Search results for: nursing approaches
2898 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships
Authors: Martina Maria Keitsch
Abstract:
Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.Keywords: critical design, postmodern design theories, narratives, rhizome
Procedia PDF Downloads 1712897 Household Survey on Food Behaviors and Nutrition Status in Suburb of Thailand
Authors: P. Chonsin, N. Neelapaichit, N. Piaseu
Abstract:
This household survey aimed to describe food behaviors and nutritional status of households in suburb nearby Bangkok, Thailand. Through convenience sampling, sample included 187 food providers from 125 households in three communities. Data were collected by structured interview and nutritional assessment. Results revealed that majority of the sample were female (68.4 %), aged between 18 to 91 years. The households selected raw foods concerning quality as the first priority (46.5%), cooking for their family members as 91.2%, using seasonings as 71.2%. The most favorite tastes were sweet (19.8%), salty (20.3%), and fatty (1.6%). Food related health problems were hypertension (40.1%), diabetes (26.7%), and dyslipidemia (19.3%). Approximately half of the overall samples (55.1%) and the sample with hypertension (84.5%) had excessive body mass index (BMI). Moreover, one-fourth of the sample with hypertension (25.3%) had salty food preference. Results suggest approaches to promote behavioral modification for sodium reduction particularly in food providers of households with hypertension and excessive BMI.Keywords: food behavior, nutrition status, household, suburb
Procedia PDF Downloads 3932896 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2952895 Attention-based Adaptive Convolution with Progressive Learning in Speech Enhancement
Authors: Tian Lan, Yixiang Wang, Wenxin Tai, Yilan Lyu, Zufeng Wu
Abstract:
The monaural speech enhancement task in the time-frequencydomain has a myriad of approaches, with the stacked con-volutional neural network (CNN) demonstrating superiorability in feature extraction and selection. However, usingstacked single convolutions method limits feature represen-tation capability and generalization ability. In order to solvethe aforementioned problem, we propose an attention-basedadaptive convolutional network that integrates the multi-scale convolutional operations into a operation-specific blockvia input dependent attention to adapt to complex auditoryscenes. In addition, we introduce a two-stage progressivelearning method to enlarge the receptive field without a dra-matic increase in computation burden. We conduct a series ofexperiments based on the TIMIT corpus, and the experimen-tal results prove that our proposed model is better than thestate-of-art models on all metrics.Keywords: speech enhancement, adaptive convolu-tion, progressive learning, time-frequency domain
Procedia PDF Downloads 1222894 Application of the MOOD Technique to the Steady-State Euler Equations
Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère
Abstract:
The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.Keywords: Euler equations, finite volume, MOOD, steady-state
Procedia PDF Downloads 2772893 Data-Centric Anomaly Detection with Diffusion Models
Authors: Sheldon Liu, Gordon Wang, Lei Liu, Xuefeng Liu
Abstract:
Anomaly detection, also referred to as one-class classification, plays a crucial role in identifying product images that deviate from the expected distribution. This study introduces Data-centric Anomaly Detection with Diffusion Models (DCADDM), presenting a systematic strategy for data collection and further diversifying the data with image generation via diffusion models. The algorithm addresses data collection challenges in real-world scenarios and points toward data augmentation with the integration of generative AI capabilities. The paper explores the generation of normal images using diffusion models. The experiments demonstrate that with 30% of the original normal image size, modeling in an unsupervised setting with state-of-the-art approaches can achieve equivalent performances. With the addition of generated images via diffusion models (10% equivalence of the original dataset size), the proposed algorithm achieves better or equivalent anomaly localization performance.Keywords: diffusion models, anomaly detection, data-centric, generative AI
Procedia PDF Downloads 822892 The Estimation of Human Vital Signs Complexity
Authors: L. Bikulciene, E. Venskaityte, G. Jarusevicius
Abstract:
Non-stationary and nonlinear signals generated by living complex systems defy traditional mechanistic approaches, which are based on homeostasis. Previous our studies have shown that the evaluation of the interactions of physiological signals by using special analysis methods is suitable for observation of physiological processes. It is demonstrated the possibility of using deep physiological model, based interpretation of the changes of the human body’s functional states combined with an application of the analytical method based on matrix theory for the physiological signals analysis, which was applied on high risk cardiac patients. It is shown that evaluation of cardiac signals interactions show peculiar for each individual functional changes at the onset of hemodynamic restoration procedure. Therefore we suggest that the alterations of functional state of the body, after patients overcome surgery can be complemented by the data received from the suggested approach of the evaluation of functional variables interactions.Keywords: cardiac diseases, complex systems theory, ECG analysis, matrix analysis
Procedia PDF Downloads 3442891 A Review Article on Physical Therapy Methods for Children with Cerebral Palsy Rehabilitation
Authors: Andrew Anis Fakhrey Mosaad
Abstract:
Introduction: Children with cerebral palsy (CP) can be rehabilitated using a variety of methods and strategies, from traditional and conservative methods to more intricate motor learning-based theories such as sensory-motor integration and neurodevelopmental treatment. Method: Since sensory, cognitive, communication, perceptual, and/or behavioral abnormalities are often present alongside motor impairments in children with cerebral palsy, therapy approaches are tailored to each child's specific needs. Using evidence-based practices guarantees that kids make the most progress possible. Task-specific exercises and active engagement are the cornerstones of effective physical therapy regimens, which enhance motor recovery by potentially plasticizing the central nervous system (CNS). Conclusion: The goal of CP rehabilitation for kids is to improve their functional ability, gait, balance, and motor development. Presenting various methods frequently employed in the rehabilitation of children with cerebral palsy was the aim of this review.Keywords: children, cerebral palsy, rehabilitation, physical therapy
Procedia PDF Downloads 02890 Management of Organizational Behavior Utilizing Human Resources
Authors: Habab Ahmed Hassan Abuzeid
Abstract:
Organizations are social systems. If one wishes to work in them or to manage them, it is necessary to understand how they operate. Organizations combine science and people–technology and humanity. Unless we have qualified people to design and implement, techniques alone will not produce desirable results. Human behavior in organizations is rather unpredictable. It is unpredictable because it arises from people’s deep-seated needs and value systems. However, it can be partially understood in terms of the framework of behavioral science, management and other disciplines. There is no idealistic solution to organizational problems. All that can be done is to increase our understanding and skills so that human relations at work can be enhanced. In this paper, we consider management of organization behavior utilizing human resources. Study the elements of organization behavior, the effectiveness of mechanism to enhance staff relationships. Many approaches could be applied for healthy organizational environment, it’s highlighted more details in this paper. Organization behavior can raise the employees’ engagement, loyalty and commitment; to accomplish the goal.Keywords: environment, engagement, human resources, organization behavior
Procedia PDF Downloads 3642889 Structural Reliability Analysis Using Extreme Learning Machine
Authors: Mehul Srivastava, Sharma Tushar Ravikant, Mridul Krishn Mishra
Abstract:
In structural design, the evaluation of safety and probability failure of structure is of significant importance, mainly when the variables are random. On real structures, structural reliability can be evaluated obtaining an implicit limit state function. The structural reliability limit state function is obtained depending upon the statistically independent variables. In the analysis of reliability, we considered the statistically independent random variables to be the load intensity applied and the depth or height of the beam member considered. There are many approaches for structural reliability problems. In this paper Extreme Learning Machine technique and First Order Second Moment Method is used to determine the reliability indices for the same set of variables. The reliability index obtained using ELM is compared with the reliability index obtained using FOSM. Higher the reliability index, more feasible is the method to determine the reliability.Keywords: reliability, reliability index, statistically independent, extreme learning machine
Procedia PDF Downloads 6822888 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 872887 Dermatological Study on Risk Factors for Pruritic Skin: Skin Properties of Elderly
Authors: Dianis Wulan Sari, Takeo Minematsu, Mikako Yoshida, Hiromi Sanada
Abstract:
Introduction: Pruritus is diagnosed as itching without macroscopic abnormalities on skin. It is the most skin complaint of elderly people. In the present study, we conducted a dermatological study to examine the risk factors of pruritic skin and predicted how to prevent pruritus especially in the elderly population. Pruritus is caused several types of inflammation, including epidermal innate immunity based on keratinocyte responses and acquired immunity regulated by type 1 or 2 helper T (Th) cells. The triggers of pruritus differ among inflammation types, therefore we did separately assess the pruritus-associated factors of each inflammation type in an effort to contribute to the identification of intervention targets for preventing pruritus. Therefore, this study aimed to investigate the factors related with actual condition of pruritic skin by examine the skin properties. Method: This study was conducted in elderly population of Indonesian nursing home. Basic characteristics and behaviors were obtained by interview. The properties of pruritic skin were collected by examination of skin biomarker using skin blotting as novel method of non-invasive skin assessment method and examination of skin barrier function using stratum corneum hydration and skin pH. Result: The average age of participants was 74 years with independent status was 66.8%. Age (β = -0.130, p = 0.044), cumulative lifetime sun exposure (β = 0.145, p = 0.026), bathing duration (β = 0.151, p = 0.022), clothing change frequency (β = 0.135, p = 0.029), and clothing type (β = -0.139, p = 0.021) were risk factors of pruritic skin in multivariate analysis. Conclusion: Risk factors of pruritic skin in elderly population were caused by internal factors such as skin senescence and external factors such as sun exposure, hygiene care and skin care behavior.Keywords: aging, hygiene care, pruritus, skin care, sun exposure
Procedia PDF Downloads 2262886 Corporate Social Responsibility and Dividend Policy
Authors: Mohammed Benlemlih
Abstract:
Using a sample of 22,839 US firm-year observations over the 1991-2012 period, we find that high CSR firms pay more dividends than low CSR firms. The analysis of individual components of CSR provides strong support for this main finding: five of the six individual dimensions are also associated with high dividend payout. When analyzing the stability of dividend payout, our results show that socially irresponsible firms adjust dividends more rapidly than socially responsible firms do: dividend payout is more stable in high CSR firms. Additional results suggest that firms involved in two controversial activities -the military and alcohol - are associated with low dividend payouts. These findings are robust to alternative assumptions and model specifications, alternative measures of dividend, additional control, and several approaches to address endogeneity. Overall, our results are consistent with the expectation that high CSR firms may use dividend policy to manage the agency problems related to overinvestment in CSR.Keywords: corporate social responsibility, dividend policy, Lintner model, agency theory, signaling theory, dividend stability
Procedia PDF Downloads 2652885 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 1272884 A Collaborative Platform for Multilingual Ontology Development
Authors: Ahmed Tawfik, Fausto Giunchiglia, Vincenzo Maltese
Abstract:
Ontologies provide a common understanding of a specific domain of interest that can be communicated between people and used as background knowledge for automated reasoning in a wide range of applications. In this paper we address the design of multilingual ontologies following well-defined knowledge engineering methodologies with the support of novel collaborative development approaches. In particular, we present a collaborative platform which allows ontologies to be developed incrementally in multiple languages. This is made possible via an appropriate mapping between language independent concepts and one lexicalization per language (or a lexical gap in case such lexicalization does not exist). The collaborative platform has been designed to support the development of the Universal Knowledge Core, a multilingual ontology currently in English, Italian, Chinese, Mongolian, Hindi, and Bangladeshi. Its design follows a workflow-based development methodology that models resources as a set of collaborative objects and assigns customizable workflows to build and maintain each collaborative object in a community driven manner, with extensive support of modern web 2.0 social and collaborative features.Keywords: knowledge diversity, knowledge representation, ontology, development
Procedia PDF Downloads 3922883 Important Factors Affecting the Effectiveness of Quality Control Circles
Authors: Sogol Zarafshan
Abstract:
The present study aimed to identify important factors affecting the effectiveness of quality control circles in a hospital, as well as rank them using a combination of fuzzy VIKOR and Grey Relational Analysis (GRA). The study population consisted of five academic members and five experts in the field of nursing working in a hospital, who were selected using a purposive sampling method. Also, a sample of 107 nurses was selected through a simple random sampling method using their employee codes and the random-number table. The required data were collected using a researcher-made questionnaire which consisted of 12 factors. The validity of this questionnaire was confirmed through giving the opinions of experts and academic members who participated in the present study, as well as performing confirmatory factor analysis. Its reliability also was verified (α=0.796). The collected data were analyzed using SPSS 22.0 and LISREL 8.8, as well as VIKOR–GRA and IPA methods. The results of ranking the factors affecting the effectiveness of quality control circles showed that the highest and lowest ranks were related to ‘Managers’ and supervisors’ support’ and ‘Group leadership’. Also, the highest hospital performance was for factors such as ‘Clear goals and objectives’ and ‘Group cohesiveness and homogeneity’, and the lowest for ‘Reward system’ and ‘Feedback system’, respectively. The results showed that although ‘Training the members’, ‘Using the right tools’ and ‘Reward system’ were factors that were of great importance, the organization’s performance for these factors was poor. Therefore, these factors should be paid more attention by the studied hospital managers and should be improved as soon as possible.Keywords: Quality control circles, Fuzzy VIKOR, Grey Relational Analysis, Importance–Performance Analysis
Procedia PDF Downloads 1352882 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 1192881 Combining Instance-Based and Reasoning-Based Approaches for Ontology Matching
Authors: Abderrahmane Khiat, Moussa Benaissa
Abstract:
Due to the increasing number of sources of information available on the web and their distribution and heterogeneity, ontology alignment became a very important and inevitable problem to ensure semantic interoperability. Instance-based ontology alignment is based on the comparison of the extensions of concepts; and represents a very promising technique to find semantic correspondences between entities of different ontologies. In practice, two situations may arise: ontologies that share many common instances and ontologies that share few or do not share common instances. In this paper, we describe an approach to manage the latter case. This approach exploits the reasoning on ontologies in order to create a corpus of common instances. We show that it is theoretically powerful because it is based on description logics and very useful in practice. We present the experimental results obtained by running our approach on ontologies of OAEI 2012 benchmark test. The results show the performance of our approach.Keywords: description logic inference, instance-based ontology alignment, semantic interoperability, semantic web
Procedia PDF Downloads 4472880 Mobile Platform’s Attitude Determination Based on Smoothed GPS Code Data and Carrier-Phase Measurements
Authors: Mohamed Ramdani, Hassen Abdellaoui, Abdenour Boudrassen
Abstract:
Mobile platform’s attitude estimation approaches mainly based on combined positioning techniques and developed algorithms; which aim to reach a fast and accurate solution. In this work, we describe the design and the implementation of an attitude determination (AD) process, using only measurements from GPS sensors. The major issue is based on smoothed GPS code data using Hatch filter and raw carrier-phase measurements integrated into attitude algorithm based on vectors measurement using least squares (LSQ) estimation method. GPS dataset from a static experiment is used to investigate the effectiveness of the presented approach and consequently to check the accuracy of the attitude estimation algorithm. Attitude results from GPS multi-antenna over short baselines are introduced and analyzed. The 3D accuracy of estimated attitude parameters using smoothed measurements is over 0.27°.Keywords: attitude determination, GPS code data smoothing, hatch filter, carrier-phase measurements, least-squares attitude estimation
Procedia PDF Downloads 1552879 Mastering Digitization: A Quality-Adapted Digital Transformation Model
Authors: Franziska Schaefer, Marlene Kuhn, Heiner Otten
Abstract:
In the very near future, digitization will be the main challenge a company has to master to survive in a highly competitive market. Developing the right transformation strategy by considering all relevant aspects determines the success or failure of a company. Especially the digital focus on the customer plays a key role in creating sustainable competitive advantages, also leading to new tasks within the quality management. Therefore, quality management needs to be particularly addressed to support the upcoming digital change. In this paper, we present an analysis of existing digital transformation approaches and derive a transformation strategy from a quality management perspective. We identify and classify different transformation dimensions and assess their relevance to quality management tasks, resulting in a quality-adapted digital transformation model. Furthermore, we introduce applicable and customized quality management methods to support the presented digital transformation tasks. With our developed model we provide a digital transformation guideline from a quality perspective to master future disruptive changes.Keywords: digital transformation, digitization, quality management, strategy
Procedia PDF Downloads 4792878 A Survey of Feature Selection and Feature Extraction Techniques in Machine Learning
Authors: Samina Khalid, Shamila Nasreen
Abstract:
Dimensionality reduction as a preprocessing step to machine learning is effective in removing irrelevant and redundant data, increasing learning accuracy, and improving result comprehensibility. However, the recent increase of dimensionality of data poses a severe challenge to many existing feature selection and feature extraction methods with respect to efficiency and effectiveness. In the field of machine learning and pattern recognition, dimensionality reduction is important area, where many approaches have been proposed. In this paper, some widely used feature selection and feature extraction techniques have analyzed with the purpose of how effectively these techniques can be used to achieve high performance of learning algorithms that ultimately improves predictive accuracy of classifier. An endeavor to analyze dimensionality reduction techniques briefly with the purpose to investigate strengths and weaknesses of some widely used dimensionality reduction methods is presented.Keywords: age related macular degeneration, feature selection feature subset selection feature extraction/transformation, FSA’s, relief, correlation based method, PCA, ICA
Procedia PDF Downloads 4962877 Generalization of Zhou Fixed Point Theorem
Authors: Yu Lu
Abstract:
Fixed point theory is a basic tool for the study of the existence of Nash equilibria in game theory. This paper presents a significant generalization of the Veinott-Zhou fixed point theorem for increasing correspondences, which serves as an essential framework for investigating the existence of Nash equilibria in supermodular and quasisupermodular games. To establish our proofs, we explore different conceptions of multivalued increasingness and provide comprehensive results concerning the existence of the largest/least fixed point. We provide two distinct approaches to the proof, each offering unique insights and advantages. These advancements not only extend the applicability of the Veinott-Zhou theorem to a broader range of economic scenarios but also enhance the theoretical framework for analyzing equilibrium behavior in complex game-theoretic models. Our findings pave the way for future research in the development of more sophisticated models of economic behavior and strategic interaction.Keywords: fixed-point, Tarski’s fixed-point theorem, Nash equilibrium, supermodular game
Procedia PDF Downloads 552876 A Remedy for the Confusing Occlusal Principles - An Approach to a Passionate, In-Depth Understanding of Tooth Surfaces Dynamics
Authors: Kariem Elhelow
Abstract:
The task of optimizing teeth surface relations remains perplexing for many dental practitioners. The well-being of teeth, periodontium, and the musculoskeletal system is closely associated with occlusal stability. Dental occlusion is rather far beyond the simple contact of the occlusal surfaces of the opposite jaws, a fact that turned the word “Occlusion” into one of the most complicated puzzles in dentistry. The literature describing the pathological approaches made the practice of occlusion even more intimidating. Understanding the biomechanics of teeth and jaw movements makes the goals of occlusal rehabilitation very lively and simple to practice. The purpose of this article is to establish a path for understanding and practicing the fundamental occlusal principles in a simple yet in depth way. Relying of the evidence based core would deliver a context for showing that occlusion is not as complicated as literatures might reflect. Conclusion: Maintaining a well-defined picture of what a healthy occlusion should be like is very gratifying to both the operator and the patient, with added worth of predictability, esthetics, and function to the whole treatment.Keywords: occlusal, temporomandibular joint, prosthetic, dentition
Procedia PDF Downloads 1292875 Investigation of Stoneley Waves in Multilayered Plates
Authors: Bing Li, Tong Lu, Lei Qiang
Abstract:
Stoneley waves are interface waves that propagate at the interface between two solid media. In this study, the dispersion characteristics and wave structures of Stoneley waves in elastic multilayered plates are displayed and investigated. With a perspective of bulk wave, a reasonable assumption of the potential function forms of the expansion wave and shear wave in nth layer medium is adopted, and the characteristic equation of Stoneley waves in a three-layered plate is given in a determinant form. The dispersion curves and wave structures are solved and presented in both numerical and simulation results. It is observed that two Stoneley wave modes exist in a three-layered plate, that conspicuous dispersion occurs on low frequency band, that the velocity of each Stoneley wave mode approaches the corresponding Stoneley wave velocity at interface between two half infinite spaces. The wave structures reveal that the in-plane displacement of Stoneley waves are relatively high at interfaces, which shows great potential for interface defects detection.Keywords: characteristic equation, interface waves, potential function, Stoneley waves, wave structure
Procedia PDF Downloads 3192874 The Capability of Organizational Leadership: Development of Conceptual Framework
Authors: Kurmet Kivipõld, Maaja Vadi
Abstract:
Current paper develops the conceptual framework for organizational leadership capability. Organizational leadership here is understood as collective multi-level phenomenon which has been embedded into organizational processes as a capability at the level of the entire organization. The paper analyses and systematises the theo¬retical approaches to multi-level leadership in existing literature. This analysis marks the foundation of collective leadership at the organizational level, which forms the basis for the development of the conceptual framework of organi¬zational leadership capability. The developed conceptual framework of organiza¬tional leadership capability is formed from the synthesis of the three groups of base theories – traditional leadership theories, the resource-based view from strategic management and complexity theory from system theories. These conceptual sources present the main characteristics that determine the nature of organizational leadership capability and are the basis for its mea¬surement.Keywords: leadership, organizational capability, organizational leadership, resource-based view, system theory
Procedia PDF Downloads 3502873 Solution Approaches for Some Scheduling Problems with Learning Effect and Job Dependent Delivery Times
Authors: M. Duran Toksari, Berrin Ucarkus
Abstract:
In this paper, we propose two algorithms to optimally solve makespan and total completion time scheduling problems with learning effect and job dependent delivery times in a single machine environment. The delivery time is the extra time to eliminate adverse effect between the main processing and delivery to the customer. In this paper, we introduce the job dependent delivery times for some single machine scheduling problems with position dependent learning effect, which are makespan are total completion. The results with respect to two algorithms proposed for solving of the each problem are compared with LINGO solutions for 50-jobs, 100-jobs and 150-jobs problems. The proposed algorithms can find the same results in shorter time.Keywords: delivery Times, learning effect, makespan, scheduling, total completion time
Procedia PDF Downloads 4692872 Using the Transtheoretical Model to Investigate Stages of Change in Regular Volunteer Service among Seniors in Community
Authors: Pei-Ti Hsu, I-Ju Chen, Jeu-Jung Chen, Cheng-Fen Chang, Shiu-Yan Yang
Abstract:
Taiwan now is an aging society Research on the elderly should not be confined to caring for seniors, but should also be focused on ways to improve health and the quality of life. Senior citizens who participate in volunteer services could become less lonely, have new growth opportunities, and regain a sense of accomplishment. Thus, the question of how to get the elderly to participate in volunteer service is worth exploring. Apply the Transtheoretical Model to understand stages of change in regular volunteer service and voluntary service behaviour among the seniors. 1525 adults over the age of 65 from the Renai district of Keelung City were interviewed. The research tool was a self-constructed questionnaire and individual interviews were conducted to collect data. Then the data was processed and analyzed using the IBM SPSS Statistics 20 (Windows version) statistical software program. In the past six months, research subjects averaged 9.92 days of volunteer services. A majority of these elderly individuals had no intention to change their regular volunteer services. We discovered that during the maintenance stage, the self-efficacy for volunteer services was higher than during all other stages, but self-perceived barriers were less during the preparation stage and action stage. Self-perceived benefits were found to have an important predictive power for those with regular volunteer service behaviors in the previous stage, and self-efficacy was found to have an important predictive power for those with regular volunteer service behaviors in later stages. The research results support the conclusion that community nursing staff should group elders based on their regular volunteer services change stages and design appropriate behavioral change strategies.Keywords: seniors, stages of change in regular volunteer services, volunteer service behavior, self-efficacy, self-perceived benefits
Procedia PDF Downloads 4262871 Communication of Sensors in Clustering for Wireless Sensor Networks
Authors: Kashish Sareen, Jatinder Singh Bal
Abstract:
The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.Keywords: clustering, DLCC, MLCC, wireless sensor networks
Procedia PDF Downloads 4812870 Resilience and Renewal: Sustainable Tourism Development in Post-Earthquake Marrakech-El Haouz
Authors: Oumayma Hilal
Abstract:
The devastating earthquake in Marrakech-El Haouz in September 2023 underscores the critical need for sustainable tourism practices. This study proposes innovative approaches to territory tourism, prioritizing resilient and sustainable development to aid recovery and empower local communities. Using a mixed-methods approach, the research evaluates post-earthquake tourism impacts, gathers local perspectives, and benchmarks global models for disaster recovery through tourism. The paper aims to offer practical, community-centric tourism initiatives, integrated with strategic communication strategies, to enhance socio-economic welfare and ensure long-term resilience. The findings are expected to contribute significantly to sustainable tourism literature in post-disaster contexts and provide actionable strategies for the revitalization of the Marrakech-El Haouz region.Keywords: sustainable tourism, community development, Marrakech El Haouz, communication strategies, territory tourism, sustainable tourism, community development
Procedia PDF Downloads 552869 Antimicrobial Activity of the Cyanobacteria spp. against Fish Pathogens in Aquaculture
Authors: I. Tulay Cagatay
Abstract:
Blue-green microalgae cyanobacteria, which are important photosynthetic organisms of aquatic ecosystems, are the primary sources of many bioactive compounds such as proteins, carbohydrates, lipids, vitamins and enzymes that can be used as antimicrobial and antiviral agents. Some of these organisms are nowadays used directly in the food, cosmetic and pharmaceutical industry, or in aquaculture and biotechnological approaches like biofuel or drug therapy. Finding the effective, environmental friendly chemotropic and antimicrobial agents to control fish pathogens are crucial in a country like Turkey which has a production capacity of about 240 thousand tons of cultured fish and has 2377 production farms and which is the second biggest producer in Europe. In our study, we tested the antimicrobial activity of cyanobacterium spp. against some fish pathogens Aeromonas hydrophila and Yersinia ruckeri that are important pathogens for rainbow trout farms. Agar disk diffusion test method was used for studying antimicrobial activity on pathogens. Both tested microorganisms have shown antimicrobial activity positively as the inhibition zones were 0.45 mm and 0.40 mm respectively.Keywords: fish pathogen, cyanobacteria, antimicrobial activity, trout
Procedia PDF Downloads 166