Search results for: task autonomy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2541

Search results for: task autonomy

1371 Rapid Design Approach for Electric Long-Range Drones

Authors: Adrian Sauer, Lorenz Einberger, Florian Hilpert

Abstract:

The advancements and technical innovations in the field of electric unmanned aviation over the past years opened the third dimension in areas like surveillance, logistics, and mobility for a wide range of private and commercial users. Researchers and companies are faced with the task of integrating their technology into airborne platforms. Especially start-ups and researchers require unmanned aerial vehicles (UAV), which can be quickly developed for specific use cases without spending significant time and money. This paper shows a design approach for the rapid development of a lightweight automatic separate-lift-thrust (SLT) electric vertical take-off and landing (eVTOL) UAV prototype, which is able to fulfill basic transportation as well as surveillance missions. The design approach does not require expensive or time-consuming design loop software. Thereby developers can easily understand, adapt, and adjust the presented method for their own project. The approach is mainly focused on crucial design aspects such as aerofoil, tuning, and powertrain.

Keywords: aerofoil, drones, rapid prototyping, powertrain

Procedia PDF Downloads 69
1370 Determination of Flow Arrangement for Optimum Performance in Heat Exchangers

Authors: Ahmed Salisu Atiku

Abstract:

This task involves the determination of the flow arrangement for optimum performance and the calculation of total heat transfer of two identical double pipe heat exchangers in series. The inner pipe contains the cold water stream at 27°C, whilst the outer pipe contains the two hot stream of water at 50°C and 90 °C which can be mixed in any way desired. The analysis was carried out using counter flow arrangement due to its good heat transfer ability. The best way of heating this cold stream was found out to be passing the 90°C hot stream through the two heat exchangers. The outlet temperature of the cold stream was found to be 39.6°C and overall heat transfer of 131.3 kW. Though starting with 50°C hot stream in the first heat exchanger followed by 90°C hot stream in the second heat exchanger gives an outlet temperature almost the same as 90°C hot stream alone, but the heat transfer is low. The reason for the low heat transfer was that only the heat transfer in the second heat exchanger is considered. Whilst the reason behind high outlet temperature was that the cold stream was already preheated by the first stream.

Keywords: cold stream, flow arrangement, heat exchanger, hot stream

Procedia PDF Downloads 321
1369 Utilizing Waste Heat from Thermal Power Plants to Generate Power by Modelling an Atmospheric Vortex Engine

Authors: Mohammed Nabeel Khan, C. Perisamy

Abstract:

Convective vortices are normal highlights of air that ingest lower-entropy-energy at higher temperatures than they dismiss higher-entropy-energy to space. By means of the thermodynamic proficiency, it has been anticipated that the force of convective vortices relies upon the profundity of the convective layer. The atmospheric vortex engine is proposed as a gadget for delivering mechanical energy by methods for artificially produced vortex. The task of the engine is in view of the certainties that the environment is warmed from the base and cooled from the top. By generation of the artificial vortex, it is planned to take out the physical solar updraft tower and decrease the capital of the solar chimney power plants. The study shows the essentials of the atmospheric vortex engine, furthermore, audits the cutting edge in subject. Moreover, the study talks about a thought on using the solar energy as heat source to work the framework. All in all, the framework is attainable and promising for electrical power production.

Keywords: AVE, atmospheric vortex engine, atmosphere, updraft, vortex

Procedia PDF Downloads 158
1368 Modeling and Analyzing Controversy in Large-Scale Cyber-Argumentation

Authors: Najla Althuniyan

Abstract:

Online discussions take place across different platforms. These discussions have the potential to extract crowd wisdom and capture the collective intelligence from a different perspective. However, certain phenomena, such as controversy, often appear in online argumentation that makes the discussion between participants heated. Heated discussions can be used to extract new knowledge. Therefore, detecting the presence of controversy is an essential task to determine if collective intelligence can be extracted from online discussions. This paper uses existing measures for estimating controversy quantitatively in cyber-argumentation. First, it defines controversy in different fields, and then it identifies the attributes of controversy in online discussions. The distributions of user opinions and the distance between opinions are used to calculate the controversial degree of a discussion. Finally, the results from each controversy measure are discussed and analyzed using an empirical study generated by a cyber-argumentation tool. This is an improvement over the existing measurements because it does not require ground-truth data or specific settings and can be adapted to distribution-based or distance-based opinions.

Keywords: online argumentation, controversy, collective intelligence, agreement analysis, collaborative decision-making, fuzzy logic

Procedia PDF Downloads 115
1367 Granger Causal Nexus between Financial Development and Energy Consumption: Evidence from Cross Country Panel Data

Authors: Rudra P. Pradhan

Abstract:

This paper examines the Granger causal nexus between financial development and energy consumption in the group of 35 Financial Action Task Force (FATF) Countries over the period 1988-2012. The study uses two financial development indicators such as private sector credit and stock market capitalization and seven energy consumption indicators such as coal, oil, gas, electricity, hydro-electrical, nuclear and biomass. Using panel cointegration tests, the study finds that financial development and energy consumption are cointegrated, indicating the presence of a long-run relationship between the two. Using a panel vector error correction model (VECM), the study detects both bidirectional and unidirectional causality between financial development and energy consumption. The variation of this causality is due to the use of different proxies for both financial development and energy consumption. The policy implication of this study is that economic policies should recognize the differences in the financial development-energy consumption nexus in order to maintain sustainable development in the selected 35 FATF countries.

Keywords: energy consumption, financial development, FATF countries, Panel VECM

Procedia PDF Downloads 264
1366 A Cross-Linguistic Comparison on Compliment Responses in Turkish-English Bilinguals

Authors: Elifcan Oztekin

Abstract:

Compliment response strategies in cross-linguistic contexts have received a considerable amount of interest in sociolinguistic research in various language settings. In this respect, a common finding of these studies indicates that speakers of different languages employ different patterns in strategies to respond to compliments. This has triggered varying theoretical approaches to compliment responses within theories of politeness and the universality of speech acts. In the light of previous studies, the present study investigates compliment response strategies that Turkish-English bilingual university students use in English and Turkish response conditions through a cross-linguistic discourse completion task and interviews. Data were analyzed using Holmes’ (1988) taxonomy and the results indicate a similar pattern to what has been observed in Turkish compliments responses in previous research. Turkish-English comparisons also display noticeable similarities in macro-level strategies, while subtle differences in micro-level strategies were also observed.

Keywords: compliment response strategies, cross-cultural differences, bilingualism, sociolinguistics

Procedia PDF Downloads 210
1365 Using Wearable Technology to Monitor Workers’ Stress for Construction Safety: A Conceptual Framework

Authors: Namhun Lee, Seong Jin Kim

Abstract:

The construction industry represents one of the largest industries in the United States, yet it continues to face several occupational health and safety challenges. Many workers on construction sites are suffering from extended exposure to stressful situations such as poor and hazardous work environments and task complexity. Stress can be commonly defined as a feeling of emotional or physical tension, which can easily impact construction safety and result in a higher rate of job-related injuries in the construction industry. Physiological signals transmitted from wearable biosensors can be used to detect excessive stress. Therefore, workers’ stress should be detected and mitigated to prevent any type of serious incident or accident proactively. By doing this, construction productivity, as well as job satisfaction, would also be improved in the construction industry. To establish a foundation in this field of research, a conceptual framework for using wearable technology for construction safety has been developed for continuous and automatic monitoring of worker’s stress. The conceptual framework will serve as a foothold in future studies on the application of wearable technology for construction safety.

Keywords: construction safety, occupational stress, stress monitoring, wearable biosensors

Procedia PDF Downloads 158
1364 Cross-Knowledge Graph Relation Completion for Non-Isomorphic Cross-Lingual Entity Alignment

Authors: Yuhong Zhang, Dan Lu, Chenyang Bu, Peipei Li, Kui Yu, Xindong Wu

Abstract:

The Cross-Lingual Entity Alignment (CLEA) task aims to find the aligned entities that refer to the same identity from two knowledge graphs (KGs) in different languages. It is an effective way to enhance the performance of data mining for KGs with scarce resources. In real-world applications, the neighborhood structures of the same entities in different KGs tend to be non-isomorphic, which makes the representation of entities contain diverse semantic information and then poses a great challenge for CLEA. In this paper, we try to address this challenge from two perspectives. On the one hand, the cross-KG relation completion rules are designed with the alignment constraint of entities and relations to improve the topology isomorphism of two KGs. On the other hand, a representation method combining isomorphic weights is designed to include more isomorphic semantics for counterpart entities, which will benefit the CLEA. Experiments show that our model can improve the isomorphism of two KGs and the alignment performance, especially for two non-isomorphic KGs.

Keywords: knowledge graphs, cross-lingual entity alignment, non-isomorphic, relation completion

Procedia PDF Downloads 118
1363 Comparing Nonverbal Deception Detection of Police Officers and Human Resources Students in the Czech Republic

Authors: Lenka Mynaříková, Hedvika Boukalová

Abstract:

The study looks at the ability to detect nonverbal deception among police officers and management students in the Czech Republic. Respondents from police departments (n=197) and university students of human resources (n=161) completed a deception detection task and evaluated veracity of the statements of suspects in 21 video clips from real crime investigations. Their evaluations were based on nonverbal behavior. Voices in the video clips were modified so that words were not recognizable, yet paraverbal voice characteristics were preserved. Results suggest that respondents have a tendency to lie bias based on their profession. In the evaluation of video clips, stereotypes also played a significant role. The statements of suspects of a different ethnicity, younger age or specific visual features were considered deceitful more often. Research might be beneficial for training in professions that are in need of deception detection techniques.

Keywords: deception detection, police officers, human resources, forensic psychology, forensic studies, organizational psychology

Procedia PDF Downloads 430
1362 Passive Non-Prehensile Manipulation on Helix Path Based on Mechanical Intelligence

Authors: Abdullah Bajelan, Adel Akbarimajd

Abstract:

Object manipulation techniques in robotics can be categorized in two major groups including manipulation with grasp and manipulation without grasp. The original aim of this paper is to develop an object manipulation method where in addition to being grasp-less, the manipulation task is done in a passive approach. In this method, linear and angular positions of the object are changed and its manipulation path is controlled. The manipulation path is a helix track with constant radius and incline. The method presented in this paper proposes a system which has not the actuator and the active controller. So this system requires a passive mechanical intelligence to convey the object from the status of the source along the specified path to the goal state. This intelligent is created based on utilizing the geometry of the system components. A general set up for the components of the system is considered to satisfy the required conditions. Then after kinematical analysis, detailed dimensions and geometry of the mechanism is obtained. The kinematical results are verified by simulation in ADAMS.

Keywords: mechanical intelligence, object manipulation, passive mechanism, passive non-prehensile manipulation

Procedia PDF Downloads 480
1361 Protein and Mineral Removal from Dairy Waste-Water Using Precipitation Process

Authors: Zahra Akbari, Farzin Zokaee, Talat Ghomashchi

Abstract:

Whey is a by-product of the dairy industry whose major components are lactose (44–52 g/L), proteins (6–8 g/L) and mineral salts (4–9 g/L). Approximately 50% of 121 million tons of whey produced in the world in 1993 were disposed into rivers, lakes or other water bodies, treated in wastewater treatment plants or loaded onto land. This represents a significant loss of resources and causes serious pollution problems since whey is a heavy organic pollutant with high COD and BOD values, 40–60 g/L and 50–80 g/L, respectively. The removal of cheese whey proteins and minerals represent an important task both in environmental and in food sciences. The most important treatments which are considered in this study, have been done by using lime, Al2O3, FeCl3 and AlCl3 along with heating and also acidic-alkaline method. Results show that the best way for removal of protein is accomplished with adding HCl to decrease pH from 6 to 4, boiling for 20 min, and filtering protein aggregates. Also partial demineralization in whey solution for reducing ash is accomplished by adding NaOH to increase pH to 7.2 and heating solution for 20 min.

Keywords: whey treatment, dairy industry, precipitation, protein, mineral

Procedia PDF Downloads 413
1360 Dismantling the School-to-Prison Pipeline through Technology: A Literature Review

Authors: Yusra A. Ibrahim

Abstract:

Educational efforts to address the school-to-prison pipeline (STPP) and retain students in school require equipping teachers with evidence-based approaches to handle social-emotional behavior (SEB) needs. One aspect of these efforts involves training teachers to utilize effective and current technologies, thereby reducing SEB challenges faced by students with disabilities in their classrooms. This literature review examines eight studies conducted within the past 10 years (from 2013 to 2023) that focus on enhancing SEB needs of students with disabilities using technology. The review reveals that autism spectrum disorder (ASD), emotional behavioral disorder (EBD), and attention deficit and hyperactivity disorder (ADHD) are the predominant disabilities studied through technology interventions. Additionally, it highlights that these studies focused on examining the effectiveness of technologies in reducing disruptive behaviors, increasing on-task behaviors, reducing anxiety, and promoting social skills.

Keywords: school-to-prison pipeline, technology, evidence-based practices, EBD

Procedia PDF Downloads 66
1359 A Query Optimization Strategy for Autonomous Distributed Database Systems

Authors: Dina K. Badawy, Dina M. Ibrahim, Alsayed A. Sallam

Abstract:

Distributed database is a collection of logically related databases that cooperate in a transparent manner. Query processing uses a communication network for transmitting data between sites. It refers to one of the challenges in the database world. The development of sophisticated query optimization technology is the reason for the commercial success of database systems, which complexity and cost increase with increasing number of relations in the query. Mariposa, query trading and query trading with processing task-trading strategies developed for autonomous distributed database systems, but they cause high optimization cost because of involvement of all nodes in generating an optimal plan. In this paper, we proposed a modification on the autonomous strategy K-QTPT that make the seller’s nodes with the lowest cost have gradually high priorities to reduce the optimization time. We implement our proposed strategy and present the results and analysis based on those results.

Keywords: autonomous strategies, distributed database systems, high priority, query optimization

Procedia PDF Downloads 521
1358 Uncertainty Estimation in Neural Networks through Transfer Learning

Authors: Ashish James, Anusha James

Abstract:

The impressive predictive performance of deep learning techniques on a wide range of tasks has led to its widespread use. Estimating the confidence of these predictions is paramount for improving the safety and reliability of such systems. However, the uncertainty estimates provided by neural networks (NNs) tend to be overconfident and unreasonable. Ensemble of NNs typically produce good predictions but uncertainty estimates tend to be inconsistent. Inspired by these, this paper presents a framework that can quantitatively estimate the uncertainties by leveraging the advances in transfer learning through slight modification to the existing training pipelines. This promising algorithm is developed with an intention of deployment in real world problems which already boast a good predictive performance by reusing those pretrained models. The idea is to capture the behavior of the trained NNs for the base task by augmenting it with the uncertainty estimates from a supplementary network. A series of experiments with known and unknown distributions show that the proposed approach produces well calibrated uncertainty estimates with high quality predictions.

Keywords: uncertainty estimation, neural networks, transfer learning, regression

Procedia PDF Downloads 134
1357 A Reliable Multi-Type Vehicle Classification System

Authors: Ghada S. Moussa

Abstract:

Vehicle classification is an important task in traffic surveillance and intelligent transportation systems. Classification of vehicle images is facing several problems such as: high intra-class vehicle variations, occlusion, shadow, illumination. These problems and others must be considered to develop a reliable vehicle classification system. In this study, a reliable multi-type vehicle classification system based on Bag-of-Words (BoW) paradigm is developed. Our proposed system used and compared four well-known classifiers; Linear Discriminant Analysis (LDA), Support Vector Machine (SVM), k-Nearest Neighbour (KNN), and Decision Tree to classify vehicles into four categories: motorcycles, small, medium and large. Experiments on a large dataset show that our approach is efficient and reliable in classifying vehicles with accuracy of 95.7%. The SVM outperforms other classification algorithms in terms of both accuracy and robustness alongside considerable reduction in execution time. The innovativeness of developed system is it can serve as a framework for many vehicle classification systems.

Keywords: vehicle classification, bag-of-words technique, SVM classifier, LDA classifier, KNN classifier, decision tree classifier, SIFT algorithm

Procedia PDF Downloads 355
1356 A Comprehensive Study of Camouflaged Object Detection Using Deep Learning

Authors: Khalak Bin Khair, Saqib Jahir, Mohammed Ibrahim, Fahad Bin, Debajyoti Karmaker

Abstract:

Object detection is a computer technology that deals with searching through digital images and videos for occurrences of semantic elements of a particular class. It is associated with image processing and computer vision. On top of object detection, we detect camouflage objects within an image using Deep Learning techniques. Deep learning may be a subset of machine learning that's essentially a three-layer neural network Over 6500 images that possess camouflage properties are gathered from various internet sources and divided into 4 categories to compare the result. Those images are labeled and then trained and tested using vgg16 architecture on the jupyter notebook using the TensorFlow platform. The architecture is further customized using Transfer Learning. Methods for transferring information from one or more of these source tasks to increase learning in a related target task are created through transfer learning. The purpose of this transfer of learning methodologies is to aid in the evolution of machine learning to the point where it is as efficient as human learning.

Keywords: deep learning, transfer learning, TensorFlow, camouflage, object detection, architecture, accuracy, model, VGG16

Procedia PDF Downloads 145
1355 Iterative Design Process for Development and Virtual Commissioning of Plant Control Software

Authors: Thorsten Prante, Robert Schöch, Ruth Fleisch, Vaheh Khachatouri, Alexander Walch

Abstract:

The development of industrial plant control software is a complex and often very expensive task. One of the core problems is that a lot of the implementation and adaptation work can only be done after the plant hardware has been installed. In this paper, we present our approach to virtually developing and validating plant-level control software of production plants. This way, plant control software can be virtually commissioned before actual ramp-up of a plant, reducing actual commissioning costs and time. Technically, this is achieved by linking the actual plant-wide process control software (often called plant server) and an elaborate virtual plant model together to form an emulation system. Method-wise, we are suggesting a four-step iterative process with well-defined increments and time frame. Our work is based on practical experiences from planning to commissioning and start-up of several cut-to-size plants.

Keywords: iterative system design, virtual plant engineering, plant control software, simulation and emulation, virtual commissioning

Procedia PDF Downloads 486
1354 A Review of BIM Applications for Heritage and Historic Buildings: Challenges and Solutions

Authors: Reza Yadollahi, Arash Hejazi, Dante Savasta

Abstract:

Building Information Modeling (BIM) is growing so fast in construction projects around the world. Considering BIM's weaknesses in implementing existing heritage and historical buildings, it is critical to facilitate BIM application for such structures. One of the pieces of information to build a model in BIM is to import material and its characteristics. Material library is essential to speed up the entry of project information. To save time and prevent cost overrun, a BIM object material library should be provided. However, historical buildings' lack of information and documents is typically a challenge in renovation and retrofitting projects. Due to the lack of case documents for historic buildings, importing data is a time-consuming task, which can be improved by creating BIM libraries. Based on previous research, this paper reviews the complexities and challenges in BIM modeling for heritage, historic, and architectural buildings. Through identifying the strengths and weaknesses of the standard BIM systems, recommendations are provided to enhance the modeling platform.

Keywords: building Information modeling, historic, heritage buildings, material library

Procedia PDF Downloads 117
1353 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering

Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining

Abstract:

DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.

Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)

Procedia PDF Downloads 274
1352 Socio-cultural Dimensions Inhibiting Female Condom Use by the Female Students: Experiences from a University in Rural South Africa

Authors: Christina Tafadzwa

Abstract:

Global HIV and AIDS trends show that Sub-Saharan Africa is the hardest-hit region, and women are disproportionately affected and infected by HIV. The trend is conspicuous in South Africa, where adolescent girls and young women (AGYW), female university students included, bear the burden of HIV infection. Although the female condom (FC) is the only female-oriented HIV and AIDS technology that provides dual protection against unwanted pregnancy and HIV, its uptake and use remain erratic, especially among the youth and young women in institutions of higher learning. This paper explores empirical evidence from the University of Venda (UniVen), which is in the rural areas of Limpopo Province in South Africa, and also among higher learning institutions experiencing low uptake and use of the FC. A phenomenological approach consisting of in-depth interviews was utilized to collect data from a total of 20 female university students at UniVen who were purposively sampled based on their participation in HIV and AIDS dialogues and campaigns conducted on campus. The findings that were analysed thematically revealed that notions of rurality and sociocultural beliefs surrounding women's sexual and reproductive health are key structural factors that influence the low use and uptake of the FC at the rural university. The evidence thus far revealed that female students are discouraged from collecting or initiating FC because of cultural dictates or prescripts which place the responsibility to collect and initiate condom use on men. Hence the inference that UniVen female students' realities are compounded by notions of rurality and society's patriarchal nature that intersect and limit women's autonomy in matters of sex. Guided by the women empowerment theory, this paper argues that such practices take away UniVen female students' agency to decide on their sexual and reproductive health. The normalisation of socio-cultural and harmful gender practices is also a retrogression in the women's health agenda. The paper recommends a holistic approach that engages traditional and community leaders, particularly men, to unlearn and uproot harmful gender norms and patriarchal elements that hinder the promotion and use of the FC.

Keywords: female condom, UniVen, socio-cultural factors, female students, HIV and AIDS

Procedia PDF Downloads 88
1351 Semi-Automatic Method to Assist Expert for Association Rules Validation

Authors: Amdouni Hamida, Gammoudi Mohamed Mohsen

Abstract:

In order to help the expert to validate association rules extracted from data, some quality measures are proposed in the literature. We distinguish two categories: objective and subjective measures. The first one depends on a fixed threshold and on data quality from which the rules are extracted. The second one consists on providing to the expert some tools in the objective to explore and visualize rules during the evaluation step. However, the number of extracted rules to validate remains high. Thus, the manually mining rules task is very hard. To solve this problem, we propose, in this paper, a semi-automatic method to assist the expert during the association rule's validation. Our method uses rule-based classification as follow: (i) We transform association rules into classification rules (classifiers), (ii) We use the generated classifiers for data classification. (iii) We visualize association rules with their quality classification to give an idea to the expert and to assist him during validation process.

Keywords: association rules, rule-based classification, classification quality, validation

Procedia PDF Downloads 437
1350 An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots

Authors: Baoshan Wei, Shuai Han, Xing Zhang

Abstract:

Local obstacle avoidance is critical for mobile robot navigation. It is a challenging task to ensure path optimality and safety in cluttered environments. We proposed an Environment Aware Dynamic Window Approach in this paper to cope with the issue. The method integrates environment characterization into Dynamic Window Approach (DWA). Two strategies are proposed in order to achieve the integration. The local goal strategy guides the robot to move through openings before approaching the final goal, which solves the local minima problem in DWA. The adaptive control strategy endows the robot to adjust its state according to the environment, which addresses path safety compared with DWA. Besides, the evaluation shows that the path generated from the proposed algorithm is safer and smoother compared with state-of-the-art algorithms.

Keywords: adaptive control, dynamic window approach, environment aware, local obstacle avoidance, mobile robots

Procedia PDF Downloads 157
1349 Women’s Empowerment on Modern Contraceptive Use in Poor-Rich Segment of Population: Evidence From South Asian Countries

Authors: Muhammad Asim, Mehvish Amjad

Abstract:

Background: Less than half of women in South Asia (SA) use any modern contraceptive method which leads to a huge burden of unintended pregnancies, unsafe abortions, maternal deaths, and socioeconomic loss. Women empowerment plays a pivotal role in improving various health seeking behaviours, including contraceptive use. The objective of this study to explore the association between women's empowerment and modern contraceptive, among rich and poor segment of population in SA. Methods: We used the most recent, large-scale, demographic health survey data of five South Asian countries, namely Afghanistan, Pakistan, Bangladesh, India, and Nepal. The outcome variable was the current use of modern contraceptive methods. The main exposure variable was a combination (interaction) of socio-economic status (SES) and women’s level of empowerment (low, medium, and high), where SES was bifurcated into poor and rich; and women empowerment was divided into three categories: decision making, attitude to violence and social independence. Moreover, overall women empowerment indicator was also created by using three dimensions of women empowerment. We applied both descriptive statistics and multivariable logistic regression techniques for data analyses. Results: Most of the women possessed ‘medium’ level of empowerment across South Asian Countries. The lowest attitude to violence empowerment was found in Afghanistan, and the lowest social independence empowerment was observed in Bangladesh across SA. However, Pakistani women have the lowest decision-making empowerment in the region. The lowest modern contraceptive use (22.1%) was found in Afghanistan and the highest (53.2%) in Bangladesh. The multivariate results depict that the overall measure of women empowerment does not affect modern contraceptive use among poor and rich women in most of South Asian countries. However, the decision-making empowerment plays a significant role among both poor and rich women to use modern contraceptive methods across South Asian countries. Conclusions: The effect of women’s empowerment on modern contraceptive use is not consistent across countries, and among poor and rich segment of population. Of the three dimensions of women’s empowerment, the autonomy of decision making in household affairs emerged as a stronger determinant of mCPR as compared with social independence and attitude towards violence against women.

Keywords: women empowerment, modern contraceptive use, South Asia, socio economic status

Procedia PDF Downloads 78
1348 Importance of an E-Learning Program in Stress Field for Postgraduate Courses of Doctors

Authors: Ramona-Niculina Jurcau, Ioana-Marieta Jurcau

Abstract:

Background: Preparing in the stress field (SF) is, increasingly, a concern for doctors of different specialties. Aims: The aim was to evaluate the importance of an e-learning program for doctors postgraduate courses, in SF. Methods: Doctors (n= 40 male, 40 female) of different specialties and ages (31-71 years), who attended postgraduate courses in SF, voluntarily responded to a questionnaire that included the following themes: Importance of SF courses for specialty practiced by each respondent doctor (using visual analogue scale, VAS); What SF themes would be indicated as e-learning (EL); Preferred form of SF information assimilation: Classical lectures (CL), EL or a combination of these methods (CL+EL); Which information on the SF course are facilitated by EL model versus CL; In their view which are the first four advantages and the first four disadvantages of EL compared to CL, for SF. Results: To most respondents, the SF courses are important for the specialty they practiced (VAS by an average of 4). The SF themes suggested to be done as EL were: Stress mechanisms; stress factor models for different medical specialties; stress assessment methods; primary stress management methods for different specialties. Preferred form of information assimilation was CL+EL. Aspects of the course facilitated by EL versus CL model: Active reading of theoretical information, with fast access to keywords details; watching documentaries in everyone's favorite order; practice through tests and the rapid control of results. The first four EL advantages, mentioned for SF were: Autonomy in managing the time allocated to the study; saving time for traveling to the venue; the ability to read information in various contexts of time and space; communication with colleagues, in good times for everyone. The first three EL disadvantages, mentioned for SF were: It decreases capabilities for group discussion and mobilization for active participation; EL information accession may depend on electrical source or/and Internet; learning slowdown can appear, by temptation of postponing the implementation. Answering questions was partially influenced by the respondent's age and genre. Conclusions: 1) Post-graduate courses in SF are of interest to doctors of different specialties. 2) The majority of participating doctors preferred EL, but combined with CL (CL+EL). 3) Preference for EL was manifested mainly by young or middle age men doctors. 4) It is important to balance the proper formula for chosen EL, to be the most efficient, interesting, useful and agreeable.

Keywords: stress field, doctors’ postgraduate courses, classical lectures, e-learning lecture

Procedia PDF Downloads 236
1347 The Layered Transition Metal Dichalcogenides as Materials for Storage Clean Energy: Ab initio Investigations

Authors: S. Meziane, H. I. Faraoun, C. Esling

Abstract:

Transition metal dichalcogenides have potential applications in power generation devices that convert waste heat into electric current by the so-called Seebeck and Hall effects thus providing an alternative energy technology to reduce the dependence on traditional fossil fuels. In this study, the thermoelectric properties of 1T and 2HTaX2 (X= S or Se) dichalcogenide superconductors have been computed using the semi-classical Boltzmann theory. Technologically, the task is to fabricate suitable materials with high efficiency. It is found that 2HTaS2 possesses the largest value of figure of merit ZT= 1.27 at 175 K. From a scientific point of view, we aim to model the underlying materials properties and in particular the transport phenomena as mediated by electrons and lattice vibrations responsible for superconductivity, Charge Density Waves (CDW) and metal/insulator transitions as function of temperature. The goal of the present work is to develop an understanding of the superconductivity of these selected materials using the transport properties at the fundamental level.

Keywords: Ab initio, High efficiency, Power generation devices, Transition metal dichalcogenides

Procedia PDF Downloads 196
1346 Factors Affecting English Language Acquisition and Learning for Primary Schools in Nigeria

Authors: Chibuzor Dalmeida

Abstract:

This paper shall discuss the factors affecting English Language Acquisition and Learning for Primary School in Nigeria. Learning English language is a difficult task mostly those at the primary school level. Pupils find it more difficult on vocabulary, grammar and sentence structure, idioms, pronunciation etc. Researchers have discovered the reasons behind these discrepancies and have formulated theories that could be of utmost assistance to English language teachers and students. This paper further looked at the following factors that include Learner Characteristics and Personal Traits, Situational and Environmental Factors, Prior Language Development and Competence and Age and Brain Development. It further recommended that pupils must learn new vocabulary, rules for grammar and sentence structure, idioms, pronunciation. Pupils whose families and communities set high standards for language acquisition learn more quickly than those who do not. Exposure to high-quality programs also essential. Pupils do best when they are allowed to speak their native language.

Keywords: acquisition, affecting, factors, learning

Procedia PDF Downloads 627
1345 Experimental Study of Hyperparameter Tuning a Deep Learning Convolutional Recurrent Network for Text Classification

Authors: Bharatendra Rai

Abstract:

The sequence of words in text data has long-term dependencies and is known to suffer from vanishing gradient problems when developing deep learning models. Although recurrent networks such as long short-term memory networks help to overcome this problem, achieving high text classification performance is a challenging problem. Convolutional recurrent networks that combine the advantages of long short-term memory networks and convolutional neural networks can be useful for text classification performance improvements. However, arriving at suitable hyperparameter values for convolutional recurrent networks is still a challenging task where fitting a model requires significant computing resources. This paper illustrates the advantages of using convolutional recurrent networks for text classification with the help of statistically planned computer experiments for hyperparameter tuning.

Keywords: long short-term memory networks, convolutional recurrent networks, text classification, hyperparameter tuning, Tukey honest significant differences

Procedia PDF Downloads 128
1344 Delivery of Patient-Directed Wound Care Via Mobile Application-Based Qualitative Analysis

Authors: Amulya Srivatsa, Gayatri Prakash, Deeksha Sarda, Varshni Nandakumar, Duncan Salmon

Abstract:

Delivery of Patient-Directed Wound Care Via Mobile Application-Based Qualitative Analysis Chronic wounds are difficult for patients to manage at-home due to their unpredictable healing process. These wounds are associated with increased morbidity and negatively affect physical and mental health. The solution is a mobile application that will have an algorithm-based checklist to determine the state of the wound based on different factors that vary from person to person. Once this information is gathered, the application will recommend a plan of care to the user and subsequent steps to be taken. The mobile application will allow users to perform a digital scan of the wound to extract quantitative information regarding wound width, length, and depth, which will then be uploaded to the EHR to notify the patient’s provider. This scan utilizes a photo taken by the user, who is prompted appropriately. Furthermore, users will enter demographic information and answer multiple choice and drop-down menus describing the wound state. The proposed solution can save patients from unnecessary trips to the hospital for chronic wound care. The next iteration of the application can incorporate AI to allow users to perform a digital scan of the wound to extract quantitative information regarding wound width, length, and depth, which can be shared with the patient’s provider to allow for more efficient treatment. Ultimately, this product can provide immediate and economical medical advice for patients that suffer from chronic wounds. Research Objectives: The application should be capable of qualitative analysis of a wound and recommend a plan of care to the user. Additionally, the results of the wound analysis should automatically upload to the patient’s EMR. Research Methodologies: The app has two components: the first is a checklist with tabs for varying factors that assists users in the assessment of their skin. Subsequently, the algorithm will create an at-home regimen for patients to follow to manage their wounds. Research Contributions: The app aims to return autonomy back to the patient and reduce the number of visits to a physician for chronic wound care. The app also serves to educate the patient on how best to care for their wounds.

Keywords: wound, app, qualitative, analysis, home, chronic

Procedia PDF Downloads 64
1343 A Taxonomy of Behavior for a Medical Coordinator by Utlizing Leadership Styles

Authors: Aryana Collins Jackson, Elisabetta Bevacqua, Pierre De Loor, Ronan Querrec

Abstract:

This paper presents a taxonomy of non-technical skills, communicative intentions, and behavior for an individual acting as a medical coordinator. In medical emergency situations, a leader among the group is imperative to both patient health and team emotional and mental health. Situational Leadership is used to make clear and easy-to-follow guidelines for behavior depending on circumstantial factors. Low-level leadership behaviors belonging to two different styles, directive and supporting, are identified from literature and are included in the proposed taxonomy. The high-level information in the taxonomy consists of the necessary non-technical skills belonging to a medical coordinator: situation awareness, decision making, task management, and teamwork. Finally, communicative intentions, dimensions, and functions are included. Thus this work brings high-level and low-level information - medical non-technical skills, communication capabilities, and leadership behavior - into a single versatile taxonomy of behavior.

Keywords: human behavior, leadership styles, medical, taxonomy

Procedia PDF Downloads 158
1342 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 240