Search results for: renal access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3625

Search results for: renal access

1975 MindFlow: A Collective Intelligence-Based System for Helping Stress Pattern Diagnosis

Authors: Andres Frederic

Abstract:

We present the MindFlow system supporting the detection and the diagnosis of stresses. The heart of the system is a knowledge synthesis engine allowing occupational health stakeholders (psychologists, occupational therapists and human resource managers) to formulate queries related to stress and responding to users requests by recommending a pattern of stress if one exists. The stress pattern diagnosis is based on expert knowledge stored in the MindFlow stress ontology including stress feature vector. The query processing may involve direct access to the MindFlow system by occupational health stakeholders, online communication between the MindFlow system and the MindFlow domain experts, or direct dialog between a occupational health stakeholder and a MindFlow domain expert. The MindFlow knowledge model is generic in the sense that it supports the needs of psychologists, occupational therapists and human resource managers. The system presented in this paper is currently under development as part of a Dutch-Japanese project and aims to assist organisation in the quick diagnosis of stress patterns.

Keywords: occupational stress, stress management, physiological measurement, accident prevention

Procedia PDF Downloads 430
1974 Good Governance and Human Development: Case of Rwanda

Authors: Hatun Korkmaz

Abstract:

Todays, the developing countries of the world widely face challenges of economic growth, political, social and human development. One of the ways to achieve economic, political and human development is good governance. Without an improvement in good governance, the objectives of human development cannot be achieved. The good governance has become a key issue over preceding two decades and it is the very important component of good economic growth and human development. This paper argues that good governance impacts positively human development with the case of Rwanda. Rwanda is a good example of this subject. In this paper, firstly we explained that what is good governance and human development and how we measure them. Then we researched the relationship between good governance and human development in case of Rwanda with the indexes of many international institutions which are researching in this topics. Rwanda has recorded the 'best progress' since the year 2000, making it the ‘most successful' about governance. Rwanda is seen as one of the top ten countries in the region in terms of relative peace, political stability and economic progress. Part of the reason for Rwanda's success is accountability, which comprises access to information, elimination of corruption and bureaucracy and transparency in public service, which variables cumulatively earned it 72.1 percent. According to this research If countries want batter growth and human development then good reforms of good governance is needed.

Keywords: human development, Rwanda, good governance, governance, development

Procedia PDF Downloads 244
1973 The Making of a Community: Perception versus Reality of Neighborhood Resources

Authors: Kirstie Smith

Abstract:

This paper elucidates the value of neighborhood perception as it contributes to the advancement of well-being for individuals and families within a neighborhood. Through in-depth interviews with city residents, this paper examines the degree to which key stakeholders’ (residents) evaluate their neighborhood and perception of resources and identify, access, and utilize local assets existing in the community. Additionally, the research objective included conducting a community inventory that qualified the community assets and resources of lower-income neighborhoods of a medium-sized industrial city. Analysis of the community’s assets was compared with the interview results to allow for a better understanding of the community’s condition. Community mapping revealed the key informants’ reflections of assets were somewhat validated. In each neighborhood, there were more assets mapped than reported in the interviews. Another chief supposition drawn from this study was the identification of key development partners and social networks that offer the potential to facilitate locally-driven community development. Overall, the participants provided invaluable local knowledge of the perception of neighborhood assets, the well-being of residents, the condition of the community, and suggestions for responding to the challenges of the entire community in order to mobilize the present assets and networks.

Keywords: community mapping, family, resource allocation, social networks

Procedia PDF Downloads 353
1972 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone

Authors: R. Bernaoui, P. Ohly

Abstract:

Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.

Keywords: algeria, breeder-veterinarian, digital heritage, networking

Procedia PDF Downloads 121
1971 Conceptual Model Design for E-Readiness of Entrepreneurial City Case Study: Entrepreneurial Cities in Iran

Authors: Mohsen Yaghmoor, Sima Radmanesh, Ameneh Gholami

Abstract:

Cities are the principal ground for manifestation of an information society. To create an entrepreneurial city, it is required that just and equal access to opportunities are provided for all segments of the city and technologies are intelligently employed. Furthermore, it is necessary for us to be electronically ready in all political, economic, social, cultural, and technological aspects. Also e-city creates enormous potentials and opportunities for development of the entrepreneurial city. After improvement of e-readiness for establishment of entrepreneurial e-city, potentials, and capitals of the city become productive and more suitable opportunities are offered to citizens, state sectors, and private sectors in order to become entrepreneurs. To create and develop an entrepreneurial city, we need to have readiness to detection and creation of entrepreneurial opportunities and finally exploitation of these opportunities which, in turn, lead to use of entrepreneurial events and their quality in the city. In this model, the quality of entrepreneurial events, the productivity of activities, the necessity of reducing the digital gap, positive and active attendance in information society and compatibility and aligning with the global society are emphasized. In an entrepreneurial city, citizens are not help seekers, private sector is not passive, and the government is entrepreneurial.

Keywords: e-city, e-readiness, entrepreneurial city, entrepreneurial events, technological entrepreneurship

Procedia PDF Downloads 384
1970 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
1969 Gender Inequality on Marine Tourism Development in Small Island

Authors: Khodijah Ismail, Elfindri

Abstract:

Tourism development have many environmental, economically and sociocultural benefits. Small islands have a lot of potential for marine tourism development. But, stereotype gender issues still dominate the social and cultural life of rural communities that have an impact on the gap in benefits of local development. The purpose of this study is to found development strategy concept of marine tourism in small islands gender-based. This study found in the marine tourism development of small islands not involved women, from planning to monitor marine tourism development in small islands. It's affects to the low of socio-economic of women in the coastal village and small islands. This condition is not advantage for sustainable development of marine tourism in small islands. Therefore, strengthening of livelihood assets by gender based through the marine tourism development in small islands is very important to attention, that women can contributed to household welfare, bargaining positioned in social culture was better and increase broad access to local government development policies. To realize it requires the full support of the government and relevant stakeholders through gender empowerment and strengthening of accessibility, connectivity, regulation, and design institution.

Keywords: gender inequality, marine tourism, development, tourism management

Procedia PDF Downloads 485
1968 Reliability Factors Based Fuzzy Logic Scheme for Spectrum Sensing

Authors: Tallataf Rasheed, Adnan Rashdi, Ahmad Naeem Akhtar

Abstract:

The accurate spectrum sensing is a fundamental requirement of dynamic spectrum access for deployment of Cognitive Radio Network (CRN). To acheive this requirement a Reliability factors based Fuzzy Logic (RFL) Scheme for Spectrum Sensing has been proposed in this paper. Cognitive Radio User (CRU) predicts the presence or absence of Primary User (PU) using energy detector and calculates the Reliability factors which are SNR of sensing node, threshold of energy detector and decision difference of each node with other nodes in a cooperative spectrum sensing environment. Then the decision of energy detector is combined with Reliability factors of sensing node using Fuzzy Logic. These Reliability Factors used in RFL Scheme describes the reliability of decision made by a CRU to improve the local spectrum sensing. This Fuzzy combining scheme provides the accuracy of decision made by sensornode. The simulation results have shown that the proposed technique provide better PU detection probability than existing Spectrum Sensing Techniques.

Keywords: cognitive radio, spectrum sensing, energy detector, reliability factors, fuzzy logic

Procedia PDF Downloads 486
1967 (In)Visibility of Afghan Migrants in Turkey's Informal Labour Market

Authors: Rezzan Alagoz, Seda Gonul

Abstract:

This study examines the migration, work, and social life experiences of undocumented Afghan migrants employed as shepherds in Igdır. Despite their high visibility in informal labor markets, their undocumented status renders them invisible in everyday life. Their invisibility in both official status and social life, coupled with their vulnerability to exploitation in the labor market, renders them particularly susceptible to marginalization. This research employs the concept of the subaltern to examine the characteristics of Afghan migrants as unrepresented, unheard, and invisible. It also analyzes their experiences in the labor market based on the concept of biopolitics. Undocumented Afghan migrants are engaged in labor-intensive occupations such as shepherding, thereby addressing an essential gap in the workforce that local workers are reluctant to undertake. The reliance of employers on the labor of these employees is significant; however, the undocumented status of these workers leaves them vulnerable to exploitation. In addition to serving as a critical source of low-cost labor, these individuals are susceptible to exploitation in the form of non-payment for their work, extended and intensive work schedules, and, on some occasions, physical violence. In the event of a conflict between shepherds and their employers, undocumented workers are unable to seek legal recourse, which serves to reinforce their marginalized status further. The predominant practice among Afghan shepherds is to utilize the workplace as a place of residence. In the context of shepherding work, the prevailing conditions at the workplace frequently pose a significant threat to the health and well-being of the individuals engaged in such activities. As a result of their lack of official status, these individuals lack access to basic services such as healthcare, which has the consequence of rendering them invisible in public and institutional spaces. Attempts to engage with public systems carry the risk of deportation, reinforcing the already fragile and precarious nature of their existence. This study examines the socio-political implications of undocumented status and addresses these experiences in the context of national and international migration policies. In line with Agamben's concept of the "state of exception" undocumented migrants exist in a state where fundamental rights are effectively nullified, and they are rendered outside the protection of the law. This exclusion is further exacerbated by the intersection of economic exploitation, political and physical invisibility, and limited access to basic services, which collectively contribute to a cycle of vulnerability. This research is based on in-depth interviews with 18 Afghan shepherds in Igdir province in August 2024. The research contributes to the ongoing critical debates on migration, labor exploitation, and biopolitics by focusing on the experiences of Afghan shepherds. The article examines how undocumented migrants maneuver between visibility and invisibility within the context of a system that relies on exploitation in the labor market and migration policies. The research findings demonstrate the necessity for policy intervention to address the structural exclusion of undocumented Afghan migrants from national and international protection systems, as well as their indispensable role in local economies.

Keywords: Afghan migrants, biopolitics, border economy, informal labour market, migration policy, sheepherding, Subaltern

Procedia PDF Downloads 15
1966 Norms and Laws: Fate of Community Forestry in Jharkhand

Authors: Pawas Suren

Abstract:

The conflict between livelihood and forest protection has been a perpetual phenomenon in India. In the era of climate change, the problem is expected to aggravate the declining trend of dense forest in the country, creating impediments in the climate change adaptation by the forest dependent communities. In order to access the complexity of the problem, Hazarinagh and Chatra districts of Jharkhand were selected as a case study. To identify norms practiced by the communities to manage community forestry, the ethnographic study was designed to understand the values, traditions, and cultures of forest dependent communities, most of whom were tribal. It was observed that internalization of efficient forest norms is reflected in the pride and honor of such behavior while violators are sanctioned through guilt and shame. The study analyzes the effect of norms being practiced in the management and ecology of community forestry as common property resource. The light of the findings led towards the gaps in the prevalent forest laws to address efficient allocation of property rights. The conclusion embarks on reconsidering accepted factors of forest degradation in India.

Keywords: climate change, common property resource, community forestry, norms

Procedia PDF Downloads 343
1965 Breaking through Barricades to Enhance the University Library Infrastructure to Aid the Visually Challenged - Contemplated Based within the Sri Lankan Context

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

The Sri Lankan legislative acts dictate several recommendations to improve accessibility of services for the visually challenged. But the main consideration here is the feasibility and extent to which these endorsements have been implemented in actuality within Sri Lankan academic libraries. This paper tends to assess the existent issues that impediment the implementation of accessibility features for the visually challenged in Sri Lankan academic libraries. Visually challenged students continually walk through immense challenges to step forth into their university life. Reaching their undergrad stage of their academic phase, they should be entitled to access information resources with ease and with equality in comparison to the sighted users of a university library. The current university libraries in Sri Lanka, have well improved services that they render to their users. But, what lacks in this scenario is the consideration as to whether these features offered by libraries are user-friendly and easily accessible by the visually challenged users as well. Hence, this paper tends to analyze the inhibitions in delivering services oriented towards the visually challenged and the sighted, and propose feasible alternatives to create a neutral high-end university library environment.

Keywords: accessibility, university library, Sri Lanka, visually-challenged

Procedia PDF Downloads 289
1964 Electoral Violence and Women in Politics: A Case Study of Pakistan

Authors: Mariam Arif

Abstract:

The objective of the current study is to find out the electoral violence against women and its implications on their political participation. This paper is a qualitative study to get an in-depth analysis of the phenomenon. This study used questionnaires and interviews for findings. This paper attempts to study electoral violence and women in politics in Pakistan. The study concluded that women are subjected to different categories of violence defined as physical violence that involves sexual and bodily harm to a politically active woman or to people associated with her. Social and psychological violence includes class difference, stress, social limitations, family pressure and character assassination. Economic violence is defined as a systematic restriction of access to economic resources available to women thus hinder women active participation in politics (elections). All these violence against women in elections are threat to the integrity of the electoral process of the country that eventually affects women’s participation as voters, party candidates, election officials and political party leaders. It also undermines the free and fair democratic process. This qualitative paper shows a significant negative relationship between electoral violence and women participation in politics.

Keywords: elections, politics, violence, women

Procedia PDF Downloads 159
1963 Street Naming and Property Addressing Systems for New Development in Ghana: A Case Study of Nkawkaw in the Kwahu West Municipality

Authors: Jonathan Nii Laryea Ashong, Samuel Opare

Abstract:

Current sustainable cities debate focuses on the formidable problems for the Ghana’s largest urban and rural agglomerations, the majority of all urban dwellers continue to reside in far smaller urban settlements. It is estimated that by year 2030, almost all the Ghana’s population growth will likely be intense in urban areas including Nkawkaw in the Kwahu West Municipality of Ghana. Nkawkaw is situated on the road and former railway between Accra and Kumasi, and lies about halfway between these cities. It is also connected by road to Koforidua and Konongo. According to the 2013 census, Nkawkaw has a settlement population of 61,785. Many international agencies, government and private architectures’ are been asked to adequately recognize the naming of streets and property addressing system among the 170 districts across Ghana. The naming of streets and numbering of properties is to assist Metropolitan, Municipal and District Assemblies to manage the processes for establishing coherent address system nationally. Street addressing in the Nkawkaw in the Kwahu West Municipality which makes it possible to identify the location of a parcel of land, public places or dwellings on the ground based on system of names and numbers, yet agreement on how to progress towards it remains elusive. Therefore, reliable and effective development control for proper street naming and property addressing systems are required. The Intelligent Addressing (IA) technology from the UK is being used to name streets and properties in Ghana. The intelligent addressing employs the technique of unique property Reference Number and the unique street reference number which would transform national security and other service providers’ ability to respond rapidly to distress calls. Where name change is warranted following the review of existing streets names, the Physical Planning Department (PPDs) shall, in consultation with the relevant traditional authorities and community leadership (or relevant major stakeholders), select a street name in accordance with the provisions of the policy and the processes outlined for street name change for new development. In the case of existing streets with no names, the respective PPDs shall, in consultation with the relevant traditional authorities and community leadership (or relevant major stakeholders), select a street name in accordance with the requirements set out in municipality. Naming of access ways proposed for new developments shall be done at the time of developing sector layouts (subdivision maps) for the designated areas. In the case of private gated developments, the developer shall submit the names of the access ways as part of the plan and other documentation forwarded to the Municipal District Assembly for approval. The names shall be reviewed first by the PPD to avoid duplication and to ensure conformity to the required standards before submission to the Assembly’s Statutory Planning Committee for approval. The Kwahu West Municipality is supposed to be self-sustaining, providing basic services to inhabitants as a result of proper planning layouts, street naming and property addressing system that prevail in the area. The implications of these future projections are discussed.

Keywords: Nkawkaw, Kwahu west municipality, street naming, property, addressing system

Procedia PDF Downloads 542
1962 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 437
1961 Application of Hybrid Honey Bees Mating Optimization Algorithm in Multiuser Detection of Wireless Communication Systems

Authors: N. Larbi, F. Debbat

Abstract:

Wireless communication systems have changed dramatically and shown spectacular evolution over the past two decades. These radio technologies are engaged in a quest endless high-speed transmission coupled to a constant need to improve transmission quality. Various radio communication systems being developed use code division multiple access (CDMA) technique. This work analyses a hybrid honey bees mating optimization algorithm (HBMO) applied to multiuser detection (MuD) in CDMA communication systems. The HBMO is a swarm-based optimization algorithm, which simulates the mating process of real honey bees. We apply a hybridization of HBMO with simulated annealing (SA) in order to improve the solution generated by the HBMO. Simulation results show that the detection based on Hybrid HBMO, in term of bit error rate (BER), is viable option when compared with the classic detectors from literature under Rayleigh flat fading channel.

Keywords: BER, DS-CDMA multiuser detection, genetic algorithm, hybrid HBMO, simulated annealing

Procedia PDF Downloads 435
1960 Digitization and Morphometric Characterization of Botanical Collection of Indian Arid Zones as Informatics Initiatives Addressing Conservation Issues in Climate Change Scenario

Authors: Dipankar Saha, J. P. Singh, C. B. Pandey

Abstract:

Indian Thar desert being the seventh largest in the world is the main hot sand desert occupies nearly 385,000km2 and about 9% of the area of the country harbours several species likely the flora of 682 species (63 introduced species) belonging to 352 genera and 87 families. The degree of endemism of plant species in the Thar desert is 6.4 percent, which is relatively higher than the degree of endemism in the Sahara desert which is very significant for the conservationist to envisage. The advent and development of computer technology for digitization and data base management coupled with the rapidly increasing importance of biodiversity conservation resulted in the invention of biodiversity informatics as discipline of basic sciences with multiple applications. Aichi Target 19 as an outcome of Convention of Biological Diversity (CBD) specifically mandates the development of an advanced and shared biodiversity knowledge base. Information on species distributions in space is the crux of effective management of biodiversity in the rapidly changing world. The efficiency of biodiversity management is being increased rapidly by various stakeholders like researchers, policymakers, and funding agencies with the knowledge and application of biodiversity informatics. Herbarium specimens being a vital repository for biodiversity conservation especially in climate change scenario the digitization process usually aims to improve access and to preserve delicate specimens and in doing so creating large sets of images as a part of the existing repository as arid plant information facility for long-term future usage. As the leaf characters are important for describing taxa and distinguishing between them and they can be measured from herbarium specimens as well. As a part of this activity, laminar characterization (leaves being the most important characters in assessing climate change impact) initially resulted in classification of more than thousands collections belonging to ten families like Acanthaceae, Aizoaceae, Amaranthaceae, Asclepiadaceae, Anacardeaceae, Apocynaceae, Asteraceae, Aristolochiaceae, Berseraceae and Bignoniaceae etc. Taxonomic diversity indices has also been worked out being one of the important domain of biodiversity informatics approaches. The digitization process also encompasses workflows which incorporate automated systems to enable us to expand and speed up the digitisation process. The digitisation workflows used to be on a modular system which has the potential to be scaled up. As they are being developed with a geo-referencing tool and additional quality control elements and finally placing specimen images and data into a fully searchable, web-accessible database. Our effort in this paper is to elucidate the role of BIs, present effort of database development of the existing botanical collection of institute repository. This effort is expected to be considered as a part of various global initiatives having an effective biodiversity information facility. This will enable access to plant biodiversity data that are fit-for-use by scientists and decision makers working on biodiversity conservation and sustainable development in the region and iso-climatic situation of the world.

Keywords: biodiversity informatics, climate change, digitization, herbarium, laminar characters, web accessible interface

Procedia PDF Downloads 229
1959 The Effect of Tacit Knowledge for Intelligence Cycle

Authors: Bahadir Aydin

Abstract:

It is difficult to access accurate knowledge because of mass data. This huge data make environment more and more caotic. Data are main piller of intelligence. The affiliation between intelligence and knowledge is quite significant to understand underlying truths. The data gathered from different sources can be modified, interpreted and classified by using intelligence cycle process. This process is applied in order to progress to wisdom as well as intelligence. Within this process the effect of tacit knowledge is crucial. Knowledge which is classified as explicit and tacit knowledge is the key element for any purpose. Tacit knowledge can be seen as "the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence cycle is scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose of all organizations is to be successful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. Thanks to this process the decision-makers can be presented with a clear holistic understanding, as early as possible in the decision making process. Altering from the current traditional reactive approach to a proactive intelligence cycle approach would reduce extensive duplication of work in the organization. Applying new result-oriented cycle and tacit knowledge intelligence can be procured and utilized more effectively and timely.

Keywords: information, intelligence cycle, knowledge, tacit Knowledge

Procedia PDF Downloads 514
1958 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 410
1957 Electrical Equivalent Analysis of Micro Cantilever Beams for Sensing Applications

Authors: B. G. Sheeparamatti, J. S. Kadadevarmath

Abstract:

Microcantilevers are the basic MEMS devices, which can be used as sensors, actuators, and electronics can be easily built into them. The detection principle of microcantilever sensors is based on the measurement of change in cantilever deflection or change in its resonance frequency. The objective of this work is to explore the analogies between the mechanical and electrical equivalent of microcantilever beams. Normally scientists and engineers working in MEMS use expensive software like CoventorWare, IntelliSuite, ANSYS/Multiphysics, etc. This paper indicates the need of developing the electrical equivalent of the MEMS structure and with that, one can have a better insight on important parameters, and their interrelation of the MEMS structure. In this work, considering the mechanical model of the microcantilever, the equivalent electrical circuit is drawn and using a force-voltage analogy, it is analyzed with circuit simulation software. By doing so, one can gain access to a powerful set of intellectual tools that have been developed for understanding electrical circuits. Later the analysis is performed using ANSYS/Multiphysics - software based on finite element method (FEM). It is observed that both mechanical and electrical domain results for a rectangular microcantilevers are in agreement with each other.

Keywords: electrical equivalent circuit analogy, FEM analysis, micro cantilevers, micro sensors

Procedia PDF Downloads 397
1956 Strategic Citizen Participation in Applied Planning Investigations: How Planners Use Etic and Emic Community Input Perspectives to Fill-in the Gaps in Their Analysis

Authors: John Gaber

Abstract:

Planners regularly use citizen input as empirical data to help them better understand community issues they know very little about. This type of community data is based on the lived experiences of local residents and is known as "emic" data. What is becoming more common practice for planners is their use of data from local experts and stakeholders (known as "etic" data or the outsider perspective) to help them fill in the gaps in their analysis of applied planning research projects. Utilizing international Health Impact Assessment (HIA) data, I look at who planners invite to their citizen input investigations. Research presented in this paper shows that planners access a wide range of emic and etic community perspectives in their search for the “community’s view.” The paper concludes with how planners can chart out a new empirical path in their execution of emic/etic citizen participation strategies in their applied planning research projects.

Keywords: citizen participation, emic data, etic data, Health Impact Assessment (HIA)

Procedia PDF Downloads 484
1955 Pedagogical Opportunities of Physics Education Technology Interactive Simulations for Secondary Science Education in Bangladesh

Authors: Mohosina Jabin Toma, Gerald Tembrevilla, Marina Milner-Bolotin

Abstract:

Science education in Bangladesh is losing its appeal at an alarming rate due to the lack of science laboratory equipment, excessive teacher-student ratio, and outdated teaching strategies. Research-based educational technologies aim to address some of the problems faced by teachers who have limited access to laboratory resources, like many Bangladeshi teachers. Physics Education Technology (PhET) research team has been developing science and mathematics interactive simulations to help students develop deeper conceptual understanding. Still, PhET simulations are rarely used in Bangladesh. The purpose of this study is to explore Bangladeshi teachers’ challenges in learning to implement PhET-enhanced pedagogies and examine teachers’ views on PhET’s pedagogical opportunities in secondary science education. Since it is a new technology for Bangladesh, seven workshops on PhET were conducted in Dhaka city for 129 in-service and pre-service teachers in the winter of 2023 prior to data collection. This study followed an explanatory mixed method approach that included a pre-and post-workshop survey and five semi-structured interviews. Teachers participated in the workshops voluntarily and shared their experiences at the end. Teachers’ challenges were also identified from workshop discussions and observations. The interviews took place three to four weeks after the workshop and shed light on teachers’ experiences of using PhET in actual classroom settings. The results suggest that teachers had difficulty handling new technology; hence, they recommended preparing a booklet and Bengali YouTube videos on PhET to assist them in overcoming their struggles. Teachers also faced challenges in using any inquiry-based learning approach due to the content-loaded curriculum and exam-oriented education system, as well as limited experience with inquiry-based education. The short duration of classes makes it difficult for them to design PhET activities. Furthermore, considering limited access to computers and the internet in school, teachers think PhET simulations can bring positive changes if used in homework activities. Teachers also think they lack pedagogical skills and sound content knowledge to take full advantage of PhET. They highly appreciated the workshops and proposed that the government designs some teacher training modules on how to incorporate PhET simulations. Despite all the challenges, teachers believe PhET can enhance student learning, ensure student engagement and increase student interest in STEM Education. Considering the lack of science laboratory equipment, teachers recognized the potential of PhET as a supplement to hands-on activities for secondary science education in Bangladesh. They believed that if PhET develops more curriculum-relevant sims, it will bring revolutionary changes to how Bangladeshi students learn science. All the participating teachers in this study came from two organizations, and all the workshops took place in urban areas; therefore, the findings cannot be generalized to all secondary science teachers. A nationwide study is required to include teachers from diverse backgrounds. A further study can shed light on how building a professional learning community can lessen teachers’ challenges in incorporating PhET-enhanced pedagogy in their teaching.

Keywords: educational technology, inquiry-based learning, PhET interactive simulations, PhET-enhanced pedagogies, science education, science laboratory equipment, teacher professional development

Procedia PDF Downloads 95
1954 Gig-Work in the Midst of the COVID-19 Pandemic

Authors: Audie Daniel Wood

Abstract:

In the spring of 2020, the country and the economy came to a halt due to an outbreak of the novel coronavirus, SARS-2, virus known as COVID-19. One of the hardest hit sectors of the economy was the gig-sector, which includes Lyft, Uber, Door-Dash, and other services. In this study, we examined the effects of the independent contractor status of laborers in this field to see how a near-complete economic shut-down affected the lives of laborers who are denied access to health-care and unemployment benefits due to their status as independent contractors. What the study found was there was no 'life-altering' change to the lives of the workers who used gig-work as supplementary income during the economic shut-down, but those who relied on Lyft and Uber, etc. as their sole source of income were more heavily impacted by the economic shut-down than part-time workers. The second significant finding of the study was that across all genders and races, the idea of having to seek unemployment or help was something that none of the workers wanted. They all felt as if unemployment and social-insurance were for those who could not work. While the findings are not generalizable due to this being a small qualitative study consisting of 27 participants, the findings suggest that the economic and social impact of COVID-19 on those that work in the gig-industry warrants further discussion and research.

Keywords: gig-work, Covid-19, independent contractor, Uber

Procedia PDF Downloads 125
1953 Simulator Dynamic Positioning System with Azimuthal Thruster

Authors: Robson C. Santos, Christian N. Barreto, Gerson G. Cunha, Severino J. C. Neto

Abstract:

This paper aims to project the construction of a prototype azimuthal thruster, mounted with materials of low cost and easy access, testing in a controlled environment to measure their performance, characteristics and feasibility of future projects. The construction of the simulation of dynamic positioning software, responsible for simulating a vessel and reposition it when necessary . Tests for partial and full validation of the model were conducted, operates independently of the control system and executes the commands and commands of the helix of rotation azimuth. The system provides an interface to the user and simulates the conditions unfavorable positioning of a vessel, accurately calculates the azimuth angle, the direction of rotation of the helix and the time that this should be turned on so that the vessel back to position original. There is a serial communication that connects the Simulation Dynamic Positioning System with Embedded System causing the user-generated data to simulate the DP system arrives in the form of control signals to the motors of the propellant. This article addresses issues in the marine industry employees.

Keywords: azimuthal thruster, dynamic positioning, embedded system, simulator dynamic positioning

Procedia PDF Downloads 465
1952 Unravelling the Procedural Obligations of the Administration in the Case Law of the European Court of Human Rights

Authors: Agne Andrijauskaite

Abstract:

The observance of procedural rights by administrative authorities is essential for the effective implementation of subjective rights and is part and parcel of the notion of good governance. Whilst a lot of legal scholarship addresses the scope and content of such rights under the European Union legal framework, a very limited attention is given to their application in the case law of European Court of Human Rights (ECtHR) despite its growing engagement with the subject. This paper written as a part of a wider project on the development of pan-European principles of good administration by the Council of Europe aims to fill this lacuna. This will be done by delimiting the scope and extent of individual procedural safeguards through an analysis of the practice of the ECtHR. The right to be heard, the right to access the files and the right to a decision in reasonable time by administrative authorities will be selected as loci classici for the purpose of this article. The results presented in the paper should contribute to the awareness of growing body of ECtHR’s case-law revolving around administrative procedural law and the growing debate on the notion of good governance found therein within academic community.

Keywords: European Court of Human Rights, good governance, procedural rights, procedural Law

Procedia PDF Downloads 284
1951 Towards a Distributed Computation Platform Tailored for Educational Process Discovery and Analysis

Authors: Awatef Hicheur Cairns, Billel Gueni, Hind Hafdi, Christian Joubert, Nasser Khelifa

Abstract:

Given the ever changing needs of the job markets, education and training centers are increasingly held accountable for student success. Therefore, education and training centers have to focus on ways to streamline their offers and educational processes in order to achieve the highest level of quality in curriculum contents and managerial decisions. Educational process mining is an emerging field in the educational data mining (EDM) discipline, concerned with developing methods to discover, analyze and provide a visual representation of complete educational processes. In this paper, we present our distributed computation platform which allows different education centers and institutions to load their data and access to advanced data mining and process mining services. To achieve this, we present also a comparative study of the different clustering techniques developed in the context of process mining to partition efficiently educational traces. Our goal is to find the best strategy for distributing heavy analysis computations on many processing nodes of our platform.

Keywords: educational process mining, distributed process mining, clustering, distributed platform, educational data mining, ProM

Procedia PDF Downloads 454
1950 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 133
1949 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 132
1948 Exploring the Capabilities of Sentinel-1A and Sentinel-2A Data for Landslide Mapping

Authors: Ismayanti Magfirah, Sartohadi Junun, Samodra Guruh

Abstract:

Landslides are one of the most frequent and devastating natural disasters in Indonesia. Many studies have been conducted regarding this phenomenon. However, there is a lack of attention in the landslide inventory mapping. The natural condition (dense forest area) and the limited human and economic resources are some of the major problems in building landslide inventory in Indonesia. Considering the importance of landslide inventory data in susceptibility, hazard, and risk analysis, it is essential to generate landslide inventory based on available resources. In order to achieve this, the first thing we have to do is identify the landslides' location. The presence of Sentinel-1A and Sentinel-2A data gives new insights into land monitoring investigation. The free access, high spatial resolution, and short revisit time, make the data become one of the most trending open sources data used in landslide mapping. Sentinel-1A and Sentinel-2A data have been used broadly for landslide detection and landuse/landcover mapping. This study aims to generate landslide map by integrating Sentinel-1A and Sentinel-2A data use change detection method. The result will be validated by field investigation to make preliminary landslide inventory in the study area.

Keywords: change detection method, landslide inventory mapping, Sentinel-1A, Sentinel-2A

Procedia PDF Downloads 171
1947 Effects of Aging on Auditory and Visual Recall Abilities

Authors: Rashmi D. G., Aishwarya G., Niharika M. K.

Abstract:

Purpose: Free recall tasks target cognitive and linguistic processes like episodic memory, lexical access and retrieval. Consequently, the free recall paradigm is suitable for assessing memory deterioration caused by aging; this also depends on linguistic factors, including the use of first and second languages and their relative ability. Hence, the present study aimed to determine if aging has an effect on visual and auditory recall abilities. Method: Twenty young adults (mean age: 25.4±0.99) and older adults (mean age: 63.3±3.51) participated in the study. Participants performed a free recall task under two conditions – related and unrelated and two modalities - visual and auditory where they were instructed to recall as many items as possible with no specific order and time limit. Results: Free recall performance was calculated as the mean number of correctly recalled items. Although younger participants recalled a higher number of items, the performance across conditions and modality was variable. Conclusion: In summary, the findings of the present study revealed an age-related decline in the efficiency of episodic memory, which is crucial to remember recent events.

Keywords: recall, episodic memory, aging, modality

Procedia PDF Downloads 95
1946 Effects of Education Equity Policy on Housing Prices: Evidence from Simultaneous Admission to Public and Private Schools Policy in Shanghai

Authors: Tianyu Chen

Abstract:

China's school district education policy has encouraged parents to purchase properties in school districts with high-quality education resources. Shanghai has implemented "Simultaneous Admission to Public and Private Schools" (SAPPS) since 2018, which has covered all nine-year compulsory education by 2020. This study examines the impact of SAPPS on the housing market, specifically the premium effect of houses located in dual-school districts. Based on the Hedonic Pricing Model and the Signaling Theory, data is collected from 585 second-hand house transactions in Pudong New Area, Shanghai, and it is analyzed with the Difference-in-Differences (DID) model. The results indicate that the implementation of SAPPS has exacerbated the premium of dual school district housing and weakened the effect of the policy to a certain degree. To ensure equal access to education for all students, the government should work both on the supply and demand sides of the education resource equation.

Keywords: simultaneous admission to public and private schools, housing prices, education policy, education equity

Procedia PDF Downloads 77