Search results for: limited access highways
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7289

Search results for: limited access highways

5759 TeleEmergency Medicine: Transforming Acute Care through Virtual Technology

Authors: Ashley L. Freeman, Jessica D. Watkins

Abstract:

TeleEmergency Medicine (TeleEM) is an innovative approach leveraging virtual technology to deliver specialized emergency medical care across diverse healthcare settings, including internal acute care and critical access hospitals, remote patient monitoring, and nurse triage escalation, in addition to external emergency departments, skilled nursing facilities, and community health centers. TeleEM represents a significant advancement in the delivery of emergency medical care, providing healthcare professionals the capability to deliver expertise that closely mirrors in-person emergency medicine, exceeding geographical boundaries. Through qualitative research, the extension of timely, high-quality care has proven to address the critical needs of patients in remote and underserved areas. TeleEM’s service design allows for the expansion of existing services and the establishment of new ones in diverse geographic locations. This ensures that healthcare institutions can readily scale and adapt services to evolving community requirements by leveraging on-demand (non-scheduled) telemedicine visits through the deployment of multiple video solutions. In terms of financial management, TeleEM currently employs billing suppression and subscription models to enhance accessibility for a wide range of healthcare facilities. Plans are in motion to transition to a billing system routing charges through a third-party vendor, further enhancing financial management flexibility. To address state licensure concerns, a patient location verification process has been integrated through legal counsel and compliance authorities' guidance. The TeleEM workflow is designed to terminate if the patient is not physically located within licensed regions at the time of the virtual connection, alleviating legal uncertainties. A distinctive and pivotal feature of TeleEM is the introduction of the TeleEmergency Medicine Care Team Assistant (TeleCTA) role. TeleCTAs collaborate closely with TeleEM Physicians, leading to enhanced service activation, streamlined coordination, and workflow and data efficiencies. In the last year, more than 800 TeleEM sessions have been conducted, of which 680 were initiated by internal acute care and critical access hospitals, as evidenced by quantitative research. Without this service, many of these cases would have necessitated patient transfers. Barriers to success were examined through thorough medical record review and data analysis, which identified inaccuracies in documentation leading to activation delays, limitations in billing capabilities, and data distortion, as well as the intricacies of managing varying workflows and device setups. TeleEM represents a transformative advancement in emergency medical care that nurtures collaboration and innovation. Not only has advanced the delivery of emergency medicine care virtual technology through focus group participation with key stakeholders, rigorous attention to legal and financial considerations, and the implementation of robust documentation tools and the TeleCTA role, but it’s also set the stage for overcoming geographic limitations. TeleEM assumes a notable position in the field of telemedicine by enhancing patient outcomes and expanding access to emergency medical care while mitigating licensure risks and ensuring compliant billing.

Keywords: emergency medicine, TeleEM, rural healthcare, telemedicine

Procedia PDF Downloads 83
5758 Finite Element Modelling and Optimization of Post-Machining Distortion for Large Aerospace Monolithic Components

Authors: Bin Shi, Mouhab Meshreki, Grégoire Bazin, Helmi Attia

Abstract:

Large monolithic components are widely used in the aerospace industry in order to reduce airplane weight. Milling is an important operation in manufacturing of the monolithic parts. More than 90% of the material could be removed in the milling operation to obtain the final shape. This results in low rigidity and post-machining distortion. The post-machining distortion is the deviation of the final shape from the original design after releasing the clamps. It is a major challenge in machining of the monolithic parts, which costs billions of economic losses every year. Three sources are directly related to the part distortion, including initial residual stresses (RS) generated from previous manufacturing processes, machining-induced RS and thermal load generated during machining. A finite element model was developed to simulate a milling process and predicate the post-machining distortion. In this study, a rolled-aluminum plate AA7175 with a thickness of 60 mm was used for the raw block. The initial residual stress distribution in the block was measured using a layer-removal method. A stress-mapping technique was developed to implement the initial stress distribution into the part. It is demonstrated that this technique significantly accelerates the simulation time. Machining-induced residual stresses on the machined surface were measured using MTS3000 hole-drilling strain-gauge system. The measured RS was applied on the machined surface of a plate to predict the distortion. The predicted distortion was compared with experimental results. It is found that the effect of the machining-induced residual stress on the distortion of a thick plate is very limited. The distortion can be ignored if the wall thickness is larger than a certain value. The RS generated from the thermal load during machining is another important factor causing part distortion. Very limited number of research on this topic was reported in literature. A coupled thermo-mechanical FE model was developed to evaluate the thermal effect on the plastic deformation of a plate. A moving heat source with a feed rate was used to simulate the dynamic cutting heat in a milling process. When the heat source passed the part surface, a small layer was removed to simulate the cutting operation. The results show that for different feed rates and plate thicknesses, the plastic deformation/distortion occurs only if the temperature exceeds a critical level. It was found that the initial residual stress has a major contribution to the part distortion. The machining-induced stress has limited influence on the distortion for thin-wall structure when the wall thickness is larger than a certain value. The thermal load can also generate part distortion when the cutting temperature is above a critical level. The developed numerical model was employed to predict the distortion of a frame part with complex structures. The predictions were compared with the experimental measurements, showing both are in good agreement. Through optimization of the position of the part inside the raw plate using the developed numerical models, the part distortion can be significantly reduced by 50%.

Keywords: modelling, monolithic parts, optimization, post-machining distortion, residual stresses

Procedia PDF Downloads 54
5757 Application Research of Stilbene Crystal for the Measurement of Accelerator Neutron Sources

Authors: Zhao Kuo, Chen Liang, Zhang Zhongbing, Ruan Jinlu. He Shiyi, Xu Mengxuan

Abstract:

Stilbene, C₁₄H₁₂, is well known as one of the most useful organic scintillators for pulse shape discrimination (PSD) technique for its good scintillation properties. An on-line acquisition system and an off-line acquisition system were developed with several CAMAC standard plug-ins, NIM plug-ins, neutron/γ discriminating plug-in named 2160A and a digital oscilloscope with high sampling rate respectively for which stilbene crystals and photomultiplier tube detectors (PMT) as detector for accelerator neutron sources measurement carried out in China Institute of Atomic Energy. Pulse amplitude spectrums and charge amplitude spectrums were real-time recorded after good neutron/γ discrimination whose best PSD figure-of-merits (FoMs) are 1.756 for D-D accelerator neutron source and 1.393 for D-T accelerator neutron source. The probability of neutron events in total events was 80%, and neutron detection efficiency was 5.21% for D-D accelerator neutron sources, which were 50% and 1.44% for D-T accelerator neutron sources after subtracting the background of scattering observed by the on-line acquisition system. Pulse waveform signals were acquired by the off-line acquisition system randomly while the on-line acquisition system working. The PSD FoMs obtained by the off-line acquisition system were 2.158 for D-D accelerator neutron sources and 1.802 for D-T accelerator neutron sources after waveform digitization off-line processing named charge integration method for just 1000 pulses. In addition, the probabilities of neutron events in total events obtained by the off-line acquisition system matched very well with the probabilities of the on-line acquisition system. The pulse information recorded by the off-line acquisition system could be repetitively used to adjust the parameters or methods of PSD research and obtain neutron charge amplitude spectrums or pulse amplitude spectrums after digital analysis with a limited number of pulses. The off-line acquisition system showed equivalent or better measurement effects compared with the online system with a limited number of pulses which indicated a feasible method based on stilbene crystals detectors for the measurement of prompt neutrons neutron sources like prompt accelerator neutron sources emit a number of neutrons in a short time.

Keywords: stilbene crystal, accelerator neutron source, neutron / γ discrimination, figure-of-merits, CAMAC, waveform digitization

Procedia PDF Downloads 187
5756 Feasibility Study of Particle Image Velocimetry in the Muzzle Flow Fields during the Intermediate Ballistic Phase

Authors: Moumen Abdelhafidh, Stribu Bogdan, Laboureur Delphine, Gallant Johan, Hendrick Patrick

Abstract:

This study is part of an ongoing effort to improve the understanding of phenomena occurring during the intermediate ballistic phase, such as muzzle flows. A thorough comprehension of muzzle flow fields is essential for optimizing muzzle device and projectile design. This flow characterization has heretofore been almost entirely limited to local and intrusive measurement techniques such as pressure measurements using pencil probes. Consequently, the body of quantitative experimental data is limited, so is the number of numerical codes validated in this field. The objective of the work presented here is to demonstrate the applicability of the Particle Image Velocimetry (PIV) technique in the challenging environment of the propellant flow of a .300 blackout weapon to provide accurate velocity measurements. The key points of a successful PIV measurement are the selection of the particle tracer, their seeding technique, and their tracking characteristics. We have experimentally investigated the aforementioned points by evaluating the resistance, gas dispersion, laser light reflection as well as the response to a step change across the Mach disk for five different solid tracers using two seeding methods. To this end, an experimental setup has been performed and consisted of a PIV system, the combustion chamber pressure measurement, classical high-speed schlieren visualization, and an aerosol spectrometer. The latter is used to determine the particle size distribution in the muzzle flow. The experimental results demonstrated the ability of PIV to accurately resolve the salient features of the propellant flow, such as the under the expanded jet and vortex rings, as well as the instantaneous velocity field with maximum centreline velocities of more than 1000 m/s. Besides, naturally present unburned particles in the gas and solid ZrO₂ particles with a nominal size of 100 nm, when coated on the propellant powder, are suitable as tracers. However, the TiO₂ particles intended to act as a tracer, surprisingly not only melted but also functioned as a combustion accelerator and decreased the number of particles in the propellant gas.

Keywords: intermediate ballistic, muzzle flow fields, particle image velocimetry, propellant gas, particle size distribution, under expanded jet, solid particle tracers

Procedia PDF Downloads 161
5755 Teenage Pregnancy: The Unmet Needs of Female Adolescents in Uganda

Authors: M. Weller Jones, J. Moffat, J. Taylor, J. Hartland, M. Natarajan

Abstract:

Background: Uganda’s teenage pregnancy rate remains a significant problem for female and maternal health in the country. Teenage pregnancy is linked to higher rates of maternal and neonatal mortality and morbidity, including preterm labour, obstructed labour, vesicovaginal fistulae, infections, and maternal mental health morbidity. In 2015, the National Strategy to End Child Marriage and Teenage Pregnancy was launched in Uganda. Research is needed so that the interventions in this Strategy can be effectively applied at a local level. This study at Kitovu and Villa Maria Hospitals, two local community hospitals near Masaka, Uganda, aimed to measure change in the local teenage pregnancy rate over the past 5 years; and to explore the awareness and attitudes of teenagers and healthcare professionals towards 1) teenage pregnancy and, 2) the challenges female adolescents still currently face. Method: Teenage delivery rate, type of delivery, incidence of complications in labour and neonatal and maternal outcomes were collected from the labour ward admission books, at both hospitals, for a six month time period in 2011 and 2016. At Kitovu Hospital, qualitative data regarding the experience of, and attitudes towards teenage pregnancy was collected from interviews conducted with 12 maternity staff members and with eight female teenagers, aged 16-19, who were pregnant or post-partum. Results: The proportion of total births to teenage mothers fell from 14% in 2011 to 7% in 2016 (Kitovu), but it remains higher in rural locations (19%, Villa Maria). Beliefs about exacerbating factors included: poor access to contraception; misconceptions that contraception is damaging to women’s health; failing sex education in schools; and poor awareness of national campaigns to reduce teenage pregnancy. Staff felt that the best way to tackle teenage pregnancy was to improve sex education in schools and to sensitise families to these issues. Six of the eight teenagers wanted more frequent sex education and easier, cheap access to contraception. Only one teenager saw positive consequences stating that teenage pregnancy would ‘avoid operations later in life.’ Discussion: Teenage pregnancy is a recognised problem and strategies in the Masaka region should focus on improving sex education in schools and initiating an organisation that educates and supplies free contraception to teenagers.

Keywords: adolescents, attitudes, teenage pregnancy, Uganda

Procedia PDF Downloads 187
5754 Adaptive Training Methods Designed to Improve a Shorter Resident Curriculum in Obstetrics and Gynecology

Authors: Philippe Judlin, Olivier Morel

Abstract:

Background: In France, the resident curriculum (RC) in Obstetrics and Gynecology (OBGYN) takes five years. In the course of the last 15 years, this RC has undergone major changes, characterized mainly by successive reductions of work hours. The program used to comprise long and frequent shifts, huge workload, poor supervision and erratic theoretical teaching. A decade ago, the French Ministry of Heath recommended a limitation of shift duration up to 24 hours and a minimum of 11 hours off duty between shifts. Last year, in order to comply with European Union directives, new recommendations have further limited residents’ work hours to 48 hours per week. Methods: Assessment of the residency program adjustments recently made to accommodate the recommendations while improving the training quality in resorting to new methods. Results: The challenge facing program directors was to provide an all-encompassing curriculum to OBGYN residents despite fewer work hours. Program has been dramatically redesigned, and several measures have been put in place: -The resident rotation system has been redesigned. Residents used to make 6-month rotations between 10-12 Departments of OBGYN or Surgery. Fewer Departments, those providing the best teaching, have been kept in the new RC. -Extensive inhouse supervision has been implemented for all kinds of clinical activities. Effectual supervision of residents has proved to be an effective tool to improve the quality of training. -The tutorship system, with academic members individually overseeing residents during their curriculum, has been perfected. It allows a better follow-up of residents’ progresses during the 5-year program. -The set up of an extensive program of lectures encompassing all maters in Obstetrics & Gynecology. These mandatory lectures are available online in a dedicated website. Therefore, face-to-face lectures have been limited in order to fit in the 48-hour limit. -The use of simulation has been significantly increased in obstetrics, materno-fetal medicine and surgery (stressing especially laparoscopic training). -Residents’ feedback has been taken into account in the setup of the new RC. Conclusion: This extensive overhaul of the Obstetrics and Gynecology RC has been in place since last year only. Nevertheless, the new program seems to adequately take into account the new recommendations while providing a better and more consistent teaching to the OBGYN residents.

Keywords: education, laparoscopy, residency, simulation

Procedia PDF Downloads 186
5753 Comparison of Air Quality in 2019 and 2020 in the Campuses of the University of the Basque Country

Authors: Elisabete Alberdi, Irantzu Álvarez, Nerea Astigarraga, Heber Hernández

Abstract:

The purpose of this research work is to study the emissions of certain substances that contribute to air pollution and, as far as possible, to try to eliminate or reduce them, to avoid damage to both health and the environment. This work focuses on analyzing and comparing air quality in 2019 and 2020 in the Autonomous Community of the Basque Country, especially near the UPV/EHU campuses. We use Geostatistics to develop a spatial model and to analyse the levels of pollutants in those areas where the scope of the monitoring stations is limited. Finally, different more sustainable transport alternatives for users have been proposed.

Keywords: air quality, pollutants, monitoring stations, environment, geostatistics

Procedia PDF Downloads 174
5752 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters

Authors: Shaban Guma, Naim Bajcinca

Abstract:

We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.

Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless

Procedia PDF Downloads 331
5751 Highly Accurate Tennis Ball Throwing Machine with Intelligent Control

Authors: Ferenc Kovács, Gábor Hosszú

Abstract:

The paper presents an advanced control system for tennis ball throwing machines to improve their accuracy according to the ball impact points. A further advantage of the system is the much easier calibration process involving the intelligent solution of the automatic adjustment of the stroking parameters according to the ball elasticity, the self-calibration, the use of the safety margin at very flat strokes and the possibility to placing the machine to any position of the half court. The system applies mathematical methods to determine the exact ball trajectories and special approximating processes to access all points on the aimed half court.

Keywords: control system, robot programming, robot control, sports equipment, throwing machine

Procedia PDF Downloads 397
5750 The Role of Accounting and Auditing in Anti-Corruption Strategies: The Case of ECOWAS

Authors: Edna Gnomblerou

Abstract:

Given the current scale of corruption epidemic in West African economies, governments are seeking for immediate and effective measures to reduce the likelihood of the plague within the region. Generally, accountants and auditors are expected to help organizations in detecting illegal practices. However, their role in the fight against corruption is sometimes limited due to the collusive nature of corruption. The Denmark anti-corruption model shows that the implementation of additional controls over public accounts and independent efficient audits improve transparency and increase the probability of detection. This study is aimed at reviewing the existing anti-corruption policies of the Economic Commission of West African States (ECOWAS) as to observe the role attributed to accounting, auditing and other managerial practices in their anti-corruption drive. It further discusses the usefulness of accounting and auditing in helping anti-corruption commissions in controlling misconduct and increasing the perception to detect irregularities within public administration. The purpose of this initiative is to identify and assess the relevance of accounting and auditing in curbing corruption. To meet this purpose, the study was designed to answer the questions of whether accounting and auditing processes were included in the reviewed anti-corruption strategies, and if yes, whether they were effective in the detection process. A descriptive research method was adopted in examining the role of accounting and auditing in West African anti-corruption strategies. The analysis reveals that proper recognition of accounting standards and implementation of financial audits are viewed as strategic mechanisms in tackling corruption. Additionally, codes of conduct, whistle-blowing and information disclosure to the public are among the most common managerial practices used throughout anti-corruption policies to effectively and efficiently address the problem. These observations imply that sound anti-corruption strategies cannot ignore the values of including accounting and auditing processes. On one hand, this suggests that governments should employ all resources possible to improve accounting and auditing practices in the management of public sector organizations. On the other hand, governments must ensure that accounting and auditing practices are not limited to the private sector, but when properly implemented constitute crucial mechanisms to control and reduce corrupt incentives in public sector.

Keywords: accounting, anti-corruption strategy, auditing, ECOWAS

Procedia PDF Downloads 256
5749 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 22
5748 Techno-Economic Assessment of Distributed Heat Pumps Integration within a Swedish Neighborhood: A Cosimulation Approach

Authors: Monica Arnaudo, Monika Topel, Bjorn Laumert

Abstract:

Within the Swedish context, the current trend of relatively low electricity prices promotes the electrification of the energy infrastructure. The residential heating sector takes part in this transition by proposing a switch from a centralized district heating system towards a distributed heat pumps-based setting. When it comes to urban environments, two issues arise. The first, seen from an electricity-sector perspective, is related to the fact that existing networks are limited with regards to their installed capacities. Additional electric loads, such as heat pumps, can cause severe overloads on crucial network elements. The second, seen from a heating-sector perspective, has to do with the fact that the indoor comfort conditions can become difficult to handle when the operation of the heat pumps is limited by a risk of overloading on the distribution grid. Furthermore, the uncertainty of the electricity market prices in the future introduces an additional variable. This study aims at assessing the extent to which distributed heat pumps can penetrate an existing heat energy network while respecting the technical limitations of the electricity grid and the thermal comfort levels in the buildings. In order to account for the multi-disciplinary nature of this research question, a cosimulation modeling approach was adopted. In this way, each energy technology is modeled in its customized simulation environment. As part of the cosimulation methodology: a steady-state power flow analysis in pandapower was used for modeling the electrical distribution grid, a thermal balance model of a reference building was implemented in EnergyPlus to account for space heating and a fluid-cycle model of a heat pump was implemented in JModelica to account for the actual heating technology. With the models set in place, different scenarios based on forecasted electricity market prices were developed both for present and future conditions of Hammarby Sjöstad, a neighborhood located in the south-east of Stockholm (Sweden). For each scenario, the technical and the comfort conditions were assessed. Additionally, the average cost of heat generation was estimated in terms of levelized cost of heat. This indicator enables a techno-economic comparison study among the different scenarios. In order to evaluate the levelized cost of heat, a yearly performance simulation of the energy infrastructure was implemented. The scenarios related to the current electricity prices show that distributed heat pumps can replace the district heating system by covering up to 30% of the heating demand. By lowering of 2°C, the minimum accepted indoor temperature of the apartments, this level of penetration can increase up to 40%. Within the future scenarios, if the electricity prices will increase, as most likely expected within the next decade, the penetration of distributed heat pumps can be limited to 15%. In terms of levelized cost of heat, a residential heat pump technology becomes competitive only within a scenario of decreasing electricity prices. In this case, a district heating system is characterized by an average cost of heat generation 7% higher compared to a distributed heat pumps option.

Keywords: cosimulation, distributed heat pumps, district heating, electrical distribution grid, integrated energy systems

Procedia PDF Downloads 150
5747 Approaching Sexual Violence Against People with Disabilities in Colombia from a Qualitative Perspective

Authors: Mariana Calderón, Rocío Murad, Natalia Acevedo, Laura León, Juliana Fonseca, Maria de los Angeles Balaguera Villa

Abstract:

Recently, different countries and international organizations have put on their agenda the elimination of violence against people with disabilities. This research aims to evaluate the social dimensions of sexual violence against people with disabilities, particularly those with psychosocial and cognitive, in Colombia. Results reveal that 55% of people with disabilities that are survivors of sexual violence are younger than 29 years and 20,4 are people with cognitive and psychosocial disabilities. Colombian regions with better social positions presented more cases of sexual violence against people with disabilities. There were found access barriers for health, education and employment among this population, and there was also found poor data quality. Despite Colombia having an important normative framework aimed at preventing and attending to gender-based violence, it does not take into account people with disabilities specific needs. Additionally, it was found an insufficient implementation and appropriation of these norms, negative attitudes, and in general, a lack of service adaptation according to the needs, identities and circumstances of people with disabilities. Furthermore, among the factors that are exposing people with disabilities to sexual violence, it was found that family members tend to be the main aggressors, there are deep gaps in the sex education received by people with disabilities, imaginaries and perceptions about their sexuality are both hypersexualizing and presenting them as asexual. On the other hand, among protective factors, there were found body self-knowledge and conscience, acknowledgment of their sexuality and their sexual and reproductive rights and access to sex ed. Although during the last few years, there has occurred a positive change toward social inclusion of people with disabilities, specifically through their role in the political agenda and the recognition of their rights. More work is needed in order to guarantee their sexual and reproductive rights, particularly for persons with psychosocial and cognitive disabilities. This research results showed the importance of transforming persisting negative imaginaries about their sexuality and also enforcing and promoting their autonomy. In this sense, it is important to acknowledge gaps and barriers faced by them and create strategies to encourage their social inclusion through education, employment, and skill development. Nevertheless, it is necessary to keep contributing new evidence of the social determinants of health that are influencing the occurrence of sexual violence. This research understands sexual violence against people with disabilities in a multidimensional manner and offers the following recommendations: 1- To foment public sensitization and understanding of disabilities. 2- To increase parents, caregivers and officers’ commitment to the prevention and reduction of sexual violence. 3- To focus on the needs, identities and circumstances of people with disabilities.

Keywords: disabilities, sexual and reproductive rights, sexual violence, prevention

Procedia PDF Downloads 77
5746 Strategic Management for Corporate Social Responsibility in Colombian Industries: A Typology of CSR

Authors: Iris Maria Velez Osorio

Abstract:

There has been in the last decade a concern about the environment, particularly about clean and enough water for human consumption but, some enterprises had some trouble to understand the limited resources in the environment. This research tries to understand how some industries are better oriented to the preservation of the environment through investment for strategic management of scarce resources and try in the best way possible, the contaminants. It was made an industry classification since four different group of theories for Corporate Social Responsibility agree with variables of: investment in environmental care, water protection, and residues treatment finding different levels of commitment with CSR.

Keywords: corporate social responsibility, environment, strategic management, water

Procedia PDF Downloads 376
5745 Curricular Reforms for Inclusive Education: Equalization of Opportunities for the Physically Challenged Persons

Authors: Ede Jairus Adagba

Abstract:

The National Policy on Education has made elaborate and fascinating provisions for the education of the people with Special Needs. This category of people includes the physically challenged, the disadvantaged, the gifted and talented. However, the focus of this paper is people that are physically challenged. The paper reasons that in spite of the commendable provisions, the present curricular and learning conditions are not conducive enough to cater for the interest of the physically challenged persons. As a panacea, some curricular and physical condition reforms are proposed. These are hoped to facilitate access to inclusive education and equalization for opportunities of the physically challenged.

Keywords: curricular reforms, equalization, inclusive education, physically challenged persons

Procedia PDF Downloads 305
5744 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 652
5743 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 537
5742 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 124
5741 Efficient Variable Modulation Scheme Based on Codebook in the MIMO-OFDM System

Authors: Yong-Jun Kim, Jae-Hyun Ro, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

Because current wireless communication requires high reliability in a limited bandwidth environment, this paper proposes the variable modulation scheme based on the codebook. The variable modulation scheme adjusts transmission power using the codebook in accordance with hannel state. Also, if the codebook is composed of many bits, the reliability is more improved by the proposed scheme. The simulation results show that the performance of proposed scheme has better reliability than the the performance of conventional scheme.

Keywords: MIMO-OFDM, variable modulation, codebook, channel state

Procedia PDF Downloads 587
5740 An Assessment of Government Entrepreneurship Programs for Women in Sabah Malaysia

Authors: Imelda Albert Gisip, Tarsiah T. Z. Taman

Abstract:

In Asia, particularly in Malaysia women entrepreneurs contribute substantially to economic growth. This paper presents a review of women entrepreneurs’ program, focusing on Creating Millionaires among Young Women Entrepreneurs (CREAM@YWE) program in Sabah Malaysia which aims to accelerate the entrepreneurship among young women in Sabah Malaysia. Entrepreneurs is seen as essential for growth, job creation and social progress and the virtues of small business for Sabah Maju Jaya (SMJ), the Sabah state government Sabah State development plan for the year 2021-2025. SMJ guides the direction of the government's policies and programs, further guiding the implementation in a planned and strategic manner, to achieve targets and goals that coincide with the development needs of the state. One of the government’s agenda is to put its efforts more strongly to ensure that women entrepreneurs are well supported and enhanced. Thus, The CreaM@YWE Program was developed in 2018 with the main objective is to produce competitive young women entrepreneurs in Sabah and achieve "millionaire" status. CreaM@YWE Program is an innovation process which specifically developed to accelerate entrepreneurship sector particularly for women entrepreneurs in Sabah by incorporating strategic partnerships and collaborations with government agencies and industry players. Being the first of its kind in Sabah, the novelty of this project is providing a supportive ecosystem including six months intensive courses, guided through "hands-holding”, collaborations with strategic partners and easy access to government's assistance. Since its inception, the program has significantly impact society’s wellbeing particularly in empowering young women entrepreneurs in Sabah for the past six years and has produced many successful women entrepreneurs with “millionaire” status. Generally, improving women’s enterprise sector in Malaysia needs an overall enabling environment that allows development opportunities for women entrepreneurs including access to resources and support services. Since achieving the goal of women entrepreneurship policy requires effective partnerships and inclusiveness, Cream @YWE Program has managed to practice these in assisting small entrepreneurs among young women in Sabah in accessing public goods and business opportunities. This proves that achieving women’s economic empowerment requires sound policies, a holistic approach and long-term commitment. Thus, this paper presents how Cream@YWE Program has been supporting Sabah young women entrepreneurs by reforming the business environment to help create opportunities for women, while addressing the few existing gender-specific hurdles.

Keywords: entrepreneurship programs, women, Sabah, Malaysia

Procedia PDF Downloads 23
5739 Parental Education on Early Childhood Development Using Mobile App and Website in China

Authors: Margo O'Sullivan, Xuefeng Chen, Qi Zhao, J. Jiang, Ning Fu

Abstract:

Early childhood development, or ECD, is about the 'whole child' – the physical, social and emotional, cognitive thinking and language progression of each young individual. Overwhelming evidence is now available to support investment in Early Childhood Development internationally, attendance at ECD leads to: improved learning outcomes; improved completion and reduced less dropout rates; and most notably, Professor Heckman, Nobel Laureate’s, findings that for every dollar invested, there is an economic return of up to 17%. Notably, ECD has been included in the 2015-2030 Sustainable Development Goals. The Government of China (GOC) has embraced this research and in 2010, State Council, announced focus on ECD setting a target to provide access to ECD for 85% of 3-6 year olds by 2020; to date, the target has surpassed expectations and reached 70.4%. GoC is also increasingly focusing on the even more critical 0-3 age group, when the plasticity of the brain is at its peak and neurons form connections as fast as 1,000 per second. Key to ECD are parents and caregivers of young children, with parental education critical to fully exploiting the significant potential of the early years of children. In China, with such vast numbers, one in seven pre-school age children in the world live in China, the Ministry of Education (MoE) and the National Centre for Education Technology, explored how to best provide parental education and provide key child developmental related knowledge to parents and caregivers. In response, MoE and UNICEF created a resource for parenting information that began with a computer website in 2012, followed by piloting a kiosk service in 2013 for parents in remote areas without access to the internet, and then a mobile phone application in 2014. The resource includes 269 ECD messages and 200 micro-videos covering critical issues of early childhood development from birth to age 6 years: daily care, nutrition and feeding, disease prevention, immunization, development and education, and safety and protection. To date, there have been 397,599 unique views on the website, and data for the mobile app currently being analysed (Links: http://yuer.cbern.gov.cn/; App: https://appsto.re/cn/OiKPZ.i). This paper will explore the development of this resource, its use by parents and the public, efforts to assess the effectiveness in improving parenting and child development, and future plans to roll an updated version in 2016 to all parents.

Keywords: early childhood development, mobile apps for education, parental education, China

Procedia PDF Downloads 226
5738 Cost-Conscious Treatment of Basal Cell Carcinoma

Authors: Palak V. Patel, Jessica Pixley, Steven R. Feldman

Abstract:

Introduction: Basal cell carcinoma (BCC) is the most common skin cancer worldwide and requires substantial resources to treat. When choosing between indicated therapies, providers consider their associated adverse effects, efficacy, cosmesis, and function preservation. The patient’s tumor burden, infiltrative risk, and risk of tumor recurrence are also considered. Treatment cost is often left out of these discussions. This can lead to financial toxicity, which describes the harm and quality of life reductions inflicted by high care costs. Methods: We studied the guidelines set forth by the American Academy of Dermatology for the treatment of BCC. A PubMed literature search was conducted to identify the costs of each recommended therapy. We discuss costs alongside treatment efficacy and side-effect profile. Results: Surgical treatment for BCC can be cost-effective if the appropriate treatment is selected for the presenting tumor. Curettage and electrodesiccation can be used in low-grade, low-recurrence tumors in aesthetically unimportant areas. The benefits of cost-conscious care are not likely to be outweighed by the risks of poor cosmesis or tumor return ($471 BCC of the cheek). When tumor burden is limited, MMS offers better cure rates and lower recurrence rates than surgical excision, and with comparable costs (MMS $1263; SE $949). Surgical excision with permanent sections may be indicated when tumor burden is more extensive or if molecular testing is necessary. The utility of surgical excision with frozen sections, which costs substantially more than MMS without comparable outcomes, is less clear (SE with frozen sections $2334-$3085). Less data exists on non-surgical treatments for BCC. These techniques cost less, but recurrence-risk is high. Side-effects of nonsurgical treatment are limited to local skin reactions, and cosmesis is good. Cryotherapy, 5-FU, and MAL-PDT are all more affordable than surgery, but high recurrence rates increase risk of secondary financial and psychosocial burden (recurrence rates 21-39%; cost $100-270). Radiation therapy offers better clearance rates than other nonsurgical treatments but is associated with similar recurrence rates and a significantly larger financial burden ($2591-$3460 BCC of the cheek). Treatments for advanced or metastatic BCC are extremely costly, but few patients require their use, and the societal cost burden remains low. Vismodegib and sonidegib have good response rates but substantial side effects, and therapy should be combined with multidisciplinary care and palliative measures. Expert-review has found sonidegib to be the less expensive and more efficacious option (vismodegib $128,358; sonidegib $122,579). Platinum therapy, while not FDA-approved, is also effective but expensive (~91,435). Immunotherapy offers a new line of treatment in patients intolerant of hedgehog inhibitors ($683,061). Conclusion: Dermatologists working within resource-compressed practices and with resource-limited patients must prudently manage the healthcare dollar. Surgical therapies for BCC offer the lowest risk of recurrence at the most reasonable cost. Non-surgical therapies are more affordable, but high recurrence rates increase the risk of secondary financial and psychosocial burdens. Treatments for advanced BCC are incredibly costly, but the low incidence means the overall cost to the system is low.

Keywords: nonmelanoma skin cancer, basal cell skin cancer, squamous cell skin cancer, cost of care

Procedia PDF Downloads 124
5737 Electronic Resources and Information Literacy in Higher Education Library

Authors: Nirmal Singh, Rajesh Kumar

Abstract:

Abstract- Information literacy aims to develop both critical understanding and active participation in scholars. It enables scholars to interpret and make informed judgments as users of information sources, and it also enables them to become producers of information in their own right, and thereby to become more powerful participants in society. Information literacy is about developing people‘s critical and creative abilities. Digital media – and particularly the Internet – significantly increase the potential for such active participation of the individual, provided scholars have the means and training to effectively access and use them. This paper provides definition, standards and importance of information literacy (IL). Keywords: Information literacy, Digital Media, Training, Communications Technologies.

Keywords: Information literacy, Digital Media, Training, , Communications Technologies

Procedia PDF Downloads 159
5736 Health Advocacy in Medical School: An American Survey on Attitudes and Engagement in Clerkships

Authors: Rachel S. Chang, Samuel P. Massion, Alan Z. Grusky, Heather A. Ridinger

Abstract:

Introduction Health advocacy is defined as activities that improve access to care, utilize resources, address health disparities, and influence health policy. Advocacy is increasingly being recognized as a critical component of a physician’s role, as understanding social determinants of health and improving patient care are important aspects within the American Medical Association’s Health Systems Science framework. However, despite this growing prominence, educational interventions that address advocacy topics are limited and variable across medical school curricula. Furthermore, few recent studies have evaluated attitudes toward health advocacy among physicians-in-training in the United States. This study examines medical student attitudes towards health advocacy, along with perceived knowledge, ability, and current level of engagement with health advocacy during their clerkships. Methods This study employed a cross-sectional survey design using a single anonymous, self-report questionnaire to all second-year medical students at Vanderbilt University School of Medicine (n=96) in December 2020 during clerkship rotations. The survey had 27 items with 5-point Likert scale (15), multiple choice (11), and free response questions (1). Descriptive statistics and thematic analysis were utilized to analyze responses. The study was approved by the Vanderbilt University Institutional Review Board. Results There was an 88% response rate among second-year clerkship medical students. A majority (83%) agreed that formal training in health advocacy should be a mandatory part of the medical student curriculum Likewise, 83% of respondents felt that acting as a health advocate or patients should be part of their role as a clerkship student. However, a minority (25%) felt adequately prepared. While 72% of respondents felt able to identify a psychosocial need, 18% felt confident navigating the healthcare system and only 9% felt able to connect a patient to a psychosocial resource to fill that gap. 44% of respondents regularly contributed to conversations with their medical teams when discussing patients’ social needs, such as housing insecurity, financial insecurity, or legal needs. On average, respondents reported successfully connecting patients to psychosocial resources 1-2 times per 8-week clerkship block. Barriers to participating in health advocacy included perceived time constraints, lack of awareness of resources, lower emphasis among medical teams, and scarce involvement with social work teams. Conclusions In this single-institutional study, second-year medical students on clerkships recognize the importance of advocating for patients and support advocacy training within their medical school curriculum. However, their perceived lack of ability to navigate the healthcare system and connect patients to psychosocial resources, result in students feeling unprepared to advocate as effectively as they hoped during their clerkship rotations. Our results support the ongoing need to equip medical students with training and resources necessary for them to effectively act as advocates for patients.

Keywords: clerkships, medical students, patient advocacy, social medicine

Procedia PDF Downloads 130
5735 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 128
5734 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 249
5733 Identifying the Challenges and Opportunities of Using Lesson Study in English Language Teaching Through the Lenses of In-Service Ecuadorian EFL Teachers

Authors: Cherres Sara, Cajas Diego

Abstract:

This paper explores how EFL teachers understand the process of Lesson Study in Ecuadorian schools and the challenges and opportunities that it brings to the improvement of their teaching practice. Using a narrative research methodology, this study presents the results of the application of the four steps of Lesson Study carried out by seven teachers in four different schools located in the Southern part of Ecuador during four months. Before starting the implementation of the lesson study, 30 teachers were trained on this model. This training was opened to EFL teachers working in public and private schools without any charge. The criteria to select these teachers were first, to be minimum a one-year in-service teacher, second, to have a b2 level of English, and third, to be able to commit to follow the course guidelines. After the course, seven teachers decided to continue with the implementation of the Lesson Study in their respective institutions. During the implementation of the Lesson Study, data was collected through observations, in-depth interviews and teachers’ planning meetings; and analyzed using a thematic analysis. The results of this study are presented using the lenses of seven EFL teachers that explained the challenges and opportunities that the implementation of Lesson Study conveyed. The challenges identified were the limited capacity of reflection and recognition of the activities that required improvement after the class, limited capacity to provide truthful peer feedback, teachers wrong notions about their performance in their classes, difficulties to follow a collaborative lesson plan; and, the disconnection between class activities and the class content. The opportunities identified were teachers’ predisposition to collaborate, teachers’ disposition to attend professional development courses, their commitment to work extra hours in planning meetings, their openness and their desired to be observed in their classes; and, their willingness to share class materials and knowledge. On the other hand, the results show that there is a disconnection between teachers’ knowledge of ELT and its proper application in class (from theory to practice). There are also, rigid institutional conceptions of teaching that do not allow teaching innovations. The authors concluded that there is a disconnection between teachers’ knowledge of ELT and its proper application in class (from theory to practice). There are also, rigid institutional conceptions of teaching that do not allow teaching innovations for example: excessive institutional paperwork and activities that are not connected to the development of students’ competences.

Keywords: ELT, lesson study, teachers’ professional development, teachers’ collaboration

Procedia PDF Downloads 68
5732 Incidence of Vulval, Vaginal and Cervical Disease in Rapid Access Clinic in a London Tertiary Hospital Setting

Authors: Kieren Wilson, Gulnaz Majeed

Abstract:

NHS constitution gives rights to the patient with suspected cancer to be seen by a cancer specialist within 2 weeks of referral. Guys and St Thomas Hospital (GSTT) is one of the largest cancer centres in London. NICE guidelines have provided guidance for health professionals to refer patients appropriately to RAC. In GSTT suspected gynae cancer referrals are mostly by NHS e-Referral Service with some fax, emails as well as paper referrals. The objective of this study was to evaluate compliance with 2-week referral pathway with emphasis on one stop diagnostic service with supporting efficient pathways. A prospective evaluation over 3 months (1 Jan 2017 to 31 Mar 2017) was undertaken. There were 26 clinics, 761 patients were booked in the clinics with a DNA rate of 13% (n=101) hence 606 patients were seen. Majority of referrals were for post menopausal bleeding (PMB) 25% (n=194) followed by cervical, vaginal, vulval reasons 23% (n=179) (abnormal cytology excluded as patients directly referred to colposcopy unit in GSTT), ovarian 7% (n=54) and endometrial 5% (n=41). Women with new or previous established diagnosis of cancer were 24, cervical (n=17), vulva (n=6) and vagina (n=1). Multifocal preinvasive disease vulva (VIN), vagina (VAIN) and cervix (CIN) was confirmed in twenty-six patients 4% (high prevalence in HIV patients). Majority of cervical referrals: PCB (n=14), cervical erosion (n=7), polyps (n=9) and cervical cyst were benign. However, two women with PMB had cervical cancer. Only 2 out of 13 referrals with vaginal concerns had VAIN. One case with non-cervical glandular cytology was confirmed to have endometrial cancer. One stop service based on the diagnostic support of ultrasound, colposcopy and hysteroscopy was achieved in 54% (n=359). Patients were discharged to GP, benign gynaecology, endometriosis, combined vulval/dermatology clinic or gynae oncology. 33% (n=202) required a second visit, 12% (n=70) third visit, 3% (n=19) fourth visit, 1% (n=4) fifth visit and 1% (n=6) sixth visit. Main reasons for follow ups were the unavailability of diagnostic slots, patient choice, need for interpreters, the discussion following gynae MDM review for triage to benign gynae, delay in availability of diagnostic results like histology/MRI/CT. Recommendations following this study are multi disciplinary review of pathways with the availability of additional diagnostic procedure slots to aim for one stop service. Furthermore, establishment of virtual and telephone consultations to reduce follow ups.

Keywords: multifocal disease, post menopausal bleeding, preinvasive disease, rapid access clinic

Procedia PDF Downloads 188
5731 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 288
5730 qPCR Method for Detection of Halal Food Adulteration

Authors: Gabriela Borilova, Monika Petrakova, Petr Kralik

Abstract:

Nowadays, European producers are increasingly interested in the production of halal meat products. Halal meat has been increasingly appearing in the EU's market network and meat products from European producers are being exported to Islamic countries. Halal criteria are mainly related to the origin of muscle used in production, and also to the way products are obtained and processed. Although the EU has legislatively addressed the question of food authenticity, the circumstances of previous years when products with undeclared horse or poultry meat content appeared on EU markets raised the question of the effectiveness of control mechanisms. Replacement of expensive or not-available types of meat for low-priced meat has been on a global scale for a long time. Likewise, halal products may be contaminated (falsified) by pork or food components obtained from pigs. These components include collagen, offal, pork fat, mechanically separated pork, emulsifier, blood, dried blood, dried blood plasma, gelatin, and others. These substances can influence sensory properties of the meat products - color, aroma, flavor, consistency and texture or they are added for preservation and stabilization. Food manufacturers sometimes access these substances mainly due to their dense availability and low prices. However, the use of these substances is not always declared on the product packaging. Verification of the presence of declared ingredients, including the detection of undeclared ingredients, are among the basic control procedures for determining the authenticity of food. Molecular biology methods, based on DNA analysis, offer rapid and sensitive testing. The PCR method and its modification can be successfully used to identify animal species in single- and multi-ingredient raw and processed foods and qPCR is the first choice for food analysis. Like all PCR-based methods, it is simple to implement and its greatest advantage is the absence of post-PCR visualization by electrophoresis. qPCR allows detection of trace amounts of nucleic acids, and by comparing an unknown sample with a calibration curve, it can also provide information on the absolute quantity of individual components in the sample. Our study addresses a problem that is related to the fact that the molecular biological approach of most of the work associated with the identification and quantification of animal species is based on the construction of specific primers amplifying the selected section of the mitochondrial genome. In addition, the sections amplified in conventional PCR are relatively long (hundreds of bp) and unsuitable for use in qPCR, because in DNA fragmentation, amplification of long target sequences is quite limited. Our study focuses on finding a suitable genomic DNA target and optimizing qPCR to reduce variability and distortion of results, which is necessary for the correct interpretation of quantification results. In halal products, the impact of falsification of meat products by the addition of components derived from pigs is all the greater that it is not just about the economic aspect but above all about the religious and social aspect. This work was supported by the Ministry of Agriculture of the Czech Republic (QJ1530107).

Keywords: food fraud, halal food, pork, qPCR

Procedia PDF Downloads 247