Search results for: traditional bullying
3788 A Goal-Oriented Social Business Process Management Framework
Authors: Mohammad Ehson Rangiha, Bill Karakostas
Abstract:
Social Business Process Management (SBPM) promises to overcome limitations of traditional BPM by allowing flexible process design and enactment through the involvement of users from a social community. This paper proposes a meta-model and architecture for socially driven business process management systems. It discusses the main facets of the architecture such as goal-based role assignment that combines social recommendations with user profile, and process recommendation, through a real example of a charity organization.Keywords: business process management, goal-based modelling, process recommendation social collaboration, social BPM
Procedia PDF Downloads 4943787 A Regulatory Analysis on Legal Problems of BitCoin
Authors: Fady Tawakol
Abstract:
BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law.Keywords: BitCoin, financial protection, crypto currency, money laundering
Procedia PDF Downloads 2093786 Seamless Mobility in Heterogeneous Mobile Networks
Authors: Mohab Magdy Mostafa Mohamed
Abstract:
The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into consideration power level, subscriber velocity, and target cell load instead of only power level in traditional algorithms. Simulation results show that network performance in terms of number of handovers and handover occurrence distance is improved.Keywords: vertical handover, fuzzy control theory, power level, speed, target cell load
Procedia PDF Downloads 3533785 Analysis of Suitability of Online Assessment by Maintaining Critical Thinking
Authors: Mohamed Chabi
Abstract:
The purpose of this study is to determine Whether paper assessment especially in the subject mathematics will ever be completely replaced by online assessment using Learning Management System and Content Management System such as blackboard. In the subject mathematics, the assessment is the exercise of judgment on the quality of students’ work, as a way of supporting student learning and appraising its outcomes. Testing students has moved from the traditional scribbling and sketching on paper towards working online on a screen and keyboard.Keywords: paper assessment, online assessment, learning management system, content management system, mathematics
Procedia PDF Downloads 4683784 The Neglected Elements of Implementing Strategic Succession Management in Public Organizations
Authors: François Chiocchio, Mahshid Gharibpour
Abstract:
Regardless of the extent to which succession management is implemented in the private sector, it is still overlooked in the public sector. Traditional succession management is evolving providing a better alignment between business strategies and HR strategies. Succession management brings sustainable effectiveness for succession programs through career path development, knowledge and skill transfer, job retention, as well as high-potential candidates’ empowerment for upcoming vacancies. By way of a systematic literature review, we bring into focus strategic succession management in public organizations and discuss best ways of implementation.Keywords: succession management, strategic succession management, public organization, succession management model
Procedia PDF Downloads 3553783 Aromatic and Medicinal Plants in Morocco: Diversity and Socio-Economic Role
Authors: Mohammed Sghir Taleb
Abstract:
Morocco is characterized by a great richness and diversity in aromatic and medicinal plants and it has an ancestral knowledge in the use of plants for medicinal and cosmetic purposes. In effect, the poverty of riparian, specially, mountain populations have greatly contributed to the development of traditional pharmacopoeia in Morocco. The analysis of the bibliographic data showed that a large number of plants in Morocco are exploited for aromatic and medicinal purposes and several of them are commercialized internationally. However, these potentialities of aromatic and medicinal plants are currently subjected to climate change and strong human pressures: Collecting fruits, agriculture development, harvesting plants, urbanization, overgrazing...Keywords: aromatic, medicinal, plant, Morocco
Procedia PDF Downloads 3033782 Identification of COVID-SARS Variants Based on Lactate Test Results
Authors: Zoltan Horvath, Dora Nagy
Abstract:
In this research, it was examined whether individual COVID variants cause differences in the lactate curve of cyclists. After all, the virus variants attacked different organs in our body during the infections. During our tests, we used a traditional lactate step test, the results of which were compared with the values before the infection. In the tests, it has been proven that different virus variants show unique lactate curves. In this way, based on the lactate curve, it is possible to identify which variant caused the disease. Thanks to this, it has been shorten the return time, because we can apply the best return protocol after infection to the competitors.Keywords: COVID-Sars19, lactate, virus mutation, lactate profile
Procedia PDF Downloads 663781 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 673780 Research on the Overall Protection of Historical Cities Based on the 'City Image' in Ancient Maps: Take the Ancient City of Shipu, Zhejiang, China as an Example
Authors: Xiaoya Yi, Yi He, Zhao Lu, Yang Zhang
Abstract:
In the process of rapid urbanization, many historical cities have undergone excessive demolition and construction under the protection and renewal mechanism. The original pattern of the city has been changed, the urban context has been cut off, and historical features have gradually been lost. The historical city gradually changed into the form of decentralization and fragmentation. The understanding of the ancient city includes two levels. The first one refers to the ancient city on the physical space, which defined an ancient city by its historic walls. The second refers to the public perception of the image, which is derived from people's spatial identification of the ancient city. In ancient China, people draw maps to show their way of understanding the city. Starting from ancient maps and exploring the spatial characteristics of traditional Chinese cities from the perspective of urban imagery is a key clue to understanding the spatial characteristics of historical cities on an overall level. The spatial characteristics of the urban image presented by the ancient map are summarized into two levels by typology. The first is the spatial pattern composed of the center, axis and boundary. The second is the space element that contains the city, street, and sign system. Taking the ancient city of Shipu as a typical case, the "city image" in the ancient map is analyzed as a prototype, and it is projected into the current urban space. The research found that after a long period of evolution, the historical spatial pattern of the ancient city has changed from “dominant” to “recessive control”, and the historical spatial elements are non-centralized and fragmented. The wall that serves as the boundary of the ancient city is transformed into “fragmentary remains”, the streets and lanes that serve as the axis of the ancient city are transformed into “structural remains”, and the symbols of the ancient city center are transformed into “site remains”. Based on this, the paper proposed the methods of controlling the protection of land boundaries, the protecting of the streets and lanes, and the selective restoring of the city wall system and the sign system by accurate assessment. In addition, this paper emphasizes the continuity of the ancient city's traditional spatial pattern and attempts to explore a holistic conservation method of the ancient city in the modern context.Keywords: ancient city protection, ancient maps, Shipu ancient city, urban intention
Procedia PDF Downloads 1283779 A Critical Case Study of Women Police in Ranchi, Jharkhand, India: An Analysis of Work Life Balance of Women in Jharkhand, India
Authors: Swati Minz, Pradeep Munda, Ranchi Jharkhand
Abstract:
Women of today’s era are well educated and they are best and proficient at their skills that are key to success anywhere. Government played a major role in uplifting women in Indian society. Through all these efforts Indian women decided to move forward and started choosing career path which was itself a challenge in their life. The people in the society had a very hatred feeling for the women who chose a career and moved forward. Women in today’s times have achieved a lot but in reality they have to still travel a long way. Women started leaving the secured domains of their home and moved out, but a harsh, cruel, exploitative world awaits them, where women have to prove their talent against the world who see women as merely vassals of producing children. In spite all modernisation, a woman has her limits and emerges to claim traditional male space, juggling with many family problems and multiple roles to excel at a level that would have been perceived as impossible a generation ago. Still a woman in India is storming traditional male fields. Even the occupation which had male monopoly life defense services, merchant navy, administrative or police services, these are the best examples for women now. If these women are taken under consideration they never had any issues while fighting a battle ,or trying to encroach into the men’s world ,but rather, they adopts themselves in the situation and are good ,trying to justify their roles and proving themselves. The last few decades there have been noticed an enormous growth in levels of education, confidence and the most importantly, ambition noticed towards in women, who all are striving their rights and claiming a dignified place in the society. Previously women were educated for the sake to get married and start new family but nowadays they utilize their skill productively. Since the time after independence, considering both women in India in general and women in Jharkhand in particular has played a very prominent role in all walks of life including the professions. Any success and achievement in any organisation depends on their contribution as well. Due to these consequences, there has always been a need to study and focus light on issues affecting women professionals, empowerment and their work life balance.Keywords: women, work life balance, work empowerment, career, struggle, society, challenges, family, society, achievement
Procedia PDF Downloads 3883778 Rounded-off Measurements and Their Implication on Control Charts
Authors: Ran Etgar
Abstract:
The process of rounding off measurements in continuous variables is commonly encountered. Although it usually has minor effects, sometimes it can lead to poor outcomes in statistical process control using X ̅-chart. The traditional control limits can cause incorrect conclusions if applied carelessly. This study looks into the limitations of classical control limits, particularly the impact of asymmetry. An approach to determining the distribution function of the measured parameter (Y ̅) is presented, resulting in a more precise method to establish the upper and lower control limits. The proposed method, while slightly more complex than Shewhart's original idea, is still user-friendly and accurate and only requires the use of two straightforward tables.Keywords: inaccurate measurement, SPC, statistical process control, rounded-off, control chart
Procedia PDF Downloads 403777 Object-Scene: Deep Convolutional Representation for Scene Classification
Authors: Yanjun Chen, Chuanping Hu, Jie Shao, Lin Mei, Chongyang Zhang
Abstract:
Traditional image classification is based on encoding scheme (e.g. Fisher Vector, Vector of Locally Aggregated Descriptor) with low-level image features (e.g. SIFT, HoG). Compared to these low-level local features, deep convolutional features obtained at the mid-level layer of convolutional neural networks (CNN) have richer information but lack of geometric invariance. For scene classification, there are scattered objects with different size, category, layout, number and so on. It is crucial to find the distinctive objects in scene as well as their co-occurrence relationship. In this paper, we propose a method to take advantage of both deep convolutional features and the traditional encoding scheme while taking object-centric and scene-centric information into consideration. First, to exploit the object-centric and scene-centric information, two CNNs that trained on ImageNet and Places dataset separately are used as the pre-trained models to extract deep convolutional features at multiple scales. This produces dense local activations. By analyzing the performance of different CNNs at multiple scales, it is found that each CNN works better in different scale ranges. A scale-wise CNN adaption is reasonable since objects in scene are at its own specific scale. Second, a fisher kernel is applied to aggregate a global representation at each scale and then to merge into a single vector by using a post-processing method called scale-wise normalization. The essence of Fisher Vector lies on the accumulation of the first and second order differences. Hence, the scale-wise normalization followed by average pooling would balance the influence of each scale since different amount of features are extracted. Third, the Fisher vector representation based on the deep convolutional features is followed by a linear Supported Vector Machine, which is a simple yet efficient way to classify the scene categories. Experimental results show that the scale-specific feature extraction and normalization with CNNs trained on object-centric and scene-centric datasets can boost the results from 74.03% up to 79.43% on MIT Indoor67 when only two scales are used (compared to results at single scale). The result is comparable to state-of-art performance which proves that the representation can be applied to other visual recognition tasks.Keywords: deep convolutional features, Fisher Vector, multiple scales, scale-specific normalization
Procedia PDF Downloads 3313776 Sigma-Delta ADCs Converter a Study Case
Authors: Thiago Brito Bezerra, Mauro Lopes de Freitas, Waldir Sabino da Silva Júnior
Abstract:
The Sigma-Delta A/D converters have been proposed as a practical application for A/D conversion at high rates because of its simplicity and robustness to imperfections in the circuit, also because the traditional converters are more difficult to implement in VLSI technology. These difficulties with conventional conversion methods need precise analog components in their filters and conversion circuits, and are more vulnerable to noise and interference. This paper aims to analyze the architecture, function and application of Analog-Digital converters (A/D) Sigma-Delta to overcome these difficulties, showing some simulations using the Simulink software and Multisim.Keywords: analysis, oversampling modulator, A/D converters, sigma-delta
Procedia PDF Downloads 3293775 Mental Health of Caregivers in Public Hospital Intensive Care Department: A Multicentric Cross-Sectional Study
Authors: Lamia Bouzgarrou, Amira Omrane, Naima Bouatay, Chaima Harrathi, Samia Machroughl, Ahmed Mhalla
Abstract:
Background and Aims: Professionals of health care sector are exposed to psychosocial constraints like stress, harassment, violence, which can lead to many mental health problems such as, depression, addictive behavior, and burn-out. Moreover, it’s well established that caregivers affected to intensive care units are more likely to experience such constraints and mental health problems. For these caregivers, the mental health state may affect care quality and patient’s safety. This study aims either to identify occupational psychosocial constraints and their mental health consequences among paramedical and medical caregivers affected to intensive units in Tunisian public hospital. Methods: An exhaustive three months cross-sectional study conducted among medical and paramedical staffs of intensive care units in three Tunisian university hospitals. After informed consent collection, we evaluated work-related stress, workplace harassment, depression, anxious troubles, addictive behavior, and self-esteems through an anonymous self-completed inquiry form. Five validated questionnaires and scales were included in this form: Karasek's Job Content Questionnaire, Negative Acts Questionnaire, Rosenberg, Beck depression inventory and Hamilton Anxiety scale. Results: We included 129 intensive unit caregivers; with a mean age of 36.1 ± 1.1 years and a sex ratio of 0.58. Among these caregivers, 30% were specialist or under-specialization doctors. The average seniority in the intensive care was 6.1 ± 1.2 (extremes=1 to 40 years). Atypical working schedules were noted among 36.7% of the subjects with an imposed choice in 52.4% of cases. During the last 12 months preceding the survey, 51.7% of care workers were absent from work because of a health problem with stops exceeding 15 days in 11.7%. Job strain was objective among 15% of caregivers and 38.33% of them were victims of moral harassment. A low or very low self-esteem was noted among 40% of respondents. Moreover, active smoking was reported by 20% subjects, alcohol consumption by 13.3% and psychotropic substance use by 1.7% of them. According to Beck inventory and Hamilton Anxiety scale, we concluded that 61.7% of intensive care providers were depressed, with 'severe' depression in 13.3% of cases and 49.9% of them present anxious disorders. Multivariate analysis objective that, job strain was correlated with young age (p=0.005) and shorter work seniority (p=0.001). Workplace and moral harassment was more prevalent among females (p=0.009), under-specialization doctor (p=0.021), those affected to atypical schedules (p=0.008). Concerning depression, it was more prevalent among staff in job strain situation (p = 0.004), among smokers caregivers (p = 0.048), and those with no leisure activity (p < 0.001). Anxious disorders were positively correlated to chronic diseases history (p = 0.001) and work-bullying exposure (p = 0.004). Conclusions: Our findings reflected a high frequency of caregivers who are under stress at work and those who are victims of moral harassment. These health professionals were at increased risk for developing psychiatric illness such depressive and anxious disorders and addictive behavior. Our results suggest the necessity of preventive strategies of occupational psychosocial constraints in order to preserve professional’s mental health and maximize patient safety and quality of care.Keywords: health care sector, intensive care units, mental health, psychosocial constraints
Procedia PDF Downloads 1553774 Leveraging Deep Q Networks in Portfolio Optimization
Authors: Peng Liu
Abstract:
Deep Q networks (DQNs) represent a significant advancement in reinforcement learning, utilizing neural networks to approximate the optimal Q-value for guiding sequential decision processes. This paper presents a comprehensive introduction to reinforcement learning principles, delves into the mechanics of DQNs, and explores its application in portfolio optimization. By evaluating the performance of DQNs against traditional benchmark portfolios, we demonstrate its potential to enhance investment strategies. Our results underscore the advantages of DQNs in dynamically adjusting asset allocations, offering a robust portfolio management framework.Keywords: deep reinforcement learning, deep Q networks, portfolio optimization, multi-period optimization
Procedia PDF Downloads 323773 Valorizing Traditional Greek Wheat Varieties: Use of DNA Barcoding for Species Identification and Biochemical Analysis of Their Nutritional Value
Authors: Niki Mougiou, Spyros Didos, Ioanna Bouzouka, Athina Theodorakopoulou, Michael Kornaros, Anagnostis Argiriou
Abstract:
Grains from traditional old Greek cereal varieties were evaluated and compared to commercial cultivars, like Simeto and Mexicali 81, in an effort to valorize local products and assess the nutritional benefits of ancient grains. The samples studied in this research included common wheat, durum wheat, emmer (Triticum dicoccum) and einkorn (Triticum monococcum), as well as barley, oats and rye grains. The Internal Transcribed Spacer 2 (ITS2) nuclear region was amplified and sequenced as a barcode for species identification, allowing the verification of the label of each product. After that, the total content of bound and free polyphenols and flavonoids, as well as the antioxidant activity of bound and free compounds, was measured by classic colorimetric assays using Folin- Ciocalteu, AlCl₃ and DPPH‧ (2,2-diphenyl-1-picrylhydrazyl) reagents, respectively. Moreover, the level of variation of fatty acids was determined in all samples by gas chromatography. The results showed that local old landraces of emmer and einkorn had the highest polyphenol content, 2.4 and 3.3 times higher than the average value of 5 durum wheat samples, respectively. Regarding the total flavonoid content, einkorn had 2.6-fold and emmer 2-fold higher values than common wheat. The antioxidant activity of free or bound compounds was at the same level, at about 20-30% higher in both einkorn and emmer compared to common wheat. Five main fatty acids were detected in all samples, in order of decreasing amounts: linoleic (C18:2) > palmitic (C16:0) ≈ , oleic (C18:1) > eicosenoic (C20:1, cis-11) > stearic (C18:0). Emmer and einkorn showed a higher diversity of fatty acids and a higher content of mono-unsaturated fatty acids compared to common wheat. The results of this study demonstrate the high nutritional value of old local landraces that have been put aside by more productive, yet with lower qualitative characteristics, commercial cultivars, underlining the importance of maintaining sustainable agricultural practices to ensure their continued cultivation.Keywords: biochemical analysis, nutritional value, plant barcoding, wheat
Procedia PDF Downloads 853772 The Impact of E-Markiting on Consumer Satisfaction
Authors: Malki Fatima Zahra Nadia, Kellal Chaimaa, Brahimi Houria
Abstract:
The world has witnessed a great revolution in to field of technology and communication, especially after the opening of markets (globalization) . Which has led to a change from traditional marketing, which depends on direct selling and buying to electronic marketing, consequently different corporation have adopted this concept so as to gain time , efforts and money for the sake of the customer’s satisfaction. It is the main reason of the study, which is to know the impact of electronic marketing on the consumer’s satisfaction in the fields of communication through practical studies of Ooredoo customer’s where the descriptive analytical method has been used with statistics to analyze the results of the survey. It concluded that e-marketing effectively contributes to customer satisfaction.Keywords: e-marketing, consumer, consumer behavior, satisfaction
Procedia PDF Downloads 853771 Mathematical Modeling on Capturing of Magnetic Nanoparticles in an Implant Assisted Channel for Magnetic Drug Targeting
Authors: Shashi Sharma, V. K. Katiyar, Uaday Singh
Abstract:
The ability to manipulate magnetic particles in fluid flows by means of inhomogeneous magnetic fields is used in a wide range of biomedical applications including magnetic drug targeting (MDT). In MDT, magnetic carrier particles bounded with drug molecules are injected into the vascular system up-stream from the malignant tissue and attracted or retained at the specific region in the body with the help of an external magnetic field. Although the concept of MDT has been around for many years, however, wide spread acceptance of the technique is still looming despite the fact that it has shown some promise in both in vivo and clinical studies. This is because traditional MDT has some inherent limitations. Typically, the magnetic force is not very strong and it is also very short ranged. Since the magnetic force must overcome rather large hydrodynamic forces in the body, MDT applications have been limited to sites located close to the surface of the skin. Even in this most favorable situation, studies have shown that it is difficult to collect appreciable amounts of the MDCPs at the target site. To overcome these limitations of the traditional MDT approach, Ritter and co-workers reported the implant assisted magnetic drug targeting (IA-MDT). In IA-MDT, the magnetic implants are placed strategically at the target site to greatly and locally increase the magnetic force on MDCPs and help to attract and retain the MDCPs at the targeted region. In the present work, we develop a mathematical model to study the capturing of magnetic nanoparticles flowing in a fluid in an implant assisted cylindrical channel under the magnetic field. A coil of ferromagnetic SS 430 has been implanted inside the cylindrical channel to enhance the capturing of magnetic nanoparticles under the magnetic field. The dominant magnetic and drag forces, which significantly affect the capturing of nanoparticles, are incorporated in the model. It is observed through model results that capture efficiency increases from 23 to 51 % as we increase the magnetic field from 0.1 to 0.5 T, respectively. The increase in capture efficiency by increase in magnetic field is because as the magnetic field increases, the magnetization force, which is attractive in nature and responsible to attract or capture the magnetic particles, increases and results the capturing of large number of magnetic particles due to high strength of attractive magnetic force.Keywords: capture efficiency, implant assisted-magnetic drug targeting (IA-MDT), magnetic nanoparticles, modelling
Procedia PDF Downloads 4623770 Application of Unconventional Materials for ‘Statement Jewellery’
Authors: Shaleni Bajpai, V. Niveditha
Abstract:
A fashion accessory is a product which used to give secondary way to the wearer’s outfit. The term came into use in the 19th century and was specifically chosen to complement the wearer’s look. The aim of project was to introduce the unconventional materials for statement jewellery. The materials used for statement jewellery were waste Cd’s, and scrap fabric. These materials were amalgamated with the traditional raw materials such as beads, sequins, charms and chains to form unique jewellery sets. The sets were divided into two categories based on the type of raw material used i.e. Category 1: Clef-Cd Jewellery, Category 2: Crumb-Fabric Jewellery. Each Jewellery set consisted of a necklace, a pair of earrings, a ring and a bracelet.Keywords: statement jewellery, unconventional, crumb fabric, Cd’s
Procedia PDF Downloads 2583769 Phytochemical Screening and Toxicological Studies of Aqueous Stem Bark Extract of Boswellia papyrifera (DEL) in Rats
Authors: Y. Abdulmumin, K. I. Matazu, A. M. Wudil, A. J. Alhassan, A. A. Imam
Abstract:
Phytochemical analysis of Boswellia papryfera confirms the presence of various phytochemicals such as alkaloids, flavonoids, tannins, saponins and cardiac glycosides in its aqueous stem bark extract at different concentration, with tannins being the highest (0.611 ± 0.002 g %). Acute toxicity test (LD50, oral, rat) of the extract showed no mortality at up to 5000 mg/kg and the animals were found active and healthy. The extract was declared as practically non-toxic, this suggest the safety of the extract in traditional medicine.Keywords: acute toxicity, aqueous extract, boswellia papryfera, phytochemicals and stem bark
Procedia PDF Downloads 4563768 Bionaut™: A Breakthrough Robotic Microdevice to Treat Non-Communicating Hydrocephalus in Both Adult and Pediatric Patients
Authors: Suehyun Cho, Darrell Harrington, Florent Cros, Olin Palmer, John Caputo, Michael Kardosh, Eran Oren, William Loudon, Alex Kiselyov, Michael Shpigelmacher
Abstract:
Bionaut Labs, LLC is developing a minimally invasive robotic microdevice designed to treat non-communicating hydrocephalus in both adult and pediatric patients. The device utilizes biocompatible microsurgical particles (Bionaut™) that are specifically designed to safely and reliably perform accurate fenestration(s) in the 3rd ventricle, aqueduct of Sylvius, and/or trapped intraventricular cysts of the brain in order to re-establish normal cerebrospinal fluid flow dynamics and thereby balance and/or normalize intra/intercompartmental pressure. The Bionaut™ is navigated to the target via CSF or brain tissue in a minimally invasive fashion with precise control using real-time imaging. Upon reaching the pre-defined anatomical target, the external driver allows for directing the specific microsurgical action defined to achieve the surgical goal. Notable features of the proposed protocol are i) Bionaut™ access to the intraventricular target follows a clinically validated endoscopy trajectory which may not be feasible via ‘traditional’ rigid endoscopy: ii) the treatment is microsurgical, there are no foreign materials left behind post-procedure; iii) Bionaut™ is an untethered device that is navigated through the subarachnoid and intraventricular compartments of the brain, following pre-designated non-linear trajectories as determined by the safest anatomical and physiological path; iv) Overall protocol involves minimally invasive delivery and post-operational retrieval of the surgical Bionaut™. The approach is expected to be suitable to treat pediatric patients 0-12 months old as well as adult patients with obstructive hydrocephalus who fail traditional shunts or are eligible for endoscopy. Current progress, including platform optimization, Bionaut™ control, and real-time imaging and in vivo safety studies of the Bionauts™ in large animals, specifically the spine and the brain of ovine models, will be discussed.Keywords: Bionaut™, cerebrospinal fluid, CSF, fenestration, hydrocephalus, micro-robot, microsurgery
Procedia PDF Downloads 1703767 Social Business Model: Leveraging Business and Social Value of Social Enterprises
Authors: Miriam Borchardt, Agata M. Ritter, Macaliston G. da Silva, Mauricio N. de Carvalho, Giancarlo M. Pereira
Abstract:
This paper aims to analyze the barriers faced by social enterprises and based on that to propose a social business model framework that helps them to leverage their businesses and the social value delivered. A business model for social enterprises should amplify the value perception including social value for the beneficiaries while generating enough profit to escalate the business. Most of the social value beneficiaries are people from the base of the economic pyramid (BOP) or the ones that have specific needs. Because of this, products and services should be affordable to consumers while solving social needs of the beneficiaries. Developing products and services with social value require tie relationship among the social enterprises and universities, public institutions, accelerators, and investors. Despite being focused on social value and contributing to the beneficiaries’ quality of life as well as contributing to the governments that cannot properly guarantee public services and infrastructure to the BOP, many barriers are faced by the social enterprises to escalate their businesses. This is a work in process and five micro- and small-sized social enterprises in Brazil have been studied: (i) one has developed a kit for cervical uterine cancer detection to allow the BOP women to collect their own material and deliver to a laboratory for U$1,00; (ii) other has developed special products without lactose and it is about 70% cheaper than the traditional brands in the market; (iii) the third has developed prosthesis and orthosis to surplus needs that health public system have not done efficiently; (iv) the fourth has produced and commercialized menstrual panties aiming to reduce the consumption of dischargeable ones while saving money to the consumers; (v) the fifth develops and commercializes clothes from fabric wastes in a partnership with BOP artisans. The preliminary results indicate that the main barriers are related to the public system to recognize these products as public money that could be saved if they bought products from these enterprises instead of the multinational pharmaceutical companies, to the traditional distribution system (e.g. pharmacies) that avoid these products because of the low or non-existing profit, to the difficulty buying raw material in small quantities, to leverage investment by the investors, to cultural barriers and taboos. Interesting strategies to reduce the costs have been observed: some enterprises have focused on simplifying products, others have invested in partnerships with local producers and have developed their machines focusing on process efficiency to leverage investment by the investors.Keywords: base of the pyramid, business model, social business, social business model, social enterprises
Procedia PDF Downloads 1013766 Understanding Complexity at Pre-Construction Stage in Project Planning of Construction Projects
Authors: Mehran Barani Shikhrobat, Roger Flanagan
Abstract:
The construction planning and scheduling based on using the current tools and techniques is resulted deterministic in nature (Gantt chart, CPM) or applying a very little probability of completion (PERT) for each task. However, every project embodies assumptions and influences and should start with a complete set of clearly defined goals and constraints that remain constant throughout the duration of the project. Construction planners continue to apply the traditional methods and tools of “hard” project management that were developed for “ideal projects,” neglecting the potential influence of complexity on the design and construction process. The aim of this research is to investigate the emergence and growth of complexity in project planning and to provide a model to consider the influence of complexity on the total project duration at the post-contract award pre-construction stage of a project. The literature review showed that complexity originates from different sources of environment, technical, and workflow interactions. They can be divided into two categories of complexity factors, first, project tasks, and second, project organisation management. Project tasks may originate from performance, lack of resources, or environmental changes for a specific task. Complexity factors that relate to organisation and management refer to workflow and interdependence of different parts. The literature review highlighted the ineffectiveness of traditional tools and techniques in planning for complexity. However, this research focus on understanding the fundamental causes of the complexity of construction projects were investigated through a questionnaire with industry experts. The results were used to develop a model that considers the core complexity factors and their interactions. System dynamics were used to investigate the model to consider the influence of complexity on project planning. Feedback from experts revealed 20 major complexity factors that impact project planning. The factors are divided into five categories known as core complexity factors. To understand the weight of each factor in comparison, the Analytical Hierarchy Process (AHP) analysis method is used. The comparison showed that externalities are ranked as the biggest influence across the complexity factors. The research underlines that there are many internal and external factors that impact project activities and the project overall. This research shows the importance of considering the influence of complexity on the project master plan undertaken at the post-contract award pre-construction phase of a project.Keywords: project planning, project complexity measurement, planning uncertainty management, project risk management, strategic project scheduling
Procedia PDF Downloads 1383765 Using a Character’s Inner Monologue for Song Analysis
Authors: Robert Roznowski
Abstract:
The thought process of the character is never more evident than when singing alone onstage. The composer scores the emotional state and the lyricist voices the inner conflict as the character shares with an audience her or his deepest feelings. It is at these moments that a character may be thought of as voicing her or his inner monologue. Using examples from several musical theatre songs, this presentation will look at a codified approach to analyze a song from a more psychological perspective. Using the clues from the score, traditional character analysis and a psychological-based scoring method an actor may explore more fully inhabit and express the sung and unsung thoughts of the character. The approach yields a richer and more complex approach to acting the song.Keywords: acting, analysis, musical theatre, psychology
Procedia PDF Downloads 4793764 AgriFood Model in Ankara Regional Innovation Strategy
Authors: Coskun Serefoglu
Abstract:
The study aims to analyse how a traditional sector such as agri-food could be mobilized through regional innovation strategies. A principal component analysis as well as qualitative information, such as in-depth interviews, focus group and surveys, were employed to find the priority sectors. An agri-food model was developed which includes both a linear model and interactive model. The model consists of two main components, one of which is technological integration and the other one is agricultural extension which is based on Land-grant university approach of U.S. which is not a common practice in Turkey.Keywords: regional innovation strategy, interactive model, agri-food sector, local development, planning, regional development
Procedia PDF Downloads 1493763 Model Predictive Controller for Pasteurization Process
Authors: Tesfaye Alamirew Dessie
Abstract:
Our study focuses on developing a Model Predictive Controller (MPC) and evaluating it against a traditional PID for a pasteurization process. Utilizing system identification from the experimental data, the dynamics of the pasteurization process were calculated. Using best fit with data validation, residual, and stability analysis, the quality of several model architectures was evaluated. The validation data fit the auto-regressive with exogenous input (ARX322) model of the pasteurization process by roughly 80.37 percent. The ARX322 model structure was used to create MPC and PID control techniques. After comparing controller performance based on settling time, overshoot percentage, and stability analysis, it was found that MPC controllers outperform PID for those parameters.Keywords: MPC, PID, ARX, pasteurization
Procedia PDF Downloads 1633762 Testing Supportive Feedback Strategies in Second/Foreign Language Vocabulary Acquisition between Typically Developing Children and Children with Learning Disabilities
Authors: Panagiota A. Kotsoni, George S. Ypsilandis
Abstract:
Learning an L2 is a demanding process for all students and in particular for those with learning disabilities (LD) who demonstrate an inability to catch up with their classmates’ progress in a given period of time. This area of study, i.e. examining children with learning disabilities in L2 has not (yet) attracted the growing interest that is registered in L1 and thus remains comparatively neglected. It is this scientific field that this study wishes to contribute to. The longitudinal purpose of this study is to locate effective Supportive Feedback Strategies (SFS) and add to the quality of learning in second language vocabulary in both typically developing (TD) and LD children. Specifically, this study aims at investigating and comparing the performance of TD with LD children on two different types of SFSs related to vocabulary short and long-term retention. In this study two different SFSs have been examined to a total of ten (10) unknown vocabulary items. Both strategies provided morphosyntactic clarifications upon new contextualized vocabulary items. The traditional SFS (direct) provided the information only in one hypertext page with a selection on the relevant item. The experimental SFS (engaging) provided the exact same split information in three successive hypertext pages in the form of a hybrid dialogue asking from the subjects to move on to the next page by selecting the relevant link. It was hypothesized that this way the subjects would engage in their own learning process by actively asking for more information which would further lead to their better retention. The participants were fifty-two (52) foreign language learners (33 TD and 19 LD) aged from 9 to 12, attending an English language school at the level of A1 (CEFR). The design of the study followed a typical pre-post-post test procedure after an hour and after a week. The results indicated statistically significant group differences with TD children performing significantly better than the LD group in both short and long-term memory measurements and in both SFSs. As regards the effectiveness of one SFS over another the initial hypothesis was not supported by the evidence as the traditional SFS was more effective compared to the experimental one in both TD and LD children. This difference proved to be statistically significant only in the long-term memory measurement and only in the TD group. It may be concluded that the human brain seems to adapt to different SFS although it shows a small preference when information is provided in a direct manner.Keywords: learning disabilities, memory, second/foreign language acquisition, supportive feedback
Procedia PDF Downloads 2843761 The Employer Brand as Perceived by Salespeople: A Study Based on Glassdoor Reviews
Authors: Juliet F. Poujol, Jeff John Tanner, Christophe Fournier
Abstract:
Employers desire a favorable brand as an employer. This research considers whether motivation theory is applied to identify universally desirable employer brand elements. Based on data from a website where employees give their opinion about their employer (N=200), this research examines what salespeople found positive and negative about their job. Results show that traditional motivators like opportunities of advancement, and 'hygiene' factors such as benefits and work conditions are a source of satisfaction for salespeople. We also found differences by sectors. Implications are related to sales force recruitment and management.Keywords: employer brand, motivation, qualitative study, salespeople
Procedia PDF Downloads 3843760 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 1033759 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 145