Search results for: measures to prevent
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5505

Search results for: measures to prevent

4185 Affects Associations Analysis in Emergency Situations

Authors: Joanna Grzybowska, Magdalena Igras, Mariusz Ziółko

Abstract:

Association rule learning is an approach for discovering interesting relationships in large databases. The analysis of relations, invisible at first glance, is a source of new knowledge which can be subsequently used for prediction. We used this data mining technique (which is an automatic and objective method) to learn about interesting affects associations in a corpus of emergency phone calls. We also made an attempt to match revealed rules with their possible situational context. The corpus was collected and subjectively annotated by two researchers. Each of 3306 recordings contains information on emotion: (1) type (sadness, weariness, anxiety, surprise, stress, anger, frustration, calm, relief, compassion, contentment, amusement, joy) (2) valence (negative, neutral, or positive) (3) intensity (low, typical, alternating, high). Also, additional information, that is a clue to speaker’s emotional state, was annotated: speech rate (slow, normal, fast), characteristic vocabulary (filled pauses, repeated words) and conversation style (normal, chaotic). Exponentially many rules can be extracted from a set of items (an item is a previously annotated single information). To generate the rules in the form of an implication X → Y (where X and Y are frequent k-itemsets) the Apriori algorithm was used - it avoids performing needless computations. Then, two basic measures (Support and Confidence) and several additional symmetric and asymmetric objective measures (e.g. Laplace, Conviction, Interest Factor, Cosine, correlation coefficient) were calculated for each rule. Each applied interestingness measure revealed different rules - we selected some top rules for each measure. Owing to the specificity of the corpus (emergency situations), most of the strong rules contain only negative emotions. There are though strong rules including neutral or even positive emotions. Three examples of the strongest rules are: {sadness} → {anxiety}; {sadness, weariness, stress, frustration} → {anger}; {compassion} → {sadness}. Association rule learning revealed the strongest configurations of affects (as well as configurations of affects with affect-related information) in our emergency phone calls corpus. The acquired knowledge can be used for prediction to fulfill the emotional profile of a new caller. Furthermore, a rule-related possible context analysis may be a clue to the situation a caller is in.

Keywords: data mining, emergency phone calls, emotional profiles, rules

Procedia PDF Downloads 407
4184 Associations between Mindfulness, Temporal Discounting, Locus of Control, and Reward-Based Eating in a Sample of Overweight and Obese Adults

Authors: Andrea S. Badillo-Perez, Alexis D. Mitchell, Sara M. Levens

Abstract:

Overeating, and obesity have been associated with addictive behavior, primarily due to behaviors like reward-based eating, the tendency to overeat due to factors such as lack of control, preoccupation over food, and lack of satiation. Temporal discounting (TD), the ability to select future rewards over short term gains, and mindfulness, the process of maintaining present moment awareness, have been suggested to have significant, differential impacts on health-related behaviors. An individual’s health locus of control, the degree to which they feel that they have control over their health is also known to have an impact on health outcomes. The goal of this study was to investigate the relationship between health locus of control and reward-based eating, as well as the relation between TD and mindfulness in a sample (N = 126) of overweight or obese participants from larger health-focused study. Through the use of questionnaires (including the Five Facet Mindfulness Questionnaire (FFMQ), Reward-Based Eating Drive (RED), and Multidimensional Health Locus of Control (MHLOC)), anthropometric measurements, and a computerized TD task, a series of regressions tested the association between subscales of these measures. Results revealed differences in how the mindfulness subscales are associated with TD measures. Specifically the ‘Observing’ (beta =-.203) and ‘Describing’ (beta =.26) subscales were associated with lower TD rates and a longer subjective devaluation time-frame respectively. In contrast, the ‘Acting with Awareness’ subscale was associated with a shorter subjective devaluation timeframe (beta =-.23). These findings suggest that the reflective perspective initiated through the observing and describing components of mindfulness may facilitate delay of gratification, whereas the acting with awareness component of mindfulness, which focuses on the present moment, may make delay of gratification more challenging. Results also indicated that a higher degree of reward-based eating was associated with a higher degree of an external health locus of control based on the power of chance (beta =.10). However, an external locus of control based on the power of others had no significant association with reward-based eating. This finding implies that the belief that health is due to chance is associated with greater reward-based eating behavior, suggesting that interventions that focus on locus of control may be helpful. Overall, findings demonstrate that weight loss interventions may benefit from health locus of control and mindfulness exercises, but caution should be taken as the components of mindfulness appear to have different effects on increasing or decreasing delay of gratification.

Keywords: health locus of control, mindfulness, obesity, reward-based eating, temporal discounting

Procedia PDF Downloads 136
4183 User Experience Measurement of User Interfaces

Authors: Mohammad Hashemi, John Herbert

Abstract:

Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviours and profiles. It monitors the use of the mouse and use of UI elements with accurate time measurement. It does this in real-time and does so unobtrusively and efficiently allowing the user to work as normal with the application. This real-time accurate measurement of the user's interaction provides valuable data and insight into the use of the UI, and is also the basis for analysis of the user's QoE.

Keywords: user modelling, user interface experience, quality of experience, user experience, human and computer interaction

Procedia PDF Downloads 500
4182 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 521
4181 Dynamic Analysis of Commodity Price Fluctuation and Fiscal Management in Sub-Saharan Africa

Authors: Abidemi C. Adegboye, Nosakhare Ikponmwosa, Rogers A. Akinsokeji

Abstract:

For many resource-rich developing countries, fiscal policy has become a key tool used for short-run fiscal management since it is considered as playing a critical role in injecting part of resource rents into the economies. However, given its instability, reliance on revenue from commodity exports renders fiscal management, budgetary planning and the efficient use of public resources difficult. In this study, the linkage between commodity prices and fiscal operations among a sample of commodity-exporting countries in sub-Saharan Africa (SSA) is investigated. The main question is whether commodity price fluctuations affects the effectiveness of fiscal policy as a macroeconomic stabilization tool in these countries. Fiscal management effectiveness is considered as the ability of fiscal policy to react countercyclically to output gaps in the economy. Fiscal policy is measured as the ratio of fiscal deficit to GDP and the ratio of government spending to GDP, output gap is measured as a Hodrick-Prescott filter of output growth for each country, while commodity prices are associated with each country based on its main export commodity. Given the dynamic nature of fiscal policy effects on the economy overtime, a dynamic framework is devised for the empirical analysis. The panel cointegration and error correction methodology is used to explain the relationships. In particular, the study employs the panel ECM technique to trace short-term effects of commodity prices on fiscal management and also uses the fully modified OLS (FMOLS) technique to determine the long run relationships. These procedures provide sufficient estimation of the dynamic effects of commodity prices on fiscal policy. Data used cover the period 1992 to 2016 for 11 SSA countries. The study finds that the elasticity of the fiscal policy measures with respect to the output gap is significant and positive, suggesting that fiscal policy is actually procyclical among the countries in the sample. This implies that fiscal management for these countries follows the trend of economic performance. Moreover, it is found that fiscal policy has not performed well in delivering macroeconomic stabilization for these countries. The difficulty in applying fiscal stabilization measures is attributable to the unstable revenue inflows due to the highly volatile nature of commodity prices in the international market. For commodity-exporting countries in SSA to improve fiscal management, therefore, fiscal planning should be largely decoupled from commodity revenues, domestic revenue bases must be improved, and longer period perspectives in fiscal policy management are the critical suggestions in this study.

Keywords: commodity prices, ECM, fiscal policy, fiscal procyclicality, fully modified OLS, sub-saharan africa

Procedia PDF Downloads 162
4180 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design

Authors: Moreno Liso Lourdes

Abstract:

The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.

Keywords: industrial design, ADR, Law, EUIPO

Procedia PDF Downloads 239
4179 Indonesian Marriage Law Reform: A Doctrinal Research to Find the Way to Strengthen Children's Rights against Child Marriage

Authors: Erni Agustin, Zendy Prameswari

Abstract:

The Law Number 1 Year 1974 on Marriage was issued by Indonesian Government to replace the old marriage law stipulated in Burgerlijk Wetboek inherited from the Dutch colonial. The Law defines marriage as both physical and mental bond between a man and a woman as husband and wife with the purpose to form a harmonious family based on deity. Marriage shall be conducted when determined requirements are met based on the Law. Article 7 of the Law Number 1 Year 1974 stipulates the minimum age requirement to enter into marriage, which is 19 years for men and 16 years for women. This stipulation is made to make the marriage achieve the true goal to form a happy, eternal and prosperous family. It is expected at that age, each party has a mature soul and physic. However, it is possible for those who have not reached the age to enter into marriage if there is a dispensation granted by the courts or other official designated by the parents of each party in the marriage. As many other countries in the world, Indonesia has serious problems linked with the child or underage marriage. Indonesia is one of the countries with the highest absolute numbers of child marriage. In 2012, a judicial review was filed to the Constitutional Court against the provisions of the minimum age limit in the Law Number 1 Year 1974 on Marriage. The appeal was filed in order to raise the limit of minimum age for women from 16 years to be 18 years. However, the Constitutional Court considered that the provisions on the minimum age in the Law Number 1 Year 1974 on Marriage is constitutional. At the international level, Indonesia has participated in the formulation of variety of international human rights instrument which have an impact on children, and is a party to a number of them. Indonesia ratified the CRC through Presidential Decree of the Republic of Indonesia Number 36 Year 1990 on 5 September 1990. This paper attempts to analyze three main issues. Firstly, it will scrutinize the ratio legis of the stipulation on minimum age requirement to enter into marriage in the Law Number 1 Year 1974 on Marriage. Secondly, it will discuss the conformity of Indonesian marriage law to the principles and provisions on the CRC. Last, this paper will elaborate the legal measures shall be taken to strengthen the legal protection for children against child marriage. This paper is a doctrinal research using statute, conceptual and historical approaches. This study argues that The Law-making of Indonesian marriage law influenced by religious values that live in Indonesia. With regard to the conformity of Indonesian marriage law with the CRC, Indonesia is facing the issue of the compatibility of its respective national law with the CRC. Therefore, the legal measures that have to be taken are to review and amend the Indonesian Marriage Law to provide better protection for the children against underage marriage.

Keywords: child marriage, children’s rights, indonesian marriage law, underage marriage

Procedia PDF Downloads 199
4178 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 137
4177 Process Modeling of Electric Discharge Machining of Inconel 825 Using Artificial Neural Network

Authors: Himanshu Payal, Sachin Maheshwari, Pushpendra S. Bharti

Abstract:

Electrical discharge machining (EDM), a non-conventional machining process, finds wide applications for shaping difficult-to-cut alloys. Process modeling of EDM is required to exploit the process to the fullest. Process modeling of EDM is a challenging task owing to involvement of so many electrical and non-electrical parameters. This work is an attempt to model the EDM process using artificial neural network (ANN). Experiments were carried out on die-sinking EDM taking Inconel 825 as work material. ANN modeling has been performed using experimental data. The prediction ability of trained network has been verified experimentally. Results indicate that ANN can predict the values of performance measures of EDM satisfactorily.

Keywords: artificial neural network, EDM, metal removal rate, modeling, surface roughness

Procedia PDF Downloads 410
4176 Advocating in the Criminal Justice System for Individuals Who Use Drugs: Advice from Advocates in the Greater Vancouver Area

Authors: Haley Hrymak

Abstract:

For decades drug addiction has been understood to be a health problem and not a social problem. While research has advanced to allow for a more comprehensive understanding of the factors affecting addiction, the justice system has lagged behind. Given all that is known about addiction as a health issue and the need for effective rehabilitation to prevent further involvement with crime, there is a need for a dramatic shift in order to ensure individual's human right to health is being upheld within the Canadian criminal justice system. This research employs the qualitative methodology to interview advocates who work with substance users within the Greater Vancouver area to explore best practices for representing individuals with substance abuse issues within the Canadian justice system. The research shows that treatment, not punishment, is what is needed in order for recidivism to be reduced for individuals with substance abuse issues. The creative options that advocates employ to work within the current system are intended to provide a guide for lawyers working within the current criminal justice system.

Keywords: addiction, criminal law, right to health, rehabilitation

Procedia PDF Downloads 145
4175 The Magnitude Scale Evaluation of Cross-Platform Internet Public Opinion

Authors: Yi Wang, Xun Liang

Abstract:

This paper introduces a model of internet public opinion waves, which describes the message propagation and measures the influence of a detected event. We collect data on public opinion propagation from different platforms on the internet, including micro-blogs and news. Then, we compare the spread of public opinion to the seismic waves and correspondently define the P-wave and S-wave and other essential attributes and characteristics in the process. Further, a model is established to evaluate the magnitude scale of the events. In the end, a practical example is used to analyze the influence of network public opinion and test the reasonability and effectiveness of the proposed model.

Keywords: internet public opinion waves (IPOW), magnitude scale, cross-platform, information propagation

Procedia PDF Downloads 287
4174 Working Fluids in Absorption Chillers: Investigation of the Use of Deep Eutectic Solvents

Authors: L. Cesari, D. Alonso, F. Mutelet

Abstract:

The interest in cold production has been on the increase in absorption chillers for many years. In fact, the absorption cycles replace the compressor and thus reduce electrical consumption. The devices also allow waste heat generated through industrial activities to be recovered and cooled to a moderate temperature in accordance with regulatory guidelines. Many working fluids were investigated but could not compete with the commonly used {H2O + LiBr} and {H2O + NH3} to author’s best knowledge. Yet, the corrosion, toxicity and crystallization phenomena of these mixtures prevent the development of the absorption technology. This work investigates the possible use of a glyceline deep eutectic solvent (DES) and CO2 as working fluid in an absorption chiller. To do so, good knowledge of the mixtures is required. Experimental measurements (vapor-liquid equilibria, density, and heat capacity) were performed to complete the data lacking in the literature. The performance of the mixtures was quantified by the calculation of the coefficient of performance (COP). The results show that working fluids containing DES + CO2 are an interesting alternative and lead to different trails of working mixtures for absorption and chiller.

Keywords: absorption devices, deep eutectic solvent, energy valorization, experimental data, simulation

Procedia PDF Downloads 108
4173 Tertiary Training of Future Health Educators and Health Professionals Involved in Childhood Obesity Prevention and Treatment Strategies

Authors: Thea Werkhoven, Wayne Cotton

Abstract:

Adult and childhood rates of obesity in Australia are health concerns of high national priority, retaining epidemic status in the populations affected. Attempts to prevent further increases in prevalence of childhood obesity in the population aged below eighteen years have had varied success. A multidisciplinary approach has been used, employing strategies in schools, through established health care system usage and public health campaigns. Over the last decade a plateau in prevalence has been reached in the youth population afflicted by obesity and interest has peaked in school based strategies to prevent and treat overweight and obesity. Of interest to this study is the importance of the tertiary training of future health educators or health professionals destined to be involved in obesity prevention and treatment strategies. Health educators and health professionals are considered instrumental to the success of prevention and treatment strategies, required to possess sufficient and accurate knowledge in order to be effective in their positions. A common influence on the success of school based health promoting activities are the weight based attitudes possessed by health educators, known to be negative and biased towards overweight or obese children during training and practice. Whilst the tertiary training of future health professionals includes minimal nutrition education, there is no mandatory training in health education or nutrition for pre-service health educators in Australian tertiary institutions. This study aimed to assess the impact of a pedagogical intervention on pre-service health educators and health professionals enrolled in a health and wellbeing elective. The intervention aimed to increase nutrition knowledge and decrease weight bias and was embedded in the twelve week elective. Participants (n=98) were tertiary students at a major Australian University who were enrolled in health (47%) and non-health related degrees (53%). A quantitative survey using four valid and reliable instruments was conducted to measured nutrition knowledge, antifat attitudes and weight stereotyping attitudes at baseline and post-intervention. Scores on each instrument were compared between time points to check if they had significantly changed and to determine the effect of the intervention on attitudes and knowledge. Antifat attitudes at baseline were considered low and decreased further over the course of the intervention. Scores representing weight bias did decrease but the change was not significant. Fat stereotyping attitudes became stronger over the course of the intervention and this change was significant. Nutrition knowledge significantly improved from baseline to post-intervention. The design of the nutrition knowledge and attitude amelioration content of the intervention was semi-successful in achieving its outcomes. While the level of nutrition knowledge was improved over the course of the intervention, an unintentional increase was observed in weight based prejudice which is known to occur in interventions that employ stigma reduction methodologies. Further research is required into a structured methodology that increases level of nutrition knowledge and ameliorates weight bias at the tertiary level. In this way training provided would help prepare future health educators with the knowledge, skills and attitudes required to be effective and bias free in their practice.

Keywords: education, intervention, nutrition, obesity

Procedia PDF Downloads 208
4172 Prospects for the Development of e-Commerce in Georgia

Authors: Nino Damenia

Abstract:

E-commerce opens a new horizon for business development, which is why the presence of e-commerce is a necessary condition for the formation, growth, and development of the country's economy. Worldwide, e-commerce turnover is growing at a high rate every year, as the electronic environment provides great opportunities for product promotion. E-commerce in Georgia is developing at a fast pace, but it is still a relatively young direction in the country's economy. Movement restrictions and other public health measures caused by the COVID-19 pandemic have reduced economic activity in most economic sectors and countries, significantly affecting production, distribution, and consumption. The pandemic has accelerated digital transformation. Digital solutions enable people and businesses to continue part of their economic and social activities remotely. This has also led to the growth of e-commerce. According to the data of the National Statistics Service of Georgia, the share of online trade is higher in cities (27.4%) than in rural areas (9.1%). The COVID-19 pandemic has forced local businesses to expand their digital offerings. The size of the local market increased 3.2 times in 2020 to 138 million GEL. And in 2018-2020, the share of local e-commerce increased from 11% to 23%. In Georgia, the state is actively engaged in the promotion of activities based on information technologies. Many measures have been taken for this purpose, but compared to other countries, this process is slow in Georgia. The purpose of the study is to determine development prospects for the economy of Georgia based on the analysis of electronic commerce. Research was conducted around the issues using Georgian and foreign scientists' articles, works, reports of international organizations, collections of scientific conferences, and scientific electronic databases. The empirical base of the research is the data and annual reports of the National Statistical Service of Georgia, internet resources of world statistical materials, and others. While working on the article, a questionnaire was developed, based on which an electronic survey of certain types of respondents was conducted. The conducted research was related to determining how intensively Georgian citizens use online shopping, including which age category uses electronic commerce, for what purposes, and how satisfied they are. Various theoretical and methodological research tools, as well as analysis, synthesis, comparison, and other types of methods, are used to achieve the set goal in the research process. The research results and recommendations will contribute to the development of e-commerce in Georgia and economic growth based on it.

Keywords: e-commerce, information technology, pandemic, digital transformation

Procedia PDF Downloads 75
4171 Flight Safety Hazard: An Investigation into Bird Strike Prevention in the Vicinity of Suvarnabhumi Airport, Thailand

Authors: Chantarat Manvichien

Abstract:

The purpose of this research paper was aimed to examine the bird strike prevention in the vicinity of Suvarnabhumi Airport, Thailand. A bird strike event occurs when a bird or a flock of birds collide with an operating airplane and results in flight interruption. This is the reason why International Civil Aviation Organization (ICAO), a part of the United Nations, has an assumption that birds, including other wildlife, are a serious hazard to aircraft and attempts should be accomplished to overcome this hazard. ICAO requires all airports worldwide to set up proactive countermeasures in order to reduce the risk from bird strike and wildlife hazard. In Thailand, the Airports of Thailand Public Company Limited which manages Suvarnabhumi Airport, also known as Bangkok International Airport, responds to the requirements and spends a lot of effort to ensure this hazard is manageable. An intensive study on the countermeasures to prevent aircraft accident from bird strike and other wildlife have been continuously executed since the early construction of the Airport until nowadays.

Keywords: bird strike, flight safety, wildlife hazard, Suvarnabhumi airport

Procedia PDF Downloads 364
4170 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 283
4169 Numerical Study on the Urea Melting and Induced Natural Convection in a Urea Sender Module

Authors: Doo Ki Lee, Man Young Kim

Abstract:

The Urea-Selective Catalytic Reduction (SCR) system is considered to be the most promising technology to fulfill the stringent emission regulation. In the Urea-SCR system, the urea solutions are used as the reducing agent, which is a eutectic composition (32.5wt% of urea). The advantage of this eutectic compositions is that it has a low freezing point approximately at -11 ℃, however, the problem of freezing occurs at low-temperature levels below that freezing point. To prevent freezing of urea solutions, we need heating systems that can melt by heating the frozen urea solutions in urea storage tank at low-temperature environment. In this study, therefore, a numerical investigation of three-dimensional unsteady heating problems analyzed to find the melting characteristics of the urea solutions on melting process. In this work, it can be found that the urea melting initiated by heat conduction from the heater is enhanced by the natural convection inside the melted liquid urea solutions due to the temperature difference. Also, liquid urea solutions are initially concentrated on the upper parts of the urea sender module.

Keywords: urea solution, melting, heat conduction, natural convection, liquid fraction, phase change

Procedia PDF Downloads 267
4168 Early Childhood Education and Learning Outcomes in Lower Primary Schools, Uganda

Authors: John Acire, Wilfred Lajul, Ogwang Tom

Abstract:

Using a qualitative research technique, this study investigates the influence of Early Childhood Education (ECE) on learning outcomes in lower primary schools in Gulu City, Uganda. The study, which is based on Vygotsky's sociocultural theory of human learning, fills gaps in the current literature on the influence of ECE on learning outcomes. The aims of the study include analyzing the state of learning outcomes, investigating ECE practices, and determining the influence of these practices on learning outcomes in lower primary schools. The findings highlight the critical significance of ECE in promoting children's overall development. Nursery education helps children improve their handwriting, reading abilities, and general cognitive development. Children who have received nursery education have improved their abilities to handle pencils, form letters, and engage in social interactions, highlighting the significance of fine motor skills and socializing. Despite the good elements, difficulties in implementing ECE practices were found, such as differences in teaching styles, financial limits, and potential weariness due to prolonged school hours. The study suggests focused interventions to improve the effectiveness of ECE practices, ensure their connection with educational goals and maximize their influence on children's development. The study's findings show that respondents agree on the importance of nursery education in supporting holistic development, socialization, language competency, and conceptual comprehension. Challenges in nursery education, such as differences in teaching techniques and insufficient resources, highlight the need for comprehensive measures to address these challenges. Furthermore, parental engagement in home learning activities was revealed as an important factor affecting early education outcomes. Children who were engaged at home performed better in lower primary, emphasizing the value of a supportive family environment. Finally, the report suggests measures to enhance parental participation, changes in teaching methods through retraining, and age-appropriate enrolment. Future studies might concentrate on the involvement of parents, ECE policy practice, and the influence of ECE teachers on lower primary school learning results. These ideas are intended to help create a more favorable learning environment by encouraging holistic development and preparing children for success in succeeding academic levels.

Keywords: early childhood education, learning outcomes in lower primary schools, early childhood education practices, how ECE practices influence learning outcomes in lower primary schools

Procedia PDF Downloads 40
4167 Promoting Patients' Adherence to Home-Based Rehabilitation: A Randomised Controlled Trial of a Theory-Driven Mobile Application

Authors: Derwin K. C. Chan, Alfred S. Y. Lee

Abstract:

The integrated model of self-determination theory and the theory of planned behaviour has been successfully applied to explain individuals’ adherence to health behaviours, including behavioural adherence toward rehabilitation. This study was a randomised controlled trial that examined the effectiveness of an mHealth intervention (i.e., mobile application) developed based on this integrated model in promoting treatment adherence of patients of anterior cruciate ligament rupture during their post-surgery home-based rehabilitation period. Subjects were 67 outpatients (aged between 18 and 60) who undertook anterior cruciate ligament (ACL) reconstruction surgery for less than 2 months for this study. Participants were randomly assigned either into the treatment group (who received the smartphone application; N = 32) and control group (who receive standard treatment only; N = 35), and completed psychological measures relating to the theories (e.g., motivations, social cognitive factors, and behavioural adherence) and clinical outcome measures (e.g., subjective knee function (IKDC), laxity (KT-1000), muscle strength (Biodex)) relating to ACL recovery at baseline, 2-month, and 4-month. Generalise estimating equation showed the interaction between group and time was significant on intention was only significant for intention (Wald x² = 5.23, p = .02), that of perceived behavioural control (Wald x² = 3.19, p = .07), behavioural adherence (Wald x² = 3.08, p = .08, and subjective knee evaluation (Wald x² = 2.97, p = .09) were marginally significant. Post-hoc between-subject analysis showed that control group had significant drop of perceived behavioural control (p < .01), subjective norm (p < .01) and intention (p < .01), behavioural adherence (p < .01) from baseline to 4-month, but such pattern was not observed in the treatment group. The treatment group had a significant decrease of behavioural adherence (p < .05) in the 2-month, but such a decrease was not observed in 4-month (p > .05). Although the subjective knee evaluation in both group significantly improved at 2-month and 4-month from the baseline (p < .05), and the improvements in the control group (mean improvement at 4-month = 40.18) were slightly stronger than the treatment group (mean improvement at 4-month = 34.52). In conclusion, the findings showed that the theory driven mobile application ameliorated the decline of treatment intention of home-based rehabilitation. Patients in the treatment group also reported better muscle strength than control group at 4-month follow-up. Overall, the mobile application has shown promises on tackling the problem of orthopaedics outpatients’ non-adherence to medical treatment.

Keywords: self-determination theory, theory of planned behaviour, mobile health, orthopaedic patients

Procedia PDF Downloads 197
4166 Role of Biotechnology on Pharmaceutical Inventions: An Analysis

Authors: E. Prema

Abstract:

Biotechnology is a study relating to the practical application of living beings in different fields. Generally, it is a study with regard to living organisms in the industrial utilization. It is the technology, which uses living organisms or its parts for specific commercial use. Modification and application of living beings for different practical purposes is possible through biotechnology. Furthermore, today biotechnology is being used in different fields for better results. It is worthwhile to note here that biotechnology is one of the most innovative and intensive industries. It has used the genetically based characteristics in microorganisms, plants and animals to create drugs and to develop drug therapies, which may prevent, cure or alleviate disease and their symptoms. Drugs are basically chemicals and while patenting drugs, the conditions of patentability of chemicals and the types that can be patented are equally applicable to drugs also. Nowadays, the role of biotechnology for manufacturing drugs has assumed much importance because of intellectual property rights. By way using biotechnology, most of the pharmaceutical inventions are getting protection for the period of 20 years as per the Patents Act, 1970 as amended in 2005. There is no doubt that biotechnology is serving the public at large with regard manufacturing drugs and helping the needy people on time.

Keywords: biotechnology, drugs, intellectual property rights, patents

Procedia PDF Downloads 454
4165 Application of Metarhizium anisopliae against Meloidogyne javanica in Soil Amended with Oak Debris

Authors: Mohammad Abdollahi

Abstract:

Tomato (Lycopersicon esculentum Mill.) is one of the most popular, widely grown and the second most important vegetable crop, after potatoes. Nematodes have been identified as one of the major pests affecting tomato production throughout the world. The most destructive nematodes are the genus Meloidogyne. Most widespread and devastating species of this genus are M. incognita, M. javanica, and M. arenaria. These species can cause complete crop loss under adverse growing conditions. There are several potential methods for management of the root knot nematodes. Although the chemicals are widely used against the phytonematodes, because of hazardous effects of these compounds on non-target organisms and on the environment, there is a need to develop other control strategies. Nowadays, non-chemical measures are widely used to control the plant parasitic nematodes. Biocontrol of phytonematodes is an important method among environment-friendly measures of nematode management. There are some soil-inhabiting fungi that have biocontrol potential on phytonematodes, which can be used in nematode management program. The fungus Metarhizium anisopliae, originally is an entomopathogenic bioagent. Biocontrol potential of this fungus on some phytonematodes has been reported earlier. Recently, use of organic soil amendments as well as the use of bioagents is under special attention in sustainable agriculture. This research aimed to reduce the pesticide use in control of root-knot nematode, Meloidogyne javanica in tomato. The effects of M. anisopliae IMI 330189 and different levels of oak tree debris on M. javanica were determined. The combination effect of the fungus as well as the different rates of soil amendments was determined. Pots were filled with steam pasteurized soil mixture and the six leaf tomato seedlings were inoculated with 3000 second stage larvae of M. javanica/kg of soil. After eight weeks, plant growth parameters and nematode reproduction factors were compared. Based on the results of our experiment, combination of M. anisopliae IMI 330189 and oak debris caused more than 90% reduction in reproduction factor of nematode, at the rates of 100 and 150 g/kg soil (P ≤ 0.05). As compared to control, the reduction in number of galls was 76%. It was 86% for nematode reproduction factor, showing the significance of combined effect of both tested agents. Our results showed that plant debris can increase the biological activity of the tested bioagent. It was also proved that there was no adverse effect of oak debris, which potentially has antimicrobial activity, on antagonistic power of applied bioagent.

Keywords: biological control, nematode management, organic soil, Quercus branti, root knot nematode, soil amendment

Procedia PDF Downloads 172
4164 Statistical Quality Control on Assignable Causes of Variation on Cement Production in Ashaka Cement PLC Gombe State

Authors: Hamisu Idi

Abstract:

The present study focuses on studying the impact of influencer recommendation in the quality of cement production. Exploratory research was done on monthly basis, where data were obtained from secondary source i.e. the record kept by an automated recompilation machine. The machine keeps all the records of the mills downtime which the process manager checks for validation and refer the fault (if any) to the department responsible for maintenance or measurement taking so as to prevent future occurrence. The findings indicated that the product of the Ashaka Cement Plc. were considered as qualitative, since all the production processes were found to be in control (preset specifications) with the exception of the natural cause of variation which is normal in the production process as it will not affect the outcome of the product. It is reduced to the bearest minimum since it cannot be totally eliminated. It is also hopeful that the findings of this study would be of great assistance to the management of Ashaka cement factory and the process manager in particular at various levels in the monitoring and implementation of statistical process control. This study is therefore of great contribution to the knowledge in this regard and it is hopeful that it would open more research in that direction.

Keywords: cement, quality, variation, assignable cause, common cause

Procedia PDF Downloads 259
4163 Enhanced Production of Nisin by Co-culture of Lactococcus Lactis Sub SP. Lactis and Yarrowia Lipolytica in Molasses Based Medium

Authors: Mehdi Ariana, Javad Hamedi

Abstract:

Nisin is a commercial bacteriocin that is used as a food preservative and produced by Lactococcus lactis subsp. lactis. Nisin production through co-culture fermentation can be performed for increasing nisin quantities. Since lactate accumulation in the fermentation medium can prevent L. lactis growth and therefore reduce nisin production, the simultaneous culture of microorganisms can enhance L. lactis growth by a reduction in the amount of lactic acid. In this study, conducted coculture of L.lactis subsp. lactic and the yeast Yarrowia lipolytica. Both strains are cultured in a molasses-based medium that is mainly constructed of sucrose. Y. lipolytica is not able to use sucrose as a carbon source but is able to consume lactate and decrease lactic acid in the medium. So, Lactic acid consumption can increase pH value and stimulate L. lactis growth. The results showed the mixed culture increased L. lactis growth 6 times higher than that of pure culture and could enhance nisin activity by up to 40%.

Keywords: co-culture fermentation, lactococcus lactis subsp lactis, yarrowia lipolytica, nisin

Procedia PDF Downloads 107
4162 Molecular Basis of Anti-Biofilm and Anti-Adherence Activity of Syzygium aromaticum on Streptococcus mutans: In Vitro and in Vivo Study

Authors: Mohd Adil, Rosina Khan, Asad U. Khan, Vasantha Rupasinghe HP

Abstract:

The study examined the effects of Syzygium aromaticum extracts on the virulence properties of Streptococcus mutans. The activity of glucosyltransferases in the presence of crude and diethylether fraction was reduced to 80% at concentration 78.12μg/ml and 39.06μg/ml respectively. The glycolytic pH drop by S. mutans cells was also disrupted by these extracts without affecting the bacterial viability. Microscopic analysis revealed morphological changes of the S. mutans biofilms, indicating that these plant extracts at sub-MICs could significantly affect the ability of S. mutans to form biofilm with distorted extracellular matrix. Furthermore, with the help of quantitative RT-PCR, the expression of different genes involved in adherence, quorum sensing, in the presence of these extracts were down regulated. The crude and active fractions were found effective in preventing caries development in rats. The data showed that S. aromaticum holds promise as a naturally occurring source of compounds that may prevent biofilm-related oral diseases.

Keywords: biofilm, quorum sensing, Streptococcus mutans, Syzygium aromaticum extract

Procedia PDF Downloads 306
4161 Introducing Design Principles for Clinical Decision Support Systems

Authors: Luca Martignoni

Abstract:

The increasing usage of clinical decision support systems in healthcare and the demand for software that enables doctors to take informed decisions is changing everyday clinical practice. However, as technology advances not only are the benefits of technology growing, but so are the potential risks. A growing danger is the doctors’ over-reliance on the proposed decision of the clinical decision support system, leading towards deskilling and rash decisions by doctors. In that regard, identifying doctors' requirements for software and developing approaches to prevent technological over-reliance is of utmost importance. In this paper, we report the results of a design science research study, focusing on the requirements and design principles of ultrasound software. We conducted a total of 15 interviews with experts about poten-tial ultrasound software functions. Subsequently, we developed meta-requirements and design principles to design future clinical decision support systems efficiently and as free from the occur-rence of technological over-reliance as possible.

Keywords: clinical decision support systems, technological over-reliance, design principles, design science research

Procedia PDF Downloads 99
4160 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 336
4159 When the Lights Go Down in the Delivery Room: Lessons From a Ransomware Attack

Authors: Rinat Gabbay-Benziv, Merav Ben-Natan, Ariel Roguin, Benyamine Abbou, Anna Ofir, Adi Klein, Dikla Dahan-Shriki, Mordechai Hallak, Boris Kessel, Mickey Dudkiewicz

Abstract:

Introduction: Over recent decades, technology has become integral to healthcare, with electronic health records and advanced medical equipment now standard. However, this reliance has made healthcare systems increasingly vulnerable to ransomware attacks. On October 13, 2021, Hillel Yaffe Medical Center experienced a severe ransomware attack that disrupted all IT systems, including electronic health records, laboratory services, and staff communications. The attack, carried out by the group DeepBlueMagic, utilized advanced encryption to lock the hospital's systems and demanded a ransom. This incident caused significant operational and patient care challenges, particularly impacting the obstetrics department. Objective: The objective is to describe the challenges facing the obstetric division following a cyberattack and discuss ways of preparing for and overcoming another one. Methods: A retrospective descriptive study was conducted in a mid-sized medical center. Division activities, including the number of deliveries, cesarean sections, emergency room visits, admissions, maternal-fetal medicine department occupancy, and ambulatory encounters, from 2 weeks before the attack to 8 weeks following it (a total of 11 weeks), were compared with the retrospective period in 2019 (pre-COVID-19). In addition, we present the challenges and adaptation measures taken at the division and hospital levels leading up to the resumption of full division activity. Results: On the day of the cyberattack, critical decisions were made. The media announced the event, calling on patients not to come to our hospital. Also, all elective activities other than cesarean deliveries were stopped. The number of deliveries, admissions, and both emergency room and ambulatory clinic visits decreased by 5%–10% overall for 11 weeks, reflecting the decrease in division activity. Nevertheless, in all stations, there were sufficient activities and adaptation measures to ensure patient safety, decision-making, and workflow of patients were accounted for. Conclusions: The risk of ransomware cyberattacks is growing. Healthcare systems at all levels should recognize this threat and have protocols for dealing with them once they occur.

Keywords: ransomware attack, healthcare cybersecurity, obstetrics challenges, IT system disruption

Procedia PDF Downloads 23
4158 The Necessity of Screening for Internalizing Mental Health Problems in Primary School Educational Settings

Authors: Atefeh Ahmadi, Mohamed Sharif Mustaffa

Abstract:

Mental health problems that children introspect them are hardly identified. The internalizing nature of Anxiety Disorders as the most prevalent psychological diseases, make them been under recognized by parents and teachers and so become under attended by school counsellors and subsequently under referred to clinicians. The aim of this study is to investigate the level of Anxiety Disorders to clarify if it is necessary to run screening programs in rural educational settings. Spence children anxiety scale-malay-child for the first time in Malaysia distributed among 640 Malay rural primary school students aged from 9-11 years old. Cut-off score was considered one standard deviation more than the mean of all students’ scores. The results of descriptive analyses revealed the mean for scores of SCAS was 32.84 and 15.6% of students had high level of anxiety. In addition, the level and prevalence of six types of anxiety disorders based on SCAS were described. In regards to the study outcomes, screening for anxiety disorders in academic settings could prevent and reduce their side effects by early identification.

Keywords: anxiety disorders, primary schools, SCAS, screening

Procedia PDF Downloads 299
4157 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 116
4156 Dynamic Simulation of IC Engine Bearings for Fault Detection and Wear Prediction

Authors: M. D. Haneef, R. B. Randall, Z. Peng

Abstract:

Journal bearings used in IC engines are prone to premature failures and are likely to fail earlier than the rated life due to highly impulsive and unstable operating conditions and frequent starts/stops. Vibration signature extraction and wear debris analysis techniques are prevalent in the industry for condition monitoring of rotary machinery. However, both techniques involve a great deal of technical expertise, time and cost. Limited literature is available on the application of these techniques for fault detection in reciprocating machinery, due to the complex nature of impact forces that confounds the extraction of fault signals for vibration based analysis and wear prediction. This work is an extension of a previous study, in which an engine simulation model was developed using a MATLAB/SIMULINK program, whereby the engine parameters used in the simulation were obtained experimentally from a Toyota 3SFE 2.0 litre petrol engines. Simulated hydrodynamic bearing forces were used to estimate vibrations signals and envelope analysis was carried out to analyze the effect of speed, load and clearance on the vibration response. Three different loads 50/80/110 N-m, three different speeds 1500/2000/3000 rpm, and three different clearances, i.e., normal, 2 times and 4 times the normal clearance were simulated to examine the effect of wear on bearing forces. The magnitude of the squared envelope of the generated vibration signals though not affected by load, but was observed to rise significantly with increasing speed and clearance indicating the likelihood of augmented wear. In the present study, the simulation model was extended further to investigate the bearing wear behavior, resulting as a consequence of different operating conditions, to complement the vibration analysis. In the current simulation, the dynamics of the engine was established first, based on which the hydrodynamic journal bearing forces were evaluated by numerical solution of the Reynold’s equation. Also, the essential outputs of interest in this study, critical to determine wear rates are the tangential velocity and oil film thickness between the journal and bearing sleeve, which if not maintained appropriately, have a detrimental effect on the bearing performance. Archard’s wear prediction model was used in the simulation to calculate the wear rate of bearings with specific location information as all determinative parameters were obtained with reference to crank rotation. Oil film thickness obtained from the model was used as a criterion to determine if the lubrication is sufficient to prevent contact between the journal and bearing thus causing accelerated wear. A limiting value of 1 µm was used as the minimum oil film thickness needed to prevent contact. The increased wear rate with growing severity of operating conditions is analogous and comparable to the rise in amplitude of the squared envelope of the referenced vibration signals. Thus on one hand, the developed model demonstrated its capability to explain wear behavior and on the other hand it also helps to establish a correlation between wear based and vibration based analysis. Therefore, the model provides a cost-effective and quick approach to predict the impending wear in IC engine bearings under various operating conditions.

Keywords: condition monitoring, IC engine, journal bearings, vibration analysis, wear prediction

Procedia PDF Downloads 309