Search results for: data integrity challenges
28093 Copyright Clearance for Artificial Intelligence Training Data: Challenges and Solutions
Authors: Erva Akin
Abstract:
– The use of copyrighted material for machine learning purposes is a challenging issue in the field of artificial intelligence (AI). While machine learning algorithms require large amounts of data to train and improve their accuracy and creativity, the use of copyrighted material without permission from the authors may infringe on their intellectual property rights. In order to overcome copyright legal hurdle against the data sharing, access and re-use of data, the use of copyrighted material for machine learning purposes may be considered permissible under certain circumstances. For example, if the copyright holder has given permission to use the data through a licensing agreement, then the use for machine learning purposes may be lawful. It is also argued that copying for non-expressive purposes that do not involve conveying expressive elements to the public, such as automated data extraction, should not be seen as infringing. The focus of such ‘copy-reliant technologies’ is on understanding language rules, styles, and syntax and no creative ideas are being used. However, the non-expressive use defense is within the framework of the fair use doctrine, which allows the use of copyrighted material for research or educational purposes. The questions arise because the fair use doctrine is not available in EU law, instead, the InfoSoc Directive provides for a rigid system of exclusive rights with a list of exceptions and limitations. One could only argue that non-expressive uses of copyrighted material for machine learning purposes do not constitute a ‘reproduction’ in the first place. Nevertheless, the use of machine learning with copyrighted material is difficult because EU copyright law applies to the mere use of the works. Two solutions can be proposed to address the problem of copyright clearance for AI training data. The first is to introduce a broad exception for text and data mining, either mandatorily or for commercial and scientific purposes, or to permit the reproduction of works for non-expressive purposes. The second is that copyright laws should permit the reproduction of works for non-expressive purposes, which opens the door to discussions regarding the transposition of the fair use principle from the US into EU law. Both solutions aim to provide more space for AI developers to operate and encourage greater freedom, which could lead to more rapid innovation in the field. The Data Governance Act presents a significant opportunity to advance these debates. Finally, issues concerning the balance of general public interests and legitimate private interests in machine learning training data must be addressed. In my opinion, it is crucial that robot-creation output should fall into the public domain. Machines depend on human creativity, innovation, and expression. To encourage technological advancement and innovation, freedom of expression and business operation must be prioritised.Keywords: artificial intelligence, copyright, data governance, machine learning
Procedia PDF Downloads 8328092 Lennox-gastaut Syndrome Associated with Dysgenesis of Corpus Callosum
Authors: A. Bruce Janati, Muhammad Umair Khan, Naif Alghassab, Ibrahim Alzeir, Assem Mahmoud, M. Sammour
Abstract:
Rationale: Lennox-Gastaut syndrome(LGS) is an electro-clinical syndrome composed of the triad of mental retardation, multiple seizure types, and the characteristic generalized slow spike-wave complexes in the EEG. In this article, we report on two patients with LGS whose brain MRI showed dysgenesis of corpus callosum(CC). We review the literature and stress the role of CC in the genesis of secondary bilateral synchrony(SBS). Method: This was a clinical study conducted at King Khalid Hospital. Results: The EEG was consistent with LGS in patient 1 and unilateral slow spike-wave complexes in patient 2. The MRI showed hypoplasia of the splenium of CC in patient 1, and global hypoplasia of CC combined with Joubert syndrome in patient 2. Conclusion: Based on the data, we proffer the following hypotheses: 1-Hypoplasia of CC interferes with functional integrity of this structure. 2-The genu of CC plays a pivotal role in the genesis of secondary bilateral synchrony. 3-Electrodecremental seizures in LGS emanate from pacemakers generated in the brain stem, in particular the mesencephalon projecting abnormal signals to the cortex via thalamic nuclei. 4-Unilateral slow spike-wave complexes in the context of mental retardation and multiple seizure types may represent a variant of LGS, justifying neuroimaging studies.Keywords: EEG, Lennox-Gastaut syndrome, corpus callosum , MRI
Procedia PDF Downloads 44628091 Transferable Knowledge: Expressing Lessons Learnt from Failure to Outsiders
Authors: Stijn Horck
Abstract:
Background: The value of lessons learned from failure increases when these insights can be put to use by those who did not experience the failure. While learning from others has mostly been researched between individuals or teams within the same environment, transferring knowledge from the person who experienced the failure to an outsider comes with extra challenges. As sense-making of failure is an individual process leading to different learning experiences, the potential of lessons learned from failure is highly variable depending on who is transferring the lessons learned. Using an integrated framework of linguistic aspects related to attributional egotism, this study aims to offer a complete explanation of the challenges in transferring lessons learned from failures that are experienced by others. Method: A case study of a failed foundation established to address the information needs for GPs in times of COVID-19 has been used. An overview of failure causes and lessons learned were made through a preliminary analysis of data collected in two phases with metaphoric examples of failure types. This was followed up by individual narrative interviews with the board members who have all experienced the same events to analyse the individual variance of lessons learned through discourse analysis. This research design uses the researcher-as-instrument approach since the recipient of these lessons learned is the author himself. Results: Thirteen causes were given why the foundation has failed, and nine lessons were formulated. Based on the individually emphasized events, the explanation of the failure events mentioned by all or three respondents consisted of more linguistic aspects related to attributional egotism than failure events mentioned by only one or two. Moreover, the learning events mentioned by all or three respondents involved lessons learned that are based on changed insight, while the lessons expressed by only one or two are more based on direct value. Retrospectively, the lessons expressed as a group in the first data collection phase seem to have captured some but not all of the direct value lessons. Conclusion: Individual variance in expressing lessons learned to outsiders can be reduced using metaphoric or analogical explanations from a third party. In line with the attributional egotism theory, individuals separated from a group that has experienced the same failure are more likely to refer to failure causes of which the chances to be contradicted are the smallest. Lastly, this study contributes to the academic literature by demonstrating that the use of linguistic analysis is suitable for investigating the knowledge transfer from lessons learned after failure.Keywords: failure, discourse analysis, knowledge transfer, attributional egotism
Procedia PDF Downloads 11528090 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 13428089 Nuances of Urban Ecology in the Present Global Scenario: Scope, Issues, Challenges and Implications
Authors: Meenakshi Pappu
Abstract:
The term, 'urban ecology' has often been misconstrued by the educational practitioners as well as the researchers as a study under a single discipline i.e., the environmental sciences. One who has done research extensively in this study would always argue that urban ecology is not a study under a single discipline, but it is a study across disciplines such as social sciences and other sciences like architecture, engineering, planning, ecology, geography, biology, economics, sociology, anthropology, psychology and health sciences. The aim of this paper is to discuss at length the scope of Urban Ecology as an interdisciplinary study. The paper highlights the nuances of urban ecology as a study across disciplines and the challenges and the implications it holds for future research by conducting a qualitative survey in the particular areas.Keywords: educational practitioners, interdisciplinary, researchers, urban ecology
Procedia PDF Downloads 42028088 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 6228087 Role of mHealth in Effective Response to Disaster
Authors: Mohammad H. Yarmohamadian, Reza Safdari, Nahid Tavakoli
Abstract:
In recent years, many countries have suffered various natural disasters. Disaster response continues to face the challenges in health care sector in all countries. Information and communication management is a significant challenge in disaster scene. During the last decades, rapid advances in information technology have led to manage information effectively and improve communication in health care setting. Information technology is a vital solution for effective response to disasters and emergencies so that if an efficient ICT-based health information system is available, it will be highly valuable in such situation. Of that, mobile technology represents a nearly computing technology infrastructure that is accessible, convenient, inexpensive and easy to use. Most projects have not yet reached the deployment stage, but evaluation exercises show that mHealth should allow faster processing and transport of patients, improved accuracy of triage and better monitoring of unattended patients at a disaster scene. Since there is a high prevalence of cell phones among world population, it is expected the health care providers and managers to take measures for applying this technology for improvement patient safety and public health in disasters. At present there are challenges in the utilization of mhealth in disasters such as lack of structural and financial issues in our country. In this paper we will discuss about benefits and challenges of mhealth technology in disaster setting considering connectivity, usability, intelligibility, communication and teaching for implementing this technology for disaster response.Keywords: information technology, mhealth, disaster, effective response
Procedia PDF Downloads 44028086 Ambivalence in Embracing Artificial Intelligence in the Units of a Public Hospital in South Africa
Authors: Sanele E. Nene L., Lia M. Hewitt
Abstract:
Background: Artificial intelligence (AI) has a high value in healthcare, various applications have been developed for the efficiency of clinical operations, such as appointment/surgery scheduling, diagnostic image analysis, prognosis, prediction and management of specific ailments. Purpose: The purpose of this study was to explore, describe, contrast, evaluate, and develop the various leadership strategies as a conceptual framework, applied by public health Operational Managers (OMs) to embrace AI benefits, with the aim to improve the healthcare system in a public hospital. Design and Method: A qualitative, exploratory, descriptive and contextual research design was followed and a descriptive phenomenological approach. Five phases were followed to conduct this study. Phenomenological individual interviews and focus groups were used to collect data and a phenomenological thematic data analysis method was used. Findings and conclusion: Three themes surfaced as the experiences of AI by the OMs; Positive experiences related to AI, Management and leadership processes in AI facilitation, and Challenges related to AI.Keywords: ambivalence, embracing, Artificial intelligence, public hospital
Procedia PDF Downloads 7928085 Examination of Occupational Health and Safety Practices in Ghana
Authors: Zakari Mustapha, Clinto Aigbavboa, Wellinton Didi Thwala
Abstract:
Occupational Health and Safety (OHS) issues has been a major challenge to the Ghanaian government. The purpose of the study was to examine OHS practices in Ghana. The study looked at various views from different scholars about OHS practices in order to achieve the objective of the study. Literature review was conducted on OHS in Ghana. Findings from the study shows Ministry of Roads and Transport (MRT) and Ministry of Water Resources, Works and Housing (MWRWH) are two government ministries in charge of construction and implementation of the construction sector policy. The Factories, Offices and Shops Act 1970, Act 328 and the Mining Regulations 1970 LI 665 are the two major edicts. The study presents a strong background on OHS practices in Ghana and contribute to the body of knowledge on the solution to the current trends and challenges of OHS in the construction sector.Keywords: ILO convention, OHS challenges, OHS practices, OHS improvement
Procedia PDF Downloads 36728084 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network
Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz
Abstract:
Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle
Procedia PDF Downloads 23828083 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment
Authors: Michael Gidey Gebru
Abstract:
Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output
Procedia PDF Downloads 5728082 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems
Authors: Adeniyi Onasanya, Maher Elshakankiri
Abstract:
In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services
Procedia PDF Downloads 17728081 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 9128080 Design of Functional Safe Motor Control Systems in Automotive Applications
Authors: Jae-Woo Kim, Kyung-Jung Lee, Hyun-Sik Ahn
Abstract:
This paper presents a design methodology for the motor driven automotive subsystems with the consideration of the functional safety. There are many such modules in vehicles which use DC/AC motors for an electronic throttle control system, a motor driven power steering, a motor driven seat belt systems and for HVAC systems. The functional safety for the automotive electrical and electronic parts are standardized as ISO 26262, but the development procedure is very complex to be followed. We focus on the functional safe motor controller design process and show the designed motor controller hardware satisfies the required safety integrity level by using metric calculations with the safety mechanism.Keywords: AUTOSAR, MDPS, Simulink, software component
Procedia PDF Downloads 41328079 Insecurity and Insurgency on Economic Development of Nigeria
Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi
Abstract:
Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria
Procedia PDF Downloads 10228078 Boosting Project Manager Retention: Lessons from the Volunteering Sector
Authors: Julia Wicker, Alexander Lang
Abstract:
The shortage of skilled workers is no longer unique to Europe; Australia now faces similar challenges, particularly in the field of project management. Project managers, essential to the success of a wide range of industries, frequently operate under intense stress and, as a result, may choose to leave their positions before the completion of their projects. This trend poses significant risks to project continuity, budget stability, and the long-term success of organizations. Consequently, it is crucial to explore strategies aimed at improving the retention of project managers, with a specific focus on fostering intrinsic motivation -an essential factor for achieving sustained success and commitment within project-based roles. The aim of this paper is to investigate retention strategies from other industries to identify effective practices that could be adapted to the unique challenges faced by project managers. In particular, the paper draws inspiration from the volunteer sector, an industry also heavily reliant on intrinsic motivation to drive commitment and performance. By examining how the volunteer sector sustains retention through a focus on intrinsic motivation, this paper seeks to highlight potential parallels and offer actionable insights for improving the retention of project managers. The paper includes an overview of the current landscape of retention challenges in project management, highlighting key factors that contribute to early departures and their impacts on organizations. This is followed by an analysis of interviews conducted with both active volunteers and those who have left their roles, leading to the development of a model that categorizes different types of volunteers and explores their behaviours. The model identifies specific reasons for volunteer terminating their assignments and proposes strategies to mitigate these issues. The paper then adapts these volunteer retention strategies to address the challenges faced by project managers, concluding with actionable recommendations for fostering an intrinsically motivated and resilient project management workforce. Ultimately, this research aims to contribute to broader efforts in mitigating skilled workforce shortages by offering sustainable retention strategies.Keywords: skilled workforce shortages, retention challenges in project management, retention strategies in the volunteering sector, retention strategies for project managers
Procedia PDF Downloads 628077 Mobile Marketing Adoption in Pakistan
Authors: Manzoor Ahmad
Abstract:
The rapid advancement of mobile technology has transformed the way businesses engage with consumers, making mobile marketing a crucial strategy for organizations worldwide. This paper presents a comprehensive study on the adoption of mobile marketing in Pakistan, aiming to provide valuable insights into the current landscape, challenges, and opportunities in this emerging market. To achieve this objective, a mixed-methods approach was employed, combining quantitative surveys and qualitative interviews with industry experts, marketers, and consumers. The study encompassed a diverse range of sectors, including retail, telecommunications, banking, and e-commerce, ensuring a comprehensive understanding of mobile marketing practices across different industries. The findings indicate that mobile marketing has gained significant traction in Pakistan, with a growing number of organizations recognizing its potential for reaching and engaging with consumers effectively. Factors such as increasing smartphone penetration, affordable data plans, and the rise of social media usage have contributed to the widespread adoption of mobile marketing strategies. However, several challenges and barriers to mobile marketing adoption were identified. These include issues related to data privacy and security, limited digital literacy among consumers, inadequate infrastructure, and cultural considerations. Additionally, the study highlights the need for tailored and localized mobile marketing strategies to address the diverse cultural and linguistic landscape of Pakistan. Based on the insights gained from the study, practical recommendations are provided to support organizations in optimizing their mobile marketing efforts in Pakistan. These recommendations encompass areas such as consumer targeting, content localization, mobile app development, personalized messaging, and measurement of mobile marketing effectiveness. This research contributes to the existing literature on mobile marketing adoption in developing countries and specifically sheds light on the unique dynamics of the Pakistani market. It serves as a valuable resource for marketers, practitioners, and policymakers seeking to leverage mobile marketing strategies in Pakistan, ultimately fostering the growth and success of businesses operating in this region.Keywords: mobile marketing, digital marketing, mobile advertising, adoption of mobile marketing
Procedia PDF Downloads 10928076 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria
Authors: Washima Tuleun
Abstract:
Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing
Procedia PDF Downloads 2928075 The Challenges and Opportunities Faced by Women in Geomatics Engineering: The Case of the SADC Region
Authors: Moreblessings Shoko
Abstract:
Polymersomes are materials which are considered as artificial counterparts of natural vesicles. The nanotechnology of such smart nanovesicles is very useful to enhance the efficiency of many therapeutic and diagnostic drugs. Those compounds show a higher stability, flexibility, and mechanical strength to the membrane compared to natural liposomes. Also, they can be designed in detail, the permeability of the membrane can be controlled by different stimuli, and the surface can be functionalized with different biological molecules to facilitate monitoring and target. For this purpose, this study demonstrates the formation of multifunctional and pH sensitive polymersomes and their functionalization with different reactive groups or biomolecules inside and outside of polymersomes´ membrane providing by crossing the membrane and docking/undocking processes for biomedical applications. Overall, they are highly versatile and thus present new opportunities for the design of targeted and selective recognition systems, for example, in mimicking cell functions and in synthetic biology.Keywords: women, geomatics, challenges, capacity building
Procedia PDF Downloads 57428074 Seal and Heal Miracle Ointment: Effects of Cryopreserved and Lyophilized Amniotic Membrane on Experimentally Induced Diabetic Balb/C Mice
Authors: Elizalde D. Bana
Abstract:
Healing restores continuity and form through cell replication; hence, conserving structural integrity. In response to the worldwide pressing problem of chronic wounds in the healthcare delivery system, the researcher aims to provide effective intervention to preserve the structural integrity of the person. The wound healing effects of cryopreserved and lyophilized amniotic membrane (AM) of a term fetus embedded into two (2) concentrations (1.5 % and 1.0 %) of absorption-based ointment has been evaluated in vivo using the excision wound healing model 1x1 cm size. The total protein concentration in full term fetus was determined by the Biuret and Bradford methods, which are based on UV-visible spectroscopy. The percentages of protein presence in 9.5 mg (Mass total sample) of Amniotic membrane ranges between 14.77 – 14.46 % in Bradford method, while slightly lower to 13.78 – 13.80 % concentration in Biuret method, respectively. Bradford method evidently showed higher sensitivity for proteins than Biuret test. Overall, the amniotic membrane is composed principally of proteins in which a copious amount of literature substantially proved its healing abilities. After which, an area of 1 cm by 1 cm skin tissue was excised to its full thickness from the dorsolateral aspect of the isogenic mice and was applied twice a day with the ointment formulation having two (2) concentrations for the diabetic group and non-diabetic group. The wounds of each animal were left undressed and its area was measured every other day by a standard measurement formula from day 2,4,6,8,10,12 and 14. By the 14th day, the ointment containing 1.5 % of AM in absorption-based ointment applied to non-diabetic and diabetic group showed 100 % healing. The wound areas in the animals treated with the standard antibiotic, Mupirocin Ointment (Brand X) showed a 100% healing by the 14th day but with traces of scars, indicating that AM prepared from cryopreservation and lyophilization, at that given concentration, had a better wound healing property than the standard antibiotic. Four (4) multivariate tests were used which showed a significant interaction between days and treatments, meaning that the ointments prepared in two differing concentrations and induced in different groups of the mice had a significant effect on the percent of contraction over time. Furthermore, the evaluations of its effectiveness to wound healing were all significant although in differing degrees. It is observed that the higher the concentrations of amniotic membrane, the more effective are the results.Keywords: wounds, healing, amniotic membrane ointments, biomedical, stem cell
Procedia PDF Downloads 30228073 Challenges of Management of Subaortic Membrane in a Young Adult Patient: A Case Review and Literature Review
Authors: Talal Asif, Maya Kosinska, Lucas Georger, Krish Sardesai, Muhammad Shah Miran
Abstract:
This article presents a case review and literature review focused on the challenges of managing subaortic membranes (SAM) in young adult patients with mild aortic regurgitation (AR) or aortic stenosis (AS). The study aims to discuss the diagnosis of SAM, imaging studies used for assessment, management strategies in young patients, the risk of valvular damage, and the controversy surrounding prophylactic resection in mild AR. The management of SAM in adults poses challenges due to limited treatment options and potential complications, necessitating further investigation into the progression of AS and AR in asymptomatic SAM patients. The case presentation describes a 40-year-old male with muscular dystrophy who presented with symptoms and was diagnosed with SAM. Various imaging techniques, including CT chest, transthoracic echocardiogram (TTE), and transesophageal echocardiogram (TEE), were used to confirm the presence and severity of SAM. Based on the patient's clinical profile and the absence of surgical indications, medical therapy was initiated, and regular outpatient follow-up was recommended to monitor disease progression. The discussion highlights the challenges in diagnosing SAM, the importance of imaging studies, and the potential complications associated with SAM in young patients. The article also explores the management options for SAM, emphasizing surgical resection as the definitive treatment while acknowledging the limited success rates of alternative approaches. Close monitoring and prompt intervention for complications are crucial in the management of SAM. The concluding statement emphasizes the need for further research to explore alternative treatments for SAM in young patients.Keywords: subaortic membrane, management, case report, literature review, aortic regurgitation, aortic stenosis, left ventricular outflow obstruction, guidelines, heart failure
Procedia PDF Downloads 10028072 A Generalised Propensity Score Analysis to Investigate the Influence of Agricultural Research Systems on Greenhouse Gas Emissions
Authors: Spada Alessia, Fiore Mariantonietta, Lamonaca Emilia, Contò Francesco
Abstract:
Bioeconomy can give the chance to face new global challenges and can move ahead the transition from a waste economy to an economy based on renewable resources and sustainable consumption. Air pollution is a grave issue in green challenges, mainly caused by anthropogenic factors. The agriculture sector is a great contributor to global greenhouse gases (GHGs) emissions due to lacking efficient management of the resources involved and research policies. In particular, livestock sector contributes to emissions of GHGs, deforestation, and nutrient imbalances. More effective agricultural research systems and technologies are crucial in order to improve farm productivity but also to reduce the GHGs emissions. Using data from FAOSTAT statistics and concern the EU countries; the aim of this research is to evaluate the impact of ASTI R&D (Agricultural Science and Technology Indicators) on GHGs emissions for countries EU in 2015 by generalized propensity score procedures, estimating a dose-response function, also considering a set of covariates. Expected results show the existence of the influence of ASTI R&D on GHGs across EU countries. Implications are crucial: reducing GHGs emissions by means of R&D based policies and correlatively reaching eco-friendly management of required resources by means of green available practices could have a crucial role for fair intra-generational implications.Keywords: agricultural research systems, dose-response function, generalized propensity score, GHG emissions
Procedia PDF Downloads 27828071 Towards an African Model: A Survey of Social Enterprises in South Africa
Authors: Kerryn Krige, Kerrin Myers
Abstract:
Social entrepreneurship offers the opportunity to simultaneously address both social and economic inequality in South Africa. Its appeal across racial groups, its attractiveness to young people, its applicability in rural and peri-urban markets, and its acceleration in middle income, large-business economies suits the South African context. However, the potential to deliver much-needed developmental benefits has not been realised because the social entrepreneurship debate lacks evidence as to who social entrepreneurs are, their goals and operations and the socio-economic results they achieve. As a result, policy development has been stunted, and legislative barriers and red tape remain. Social entrepreneurs are isolated from the mainstream economy, and struggle to access funding because of limitations in legislative and organisational structures. The objective of the study is to strengthen the ecosystem for social entrepreneurship in South Africa by producing robust, policy-rich information from and about social enterprises currently in operation across the country. The study employs a quantitative survey methodology, using online and telephonic data collection methods. A purposive sample of 1000 social enterprises was included in the first large-scale study of social entrepreneurship in South Africa. The results offer deep insight into the characteristics of social enterprises; the activities they undertake and the markets they serve; their modes of operation and funding sources as well as key challenges and support systems. The results contribute towards developing a model of social enterprise in the African context.Keywords: social enterprise, key characteristics, challenges and enablers, towards an African model
Procedia PDF Downloads 30728070 Caring for a Spinal Cord Injury Patient with Diabetic Nephropathy Receiving Hospice Palliative Care
Authors: Li-Ting Kung, Hui-Zhu Chen, Hsin-Tzu Lee, Wan-Yin Hsu
Abstract:
Patients with spinal cord injury combined with diabetic nephropathy may under a lot of painful conditions due to complications related to the illness itself or treatments, such as recurrent pressure ulcers, autonomic and peripheral neuropathy, as well as dialysis, for long term. This case report illustrated the nursing experience of transferring a spine cord injure patient who received hemodialysis due to adverse lifestyle-induced diabetic nephropathy to the hospice ward. Nursing care was provided in this patient from July 25th to August 30th, 2015. The tool of 'Gordon’s 11-item functional health assessment' and clinical observation, interviews as well as physical examination were used as data collections. Based on results of health assessment as above, the patient’s health problems were identified as the following: impaired skin integrity, chronic pain, and hopeless. Besides to relieve the symptom of pain due to disease or the treatment of hemodialysis and provide wound care, the first author also played a role to assist the patient to achieve his goal of receiving the hospice palliative care. Finally, with much effort of nurses to communicate with medical teams between the surgical and hospice wards, the patient was transferred to the hospice ward to have fulfilled his last wish of having a good death. We hope this nursing experience can be applied to other similar cases in the future.Keywords: diabetic nephropathy, hospice care, palliative care, spinal cord injury
Procedia PDF Downloads 15228069 Psychological Well-Being at Work Among Sport Coaches: A Systematic Review and Perspectives
Authors: Ouazoul Abdelouahd, Jemjami Nadia
Abstract:
The concept of well-being at work is one of today's major challenges in maintaining quality of life and managing psycho-social risks at work. Indeed, work in the sports sector has evolved over time, and this exponential evolution, marked by increasing demands and psychological, physical and/or social challenges, which sometimes exceed the resources of sports players, influences their sense of well-being at work. Well-being and burnout as antagonists provide information on the quality of working life in sports. The main objective of this literature review was to examine the scientific corpus dealing with the subject of psychological well-being at work in the sports sector and, more specifically, with sports coaches while exploring the link between sports burnout and well-being. The results reveal the richness of the conceptual approaches and the difficulties of putting them into practice. Prospects for future research were put forward.Keywords: psychological well-being, burnout, quality of life, sports coaching
Procedia PDF Downloads 4028068 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains
Authors: Jing Jin
Abstract:
The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry
Procedia PDF Downloads 6428067 An Investigation of Entrepreneurial Intentions, Drivers, and Challenges among Final Year Students in Jigawa State Polytechnic, Nigeria
Authors: Muhammad Umar Usman
Abstract:
This study investigates the entrepreneurial intentions, drivers and challenges of starting a business among final year students in Jigawa State polytechnic. Nigeria. Final year students of Jigawa State Polytechnic from the department of accounting, business administration and management and public administration were used as a case study. The study became necessary due to the alarming rate of graduate unemployment in Nigeria. The study adopted a holistic case study approach involving a multiple methods of questionnaires involving (182) Higher National Diploma (HND) and National Diploma (ND) final year students and a telephone interview with two lecturers teaching entrepreneurship in the college. The findings clearly indicate that exposer to entrepreneurship education increases students’ entrepreneurial intentions. The result found that desire for independence, confidence and strong intention are the most important factors that influence students’ entrepreneurial intention. The study identified 3 key drivers of students’ entrepreneurial intentions. These are to earn a living, to seek job security and provision of employment. The result again identified 4 factors namely lack of support, finance, insecurity and erratic power supply as the major challenges in starting a business in Nigeria. It was also revealed that the current entrepreneurship education programme prepares students on how to open up a business not becoming an entrepreneur. The study concluded entrepreneurship helps students toward building and driving their intention to venture into business. However, the challenges of entrepreneurship in Nigeria need to be addressed in order to enable individuals to become an entrepreneur and create employment opportunities that will lead to the development of Nigerian economy. Thus, the government should provide adequate support particularly the issue of infrastructures. The Federal Government of Nigeria in collaboration with the National Board for Technical Education should fashion out the curriculum thereby making it more practically-oriented so that students may become more interested. Polytechnics should develop an internship programme for students to work in firms so as to put theory learnt in the class to practice. Students should try to align the theory learnt in college with the practical application in dynamic economic environment. Hence, this will help in building their capabilities toward entrepreneurship development in Nigeria.Keywords: entrepreneurial intention, entrepreneurial drivers, challenges, entrepreneurial education
Procedia PDF Downloads 30128066 The Role and Challenges of Social Workers in Child Protection: The Case of Indonesia
Authors: B. Rusyidi
Abstract:
Since 2009, the Indonesian Ministry of Social Affairs has been implementing Program Kesejahteraan Sosial Anak (PKSA) (Child Welfare Program) a conditional cash transfer program that targets neglected children, children with disabilities, street children, children in conflict with the law, and children in need of special protection, all from poor households. PKSA integrates three elements: Transfer of cash, care and social services through social workers, and institutional childcare assistance. This qualitative study analyzed the roles and the challenges of social workers in implementing PKSA and lays out recommendations to inform policy changes. Data were collected in late 2014 from national and local government and non-government child welfare agencies, social workers, and childcare institution representatives through interviews and Focused Group Discussions (FGDs). Field work took place in six districts in the provinces of Jakarta, Central Java and South Sulawesi. The study found that the social workers’ role was significant in facilitating cash transfer, providing education and guidance, and linking children and families to basic social services. This improved utilization of basic social services enhanced children and families’ behaviors and contributed to the well being of the children. However, only a small number of childcare institutions have social workers, leaving many children and families without care and social service linkages, depriving them of rehabilitative components to help them regain their social functions. Some social workers reported their struggles with heavy workloads, lack of professional competencies and training, limited job security, and inadequate professional acknowledgment from other professions. Parts of those challenges were due to the centralized nature of the program and the lack of shared vision and commitment about the child protection system among related government agencies both at the national and local levels. The study highlights the necessity to implement an integrated child protection system, decentralize the PKSA program, and increase the number, competence, case management, and management and monitoring of social workers. The most recent progress of the program and its impacts on social workers are also discussed.Keywords: child protection, conditional cash transfer, program decentralization, social worker, working conditions
Procedia PDF Downloads 21828065 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation
Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes
Abstract:
Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study
Procedia PDF Downloads 40928064 Challenges and Opportunities of Utilization of Social Media by Business Education Students in Nigeria Universities
Authors: Titus Amodu Umoru
Abstract:
The global economy today is full of sophistication. All over the world, business and marketing practices are undergoing an unprecedented transformation. In realization of this fact, the federal government of Nigeria has put in place a robust transformation agenda in order to put Nigeria in a better position to be a competitive player and in the process transform all sectors of its economy. New technologies, especially the internet, are the driving force behind this transformation. However, technology has inadvertently affected the way businesses are done thus necessitating the acquisition of new skills. In developing countries like Nigeria, citizens are still battling with effective application of those technologies. Obviously, students of business education need to acquire relevant business knowledge to be able to transit into the world of work on graduation from school and compete favourably in the labour market. Therefore, effective utilization of social media by both teachers and students can help extensively in empowering students with the needed skills. Social media which is described as a group of internet-based applications that build on the ideological foundations of Web 2.0, and which allow the creation and exchange of user-generated content, if incorporated into the classroom experience may be the needed answer to unemployment and poverty in Nigeria as beneficiaries can easily connect with existing and potential enterprises and customers, engage with them and reinforce mutual business benefits. Challenges and benefits of social media use in education in Nigeria universities were revealed in this study.Keywords: business education, challenges, opportunities, utilization, social media
Procedia PDF Downloads 416