Search results for: intellectual property information analysis
19129 An Integrated Real-Time Hydrodynamic and Coastal Risk Assessment Model
Authors: M. Reza Hashemi, Chris Small, Scott Hayward
Abstract:
The Northeast Coast of the US faces damaging effects of coastal flooding and winds due to Atlantic tropical and extratropical storms each year. Historically, several large storm events have produced substantial levels of damage to the region; most notably of which were the Great Atlantic Hurricane of 1938, Hurricane Carol, Hurricane Bob, and recently Hurricane Sandy (2012). The objective of this study was to develop an integrated modeling system that could be used as a forecasting/hindcasting tool to evaluate and communicate the risk coastal communities face from these coastal storms. This modeling system utilizes the ADvanced CIRCulation (ADCIRC) model for storm surge predictions and the Simulating Waves Nearshore (SWAN) model for the wave environment. These models were coupled, passing information to each other and computing over the same unstructured domain, allowing for the most accurate representation of the physical storm processes. The coupled SWAN-ADCIRC model was validated and has been set up to perform real-time forecast simulations (as well as hindcast). Modeled storm parameters were then passed to a coastal risk assessment tool. This tool, which is generic and universally applicable, generates spatial structural damage estimate maps on an individual structure basis for an area of interest. The required inputs for the coastal risk model included a detailed information about the individual structures, inundation levels, and wave heights for the selected region. Additionally, calculation of wind damage to structures was incorporated. The integrated coastal risk assessment system was then tested and applied to Charlestown, a small vulnerable coastal town along the southern shore of Rhode Island. The modeling system was applied to Hurricane Sandy and a synthetic storm. In both storm cases, effect of natural dunes on coastal risk was investigated. The resulting damage maps for the area (Charlestown) clearly showed that the dune eroded scenarios affected more structures, and increased the estimated damage. The system was also tested in forecast mode for a large Nor’Easters: Stella (March 2017). The results showed a good performance of the coupled model in forecast mode when compared to observations. Finally, a nearshore model XBeach was then nested within this regional grid (ADCIRC-SWAN) to simulate nearshore sediment transport processes and coastal erosion. Hurricane Irene (2011) was used to validate XBeach, on the basis of a unique beach profile dataset at the region. XBeach showed a relatively good performance, being able to estimate eroded volumes along the beach transects with a mean error of 16%. The validated model was then used to analyze the effectiveness of several erosion mitigation methods that were recommended in a recent study of coastal erosion in New England: beach nourishment, coastal bank (engineered core), and submerged breakwater as well as artificial surfing reef. It was shown that beach nourishment and coastal banks perform better to mitigate shoreline retreat and coastal erosion.Keywords: ADCIRC, coastal flooding, storm surge, coastal risk assessment, living shorelines
Procedia PDF Downloads 11619128 The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance
Authors: Florina Magdalena Anichitoae, Anca Dobrean, Ionut Stelian Florean
Abstract:
Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end.Keywords: adolescent, attachment, cyberbullying victimization, parents, peers, unconditional self-acceptance
Procedia PDF Downloads 20419127 Well Inventory Data Entry: Utilization of Developed Technologies to Progress the Integrated Asset Plan
Authors: Danah Al-Selahi, Sulaiman Al-Ghunaim, Bashayer Sadiq, Fatma Al-Otaibi, Ali Ameen
Abstract:
In light of recent changes affecting the Oil & Gas Industry, optimization measures have become imperative for all companies globally, including Kuwait Oil Company (KOC). To keep abreast of the dynamic market, a detailed Integrated Asset Plan (IAP) was developed to drive optimization across the organization, which was facilitated through the in-house developed software “Well Inventory Data Entry” (WIDE). This comprehensive and integrated approach enabled centralization of all planned asset components for better well planning, enhancement of performance, and to facilitate continuous improvement through performance tracking and midterm forecasting. Traditionally, this was hard to achieve as, in the past, various legacy methods were used. This paper briefly describes the methods successfully adopted to meet the company’s objective. IAPs were initially designed using computerized spreadsheets. However, as data captured became more complex and the number of stakeholders requiring and updating this information grew, the need to automate the conventional spreadsheets became apparent. WIDE, existing in other aspects of the company (namely, the Workover Optimization project), was utilized to meet the dynamic requirements of the IAP cycle. With the growth of extensive features to enhance the planning process, the tool evolved into a centralized data-hub for all asset-groups and technical support functions to analyze and infer from, leading WIDE to become the reference two-year operational plan for the entire company. To achieve WIDE’s goal of operational efficiency, asset-groups continuously add their parameters in a series of predefined workflows that enable the creation of a structured process which allows risk factors to be flagged and helps mitigation of the same. This tool dictates assigned responsibilities for all stakeholders in a method that enables continuous updates for daily performance measures and operational use. The reliable availability of WIDE, combined with its user-friendliness and easy accessibility, created a platform of cross-functionality amongst all asset-groups and technical support groups to update contents of their respective planning parameters. The home-grown entity was implemented across the entire company and tailored to feed in internal processes of several stakeholders across the company. Furthermore, the implementation of change management and root cause analysis techniques captured the dysfunctionality of previous plans, which in turn resulted in the improvement of already existing mechanisms of planning within the IAP. The detailed elucidation of the 2 year plan flagged any upcoming risks and shortfalls foreseen in the plan. All results were translated into a series of developments that propelled the tool’s capabilities beyond planning and into operations (such as Asset Production Forecasts, setting KPIs, and estimating operational needs). This process exemplifies the ability and reach of applying advanced development techniques to seamlessly integrated the planning parameters of various assets and technical support groups. These techniques enables the enhancement of integrating planning data workflows that ultimately lay the founding plans towards an epoch of accuracy and reliability. As such, benchmarks of establishing a set of standard goals are created to ensure the constant improvement of the efficiency of the entire planning and operational structure.Keywords: automation, integration, value, communication
Procedia PDF Downloads 14619126 The Application of Patterned Injuries in Reconstruction of Motorcycle Accidents
Authors: Chun-Liang Wu, Kai-Ping Shaw, Cheng-Ping Yu, Wu-Chien Chien, Hsiao-Ting Chen, Shao-Huang Wu
Abstract:
Objective: This study analyzed three criminal judicial cases. We applied the patterned injuries of the rider to demonstrate the facts of each accident, reconstruct the scenes, and pursue the truth. Methods: Case analysis, a method that collects evidence and reasons the results in judicial procedures, then the importance of the pattern of injury as evidence will be compared and evaluated. The patterned injuries analysis method is to compare the collision situation between an object and human body injuries to determine whether the characteristics can reproduce the unique pattern of injury. Result: Case 1: Two motorcycles, A and B, head-on collided; rider A dead, and rider B was accused. During the prosecutor’s investigation, the defendant learned that rider A had an 80 mm open wound on his neck. During the court trial, the defendant requested copies of the case file and found out that rider A had a large contusion on his chest wall, and the cause of death was traumatic hemothorax and abdominal wall contusion. The defendant compared all the evidence at the scene and determined that the injury was obviously not caused by the collision of the body or the motorcycle of rider B but that rider was out of control and injured himself when he crossed the double yellow line. In this case, the defendant was innocent in the High Court judgment in April 2022. Case 2: Motorcycles C and D head-on crashed, and rider C died of massive abdominal bleeding. The prosecutor decided that rider C was driving under the influence (DUI), but rider D was negligent and sued rider D. The defendant requested the copies’ file and found the special phenomenon that the front wheel of motorcycle C was turned left. The defendant’s injuries were a left facial bone fracture, a left femur fracture, and other injuries on the left side. The injuries were of human-vehicle separation and human-vehicle collision, which proved that rider C suddenly turned left when the two motorcycles approached, knocked down motorcycle D, and the defendant flew forward. Case 3: Motorcycle E and F’s rear end collided, the front rider E was sentenced to 3 months, and the rear rider F sued rider E for more than 7 million N.T. The defendant found in the copies’ file that the injury of rider F was the left tibial platform fracture, etc., and then proved that rider F made the collision with his left knee, causing motorcycle E to fall out of control. This evidence was accepted by the court and is still on trial. Conclusion: The application of patterned injuries in the reconstruction of a motorcycle accident could discover the truth and provide the basis for judicial justice. The cases and methods could be the reference for the policy of preventing traffic accident casualties.Keywords: judicial evidence, patterned injuries analysis, accident reconstruction, fatal motorcycle injuries
Procedia PDF Downloads 8519125 Literature as a Strategic Tool to Conscientise Africans: An Attempt by Postcolonial Writers and Critics to Reverse the Socio-Economics Imbalances of Colonialism
Authors: Lutendo Nendauni
Abstract:
Colonialism breaks things, colonisers exploded native cultural solidarity, producing the spiritual confusion, psychic wounding, and economic exploitation of a new and dominated ‘other’. Colonialism as the cultural and economic exploitation began when the West defended in their seizure of foreign territories for the exploitation of its natural resources; this resulted in brutal socio-economic imbalances. The Western profited at the detriment of the weak Africa. However, colonialism has since passed, but the effects are still evident culturally, socially, and economically. This paper explored how postcolonial writers and critics attempt to reverse the socio-economic imbalances resulting from the fragmentation of colonialism, with a focus on the play 'I will Marry When I Want' by Ngugi wa Thiong’o and Ngugi wa Mirii, as a primary text. Using qualitative discourse-textual analysis as the research methodology, the researcher purposively extracts discourse segments from the text for analysis and interpretation. The findings reveal that Postcolonial critics and writers attempt to reverse the socio-economic effects of colonialism through various counter discourses; their literature is concerned with the destruction of colonised identity, the search for this identity, and its assertion. It is manifest in the text that writers offer corrective views about Africans; they stress that they write their literary texts to conscientise their fellow Africans. Postcolonial writers and critics argue that language is a carrier of culture and that the only way to break free from colonial influence is by not adopting a foreign language. They further through their poems, novels, plays, and music strategically shine the spotlight on the previously nameless and destitute people so that they can develop the human spirit’s desire to overcome defeat, socio-political deprivation, and isolation.Keywords: colonialism, postcoloniality, critics, socio-economic imbalances
Procedia PDF Downloads 15719124 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria
Authors: K. Alese Boniface, K. Adu Michael
Abstract:
Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)
Procedia PDF Downloads 27919123 Gas Flow, Time, Distance Dynamic Modelling
Authors: A. Abdul-Ameer
Abstract:
The equations governing the distance, pressure- volume flow relationships for the pipeline transportation of gaseous mixtures, are considered. A derivation based on differential calculus, for an element of this system model, is addressed. Solutions, yielding the input- output response following pressure changes, are reviewed. The technical problems associated with these analytical results are identified. Procedures resolving these difficulties providing thereby an attractive, simple, analysis route are outlined. Computed responses, validating thereby calculated predictions, are presented.Keywords: pressure, distance, flow, dissipation, models
Procedia PDF Downloads 47319122 A Technical-Economical Study of a New Solar Tray Distillator
Authors: Abderrahmane Diaf, Assia Cherfa, Lamia Karadaniz
Abstract:
Multiple tray solar distillation offers an interesting alternative for small-scale desalination and production high quality distilled water at a competitive cost using solar energy. In this work, we present indoor/outdoor trial performance data of our multiple tray solar distillation as well as the results of cost estimation analysis.Keywords: solar desalination, tray distillation, multi-étages solaire, solar distillation
Procedia PDF Downloads 42519121 The Effect of the Internal Organization Communications' Effectiveness through Employee's Performance of Faculty of Management Science, Suan Sunandha Rajabhat University
Authors: Malaiphan Pansap, Surasit Vithayarat
Abstract:
The purpose of this study was to study the relationship between internal organization communications’ effectiveness and employee’s performance of Faculty of Management Science, Suan Sunandha Rajabhat University. Study on solutions of communication were carried out within the organization. Questionnaire was used to collect information from 136 people of staff and instructor and data were analyzed by using frequency, percentage, mean and standard deviation and then data processing statistic programs. The result found that organization communication that affects their employee’s performance is sender which lack the skills for speaking and writing to convince audiences ready before taking message and the message which organizations are not always informed. The employees believe the behavior of good organization communication has a positive impact on the development of organization because the employees feel involved and be a part of the organization, by the cooperation in working to achieve the goal, the employees can work in the same direction and meet goal quickly.Keywords: employee’s performance, faculty of management science, internal organization communications’ effectiveness, management accounting, Suan Sunandha Rajabhat University
Procedia PDF Downloads 23919120 Effect of Problem Based Learning (PBL) Activities to Thai Undergraduate Student Teachers Attitude and Their Achievement
Authors: Thanawit Tongmai, Chatchawan Saewor
Abstract:
Learning management is very important for students’ development. To promote students’ potential, the teacher should design appropriate learning activity that brings their students potential out. Problem based learning has been using worldwide and it has presented numerous of success. This research aims to study third year students’ attitude and their achievement in scientific research course. To find the results, mix method was used to design research conduction. The researcher used PBL and reflection activity in the class. The students had to choose a topic, reviewed information, designed experimental, wrote academic report and presented their research by themselves. The researcher was only a facilitator. Reflection activity was used to progressing and consulting their research. The data was collected along with research conduction by questionnaire and test, including attitude, opinion and their achievement. The result of this study showed that 74.71% from all of students (n = 87) benefited from PBL and reflection activity, while 25.19% were just satisfied. 100% of students had a positive reflection toward PBL activity and they believed that PBL was the best pedagogy method for scientific research course. The achievements of these students were higher than the previous study (P < 0.05). The student’s learning achievement, A, B+ and B, was 48.28, 28.74 and 22.98% respectively. Therefore, it can conclude that PBL activity is appropriate for scientific research course and it can also promote student’s achievement.Keywords: reflection, attitude, learning, achievement, PBL
Procedia PDF Downloads 28119119 Determination of Cyanotoxins from Leeukraal and Klipvoor Dams
Authors: Moletsane Makgotso, Mogakabe Elijah, Marrengane Zinhle
Abstract:
South Africa’s water resources quality is becoming more and more weakened by eutrophication, which deteriorates its usability. Thirty five percent of fresh water resources are eutrophic to hypertrophic, including grossly-enriched reservoirs that go beyond the globally-accepted definition of hypertrophy. Failing infrastructure adds to the problem of contaminated urban runoff which encompasses an important fraction of flows to inland reservoirs, particularly in the non-coastal, economic heartland of the country. Eutrophication threatens the provision of potable and irrigation water in the country because of the dependence on fresh water resources. Eutrophicated water reservoirs increase water treatment costs, leads to unsuitability for recreational purposes and health risks to human and animal livelihood due to algal proliferation. Eutrophication is caused by high concentrations of phosphorus and nitrogen in water bodies. In South Africa, Microsystis and Anabaena are widely distributed cyanobacteria, with Microcystis being the most dominant bloom-forming cyanobacterial species associated with toxin production. Two impoundments were selected, namely the Klipvoor and Leeukraal dams as they are mainly used for fishing, recreational, agricultural and to some extent, potable water purposes. The total oxidized nitrogen and total phosphorus concentration were determined as causative nutrients for eutrophication. Chlorophyll a and total microcystins, as well as the identification of cyanobacteria was conducted as indicators of cyanobacterial infestation. The orthophosphate concentration was determined by subjecting the samples to digestion and filtration followed by spectrophotometric analysis of total phosphates and dissolved phosphates using Aquakem kits. The total oxidized nitrates analysis was conducted by initially conducting filtration followed by spectrophotometric analysis. Chlorophyll a was quantified spectrophotometrically by measuring the absorbance of before and after acidification. Microcystins were detected using the Quantiplate Microcystin Kit, as well as microscopic identification of cyanobacterial species. The Klipvoor dam was found to be hypertrophic throughout the study period as the mean Chlorophyll a concentration was 269.4µg/l which exceeds the mean value for the hypertrophic state. The mean Total Phosphorus concentration was >0.130mg/l, and the total microcystin concentration was > 2.5µg/l throughout the study. The most predominant algal species were found to be the Microcystis. The Leeukraal dam was found to be mesotrophic with the potential of it becoming eutrophic as the mean concentration for chlorophyll a was 18.49 µg/l with the mean Total Phosphorus > 0.130mg/l and the Total Microcystin concentration < 0.16µg/l. The cyanobacterial species identified in Leeukraal have been classified as those that do not pose a potential risk to any impoundment. Microcystis was present throughout the sampling period and dominant during the warmer seasons. The high nutrient concentrations led to the dominance of Microcystis that resulted in high levels of microcystins rendering the impoundments, particularly Klipvoor undesirable for utilisation.Keywords: nitrogen, phosphorus, cyanobacteria, microcystins
Procedia PDF Downloads 28719118 Subjective Quality Assessment for Impaired Videos with Varying Spatial and Temporal Information
Authors: Muhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin
Abstract:
The new era of digital communication has brought up many challenges that network operators need to overcome. The high demand of mobile data rates require improved networks, which is a challenge for the operators in terms of maintaining the quality of experience (QoE) for their consumers. In live video transmission, there is a sheer need for live surveillance of the videos in order to maintain the quality of the network. For this purpose objective algorithms are employed to monitor the quality of the videos that are transmitted over a network. In order to test these objective algorithms, subjective quality assessment of the streamed videos is required, as the human eye is the best source of perceptual assessment. In this paper we have conducted subjective evaluation of videos with varying spatial and temporal impairments. These videos were impaired with frame freezing distortions so that the impact of frame freezing on the quality of experience could be studied. We present subjective Mean Opinion Score (MOS) for these videos that can be used for fine tuning the objective algorithms for video quality assessment.Keywords: frame freezing, mean opinion score, objective assessment, subjective evaluation
Procedia PDF Downloads 49419117 Swahili Codification of Emotions: A Cognitive Linguistic Analysis
Authors: Rosanna Tramutoli
Abstract:
Studies on several languages have demonstrated how different emotions are categorized in various linguistic constructions. It exists in several writings on the codification of emotions in Western African languages. A recent study on the semantic description of Swahili body terminology has demonstrated that body part terms, such as moyo (heart), uso (face) and jicho (eye) are involved in several metaphorical expressions describing emotions. However, so far hardly anything has been written on the linguistic description of emotions in Swahili. Thus, this study describes how emotional concepts, such as ‘love’ and ‘anger’ are codified in Swahili, in order to highlight common semantic and syntactic patterns, etymological sources and metaphorical expressions. The research seeks to answer a number of questions, such as which are the Swahili terms for ‘emotions’? Is there a distinction between ‘emotions’ and ‘feelings’? Which emotional lexical items have Bantu origin and which come from Arabic? Which metaphorical expressions/cognitive schemas are used to codify emotions? (e.g. kumpanda mtu kichwani, lit. ‘to climb on somebody’s head’, to make somebody feel angry, kushuka moyo, lit. ‘to be down the heart’, to feel discouraged, kumpa mtu moyo lit. ‘to give someone heart’, to encourage someone). Which body terms are involved as ‘containers/locus of emotions’? For instance, it has been shown that moyo (‘heart’) occurs as container of ‘love’ (e.g. kumtia mtu moyoni, lit. ‘to put somebody in the heart’, to love somebody very much) and ‘kindness’ (moyo wake ulijaa hisani, ‘his heart was filled with kindness’). The study also takes into account the syntactic patterns used to code emotions. For instance, when does the experiencer occur in subject position? (e.g. nina furaha, nimefurahi, ‘I am happy’) and when in object position (e.g. Huruma iliniingia moyoni, lit. ‘Pity entered me inside my heart’, ‘I felt pity’)? Data have been collected mostly through the analysis of Swahili digital corpora, containing different kinds of Swahili texts (e.g. novels, drama, political essays).Keywords: emotions, cognitive linguistics, metaphors, Swahili
Procedia PDF Downloads 56819116 Bayesian Estimation under Different Loss Functions Using Gamma Prior for the Case of Exponential Distribution
Authors: Md. Rashidul Hasan, Atikur Rahman Baizid
Abstract:
The Bayesian estimation approach is a non-classical estimation technique in statistical inference and is very useful in real world situation. The aim of this paper is to study the Bayes estimators of the parameter of exponential distribution under different loss functions and then compared among them as well as with the classical estimator named maximum likelihood estimator (MLE). In our real life, we always try to minimize the loss and we also want to gather some prior information (distribution) about the problem to solve it accurately. Here the gamma prior is used as the prior distribution of exponential distribution for finding the Bayes estimator. In our study, we also used different symmetric and asymmetric loss functions such as squared error loss function, quadratic loss function, modified linear exponential (MLINEX) loss function and non-linear exponential (NLINEX) loss function. Finally, mean square error (MSE) of the estimators are obtained and then presented graphically.Keywords: Bayes estimator, maximum likelihood estimator (MLE), modified linear exponential (MLINEX) loss function, Squared Error (SE) loss function, non-linear exponential (NLINEX) loss function
Procedia PDF Downloads 38419115 Development and Validation of Work Movement Task Analysis: Part 1
Authors: Mohd Zubairy Bin Shamsudin
Abstract:
Work-related Musculoskeletal Disorder (WMSDs) is one of the occupational health problems encountered by workers over the world. In Malaysia, there is increasing in trend over the years, particularly in the manufacturing sectors. Current method to observe workplace WMSDs is self-report questionnaire, observation and direct measurement. Observational method is most frequently used by the researcher and practitioner because of the simplified, quick and versatile when it applies to the worksite. However, there are some limitations identified e.g. some approach does not cover a wide spectrum of biomechanics activity and not sufficiently sensitive to assess the actual risks. This paper elucidates the development of Work Movement Task Analysis (WMTA), which is an observational tool for industrial practitioners’ especially untrained personnel to assess WMSDs risk factors and provide a basis for suitable intervention. First stage of the development protocol involved literature reviews, practitioner survey, tool validation and reliability. A total of six themes/comments were received in face validity stage. New revision of WMTA consisted of four sections of postural (neck, back, shoulder, arms, and legs) and associated risk factors; movement, load, coupling and basic environmental factors (lighting, noise, odorless, heat and slippery floor). For inter-rater reliability study shows substantial agreement among rater with K = 0.70. Meanwhile, WMTA validation shows significant association between WMTA score and self-reported pain or discomfort for the back, shoulder&arms and knee&legs with p<0.05. This tool is expected to provide new workplace ergonomic observational tool to assess WMSDs for the next stage of the case study.Keywords: assessment, biomechanics, musculoskeletal disorders, observational tools
Procedia PDF Downloads 46919114 CdS Quantum Dots as Fluorescent Probes for Detection of Naphthalene
Authors: Zhengyu Yan, Yan Yu, Jianqiu Chen
Abstract:
A novel sensing system has been designed for naphthalene detection based on the quenched fluorescence signal of CdS quantum dots. The fluorescence intensity of the system reduced significantly after adding CdS quantum dots to the water pollution model because of the fluorescent static quenching f mechanism. Herein, we have demonstrated the facile methodology can offer a convenient and low analysis cost with the recovery rate as 97.43%-103.2%, which has potential application prospect.Keywords: CdS quantum dots, modification, detection, naphthalene
Procedia PDF Downloads 49319113 Prevalence of Obesity in Kuwait: A Case Study among Kuwait University Students
Authors: Mohammad Alnasrallah, Muhammad Almatar
Abstract:
This study seeks to understand the relationship between the effect of geography and obesity prevalence among Kuwait University students. The sample involved 735 participants, 231 male, and 504 females, where there is a high percentage of them are overweight and obese. The percentage of overweight is 21% (BMI >25 - 30) while the percentage of obesity is 13.7% (BMI > 30). Both overweight and obese people account for 34.7%. In the study area, there are 327 fast food restaurants located in different places of in the urban area. This study uses the Geographic Information System to analyze the distribution of obesity and fast food restaurants. The study found that within half kilometers of fast food outlets, there are 33% of normal weight (BMI < 25), 30% of overweight while for the obese people there are 43 %, which shows that obesity is linked to the location of fast food restaurants. One of the significant tools that were used in this study hot and cold spots. The study found that areas of hot spots of fast food restaurants tend to be located in areas of hot spots of obese people. In conclusion, studying the prevalence of obesity from geographical perspective help to understand this public health issue and its relation to the effect of geography.Keywords: obesity prevalence, GIS, fast food, Kuwait
Procedia PDF Downloads 21519112 The Use of Digital Stories in the Development of Critical Literacy
Authors: Victoria Zenotz
Abstract:
For Fairclough (1989) critical literacy is a tool to enable readers and writers to build up meaning in discourse. More recently other authors (Leu et al., 2004) have included the new technology context in their definition of literacy. In their view being literate nowadays means to “successfully use and adapt to the rapidly changing information and communication technologies and contexts that continuously emerge in our world and influence all areas of our personal and professional lives.” (Leu et al., 2004: 1570). In this presentation the concept of critical literacy will be related to the creation of digital stories. In the first part of the presentation concepts such as literacy and critical literacy are examined. We consider that real social practices will help learners may improve their literacy level. Accordingly, we show some research, which was conducted at a secondary school in the north of Spain (2013-2014), to illustrate how the “writing” of digital stories may contribute to the development of critical literacy. The use of several instruments allowed the collection of data at the different stages of their creative process including watching and commenting models for digital stories, planning a storyboard, creating and selecting images, adding voices and background sounds, editing and sharing the final product. The results offer some valuable insights into learners’ literacy progress.Keywords: literacy, computer assisted language learning, esl
Procedia PDF Downloads 39919111 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 18519110 Safeguarding the Construction Industry: Interrogating and Mitigating Emerging Risks from AI in Construction
Authors: Abdelrhman Elagez, Rolla Monib
Abstract:
This empirical study investigates the observed risks associated with adopting Artificial Intelligence (AI) technologies in the construction industry and proposes potential mitigation strategies. While AI has transformed several industries, the construction industry is slowly adopting advanced technologies like AI, introducing new risks that lack critical analysis in the current literature. A comprehensive literature review identified a research gap, highlighting the lack of critical analysis of risks and the need for a framework to measure and mitigate the risks of AI implementation in the construction industry. Consequently, an online survey was conducted with 24 project managers and construction professionals, possessing experience ranging from 1 to 30 years (with an average of 6.38 years), to gather industry perspectives and concerns relating to AI integration. The survey results yielded several significant findings. Firstly, respondents exhibited a moderate level of familiarity (66.67%) with AI technologies, while the industry's readiness for AI deployment and current usage rates remained low at 2.72 out of 5. Secondly, the top-ranked barriers to AI adoption were identified as lack of awareness, insufficient knowledge and skills, data quality concerns, high implementation costs, absence of prior case studies, and the uncertainty of outcomes. Thirdly, the most significant risks associated with AI use in construction were perceived to be a lack of human control (decision-making), accountability, algorithm bias, data security/privacy, and lack of legislation and regulations. Additionally, the participants acknowledged the value of factors such as education, training, organizational support, and communication in facilitating AI integration within the industry. These findings emphasize the necessity for tailored risk assessment frameworks, guidelines, and governance principles to address the identified risks and promote the responsible adoption of AI technologies in the construction sector.Keywords: risk management, construction, artificial intelligence, technology
Procedia PDF Downloads 9919109 The Subjective Experiences of First-Time Chinese Parents' Transition to Parenthood and the Impact on Their Marital Satisfaction
Authors: Amy Yee Kai Wan
Abstract:
The arrival of a new baby to first-time parents is an exciting and joyous occasion, yet, the daunting task of raising the baby and the uncertainty of how it will affect the lives of the couple present a great challenge to them. This study examines the causes of conflicts and needs of the new parents through a qualitative research of five pairs of new parents in Hong Kong. Semi-structured in-depth qualitative interviews were conducted to explore the changes babies brought to their marriages, sources of support they received and found important and assistance they felt would help with their transition to parenthood. Thematic analysis was used to analyze the commonalities and differences between the five couples’ subjective experiences. Narrative analysis was used to compare the experiences of two parents who are the under-functioning parent of the couple, to study the different strategies they employed in response to the over-functioning parent and to analyze how the marital relationships were affected. Four main themes emerged from the study: 1) Change and adjustment in marital relationship, 2) parents’ level of involvement, 3) support in childcaring, and 4) challenges faced by the parents. Results from the study indicated that father involvement in childcaring is an important element in mother’s marital satisfaction Father’s marital satisfaction is dependent upon the mother – her satisfaction with father involvement, which affects the mother’s marital satisfaction. Marital convergence and co-parenting alliance acted as moderators for marital satisfaction. Implications from the study include: i) offering programmes that improve couple relationship and enhance parenting efficacy in tandem to improve overall marital satisfaction, and ii) offering prenatal counselling services or provide education to new parents from prenatal to postnatal period that can help couples reduce discrepancies between expectations and realities of their marital relationship and parenting responsibilities after their baby is born.Keywords: co-parenting alliance, father involvement, marital convergence, maternal gatekeeping, new parents, transition to parenthood
Procedia PDF Downloads 15119108 Histomorphological Comparisons of Liver of Broiler Chickens and Wild Boar in Algeria
Authors: Khenenou Tarek
Abstract:
Aim: The objective of present study was to compare the normal macro and microscopic appearance of the liver in two very different species, one is an omnivorous mammal; the wild boar and the other belongs to the family of poultry; broiler chicken from the region of Bouhmama (Khenchela). Materials and methods: Eight broilers (58 days of age) and eight wild boars were included in the experiment to obtain information about the morpho-histological appearances of liver in two species. Results: There is a big difference in the liver appearance between the two species, in the wild boar it is of firm consistency with a tiger aspect and divided into four lobes, whereas in the broiler, the liver is brown and sometimes pale during the first 10-14 days, so it was divided into two lobes. Concerning the liver parenchyma, we used the Russian LOMBO MBS-10 stereo microscope, our results showed that the liver parenchyma was well developed in wild boar than in broiler chickens whereas, in broiler chickens; an excessive development of the sinus; the latter were less developed in the wild boar. Conclusion: The macroscopic observation showed a marked difference in liver between the two species. The microscopic examination of liver showed that the parenchyma is less pronounced in broilers whereas the sinuses were highly developed in the wild boar.Keywords: broiler chicken, liver, macro and microscopic appearances, wild boar, Algeria
Procedia PDF Downloads 2119107 Theoretical Comparisons and Empirical Illustration of Malmquist, Hicks–Moorsteen, and Luenberger Productivity Indices
Authors: Fatemeh Abbasi, Sahand Daneshvar
Abstract:
Productivity is one of the essential goals of companies to improve performance, which as a strategy-oriented method, determines the basis of the company's economic growth. The history of productivity goes back centuries, but most researchers defined productivity as the relationship between a product and the factors used in production in the early twentieth century. Productivity as the optimal use of available resources means that "more output using less input" can increase companies' economic growth and prosperity capacity. Also, having a quality life based on economic progress depends on productivity growth in that society. Therefore, productivity is a national priority for any developed country. There are several methods for calculating productivity growth measurements that can be divided into parametric and non-parametric methods. Parametric methods rely on the existence of a function in their hypotheses, while non-parametric methods do not require a function based on empirical evidence. One of the most popular non-parametric methods is Data Envelopment Analysis (DEA), which measures changes in productivity over time. The DEA evaluates the productivity of decision-making units (DMUs) based on mathematical models. This method uses multiple inputs and outputs to compare the productivity of similar DMUs such as banks, government agencies, companies, airports, Etc. Non-parametric methods are themselves divided into the frontier and non frontier approaches. The Malmquist productivity index (MPI) proposed by Caves, Christensen, and Diewert (1982), the Hicks–Moorsteen productivity index (HMPI) proposed by Bjurek (1996), or the Luenberger productivity indicator (LPI) proposed by Chambers (2002) are powerful tools for measuring productivity changes over time. This study will compare the Malmquist, Hicks–Moorsteen, and Luenberger indices theoretically and empirically based on DEA models and review their strengths and weaknesses.Keywords: data envelopment analysis, Hicks–Moorsteen productivity index, Leuenberger productivity indicator, malmquist productivity index
Procedia PDF Downloads 19419106 Moving beyond the Social Model of Disability by Engaging in Anti-Oppressive Social Work Practice
Authors: Irene Carter, Roy Hanes, Judy MacDonald
Abstract:
Considering that disability is universal and people with disabilities are part of all societies; that there is a connection between the disabled individual and the societal; and that it is society and social arrangements that disable people with impairments, contemporary disability discourse emphasizes the social model of disability to counter medical and rehabilitative models of disability. However, the social model does not go far enough in addressing the issues of oppression and inclusion. The authors indicate that the social model does not specifically or adequately denote the oppression of persons with disabilities, which is a central component of progressive social work practice with people with disabilities. The social model of disability does not go far enough in deconstructing disability and offering social workers, as well as people with disabilities a way of moving forward in terms of practice anchored in individual, familial and societal change. The social model of disability is expanded by incorporating principles of anti-oppression social work practice. Although the contextual analysis of the social model of disability is an important component there remains a need for social workers to provide service to individuals and their families, which will be illustrated through anti-oppressive practice (AOP). By applying an anti-oppressive model of practice to the above definitions, the authors not only deconstruct disability paradigms but illustrate how AOP offers a framework for social workers to engage with people with disabilities at the individual, familial and community levels of practice, promoting an emancipatory focus in working with people with disabilities. An anti- social- oppression social work model of disability connects the day-to-day hardships of people with disabilities to the direct consequence of oppression in the form of ableism. AOP theory finds many of its basic concepts within social-oppression theory and the social model of disability. It is often the case that practitioners, including social workers and psychologists, define people with disabilities’ as having or being a problem with the focus placed upon adjustment and coping. A case example will be used to illustrate how an AOP paradigm offers social work a more comprehensive and critical analysis and practice model for social work practice with and for people with disabilities than the traditional medical model, rehabilitative and social model approaches.Keywords: anti-oppressive practice, disability, people with disabilities, social model of disability
Procedia PDF Downloads 108419105 Effects, Causes, and Prevention of Teen Dating Violence
Authors: Isabel Jones
Abstract:
As adolescence is a formative time, experiences during adolescence often affect the rest of one’s life. Therefore, dating, specifically violence in dating, can have lasting effects on the rest of one’s life. In order to find sources, searches were conducted on PsycINFO, specifically EBSCO, and narrowed down under the criteria that the source contained information about adolescent dating violence rather than adult, and focused on causes, effects, or prevention methods. This literature review examines research regarding the effects and causes of TDV, and then what methods are effective in the prevention of TDV development. This will allow for a clear image of how these prevention methods are effective and why they are important. Effects of TDV extend beyond the physical, including psychological and sexual long-lasting effects. These are caused by a number of concepts, including learned behavior, inhibitory issues/substance abuse, and cultural factors. When both of these are taken into account, preventative measures such as school-based interventions, parental/adult monitoring, and the presence of positive family examples are more clear as to their effectiveness. This literature review may provide further awareness to this public health crisis and give the public a view of how adolescents are affected by TDV on their path from child to adult.Keywords: adolescence, dating violence, risk factors, predictors, relationship
Procedia PDF Downloads 6819104 Opportunities for Effective Conflict Management Caused by Global Crises
Authors: Marine Kobalava
Abstract:
The article analyzes current global crises in the world, explains the causes of crises, substantiates that in the main cases the process accompanying the crisis are conflict situations. The paper argues that crises can become predictable if threats are identified and addressed by a company, organization, corporation, and others. Accordingly, mechanisms for the neutralization of conflict potential are proposed, the need to develop a communication strategy and create and redistribute information flows is justified. Conflict situations are assessed according to the types of crisis and it is considered that the conflict can become a prerequisite for the crisis. The paper substantiates the need to differentiate theories of crises and conflicts. Based on the evaluative judgment, conflict management measures are proposed taking into account institutionalization, conflict resolution norms and rules. The paper identifies the potential for conflicts created in the context of global crises and suggests local ways and mechanisms for their effective management. The involvement of the company's Public relations (PR) and relevant communication from the qualified staff is considered important. Conclusions are drawn on the problems of effective conflict management caused by global crises and recommendations for conflict resolution have been proposed.Keywords: global crises, conflict situations, conflict identification, conflict management, conflict potential
Procedia PDF Downloads 14019103 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast
Authors: Sher Muhammad, Mirza Muhammad Waqar
Abstract:
It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID
Procedia PDF Downloads 36219102 Sizing and Thermal Analysis of Mechanically Pumped Fluid Loop Thermal Control Technique for Small Satellite Scientific Applications
Authors: Shanmugasundaram Selvadurai, Amal Chandran
Abstract:
Small satellites have become an alternative low-cost solution for several missions to accomplish specific missions such as Earth imaging, Technology demonstration, Education, and other commercial purposes. Small satellite missions focusing on Infrared imaging applications require lower temperature for scientific instruments and such low temperature can be achieved only using external cryocoolers but the disadvantage is that they generate a large amount of waste heat. Existing passive thermal control techniques are not capable to handle such large thermal loads and hence one of the traditional active Thermal Control System (TCS) is studied for a small satellite configuration. This work aims to downscale the existing Mechanically Pumped Fluid Loop (MPFL) TCS to a 27U CubeSat platform for an imaginary scientific instrument. The temperature-sensitive detector in the instrument considered to be maintained between 130K and 150K to reduce dark current noise and increase the data quality. A Single-Phase fluid based MPFL is chosen for this system-level study and this TCS consists of a microfluid pump, a micro-cryocooler, a fluid accumulator, external heaters, flow regulators, and sensors. This work also explains the thermal control system architecture with a conceptual design, arrangement of all the components, and thermal analysis for different low orbit conditions. Sizing and extensive trade studies for the components are conducted and the results have shown that the Single-phase MPFL system is able to handle the given thermal loads and maintain the satellite’s interface temperature within the desired limit.Keywords: active thermal control system, satellite thermal, mechanically pumped fluid loop system, cryogenics, cryocooler
Procedia PDF Downloads 26119101 Energy Potential of Turkey and Evaluation of Solar Energy Technology as an Alternative Energy
Authors: Naci Büyükkaracığan, Murat Ahmet Ökmen
Abstract:
Emerging demand for energy in developing countries rapid population growth and industrialization are causing a rapid increase, such as Turkey. Energy is an important and indispensable factor in the industry. At the same time, energy is one of the main indicators that reflect a country's economic and social development potential. There is a linear relationship between the energy consumption and social development, and in parallel this situation, it is seen that energy consumption increase with economic growth and prosperity. In recent year’s, energy sources consumption is increasingly continuing, because of population growth and economy in Turkey. 80% of the energy used in Turkey is supplied from abroad. At the same time, while almost all of the energy obtained from our country is met by hydropower. Alternatively, studies of determining and using potential renewable energy sources such as solar energy have been realized for recent years. In this study, first of all, the situation of energy sources was examined in Turkey. Information of reserve/capacity, production and consumption values of energy sources were emphasized. For this purpose, energy production and consumption, CO2 emission and electricity energy consumption of countries were investigated. Energy consumption and electricity energy consumption per capita were comparatively analyzed.Keywords: energy potential, alternative energy sources, solar energy, Turkey
Procedia PDF Downloads 44019100 Latency-Based Motion Detection in Spiking Neural Networks
Authors: Mohammad Saleh Vahdatpour, Yanqing Zhang
Abstract:
Understanding the neural mechanisms underlying motion detection in the human visual system has long been a fascinating challenge in neuroscience and artificial intelligence. This paper presents a spiking neural network model inspired by the processing of motion information in the primate visual system, particularly focusing on the Middle Temporal (MT) area. In our study, we propose a multi-layer spiking neural network model to perform motion detection tasks, leveraging the idea that synaptic delays in neuronal communication are pivotal in motion perception. Synaptic delay, determined by factors like axon length and myelin insulation, affects the temporal order of input spikes, thereby encoding motion direction and speed. Overall, our spiking neural network model demonstrates the feasibility of capturing motion detection principles observed in the primate visual system. The combination of synaptic delays, learning mechanisms, and shared weights and delays in SMD provides a promising framework for motion perception in artificial systems, with potential applications in computer vision and robotics.Keywords: neural network, motion detection, signature detection, convolutional neural network
Procedia PDF Downloads 88