Search results for: security critical application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14809

Search results for: security critical application

13339 Analysis of Labor Behavior Effect on Occupational Health and Safety Management by Multiple Linear Regression

Authors: Yulinda Rizky Pratiwi, Fuji Anugrah Emily

Abstract:

Management of Occupational Safety and Health (OSH) are appropriately applied properly by all workers and pekarya in the company. K3 management application also has become very important to prevent accidents. Violation of the rules regarding the K3 has often occurred from time to time. By 2015 the number of occurrences of a violation of the K3 or so-called unsafe action tends to increase. Until finally in January 2016, the number increased drastically unsafe action. Trigger increase in the number of unsafe action is a decrease in the quality of management practices K3. While the application of K3 management performed by each individual thought to be influenced by the attitude and observation guide the actions of each of the individual. In addition to the decline in the quality of K3 management application may result in increased likelihood of accidents and losses for the company as well as the local co-workers. The big difference in the number of unsafe action is very significant in the month of January 2016, making the company Pertamina as the national oil company must do a lot of effort to keep track of how the implementation of K3 management on every worker and pekarya, one at PT Pertamina EP Cepu Field Asset IV. To consider the effort to control the implementation of K3 management can be seen from the attitude and observation guide the actions of the workers and pekarya. By using Multiple Linear Regression can be seen the influence of attitude and action observation guide workers and pekarya the K3 management application that has been done. The results showed that scores K3 management application of each worker and pekarya will increase by 0.764 if the score pekarya worker attitudes and increase one unit, whereas if the score Reassurance action guidelines and pekarya workers increased by one unit then the score management application K3 will increase by 0.754.

Keywords: occupational safety and health, management of occupational safety and health, unsafe action, multiple linear regression

Procedia PDF Downloads 215
13338 Applications for Tracking Close Contact with COVID-19 Patients in Malaysia

Authors: Bih Ni Lee

Abstract:

This paper discusses the unending coronavirus (Covid-19) pandemic. The activity of detecting, testing those with symptoms, and isolating their contacts is the most effective method of stopping the chain of coronavirus infection. The number of cases of coronavirus continues to increase with some reporting a cure, but not a few die. Efforts to treat and prevent continue to fight COVID-19 with flu-like symptoms. The importance of the study is to identify smartphone applications that can track the movement of individuals in an effort to curb the spread of COVID-19, especially in Malaysia. This research method used a literature review, which included new insights into the quality of action and scientific papers. It synthesized information gleaned from a variety of sources. The findings of the study are that the Government of Malaysia has launched three main applications to track the movement of individuals, namely Gerak Malaysia, MyTrace, MySejahtera. Similarly, every state in Malaysia has its own state government application to track individual movements. Overall, Malaysia is one of the countries in the world that has successfully curbed the spread of COVID-19; Covid-19 cases in Malaysia are under control.

Keywords: COVID-19 app, national security council, Gerak Malaysia, MyTrace, MySejahtera

Procedia PDF Downloads 116
13337 Preliminary Report on the Assessment of the Impact of the Kinesiology Taping Application versus Placebo Taping on the Knee Joint Position Sense

Authors: Anna Hadamus, Patryk Wasowski, Anna Mosiolek, Zbigniew Wronski, Sebastian Wojtowicz, Dariusz Bialoszewski

Abstract:

Introduction: Kinesiology Taping is a very popular physiotherapy method, often used for healthy people, especially athletes, in order to stimulate the muscles and improve their performance. The aim of this study was to determine the effect of the muscle application of Kinesiology Taping on the joint position sense in active motion. Material and Methods: The study involved 50 healthy people - 30 men and 20 women, mean age was 23.2 years (range 18-30 years). The exclusion criteria were injuries and operations of the knee, which could affect the test results. The participants were divided randomly into two equal groups. The first group consisted of individuals with the applied Kinesiology Taping muscle application (KT group), whereas in the rest of the individuals placebo application from red adhesive tape was used (placebo group). Both applications were to enhance the effects of quadriceps muscle activity. Joint position sense (JPS) was evaluated in this study. Error of Active Reproduction of the Joint Position (EARJP) of the knee was measured in 45° flexion. The test was performed prior to applying the patch, with the applied application, then 24 hours after wearing, and after removing the tape. The interval between trials was not less than 30 minutes. Statistical analysis was performed using Statistica 12.0. We calculated distribution characteristics, Wilcoxon test, Friedman‘s ANOVA and Mann-Whitney U test. Results. In the KT group and the placebo group average test score of JPS before applying application KT were 3.48° and 5.16° respectively, after its application it was 4.84° and 4.88°, then after 24 hours of experiment JPS was 5.12° and 4.96°, and after application removal we measured 3.84° and 5.12° respectively. Differences over time in any of the groups were not statistically significant. There were also no significant differences between the groups. Conclusions: 1. Applying Kinesiology Taping to quadriceps muscle had no significant effect on the knee joint proprioception. Its use in order to improve sensorimitor skills seems therefore to be unreasonable. 2. No differences between applications of KT and placebo indicates that the clinical effect of stretch tape is minimal or absent. 3. The results are the basis for the continuation of prospective, randomized trials of numerous study groups.

Keywords: joint position sense, kinesiology taping, kinesiotaping, knee

Procedia PDF Downloads 318
13336 Artificial Intelligence in Global Healthcare: Need for Robust Governance Frameworks

Authors: Sandeep Reddy, Sonia Allan, Simon Coghlan, Paul Cooper

Abstract:

Artificial Intelligence (AI) and its application in medicine has generated ample interest amongst policymakers and clinicians. Successes with AI in medical imaging interpretation and clinical decision support are paving the way for its incorporation into routine healthcare delivery. While there has been a focus on the development of ethical principles to guide its application in healthcare, challenges of this application go beyond what ethics principles can address thus requiring robust governance frameworks. Also, while ethical challenges of medical artificial intelligence are being discussed, the ethics of deploying AI in lower-income countries receive less attention than in other developed economies. This creates an imperative not only for sound ethical guidelines but also for robust governance frameworks to regulate AI in medicine around the world. In this article, we discuss what components need to be considered in developing these governance frameworks and who should lead this worldwide effort.

Keywords: artificial intelligence, global health, governance, ethics

Procedia PDF Downloads 132
13335 An Investigation Enhancing E-Voting Application Performance

Authors: Aditya Verma

Abstract:

E-voting using blockchain provides us with a distributed system where data is present on each node present in the network and is reliable and secure too due to its immutability property. This work compares various blockchain consensus algorithms used for e-voting applications in the past, based on performance and node scalability, and chooses the optimal one and improves on one such previous implementation by proposing solutions for the loopholes of the optimally working blockchain consensus algorithm, in our chosen application, e-voting.

Keywords: blockchain, parallel bft, consensus algorithms, performance

Procedia PDF Downloads 155
13334 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges

Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh

Abstract:

For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.

Keywords: guideline, law, data protection officer, personal data

Procedia PDF Downloads 64
13333 Artificial Intelligence Impact on Strategic Stability

Authors: Darius Jakimavicius

Abstract:

Artificial intelligence is the subject of intense debate in the international arena, identified both as a technological breakthrough and as a component of the strategic stability effect. Both the kinetic and non-kinetic development of AI and its application in the national strategies of the great powers may trigger a change in the security situation. Artificial intelligence is generally faster, more capable and more efficient than humans, and there is a temptation to transfer decision-making and control responsibilities to artificial intelligence. Artificial intelligence, which, once activated, can select and act on targets without further intervention by a human operator, blurs the boundary between human or robot (machine) warfare, or perhaps human and robot together. Artificial intelligence acts as a force multiplier that speeds up decision-making and reaction times on the battlefield. The role of humans is increasingly moving away from direct decision-making and away from command and control processes involving the use of force. It is worth noting that the autonomy and precision of AI systems make the process of strategic stability more complex. Deterrence theory is currently in a phase of development in which deterrence is undergoing further strain and crisis due to the complexity of the evolving models enabled by artificial intelligence. Based on the concept of strategic stability and deterrence theory, it is appropriate to develop further research on the development and impact of AI in order to assess AI from both a scientific and technical perspective: to capture a new niche in the scientific literature and academic terminology, to clarify the conditions for deterrence, and to identify the potential uses, impacts and possibly quantities of AI. The research problem is the impact of artificial intelligence developed by great powers on strategic stability. This thesis seeks to assess the impact of AI on strategic stability and deterrence principles, with human exclusion from the decision-making and control loop as a key axis. The interaction between AI and human actions and interests can determine fundamental changes in great powers' defense and deterrence, and the development and application of AI-based great powers strategies can lead to a change in strategic stability.

Keywords: artificial inteligence, strategic stability, deterrence theory, decision making loop

Procedia PDF Downloads 23
13332 Ferromagnetic Potts Models with Multi Site Interaction

Authors: Nir Schreiber, Reuven Cohen, Simi Haber

Abstract:

The Potts model has been widely explored in the literature for the last few decades. While many analytical and numerical results concern with the traditional two site interaction model in various geometries and dimensions, little is yet known about models where more than two spins simultaneously interact. We consider a ferromagnetic four site interaction Potts model on the square lattice (FFPS), where the four spins reside in the corners of an elementary square. Each spin can take an integer value 1,2,...,q. We write the partition function as a sum over clusters consisting of monochromatic faces. When the number of faces becomes large, tracing out spin configurations is equivalent to enumerating large lattice animals. It is known that the asymptotic number of animals with k faces is governed by λᵏ, with λ ≈ 4.0626. Based on this observation, systems with q < 4 and q > 4 exhibit a second and first order phase transitions, respectively. The transition nature of the q = 4 case is borderline. For any q, a critical giant component (GC) is formed. In the finite order case, GC is simple, while it is fractal when the transition is continuous. Using simple equilibrium arguments, we obtain a (zero order) bound on the transition point. It is claimed that this bound should apply for other lattices as well. Next, taking into account higher order sites contributions, the critical bound becomes tighter. Moreover, for q > 4, if corrections due to contributions from small clusters are negligible in the thermodynamic limit, the improved bound should be exact. The improved bound is used to relate the critical point to the finite correlation length. Our analytical predictions are confirmed by an extensive numerical study of FFPS, using the Wang-Landau method. In particular, the q=4 marginal case is supported by a very ambiguous pseudo-critical finite size behavior.

Keywords: entropic sampling, lattice animals, phase transitions, Potts model

Procedia PDF Downloads 149
13331 Effective Microorganisms as a Sustainable Environment Product and Their Application: A Study in Pakistan

Authors: Jaffar Hussain, Farman Ali Shah

Abstract:

As we know that Pakistan is the developing country so it adopts new technologies for progress. In last three decays, some new technologies were introduced in the world in which Effective Microorganism was one of them. Microorganisms are one of the most power full living forces on earth. Originally, EM was developed as an odor control, farm, and animal health, human health many industrial treatments. Effective Microorganism is an organic fertilizer that contains a mixture of co-existing valuable microorganism composed from the environment. There are vast application of the EM in the world in which the researchers are explained in literature .In Pakistan work on EM technologies are under process, researcher are doing work to make them most valuable. At that time the application of EM are in agriculture, water treatment, to increase Cement strength, improving saline soil etc. Effective microorganisms are environmentally friendly , not-naturally organized, not chemically synthesized, not dangerous and not pathogenic.

Keywords: developing country, technologies, effective microorganism, researchers, Pakistan, agriculture

Procedia PDF Downloads 466
13330 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 241
13329 Instability by Weak Precession of the Flow in a Rapidly Rotating Sphere

Authors: S. Kida

Abstract:

We consider the flow of an incompressible viscous fluid in a precessing sphere whose spin and precession axes are orthogonal to each other. The flow is characterized by two non-dimensional parameters, the Reynolds number Re and the Poincare number Po. For which values of (Re, Po) will the flow approach a steady state from an arbitrary initial condition? To answer it we are searching the instability boundary of the steady states in the whole (Re, Po) plane. Here, we focus the rapidly rotating and weakly precessing limit, i.e., Re >> 1 and Po << 1. The steady flow was obtained by the asymptotic expansion for small ε=Po Re¹/² << 1. The flow exhibits nearly a solid-body rotation in the whole sphere except for a thin boundary layer which develops over the sphere surface. The thickness of this boundary layer is of O(δ), where δ=Re⁻¹/², except where two circular critical bands of thickness of O(δ⁴/⁵) and of width of O(δ²/⁵) which are located away from the spin axis by about 60°. We perform the linear stability analysis of the steady flow. We assume that the disturbances are localized in the critical bands and make an expansion analysis in terms of ε to derive the eigenvalue problem for the growth rate of the disturbance, which is solved numerically. As the solution, we obtain an asymptote of the stability boundary as Po=28.36Re⁻⁰.⁸. This agrees excellently with the corresponding laboratory experiments and numerical simulations. One of the most popular instability mechanisms so far is the parametric instability, which turns out, however, not to give the correct stability boundary. The present instability is different from the parametric instability.

Keywords: boundary layer, critical band, instability, precessing sphere

Procedia PDF Downloads 139
13328 Design of Speedy, Scanty Adder for Lossy Application Using QCA

Authors: T. Angeline Priyanka, R. Ganesan

Abstract:

Recent trends in microelectronics technology have gradually changed the strategies used in very large scale integration (VLSI) circuits. Complementary Metal Oxide Semiconductor (CMOS) technology has been the industry standard for implementing VLSI device for the past two decades, but due to scale-down issues of ultra-low dimension achievement is not achieved so far. Hence it paved a way for Quantum Cellular Automata (QCA). It is only one of the many alternative technologies proposed as a replacement solution to the fundamental limit problem that CMOS technology will impose in the years to come. In this brief, presented a new adder that possesses high speed of operation occupying less area is proposed. This adder is designed especially for error tolerant application. Hence in the proposed adder, the overall area (cell count) and simulation time are reduced by 88 and 73 percent respectively. Various results of the proposed adder are shown and described.

Keywords: quantum cellular automata, carry look ahead adder, ripple carry adder, lossy application, majority gate, crossover

Procedia PDF Downloads 540
13327 Modeling of Ductile Fracture Using Stress-Modified Critical Strain Criterion for Typical Pressure Vessel Steel

Authors: Carlos Cuenca, Diego Sarzosa

Abstract:

Ductile fracture occurs by the mechanism of void nucleation, void growth and coalescence. Potential sites for initiation are second phase particles or non-metallic inclusions. Modelling of ductile damage at the microscopic level is very difficult and complex task for engineers. Therefore, conservative predictions of ductile failure using simple models are necessary during the design and optimization of critical structures like pressure vessels and pipelines. Nowadays, it is well known that the initiation phase is strongly influenced by the stress triaxiality and plastic deformation at the microscopic level. Thus, a simple model used to study the ductile failure under multiaxial stress condition is the Stress Modified Critical Strain (SMCS) approach. Ductile rupture has been study for a structural steel under different stress triaxiality conditions using the SMCS method. Experimental tests are carried out to characterize the relation between stress triaxiality and equivalent plastic strain by notched round bars. After calibration of the plasticity and damage properties, predictions are made for low constraint bending specimens with and without side grooves. Stress/strain fields evolution are compared between the different geometries. Advantages and disadvantages of the SMCS methodology are discussed.

Keywords: damage, SMSC, SEB, steel, failure

Procedia PDF Downloads 286
13326 Development of a New Method for T-Joint Specimens Testing under Shear Loading

Authors: Radek Doubrava, Roman Ruzek

Abstract:

Nonstandard tests are necessary for analyses and verification of new developed structural and technological solutions with application of composite materials. One of the most critical primary structural parts of a typical aerospace structure is T-joint. This structural element is loaded mainly in shear, bending, peel and tension. The paper is focused on the shear loading simulations. The aim of the work is to obtain a representative uniform distribution of shear loads along T-joint during the mechanical testing is. A new design of T-joint test procedure, numerical simulation and optimization of representative boundary conditions are presented. The different conditions and inaccuracies both in simulations and experiments are discussed. The influence of different parameters on stress and strain distributions is demonstrated on T-joint made of CFRP (carbon fiber reinforced plastic). A special test rig designed by VZLU (Aerospace Research and Test Establishment) for T-shear test procedure is presented.

Keywords: T-joint, shear, composite, mechanical testing, finite element analysis, methodology

Procedia PDF Downloads 423
13325 Political News Coverage in Philippine Tabloid Sheets: A Critical Discourse Analysis

Authors: Michael Steve Lopez Bernabe

Abstract:

Political news coverage of tabloid sheets as one of the print media molds or influences public opinions and perceptions. In this study, Critical Discourse Analysis was employed to 30 political news taken from major tabloid sheets in the Philippines in order to determine the linguistics features and other features characterizing the political news in tabloids such as discursive styles, news topics or contexts, journalistic roles and news sources. The political underpinnings through framing were also explored in the study. The results revealed that the linguistics features of the news coverage include moods and modalities (morphology), passivity and transitivity, nominalization, appositives and embedding (syntax), and pre-modifications, the use of verbs and omissions (grammatical features). The discursive features were direct or indirect speech; cohesion; endophora and classifications. In terms of news sources were politicians, experts, and journalists; and the tabloid perform the journalistic roles such as an intervention, watchdog, loyal-facilitator, service, infotainment and civic. The news was also evident of different political underpinnings such as game or strategic framing, conflict framing, human interest framing, attrition of responsibility framing, morality framing, economic consequences framing and issue framing.

Keywords: critical discourse analysis, political news, applied linguistics, Philippines, tabloid sheets

Procedia PDF Downloads 30
13324 Evaluation of the Most Effective Insecticides against the Spodoptera Frugiperda, on the Maize Production

Authors: Ahmed Ali Hassan

Abstract:

In 2016, the Fall Armyworm (FAW) was first discovered in Africa. FAW is abundantly present in Somalia and seriously harms the maize crop. This investigation examined the impact on maize productivity of three different pesticides used to combat the autumn armyworm, Spodoptera frugiperda (Noctuidae: Lepidoptera). During the 2020–2021 growing season, three insecticides (Malathion 57 EC, Ampligo150 ZC, and Carbryle 85 WP) were evaluated at field demonstration plots. Our result showed that, significant mortality of S. frugiperda was observed on the treatment plot treated with Amplico. Ampligo caused over 90% larval mortality after application. Malathion had moderate activity, causing 53.733% mortality after application, while Carbaryl was less effective, causing 36.367% mortality after application. Consequently, the current finding shows that the three selected insecticides reduced the damage and infestation level of S. frugiperda in the maize field conditions and the most effective treatment were Amplico.

Keywords: pesticides, maize fall army worm, insecticides, mortality, S. frugiperda

Procedia PDF Downloads 53
13323 GRABTAXI: A Taxi Revolution in Thailand

Authors: Danuvasin Charoen

Abstract:

The study investigates the business process and business model of GRABTAXI. The paper also discusses how the company implemented strategies to gain competitive advantages. The data is derived from the analysis of secondary data and the in-depth interviews among staffs, taxi drivers, and key customers. The findings indicated that the company’s competitive advantages come from being the first mover, emphasising on the ease of use and tangible benefits of application, and using network effect strategy.

Keywords: taxi, mobile application, innovative business model, Thailand

Procedia PDF Downloads 287
13322 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 416
13321 Application of Dual-Stage Sugar Substitution Technique in Tommy Atkins Mangoes

Authors: Rafael A. B. De Medeiros, Zilmar M. P. Barros, Carlos B. O. De Carvalho, Eunice G. Fraga Neta, Maria I. S. Maciel, Patricia M. Azoubel

Abstract:

The use of the sugar substitution technique (D3S) in mango was studied. It consisted of two stages and the use of ultrasound in one or both stages was evaluated in terms of water loss and solid gain. Higher water loss results were found subjecting the fruit samples to ultrasound in the first stage followed by immersion of the samples in Stevia-based solution with application of ultrasound in the second stage, while higher solids gain were obtained without application of ultrasound in second stage. Samples were evaluated in terms of total carotenoids content and total color difference. Samples submitted to ultrasound in both D3S stages presented higher carotenoid retention compared to samples sonicated only in the first stage. Color of man goes after the D3S process showed notable changes.

Keywords: Mangifera indica L., quality, Stevia rebaudiana, ultrasound

Procedia PDF Downloads 389
13320 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 140
13319 Developing Critical-Process Skills Integrated Assessment Instrument as Alternative Assessment on Electrolyte Solution Matter in Senior High School

Authors: Sri Rejeki Dwi Astuti, Suyanta

Abstract:

The demanding of the asessment in learning process was impact by policy changes. Nowadays, the assessment not only emphasizes knowledge, but also skills and attitude. However, in reality there are many obstacles in measuring them. This paper aimed to describe how to develop instrument of integrated assessment as alternative assessment to measure critical thinking skills and science process skills in electrolyte solution and to describe instrument’s characteristic such as logic validity and construct validity. This instrument development used test development model by McIntire. Development process data was acquired based on development test step and was analyzed by qualitative analysis. Initial product was observed by three peer reviewer and six expert judgment (two subject matter expert, two evaluation expert and two chemistry teacher) to acquire logic validity test. Logic validity test was analyzed using Aiken’s formula. The estimation of construct validity was analyzed by exploratory factor analysis. Result showed that integrated assessment instrument has 0,90 of Aiken’s Value and all item in integrated assessment asserted valid according to construct validity.

Keywords: construct validity, critical thinking skills, integrated assessment instrument, logic validity, science process skills

Procedia PDF Downloads 253
13318 Experience of Transfering Critically Ill Patients on a Transport Ventilator in a Lower Middle-Income Country-Uganda

Authors: Baluku Nathan

Abstract:

Transferring critically ill patients from one health facility to another poses a major risk to the patient because of increased oxygen demands. transferring patients with critical COVID-19 from a rural health canter in a rural district to a national referral hospital over 350 km in 7 hours would require three size H oxygen cylinders for successful transfer. It was always difficult to arrange the three size cylinders in the ambulance as workspace was greatly compromised for the ambulance assistant. Purpose: The purpose of this study was to investigate the impact and effectiveness of transport ventilators on the transportation of the critically ill patients from rural health canters to national referral hospitals in Uganda. Methodology: This was a descriptive cross-sectional study conducted in sept 2022 among critical care nurses and ambulance assistants who had used both methods of transportation (ventilators and cylinders). A semi structured questionnaire was used to collect quantitative data after informed consent. Results: From the findings, distribution of transport ventilators to the regional referral hospitals by the Ministry of Health has gradually improved patient transfer as the team requires less than one size oxygen cylinder to successfully transfer a patient. We use two ambulance assistants (a critical care nurse and another nurse who has been trained on use of the ventilator) when transferring patients with critical COVID-19 as the teams have to interchange over the long distance. Conclusions: Transport ventilators are effective and efficient in transferring critically ill patients, therefore should be rolled out to lower levels coupled with user training to improve outcomes of patients transferred in ambulances in lower income countries.

Keywords: emergency medical technician, critically ill, COVID-19, transport ventilator

Procedia PDF Downloads 65
13317 Graphic User Interface Design Principles for Designing Augmented Reality Applications

Authors: Afshan Ejaz, Syed Asim Ali

Abstract:

The reality is a combination of perception, reconstruction, and interaction. Augmented Reality is the advancement that layer over consistent everyday existence which includes content based interface, voice-based interfaces, voice-based interface and guide based or gesture-based interfaces, so designing augmented reality application interfaces is a difficult task for the maker. Designing a user interface which is not only easy to use and easy to learn but its more interactive and self-explanatory which have high perceived affordability, perceived usefulness, consistency and high discoverability so that the user could easily recognized and understand the design. For this purpose, a lot of interface design principles such as learnability, Affordance, Simplicity, Memorability, Feedback, Visibility, Flexibly and others are introduced but there no such principles which explain the most appropriate interface design principles for designing an Augmented Reality application interfaces. Therefore, the basic goal of introducing design principles for Augmented Reality application interfaces is to match the user efforts and the computer display (‘plot user input onto computer output’) using an appropriate interface action symbol (‘metaphors’) or to make that application easy to use, easy to understand and easy to discover. In this study by observing Augmented reality system and interfaces, few of well-known design principle related to GUI (‘user-centered design’) are identify and through them, few issues are shown which can be determined through the design principles. With the help of multiple studies, our study suggests different interface design principles which makes designing Augmented Reality application interface more easier and more helpful for the maker as these principles make the interface more interactive, learnable and more usable. To accomplish and test our finding, Pokémon Go an Augmented Reality game was selected and all the suggested principles are implement and test on its interface. From the results, our study concludes that our identified principles are most important principles while developing and testing any Augmented Reality application interface.

Keywords: GUI, augmented reality, metaphors, affordance, perception, satisfaction, cognitive burden

Procedia PDF Downloads 149
13316 The Long – Term Effects of a Prevention Program on the Number of Critical Incidents and Sick Leave Days: A Decade Perspective

Authors: Valerie Isaak

Abstract:

Background: This study explores the effectiveness of refresher training sessions of an intervention program at reducing the employees’ risk of injury due to patient violence in a forensic psychiatric hospital. Methods: The original safety intervention program that consisted of a 3 days’ workshop was conducted in the maximum-security ward of a psychiatric hospital in Israel. Ever since the original intervention, annual refreshers were conducted, highlighting one of the safety elements covered in the original intervention. The study examines the effect of the intervention program along with the refreshers over a period of 10 years in four wards. Results: Analysis of the data demonstrates that beyond the initial reduction following the original intervention, refreshers seem to have an additional positive long-term effect, reducing both the number of violent incidents and the number of actual employee injuries in a forensic psychiatric hospital. Conclusions: We conclude that such an intervention program followed by refresher training would promote employees’ wellbeing. A healthy work environment is part of management’s commitment to improving employee wellbeing at the workplace.

Keywords: wellbeing, violence at work, intervention program refreshers, public sector mental healthcare

Procedia PDF Downloads 121
13315 The Impact of Artificial Intelligence on Textiles Technology

Authors: Ramy Kamel Fekrey Gadelrab

Abstract:

Textile sensors have gained a lot of interest in recent years as it is instrumental in monitoring physiological and environmental changes, for a better diagnosis that can be useful in various fields like medical textiles, sports textiles, protective textiles, agro textiles, and geo-textiles. Moreover, with the development of flexible textile-based wearable sensors, the functionality of smart clothing is augmented for a more improved user experience when it comes to technical textiles. In this context, conductive textiles using new composites and nanomaterials are being developed while considering its compatibility with the textile manufacturing processes. This review aims to provide a comprehensive and detailed overview of the contemporary advancements in textile-based wearable physical sensors, used in the field of medical, security, surveillance, and protection, from a global perspective. The methodology used is through analysing various examples of integration of wearable textile-based sensors with clothing for daily use, keeping in mind the technological advances in the same. By comparing various case studies, it come across various challenges textile sensors, in terms of stability, the comfort of movement, and reliable sensing components to enable accurate measurements, in spite of progress in the engineering of the wearable. Addressing such concerns is critical for the future success of wearable sensors.

Keywords: nanoparticles, enzymes, immobilization, textilesconductive yarn, e-textiles, smart textiles, thermal analysisflexible textile-based wearable sensors, contemporary advancements, conductive textiles, body conformal design

Procedia PDF Downloads 25
13314 Theorizing Digital Transformation, Digitization and Digitalization in Africa Emerging Research in Digital Business: A Critical Review of the Current Scholarship

Authors: Ayanda Magida

Abstract:

The paper aims to provide a critical review of the current state-of-the-art literature on emerging digital business theories. They are specifically focusing on the emergent theories on digital transformation, digitization, and digitalization and their importance in the global south. Digital business is an emergent field that cuts across the different existing disciplines. The paper is threefold- to provide the conceptual and theoretical definition of the DT, digitization and digitization. There is a growing need to provide some of the differences between digitalization, digitization and digital transformation from a theoretical and conceptual basis. These tend to be confused and often use interchangeably the second aim is to focus on the emerging theories on digital transformation and digital business. Finally, the paper provides some critical review of the importance of scholarship in the field from the global south. The systematic review of the literature was conducted through the different research databases to provide some of the major theories in the field of digital business and critically argue for the global south stance. Much of the research on the development and adoption of digital technologies, specifically digital transformation, has been done in the west and developed countries. There is thus a dearth of research conducted in developing countries and the global south.

Keywords: digital transformation, digitization, digital business, digitalization

Procedia PDF Downloads 248
13313 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 182
13312 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 77
13311 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 254
13310 Mine Production Index (MPi): New Method to Evaluate Effectiveness of Mining Machinery

Authors: Amol Lanke, Hadi Hoseinie, Behzad Ghodrati

Abstract:

OEE has been used in many industries as measure of performance. However due to limitations of original OEE, it has been modified by various researchers. OEE for mining application is special version of classic equation, carries these limitation over. In this paper it has been aimed to modify the OEE for mining application by introducing the weights to the elements of it and termed as Mine Production index (MPi). As a special application of new index MPi shovel has been developed by team of experts and researchers for evaluating the shovel effectiveness. Based on analysis, utilization followed by performance and availability were ranked in this order. To check the applicability of this index, a case study was done on four electrical and one hydraulic shovel in a Swedish mine. The results shows that MPishovelcan properly evaluate production effectiveness of shovels and determine effectiveness values in optimistic view compared to OEE. MPi with calculation not only give the effectiveness but also can predict which elements should be focused for improving the productivity.

Keywords: mining, overall equipment efficiency (OEE), mine production index, shovels

Procedia PDF Downloads 448