Search results for: internet of things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2080

Search results for: internet of things

490 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 104
489 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 84
488 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 249
487 Effects of Application of Rice Husk Charcoal-Coated Urea and Rice Straw Compost on Growth, Yield, and Soil Properties of Rice

Authors: D. A. S. Gamage, B. F. A Basnayake, W. A. J. M. de Costa

Abstract:

Rice is one of the world’s most important cereals. Increasing food production both to meet in-country requirements and to help overcome food crises is one of the major issues facing Sri Lanka today. However, productive land is limited and has mostly been utilized either for food crop production or other uses. Agriculture plays an important and strategic role in the performance of Sri Lankan national economy. A variety of modern agricultural inputs have been introduced, namely ploughs and harvesters, pesticides, fertilizers and lime. Besides, there are several agricultural institutions developing and updating the management of agricultural sector. Modern agricultural inputs cooperate as a catalyst in raising the productivity. However, in the eagerness of gaining profits from the efficient and productive techniques, this modern agricultural input has affected the environment and living things especially those which have been blended from various chemical substance. The increased pressure to maintain a high level of rice output for consumption has resulted in increased use of pesticides and inorganic fertilizer on rice fields in Sri Lanka. The application of inorganic fertilizer has become a burdened to the country in many ways. The excessive reuse of the ground water resources with a considerable application of organic and chemical fertilizers will lead to a deterioration of the quality and quantity of water. Biochar is a form of charcoal produced through the heating of natural organic materials. It has received significant attention recently for its potential as a soil conditioner, a fertilizer and as a means of storing carbon in a sustainable manner. It is the best solution for managing the agricultural wastes while providing a useful product for increasing agricultural productivity and protecting the environment. The objective of this study was to evaluate rice husk charcoal coated urea as a slow releasing fertilizer and compare the total N, P, K, organic matter in soil and yield of rice production.

Keywords: biochar, paddy husk, soil conditioner, rice straw compost

Procedia PDF Downloads 333
486 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 210
485 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 209
484 Post-Islamic Utopias, Contentious Memory and the Revolutionary Mobilization in Iran

Authors: Saeed Saffar-Heidari

Abstract:

This article aims to study the recent Iranian national uprising of “Women, Life, Freedom” as a site of memory which renders the political possibility of imagining the post-Islamic futures in Iran. “Women, Life, Freedom” movement in Iran has been arguably the most pervasive social movement since the Islamic Revolution (1979) as it has posed serious issues and conflicts for the present Islamic state in Iran. The core argument of this article, however, is oriented toward the critical role of collective memory as a means of political transition and revolutionary mobilization. “Women, Life, Freedom” movement, among other things, has revitalized the popular binary opposition of pre-1979 and post-1979 Iran through which the Ancien Régime or the pre-1979 era is likely to be interpreted, read, and remembered in terms of present post-1979 cultural and political demands. As remembering involves everyday participation in shaping and reshaping the past through new codes, criteria, and values, it is argued that the presentist refashioning and remembering of the pre-1979 monarchical era has been one of the major facilitatory forces for the on-going revolutionary mobilization in Iran. The construction of the pre-1979 memory and the return of the dynastic specter has played a significant role in revolutionary mobilization as it has provided the protesters with the possible perspectives of post-Islamic regime in Iran. Additionally, the question of compulsory “Hijab” (veiling) as the prime mover of "Women, Life, Freedom” movement in Iran has strongly contributed to the everyday comparative discourse of pre/post 1979 memory. According to this presentist remembering of pre-1979, the Pahlavi dynasty would be conceived as a symbol of modernization, westernization, secularization, and non-compulsory Hijab. While the memory of the pre-revolutionary Iran is genuinely an imaginative as well as a constructed entity that finally culminates in the public condemnation of the very Islamic revolution (1979), it serves the enrichment of the Iranian political imagination as it paves the ways for the revolutionary mobilization and then the overthrowing of the Islamic regime in Iran. This article makes a case for the ways that the public narrative and discourse around the Islamic regime (especially the Islamic Hijab) led to the refashioning of the memory of pre-1979 era and inspired he revolutionary mobilization in Iran.

Keywords: post-islamic, utopias, memory, revolutionary, mobilization, Iran

Procedia PDF Downloads 94
483 Comparing Three Complementary Interventions (Mindfulness-Meditation, Gratitude, and Affirmations) in the Context of Stress

Authors: Regina Bowler

Abstract:

Rationale & Aims: Complementary interventions such as mindfulness-meditation, gratitude, and self-affirmation are often used by therapists to treat stress. Many studies have been conducted using these interventions either individually or adjunctively with regard to stress. However, there has been little work comparing these interventions to investigate which of them is the most effective in treating stress. This study aims to compare these interventions and to determine which of them has the strongest perceived and physiological impact on stress. Participants: 120 law students preparing to take the bar exam: 3 experimental groups of 30 individuals, 1 control group of 30 individuals. Methods: One day prior to administering the interventions, baseline salivary cortisol samples will be taken, and the participants will complete the perceived stress scale (Cohen et al., 1983). Thirty days prior to the bar exam, each experimental group will be given an intervention to practice. Interventions will be practiced once in the morning after waking and once at night at bedtime. In group one, each participant will do a recorded three-minute mindfulness meditation. In group two, each participant will practice gratitude by writing down three things he/she/they are grateful for. In group three, each participant will practice affirmation by writing three sentences affirming his/her/their core values. The control group will not have an intervention to practice. Starting experimental day 1, upon waking and prior to practicing the intervention, the participants will take a salivary cortisol sample. Then they will practice their given intervention. Every night, before going to bed, the participants will practice their given intervention for a second time. The participants will practice their interventions and take salivary cortisol samples for 28 days. After each seven-day period (days 7, 14, 21, 28), the participants will fill out a brief questionnaire about the effects their intervention has on their stress, daily life, and relationships with themselves and others. On day 29, the participants will take a final salivary cortisol sample and will fill out the Perceived Stress Scale (Cohen et al., 1983). Applications of findings: Findings from this study would inform therapists of best practices when working with clients with stress. Moreover, therapists will gain knowledge of how individuals perceive these interventions and their impact on stress, daily life, somatic symptoms, and relationships with self and others. Thus, therapists will be able to administer these interventions with more precision to the stress-related contexts and issues their clients bring.

Keywords: stress, mindfulness-meditation, gratitude, affirmations, complementary interventions

Procedia PDF Downloads 14
482 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress

Authors: Zhiyong Li, Hiroshi Katayama

Abstract:

Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.

Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)

Procedia PDF Downloads 300
481 Using Indigenous Knowledge Systems in Teaching Early Literacy: A Case Study of Zambian Public Preschools

Authors: Ronald L. Kaunda

Abstract:

The education system in Zambia still bears scars of colonialism in the area of policy, curriculum and implementation. This historical context resulted in the failure by the Government of the Republic of Zambia to achieve literacy goals expected among school going children. Specifically, research shows that the use of English for initial literacy and Western based teaching methods to engage learners in literacy activities at lower levels of education including preschool has exacerbated this situation. In 2014, the Government of the Republic of Zambia implemented a new curriculum that, among others things, required preschool teachers to use local and cultural materials and familiar languages for early literacy teaching from preschool to grade 4. This paper presents findings from a study that sought to establish ways in which preschool teachers use Zambian Indigenous knowledge systems and Indigenous teaching strategies to support literacy development among preschool children. The study used Indigenous research methodology for data collection and iterative feature of Constructivist Grounded Theory (CGT) in the data collection process and analysis. This study established that, as agents of education, preschool teachers represented community adult educators because of some roles which they played beyond their academic mandate. The study further found that classrooms as venues of learning were equipped with learning corners reflecting Indigenous literacy materials and Indigenous ways of learning. Additionally, the study found that learners were more responsive to literacy lessons because of the use of familiar languages and local contextualized environments that supported their own cultural ways of learning. The study recommended that if the education system in Zambia is to be fully inclusive of Indigenous knowledge systems and cultural ways of learning, the education policy and curriculum should include conscious steps on how this should be implemented at the classroom level. The study further recommended that more diverse local literacy materials and teaching aids should be produced for use in the classroom.

Keywords: agents of learning, early literacy, indigenous knowledge systems, venues of education

Procedia PDF Downloads 135
480 Computer Science, Mass Communications, and Social Entrepreneurship: An Interdisciplinary Approach to Teaching Interactive Storytelling for the Greater Good

Authors: Susan Cardillo

Abstract:

This research will consider ways to bridge the gap between Computer Science and Media Communications and while doing so create Social Entrepreneurship for student success. New Media, as it has been referred to, is considered content available on-demand through Internet, a digital device, usually containing some kind of interactivity and creative participation. It is the interplay between technology, images, media and communications. The next generation of the newspaper, radio, television, and film students need to have a working knowledge of the technologies that are available for the creation of their work and taught to use this knowledge to create a voice. The work is interdisciplinary; in communications, we understand the necessity of reporting and disseminating information. In documentary film we understand the instructional and historic aspects of media and technology and in the non-profit sector, we see the need for expanding outlets for good. So, the true necessity is to utilize ‘new media’ technologies to advance social causes while reporting information, teaching and creating art. Goals: The goal of this research is to give communications students a better understanding of the technology that is both, currently at their disposal, and on the horizon, so that they can use it in their media, communications and art endeavors to be a voice for their generation. There is no longer a need to be a computer scientist to have a working knowledge of communication technologies and how they will benefit our work. There are many free and easy to use applications available for the creation of interactive communications. Methodology: This is Qualitative-Case Study that puts these ideas into action. There is a survey at the end of the experiment that is qualitative in nature and allows for the participants to share ideas and feelings about the technology and approach.

Keywords: interactive storytelling, web documentary, mass communications, teaching

Procedia PDF Downloads 254
479 Study of Personality, Fear of Negative Evaluation and Life-Orientation in Convicts and Under-Trials

Authors: Sneh Laller, Kamini C. Tanwar

Abstract:

Human beings are social animals. The scenario is changing and people become angry towards petty things and this may lead to committing a crime. Objective: The aim of the present research is: 1. To find out the difference between convicts and under-trials on different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation; 2. To find out the difference between male and female jail inmates on different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation; 3. To find out the relationship between different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation in convicts and under-trials; 4. To find out the relationship between different dimensions of Personality, Fear of Negative Evaluation (FNE) and Life-orientation in male and female jail inmates. Method: The study was conducted on 100 participants (consisting of 50 convicts- 25 males and 25 females, and 50 under-trials- 25 males and 25 females); age range was 20-60 years. The NEO Five-Factor Inventory-3 by McCrae, Costa (2010), Brief Fear of Negative Evaluation scale- II by Leary (1983) and Life Orientation Test-R by Scheier et al. (1994) was used and purposive sampling technique was done for data collection. The t-test was applied to find out the comparison and Pearson correlation was applied to determine the relationship between personality, FNE and life-orientation in both the groups. Results: There is a significant difference in the dimension of personality that is neuroticism and life-orientation in convicts and under-trials and also, in the dimensions of personality such as neuroticism, extraversion, openness to experience and agreeableness, and FNE in male and female jail inmates. In convicts the dimension of personality, agreeableness shows significant positive correlation with life-orientation (r = 0.430**) whereas, in under-trials the dimension of personality, agreeableness shows significant positive correlation with FNE (r = 0.315*) and another dimension of personality, extraversion shows significant negative correlation with life-orientation (r = -0.409**). In male jail inmates, the dimension of personality, agreeableness shows significant positive correlation with FNE (r = 0.474**) whereas in female jail inmates, the dimension of personality, openness to experience shows significant negative correlation with FNE (r = -0.356*) and significant positive correlation of neuroticism with life-orientation (r = 0.292*). Conclusion: It was found that under-trials are neurotic and life-oriented than convicts, and female jail inmates are also neurotic and exhibit fear of negative evaluation whereas male jail inmates are extravert and agreeable.

Keywords: convicts, fear of negative evaluation, life-orientation, personality, under-trials

Procedia PDF Downloads 132
478 Iris Cancer Detection System Using Image Processing and Neural Classifier

Authors: Abdulkader Helwan

Abstract:

Iris cancer, so called intraocular melanoma is a cancer that starts in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris cancer detection system since the available techniques used currently are still not efficient. The combination of the image processing and artificial neural networks has a great efficiency for the diagnosis and detection of the iris cancer. Image processing techniques improve the diagnosis of the cancer by enhancing the quality of the images, so the physicians diagnose properly. However, neural networks can help in making decision; whether the eye is cancerous or not. This paper aims to develop an intelligent system that stimulates a human visual detection of the intraocular melanoma, so called iris cancer. The suggested system combines both image processing techniques and neural networks. The images are first converted to grayscale, filtered, and then segmented using prewitt edge detection algorithm to detect the iris, sclera circles and the cancer. The principal component analysis is used to reduce the image size and for extracting features. Those features are considered then as inputs for a neural network which is capable of deciding if the eye is cancerous or not, throughout its experience adopted by many training iterations of different normal and abnormal eye images during the training phase. Normal images are obtained from a public database available on the internet, “Mile Research”, while the abnormal ones are obtained from another database which is the “eyecancer”. The experimental results for the proposed system show high accuracy 100% for detecting cancer and making the right decision.

Keywords: iris cancer, intraocular melanoma, cancerous, prewitt edge detection algorithm, sclera

Procedia PDF Downloads 477
477 A Study to Explore the Views of Students regarding E-Learning as an Instructional Tool at University Level

Authors: Zafar Iqbal

Abstract:

This study involved students of 6th semester enrolled in a Bachelor of Computer Science Program at university level. In this era of science and technology, e-learning can be helpful for grassroots in providing them access to education tenant in less developed areas. It is a potential substitute of face-to-face teaching being used in different countries. The purpose of the study was to explore the views of students about e-learning (Facebook) as an instructional tool. By using purposive sampling technique an intact class of 30 students included both male and female were selected where e-learning was used as an instructional tool. The views of students were explored through qualitative approach by using focus group interviews. The approach was helpful to develop comprehensive understanding of students’ views towards e- learning. In addition, probing questions were also asked and recorded. Data was transcribed, generated nodes and then coded text against these nodes. For this purpose and further analysis, NVivo 10 software was used. Themes were generated and tangibly presented through cluster analysis. Findings were interesting and provide sufficient evidence that face book is a subsequent e-learning source for students of higher education. Students acknowledged it as best source of learning and it was aligned with their academic and social behavior. It was not time specific and therefore, feasible for students who work day time and can get on line access to the material when they got free time. There were some distracters (time wasters) reported by the students but can be minimized by little effort. In short, e-learning is need of the day and potential learning source for every individual who have access to internet living at any part of the globe.

Keywords: e-learning, facebook, instructional tool, higher education

Procedia PDF Downloads 352
476 Comparison of Risk Analysis Methodologies Through the Consequences Identification in Chemical Accidents Associated with Dangerous Flammable Goods Storage

Authors: Daniel Alfonso Reséndiz-García, Luis Antonio García-Villanueva

Abstract:

As a result of the high industrial activity, which arises from the search to satisfy the needs of products and services for society, several chemical accidents have occurred, causing serious damage to different sectors: human, economic, infrastructure and environmental losses. Historically, with the study of this chemical accidents, it has been determined that the causes are mainly due to human errors (inexperienced personnel, negligence, lack of maintenance and deficient risk analysis). The industries have the aim to increase production and reduce costs. However, it should be kept in mind that the costs involved in risk studies, implementation of barriers and safety systems is much cheaper than paying for the possible damages that could occur in the event of an accident, without forgetting that there are things that cannot be replaced, such as human lives.Therefore, it is of utmost importance to implement risk studies in all industries, which provide information for prevention and planning. The aim of this study is to compare risk methodologies by identifying the consequences of accidents related to the storage of flammable, dangerous goods for decision making and emergency response.The methodologies considered in this study are qualitative and quantitative risk analysis and consequence analysis. The latter, by means of modeling software, which provides radius of affectation and the possible scope and magnitude of damages.By using risk analysis, possible scenarios of occurrence of chemical accidents in the storage of flammable substances are identified. Once the possible risk scenarios have been identified, the characteristics of the substances, their storage and atmospheric conditions are entered into the software.The results provide information that allows the implementation of prevention, detection, control, and combat elements for emergency response, thus having the necessary tools to avoid the occurrence of accidents and, if they do occur, to significantly reduce the magnitude of the damage.This study highlights the importance of risk studies applying tools that best suited to each case study. It also proves the importance of knowing the risk exposure of industrial activities for a better prevention, planning and emergency response.

Keywords: chemical accidents, emergency response, flammable substances, risk analysis, modeling

Procedia PDF Downloads 49
475 Gold, Power, Protest, Examining How Digital Media and PGIS are Used to Protest the Mining Industry in Colombia

Authors: Doug Specht

Abstract:

This research project sought to explore the links between digital media, PGIS and social movement organisations in Tolima, Colombia. The primary aim of the research was to examine how knowledge is created and disseminated through digital media and GIS in the region, and whether there exists the infrastructure to allow for this. The second strand was to ascertain if this has had a significant impact on the way grassroots movements work and produce collective actions. The third element is a hypothesis about how digital media and PGIS could play a larger role in activist activities, particularly in reference to the extractive industries. Three theoretical strands have been brought together to provide a basis for this research, namely (a) the politics of knowledge, (b) spatial management and inclusion, and (c) digital media and political engagement. Quantitative data relating to digital media and mobile internet use was collated alongside qualitative data relating to the likelihood of using digital media in activist campaigns, with particular attention being given to grassroots movements working against extractive industries in the Tolima region of Colombia. Through interviews, surveys and GIS analysis it has been possible to build a picture of online activism and the role of PPGIS within protest movement in the region of Tolima, Colombia. Results show a gap between the desires of social movements to use digital media and the skills and finances required to implement programs that utilise it. Maps and GIS are generally reserved for legal cases rather than for informing the lay person. However, it became apparent that the combination of digital/social media and PPGIS could play a significant role in supporting the work of grassroots movements.

Keywords: PGIS, GIS, social media, digital media, mining, colombia, social movements, protest

Procedia PDF Downloads 400
474 User-Perceived Quality Factors for Certification Model of Web-Based System

Authors: Jamaiah H. Yahaya, Aziz Deraman, Abdul Razak Hamdan, Yusmadi Yah Jusoh

Abstract:

One of the most essential issues in software products is to maintain it relevancy to the dynamics of the user’s requirements and expectation. Many studies have been carried out in quality aspect of software products to overcome these problems. Previous software quality assessment models and metrics have been introduced with strengths and limitations. In order to enhance the assurance and buoyancy of the software products, certification models have been introduced and developed. From our previous experiences in certification exercises and case studies collaborating with several agencies in Malaysia, the requirements for user based software certification approach is identified and demanded. The emergence of social network applications, the new development approach such as agile method and other varieties of software in the market have led to the domination of users over the software. As software become more accessible to the public through internet applications, users are becoming more critical in the quality of the services provided by the software. There are several categories of users in web-based systems with different interests and perspectives. The classifications and metrics are identified through brain storming approach with includes researchers, users and experts in this area. The new paradigm in software quality assessment is the main focus in our research. This paper discusses the classifications of users in web-based software system assessment and their associated factors and metrics for quality measurement. The quality model is derived based on IEEE structure and FCM model. The developments are beneficial and valuable to overcome the constraints and improve the application of software certification model in future.

Keywords: software certification model, user centric approach, software quality factors, metrics and measurements, web-based system

Procedia PDF Downloads 380
473 The Impact of E-Learning on the Performance of History Learners in Eswatini General Certificate of Secondary Education

Authors: Joseph Osodo, Motsa Thobekani Phila

Abstract:

The study investigated the impact of e-learning on the performance of history learners in Eswatini general certificate of secondary education in the Manzini region of Eswatini. The study was guided by the theory of connectivism. The study had three objectives which were to find out the significance of e-learning during the COVID-19 era in learning History subject; challenges faced by history teachers’ and learners’ in e-learning; and how the challenges were mitigated. The study used a qualitative research approach and descriptive research design. Purposive sampling was used to select eight History teachers and eight History learners from four secondary schools in the Manzini region. Data were collected using face to face interviews. The collected data were analyzed and presented in thematically. The findings showed that history teachers had good knowledge on what e-learning was, while students had little understanding of e-learning. Some of the forms of e-learning that were used during the pandemic in teaching history in secondary schools included TV, radio, computer, projectors, and social media especially WhatsApp. E-learning enabled the continuity of teaching and learning of history subject. The use of e-learning through the social media was more convenient to the teacher and the learners. It was concluded that in some secondary school in the Manzini region, history teacher and learners encountered challenges such as lack of finances to purchase e-learning gadgets and data bundles, lack of skills as well as access to the Internet. It was recommended that History teachers should create more time to offer additional learning support to students whose performance was affected by the COVID-19 pandemic effects.

Keywords: e-learning, performance, COVID-19, history, connectivism

Procedia PDF Downloads 49
472 Community-Based Assessment Approach to Empower Child with Disabilities: Institutional Study on Deaf Art Community in Yogyakarta, Indonesia

Authors: Mukhamad Fatkhullah, Arfan Fadli, Marini Kristina Situmeang, Siti Hazar Sitorus

Abstract:

The emergence of a community of people with disabilities along with the various works produced has made great progress to open the public eye to their existence in society. This study focuses attention on a community that is suspected to be one of the pioneers in pursuing the movement. It is Deaf Art Community (DAC), a community of persons with disabilities based in Yogyakarta, with deaf and speech-impaired members who use sign language in everyday communication. Knowing the movement of disabled communities is a good thing, the description of the things behind it then important to know as the basis for initiating similar movements. This research focuses on the question of how community of people with disabilities begin to take shape in different regions and interact with collaborative events. Qualitative method with in-depth interview as data collection techniques was used to describe the process of formation and the emergence of community. The analytical unit in the study initially focuses on the subject in the community, but in the process, it develops to institutional analysis. Therefore some informants were determined purposively and expanded using the snowball technique. The theory used in this research is Phenomenology of Alfred Schutz to be able to see reality from the subject and institutional point of view. The results of this study found that the community is formed because the existing educational institutions (both SLB and inclusion) are less able to empower and make children with disabilities become equal with the society. Through the SLB, the presence of children with disabilities becomes isolated from the society, especially in children of his or her age. Therefore, discrimination and labeling will never be separated from society's view. Meanwhile, facilities for the basic needs of children with disabilities can not be fully provided. Besides that, the guarantee of discrimination, glances, and unpleasant behavior from children without disability does not exist, which then indicates that the existing inclusion schools offer only symbolic acceptance. Thus, both in SLB and Inclusive Schools can not empower children with disabilities. Community-based assistance, in this case, has become an alternative to actually empowering children with disabilities. Not only giving them a place to interact, through the same community, children with disabilities will be guided to discover their talents and develop their potential to be self-reliant in the future.

Keywords: children with disabilities, community-based assessment, community empowerment, social equity

Procedia PDF Downloads 240
471 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model

Procedia PDF Downloads 139
470 Forensic Methods Used for the Verification of the Authenticity of Prints

Authors: Olivia Rybak-Karkosz

Abstract:

This paper aims to present the results of scientific research on methods of forging art prints and their elements, such as signature or provenance and forensic science methods that might be used to verify their authenticity. In the last decades, the art market has observed significant interest in purchasing prints. They are considered an economical alternative to paintings and a considerable investment. However, the authenticity of an art print is difficult to establish as similar visual effects might be achieved with drawings or xerox. The latter is easy to make using a home printer. They are then offered on flea markets or internet auctions as genuine prints. This probable ease of forgery and, at the same time, the difficulty of distinguishing art print techniques were the main reasons why this research was undertaken. A lack of scientific methods dedicated to disclosing a forgery encouraged the author to verify the possibility of using forensic science's methods known and used in other fields of expertise. This research methodology consisted of completing representative forgery samples collected in selected museums based in Poland and a few in Germany and Austria. That allowed the author to present a typology of methods used to forge art prints. Given that one of the most famous graphic design examples is bills and securities, it seems only appropriate to propose in print verification the usage of methods of detecting counterfeit currency. These methods contain an examination of ink, paper, and watermarks. On prints, additionally, signatures and imprints of stamps, etc., are forged as well. So the examination should be completed with handwriting examination and forensic sphragistics. The paper contains a stipulation to conduct a complex analysis of authenticity with the participation of an art restorer, art historian, and forensic expert as head of this team.

Keywords: art forgery, examination of an artwork, handwriting analysis, prints

Procedia PDF Downloads 101
469 ASEAN Limited Centrality in Connectivity: Managing the China-Japan Infrastructure Competition

Authors: Barbora Valockova

Abstract:

Scholars recommend the establishment of a multilateral coordination mechanism by ASEAN, such as an infrastructure forum, to contain the China-Japan infrastructure financing competition in the region. However, they do not systematically investigate the reasons for its absence. This paper aims to fill the gap by addressing the following question: Why has ASEAN been unable to set up any multilateral coordination mechanism to soften the China-Japan infrastructure financing competition? This paper argues that ASEAN has not been able to set up such a mechanism due to its limited centrality in connectivity. This limited centrality decreases ASEAN’s ability to manage the China-Japan competition in a more comprehensive and coordinated way. Rather, ASEAN acts as a scope setter in connectivity, although this is not completely ineffective. This paper is divided into four sections. The first section explores the key tenets of the concept of ASEAN centrality in connectivity, which is under-examined in the current literature. The second section examines the extent to which ASEAN limited centrality in connectivity is being respected by China and Japan. The third section analyses how various stakeholders, such as ASEAN member states, their leaders and bureaucracy, and foreign private companies prevent ASEAN from attaining stronger centrality. The last section concludes and offers recommendations. Data is gathered using primary sources (official ASEAN, Chinese, and Japanese documents, interviews, etc.) and secondary material. By providing a nuanced analysis of ASEAN centrality in connectivity and developing a new operationalization of the concept, this paper aims to contribute to the international relations literature on ASEAN centrality. Initial findings suggest that while ASEAN limited centrality in connectivity has some effectiveness, it is not sufficient for setting up a multilateral coordination mechanism. While it represents a solid departure point, any potential possessed by ASEAN to evolve beyond a scope setter in connectivity is hampered by stakeholders involved in infrastructure development. While these players and their interactions can have both positive and negative effects on the scope set by ASEAN, it is unlikely that they would allow ASEAN to become the real central player. There can be no stronger ASEAN centrality in connectivity without ASEAN unity and neutrality. However, the last two factors are difficult to attain in the context of infrastructure development since ASEAN member states and stakeholders all have their styles and preferences. All other things being equal, these circumstances favor a loose, vague, and quasi-prescriptive arrangement among the relevant stakeholders.

Keywords: ASEAN centrality, China-Japan infrastructure competition, connectivity, scope setter

Procedia PDF Downloads 165
468 Kinaesthetic Method in Apprenticeship Training: Support for Finnish Learning in Vocational Education

Authors: Inkeri Jääskeläinen

Abstract:

The purpose of this study is to shed light on what is it like to study in apprenticeship training using Finnish as second language. This study examines the stories and experiences of apprenticeship students learning and studying Finnish as part of their vocational studies. Also, this pilot study examines the effects of learning to pronounce Finnish through body motions and gestures. Many foreign students choose apprenticeships and start vocational training too early, while their language skills in Finnish are still very weak. Both duties at work and school assignments require reasonably good general language skills (B1.1) and, especially at work, language skills are also a safety issue. At work students should be able to simultaneously learn Finnish and do vocational studies in a noisy, demanding, and stressing environment. Learning and understanding new things is very challenging under these circumstances and sometimes students get exhausted and experience a lot of stress - which makes learning even more difficult. Students are different from each other and so are their ways to learn. Thereafter, one of the most important features of apprenticeship training and second language learning is good understanding of adult learners and their needs. Kinaesthetic methods are an effective way to support adult students’ cognitive skills and make learning more relaxing and fun. Empirical findings show that language learning can indeed be supported physical ways, by body motions and gestures. The method used here, named TFFL (Touch and Feel Foreign Languages), was designed to support adult language learning, to correct or prevent language fossilization and to help the student to manage emotions. Finnish is considered as a difficult language to learn, mostly because it is so different from nearly all other languages. Many learners complain that they are lost or confused and there is a need to find a way to simultaneously learn the language and to handle negative emotion which come from Finnish language and the learning process itself. Due to the nature of Finnish language good pronunciation skills are needed just to understand the way the language work. Movements (body movements etc.) are a natural part of many cultures but not Finnish – In Finland students have traditionally been expected to stay still and that is not a natural way for many foreign students. However, kinaesthetic TFFL method proved out to be a useful way to help some L2 students to feel phonemes, rhythm and intonation, to improve their Finnish and, thereby, also to successfully complete their vocational studies.

Keywords: Finnish, fossilization, interference, kinaesthetic method

Procedia PDF Downloads 84
467 From Private Bodies to a Shareable Body Politic. A Theological Solution to a Foundational Political Problem.

Authors: Patrick Downey

Abstract:

The political problem besetting all nations, tribes, and families, as illuminated by Plato in the fifth book of his Republic, is the problem of our own private body with its own particular pleasures and pains. This problem we might label the “irrational love of one’s own.” The reasonable philosopher loves reality just because it is, but we love things only if we can convince ourselves that they are “ours” or an imaginative extension of “ours.” The resulting problem, that can only be medicated, but not cured, is that the “body private,” whether our own, our family, tribe, or nation, always lies underneath any level of “body politic” and threatens the bloodshed and disintegration of civil war. This is also the political problem the Bible deals with throughout, beginning with Adam and Eve’s fall from rationally shareable bodies (“the two were one flesh”) into unshareable bodies whose now shameful “privacy” must be hid behind a bloody rather than bloodless veil. The blood is the sign of always threatening civil war, whether murder between brothers, feuds within tribes, or later, war between nations. The scarlet thread of blood tying the entire Bible together, Old and New Testament, reminds us that however far our loves are pushed out beyond our private body to family, tribe or nation, they remain irrational because unshareable. Only by loving the creator God who first loved us, can we rationally love anything of our own, but it must be loved as gift rather than as a possession. Such a love renders all bodies and nations truly shareable, and achieving this shareability is the paradoxical plot of the Bible, wherein the Word becomes flesh in a particular body amidst a particular people and nation. Yet even with His own nation and His own Son, this Lord is not “partial” and demands justice towards widows, orphans, and sojourners, because the irrational love of only our own can become rational solely through the resurrection of this particular body, king of this particular nation and these particular people. His body, along with all other bodies, can thus now retain their particular wounds and history, while yet remaining shareable. Likewise, all nations will share in the nation of Israel, in the same way all distinct languages will share an understanding through the inner rational word that we see illustrated in Pentecost. Without the resurrection, however, this shareability of bodies and nations remains merely a useful fiction, as Plato saw, and the equally fictitious “rationality” of some sort of deductive universalism will not go away. Reading Scripture in terms of Plato’s “irrational love of one’s own” therefore raises questions for both a Protestant and Catholic understanding of nations, questions that neither can answer adequately without this philosophical and exegetical attention.

Keywords: body private, nations, shareability, body politic

Procedia PDF Downloads 54
466 Adding a Few Language-Level Constructs to Improve OOP Verifiability of Semantic Correctness

Authors: Lian Yang

Abstract:

Object-oriented programming (OOP) is the dominant programming paradigm in today’s software industry and it has literally enabled average software developers to develop millions of commercial strength software applications in the era of INTERNET revolution over the past three decades. On the other hand, the lack of strict mathematical model and domain constraint features at the language level has long perplexed the computer science academia and OOP engineering community. This situation resulted in inconsistent system qualities and hard-to-understand designs in some OOP projects. The difficulties with regards to fix the current situation are also well known. Although the power of OOP lies in its unbridled flexibility and enormously rich data modeling capability, we argue that the ambiguity and the implicit facade surrounding the conceptual model of a class and an object should be eliminated as much as possible. We listed the five major usage of class and propose to separate them by proposing new language constructs. By using well-established theories of set and FSM, we propose to apply certain simple, generic, and yet effective constraints at OOP language level in an attempt to find a possible solution to the above-mentioned issues regarding OOP. The goal is to make OOP more theoretically sound as well as to aid programmers uncover warning signs of irregularities and domain-specific issues in applications early on the development stage and catch semantic mistakes at runtime, improving correctness verifiability of software programs. On the other hand, the aim of this paper is more practical than theoretical.

Keywords: new language constructs, set theory, FSM theory, user defined value type, function groups, membership qualification attribute (MQA), check-constraint (CC)

Procedia PDF Downloads 220
465 Film Censorship and Female Chastity: Exploring State's Discourses and Patriarchal Values in Reconstructing Chinese Film Stardom of Tang Wei

Authors: Xinchen Zhu

Abstract:

The rapid fame of the renowned female film star Tang Wei has made her a typical subject (or object) entangled with sensitive issues involving the official ideology, sexuality, and patriarchal values of contemporary China. In 2008, Tang Wei’s official ban has triggered the wave of debates concerning state power and censorship, actor’s rights, sexual ethics, and feminism in the public sphere. Her ban implies that Chinese film censorship acts as a key factor in reconstructing Chinese film stardom. Following the ban, as sensational media texts are re-interpreting the official discourses, the texts also functioned as a crucial vehicle in reconstructing Tang's female image. Therefore, the case study of Tang's film stardom allows us to further explore how female stardom has been entangled with the issues involving official ideology, female sexual ethics, and patriarchal values in contemporary China. This paper argues that Chinese female film stars shoulder the responsibility of film acting which would conform to the official male-dominated values. However, with the development of the Internet, the state no longer remains an absolute control over the new venues. The netizens’ discussion about her ban reshaped Tang’s image as a victim and scapegoat under the unfair oppression of the official authority. Additionally, this paper argues that similar to State’s discourse, netizens’ discourse did not reject patriarchal values, and in turn emphasized Tang Wei’s female chastity.

Keywords: film censorship, Chinese female film stardom, party-state’s power, national discourses, Tang Wei

Procedia PDF Downloads 145
464 Effects of Sensory Integration Techniques in Science Education of Autistic Students

Authors: Joanna Estkowska

Abstract:

Sensory integration methods are very useful and improve daily functioning autistic and mentally disabled children. Autism is a neurobiological disorder that impairs one's ability to communicate with and relate to others as well as their sensory system. Children with autism, even highly functioning kids, can find it difficult to process language with surrounding noise or smells. They are hypersensitive to things we can ignore such as sight, sounds and touch. Adolescents with highly functioning autism or Asperger Syndrome can study Science and Math but the social aspect is difficult for them. Nature science is an area of study that attracts many of these kids. It is a systematic field in which the children can focus on a small aspect. If you follow these rules you can come up with an expected result. Sensory integration program and systematic classroom observation are quantitative methods of measuring classroom functioning and behaviors from direct observations. These methods specify both the events and behaviors that are to be observed and how they are to be recorded. Our students with and without autism attended the lessons in the classroom of nature science in the school and in the laboratory of University of Science and Technology in Bydgoszcz. The aim of this study is investigation the effects of sensory integration methods in teaching to students with autism. They were observed during experimental lessons in the classroom and in the laboratory. Their physical characteristics, sensory dysfunction, and behavior in class were taken into consideration by comparing their similarities and differences. In the chemistry classroom, every autistic student is paired with a mentor from their school. In the laboratory, the children are expected to wear goggles, gloves and a lab coat. The chemistry classes in the laboratory were held for four hours with a lunch break, and according to the assistants, the children were engaged the whole time. In classroom of nature science, the students are encouraged to use the interactive exhibition of chemical, physical and mathematical models constructed by the author of this paper. Our students with and without autism attended the lessons in those laboratories. The teacher's goals are: to assist the child in inhibiting and modulating sensory information and support the child in processing a response to sensory stimulation.

Keywords: autism spectrum disorder, science education, sensory integration techniques, student with special educational needs

Procedia PDF Downloads 172
463 Kinaesthetic Method in Apprenticeship Training: Support for Finnish Learning in Vocational Education and Training

Authors: Inkeri Jaaskelainen

Abstract:

The purpose of this study is to shed light on what it is like to study in apprenticeship training using Finnish as a second language. This study examines the stories and experiences of apprenticeship students learning and studying Finnish as part of their vocational studies. Also, this pilot study examines the effects of learning to pronounce Finnish through body motions and gestures. Many foreign students choose apprenticeships and start vocational training too early, while their language skills in Finnish are still very weak. Both duties at work and school assignments require reasonably good general language skills (B1.1), and, especially at work, language skills are also a safety issue. At work, students should be able to simultaneously learn Finnish and do vocational studies in a noisy, demanding, and stressful environment. Learning and understanding new things is very challenging under these circumstances and sometimes students get exhausted and experience a lot of stress - which makes learning even more difficult. Students are different from each other and so are their ways to learn. Thereafter, one of the most important features of apprenticeship training and second language learning is a good understanding of adult learners and their needs. Kinaesthetic methods are an effective way to support adult students’ cognitive skills and make learning more relaxing and fun. Empirical findings show that language learning can indeed be supported in physical ways, by body motions and gestures. The method used here, named TFFL (Touch and Feel Foreign Languages), was designed to support adult language learning, to correct or prevent language fossilization, and to help the student to manage emotions. Finnish is considered as a difficult language to learn, mostly because it is so different from nearly all other languages. Many learners complain that they are lost or confused and there is a need to find a way to simultaneously learn the language and to handle negative emotion that comes from the Finnish language and the learning process itself. Due to the nature of the Finnish language, good pronunciation skills are needed just to understand the way the language work. Movements (body movements etc.) are a natural part of many cultures, but not Finnish. In Finland, students have traditionally been expected to stay still, and that is not a natural way for many foreign students. However, the kinaesthetic TFFL method proved out to be a useful way to help some L2 students to feel phonemes, rhythm, and intonation, to improve their Finnish, and, thereby, also to successfully complete their vocational studies.

Keywords: Finnish, fossilization, interference, kinaesthetic method

Procedia PDF Downloads 109
462 Toxic Ingredients Contained in Our Cosmetics

Authors: El Alia Boularas, H. Bekkar, H. Larachi, H. Rezk-kallah

Abstract:

Introduction: Notwithstanding cosmetics are used in life every day, these products are not all innocuous and harmless, as they may contain ingredients responsible for allergic reactions and, possibly, for other health problems. Additionally, environmental pollution should be taken into account. Thus, it is time to investigate what is ‘hidden behind beauty’. Aims: 1.To investigate prevalence of 13 chemical ingredients in cosmetics being object of concern, which the Algerians use regularly. 2.To know the profile of questioned consumers and describe their opinion on cosmetics. Methods: The survey was carried out in year 2013 over a period of 3 months, among Algerian Internet users having an e-mail address or a Facebook account.The study investigated 13 chemical agents showing health and environmental problems, selected after analysis of the recent studies published on the subject, the lists of national and international regulatory references on chemical hazards, and querying the database Skin Deep presented by the Environmental Working Group. Results: 300 people distributed all over the Algerian territory participated in the survey, providing information about 731 cosmetics; 86% aged from 20 to 39 years, with a sex ratio=0,27. A percentage of 43% of the analyzed cosmetics contained at least one of the 13 toxic ingredients. The targeted ingredient that has been most frequently reported was ‘perfume’ followed by parabens and PEG.85% of the participants declared that cosmetics ‘can contain toxic substances’, 27% asserted that they verify regularly the list of ingredients when they buy cosmetics, 61% said that they try to avoid the toxic ingredients, among whom 24 % were more vigilant on the presence of parabens, 95% were in favour of the strengthening of the Algerian laws on cosmetics. Conclusion: The results of the survey provide the indication of a widespread presence of toxic chemical ingredients in personal care products that Algerians use daily.

Keywords: Algerians consumers, cosmetics, survey, toxic ingredients

Procedia PDF Downloads 257
461 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience

Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha

Abstract:

Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.

Keywords: digital images, medical information system, second opinion consultations, electronic medical record

Procedia PDF Downloads 427