Search results for: self organization feature map
2137 Automatic Lead Qualification with Opinion Mining in Customer Relationship Management Projects
Authors: Victor Radich, Tania Basso, Regina Moraes
Abstract:
Lead qualification is one of the main procedures in Customer Relationship Management (CRM) projects. Its main goal is to identify potential consumers who have the ideal characteristics to establish a profitable and long-term relationship with a certain organization. Social networks can be an important source of data for identifying and qualifying leads since interest in specific products or services can be identified from the users’ expressed feelings of (dis)satisfaction. In this context, this work proposes the use of machine learning techniques and sentiment analysis as an extra step in the lead qualification process in order to improve it. In addition to machine learning models, sentiment analysis or opinion mining can be used to understand the evaluation that the user makes of a particular service, product, or brand. The results obtained so far have shown that it is possible to extract data from social networks and combine the techniques for a more complete classification.Keywords: lead qualification, sentiment analysis, opinion mining, machine learning, CRM, lead scoring
Procedia PDF Downloads 662136 Role of Agricultural Journalism in Diffusion of Farming Technologies
Authors: Muhammad Luqman, Mujahid Karim
Abstract:
Agricultural journalism considered an effective tool in the diffusion of agricultural technologies among the members of farming communities. Various agricultural journalism forms are used by the different organization in order to address the community problems and provide solutions to them. The present study was conducted for analyzing the role of agricultural journalism in the dissemination of agricultural information. The universe of the study was district Sargodha from which a sample of 100 was collected through a validating and pre-tested questionnaire. Statistical analysis of collected data was done with the help of SPSS. It was concluded that majority (64.6%) of the respondent were middle-aged (31-50) years, also indicates a high (73.23%) literacy rate above middle-level education, most (78.3%) of the respondents were connected with the occupation of farming. In various forms of agricultural journalism “Radio/T.V./F.M) is used by 99.4% of the respondent, Mobile phones (96%), Magazine/ Newspaper/ periodical (66.4%) and social media (60.9%). Regarding majors areas focused on agriculture journalism “Help farmers to enhance their productivity is on the highest level with a mean of ( =3.98/5.00). The regression model of farmer's education and various forms of agricultural journalism facilities used was found to be significant.Keywords: agricultural information, journalism, farming community, technology diffusion and adoption
Procedia PDF Downloads 1792135 Queering Alterity: Engaging Pluralism to Move Beyond Gender Binaries in the Classroom
Authors: A. K. O'Loughlin
Abstract:
In Simone de Beauvoir’s climatic 1959 meditation, The Second Sex, she avows that 'On ne naît pas femme; on le devient,' translated most recently in the unabridged text (2010) as 'One is not born, but rather becomes, woman.' The signifier ‘woman’ in this context, signifies Beauvoir’s contemplation of the institution, the concept of woman(ness) defined in relation to the binary and hegemonic man(ness.) She is 'the other.' This paper is a theoretical contemplation of (1) how we actively teach 'othering' in the institution of schooling and (2) new considerations of pluralism for self-reflection and subversion that teachers, in particular, are faced with. How, in schooling, do we learn one’s options for racialized, classed and sexualized gender identification and the hierarchical signification that define these signifiers? Just like the myth of apolitical schooling, we cannot escape teaching social organization in the classroom. Yet, we do have a choice. How do we as educators learn about our own embodied intersectionalities? How do we unlearn our own binaries? How do we teach about intersectional gender? How do we teach 'the other'? We posit the processes of these reflections by educators may move our classrooms beyond binaries, engage pluralism and queer alterity itself.Keywords: othering, alterity, education, schooling, identity, racialization, gender, intersectionality, pluralism
Procedia PDF Downloads 2412134 Job Satisfaction Levels of Nurses Working in Public Hospitals
Authors: S. Kurt, B. C. Demirbag
Abstract:
Meeting employees’ expectations from an organization physically and mentally is a result of one’s assessing his or her work and its environment as well as his feeling about them. It was to determine the job satisfaction levels of the nurses in public hospitals. This descriptive study was carried out with 404 nurses (60%) accepting to take part in the study voluntarily and working in the same hospital for at least three months from 673 nurses working in hospitals depending on The Secretaryship of Public Hospital Association in Rize. The study aimed to reach the whole population by not taking samples. The data were collected by the personal information form (16 questions) prepared by the researcher, and the job satisfaction scale (36 articles) between June 1st and August 30th, 2014. According to scale, mean scores of nurses’ job satisfaction were 3.23±0.51. In addition, it was determined that the factors such as nurses’s age, marital status, childbearing, place of duty, position in workplace, being liked of job, education status, work experience, weekly working hours, maturing in professional practice, unit worked, hospital worked and colleagues affected the job satisfaction levels of nurses (p <0.05). In conclusion; the nurses’ general job satisfaction levels were moderate level.Keywords: hospitals, job satisfaction level, nurses, public hospitals
Procedia PDF Downloads 3482133 Towards a Measuring Tool to Encourage Knowledge Sharing in Emerging Knowledge Organizations: The Who, the What and the How
Authors: Rachel Barker
Abstract:
The exponential velocity in the truly knowledge-intensive world today has increasingly bombarded organizations with unfathomable challenges. Hence organizations are introduced to strange lexicons of descriptors belonging to a new paradigm of who, what and how knowledge at individual and organizational levels should be managed. Although organizational knowledge has been recognized as a valuable intangible resource that holds the key to competitive advantage, little progress has been made in understanding how knowledge sharing at individual level could benefit knowledge use at collective level to ensure added value. The research problem is that a lack of research exists to measure knowledge sharing through a multi-layered structure of ideas with at its foundation, philosophical assumptions to support presuppositions and commitment which requires actual findings from measured variables to confirm observed and expected events. The purpose of this paper is to address this problem by presenting a theoretical approach to measure knowledge sharing in emerging knowledge organizations. The research question is that despite the competitive necessity of becoming a knowledge-based organization, leaders have found it difficult to transform their organizations due to a lack of knowledge on who, what and how it should be done. The main premise of this research is based on the challenge for knowledge leaders to develop an organizational culture conducive to the sharing of knowledge and where learning becomes the norm. The theoretical constructs were derived and based on the three components of the knowledge management theory, namely technical, communication and human components where it is suggested that this knowledge infrastructure could ensure effective management. While it is realised that it might be a little problematic to implement and measure all relevant concepts, this paper presents effect of eight critical success factors (CSFs) namely: organizational strategy, organizational culture, systems and infrastructure, intellectual capital, knowledge integration, organizational learning, motivation/performance measures and innovation. These CSFs have been identified based on a comprehensive literature review of existing research and tested in a new framework adapted from four perspectives of the balanced score card (BSC). Based on these CSFs and their items, an instrument was designed and tested among managers and employees of a purposefully selected engineering company in South Africa who relies on knowledge sharing to ensure their competitive advantage. Rigorous pretesting through personal interviews with executives and a number of academics took place to validate the instrument and to improve the quality of items and correct wording of issues. Through analysis of surveys collected, this research empirically models and uncovers key aspects of these dimensions based on the CSFs. Reliability of the instrument was calculated by Cronbach’s a for the two sections of the instrument on organizational and individual levels.The construct validity was confirmed by using factor analysis. The impact of the results was tested using structural equation modelling and proved to be a basis for implementing and understanding the competitive predisposition of the organization as it enters the process of knowledge management. In addition, they realised the importance to consolidate their knowledge assets to create value that is sustainable over time.Keywords: innovation, intellectual capital, knowledge sharing, performance measures
Procedia PDF Downloads 1812132 Development of Building Information Modeling in Property Industry: Beginning with Building Information Modeling Construction
Authors: B. Godefroy, D. Beladjine, K. Beddiar
Abstract:
In France, construction BIM actors commonly evoke the BIM gains for exploitation by integrating of the life cycle of a building. The standardization of level 7 of development would achieve this stage of the digital model. The householders include local public authorities, social landlords, public institutions (health and education), enterprises, facilities management companies. They have a dual role: owner and manager of their housing complex. In a context of financial constraint, the BIM of exploitation aims to control costs, make long-term investment choices, renew the portfolio and enable environmental standards to be met. It assumes a knowledge of the existing buildings, marked by its size and complexity. The information sought must be synthetic and structured, it concerns, in general, a real estate complex. We conducted a study with professionals about their concerns and ways to use it to see how householders could benefit from this development. To obtain results, we had in mind the recurring interrogation of the project management, on the needs of the operators, we tested the following stages: 1) Inculcate a minimal culture of BIM with multidisciplinary teams of the operator then by business, 2) Learn by BIM tools, the adaptation of their trade in operations, 3) Understand the place and creation of a graphic and technical database management system, determine the components of its library so their needs, 4) Identify the cross-functional interventions of its managers by business (operations, technical, information system, purchasing and legal aspects), 5) Set an internal protocol and define the BIM impact in their digital strategy. In addition, continuity of management by the integration of construction models in the operation phase raises the question of interoperability in the control of the production of IFC files in the operator’s proprietary format and the export and import processes, a solution rivaled by the traditional method of vectorization of paper plans. Companies that digitize housing complex and those in FM produce a file IFC, directly, according to their needs without recourse to the model of construction, they produce models business for the exploitation. They standardize components, equipment that are useful for coding. We observed the consequences resulting from the use of the BIM in the property industry and, made the following observations: a) The value of data prevail over the graphics, 3D is little used b) The owner must, through his organization, promote the feedback of technical management information during the design phase c) The operator's reflection on outsourcing concerns the acquisition of its information system and these services, observing the risks and costs related to their internal or external developments. This study allows us to highlight: i) The need for an internal organization of operators prior to a response to the construction management ii) The evolution towards automated methods for creating models dedicated to the exploitation, a specialization would be required iii) A review of the communication of the project management, management continuity not articulating around his building model, it must take into account the environment of the operator and reflect on its scope of action.Keywords: information system, interoperability, models for exploitation, property industry
Procedia PDF Downloads 1342131 Definition, Structure, and Core Functions of the State Image
Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova
Abstract:
Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.Keywords: image of the country, country's image classification, function of the country image, country's image components
Procedia PDF Downloads 4202130 From Waste to Wealth: A Future Paradigm for Plastic Management Using Blockchain Technology
Authors: Jim Shi, Jasmine Chang, Nesreen El-Rayes
Abstract:
The world has been experiencing a steadily increasing trend in both the production and consumption of plastic. The global consumer revolution should not have been possible without plastic, thanks to its salient feature of inexpensiveness and durability. But, as a two-edged sword, its durable quality has returned to haunt and even jeopardized us. That exacerbating the plastic crisis has attracted various global initiatives and actions. Simultaneously, firms are eager to adopt new technology as they witness and perceive more potential and merit of Industry 4.0 technologies. For example, Blockchain technology (BCT) is drawing the attention of numerous stakeholders because of its wide range of outstanding features that promise to enhance supply chain operations. However, from a research perspective, most of the literature addresses the plastic crisis from either environmental or social perspectives. In contrast, analysis from the data science perspective and technology is relatively scarce. To this end, this study aims to fill this gap and cover the plastic crisis from a holistic view of environmental, social, technological, and business perspectives. In particular, we propose a mathematical model to examine the inclusion of BCT to enhance and improve the efficiency on the upstream and the downstream sides of the plastic value, where the whole value chain is coordinated systematically, and its interoperability can be optimized. Consequently, the Environmental, Social, and Governance (ESG) goal and Circular Economics (CE) sustainability can be maximized.Keywords: blockchain technology, plastic, circular economy, sustainability
Procedia PDF Downloads 692129 Quality Management and Service Organization
Authors: Fatemeh Khalili Varnamkhasti
Abstract:
In recent times, there has been a notable shift in the application of Total Quality Management (TQM) from manufacturing to service organizations, prompting numerous studies on the subject. TQM has firmly established itself across various sectors, emerging as an approach to process improvement, waste reduction, business optimization, and quality performance. Many researchers and academics have recognized the relevance of TQM for sustainable competitive advantage, particularly in service organizations. In light of this, the purpose of this research study is to explore the applicability of TQM within the service framework. The study delves into existing literature on TQM in service organizations and examines the reasons for its occasional shortcomings. Ultimately, the paper provides systematic guidelines for the effective implementation of TQM in service organizations. The findings of this study offer a much-improved understanding of TQM and its practices, shedding light on the evolution of service organizations. Additionally, the study highlights key insights from recent research on TQM in service organizations and proposes a ten-step approach for the successful implementation of TQM in the service sector. This framework aims to provide service managers and professionals with a comprehensive understanding of TQM fundamentals and encourages a deeper exploration of TQM theory.Keywords: quality, control, service, management, teamwork
Procedia PDF Downloads 402128 Improving Axial-Attention Network via Cross-Channel Weight Sharing
Authors: Nazmul Shahadat, Anthony S. Maida
Abstract:
In recent years, hypercomplex inspired neural networks improved deep CNN architectures due to their ability to share weights across input channels and thus improve cohesiveness of representations within the layers. The work described herein studies the effect of replacing existing layers in an Axial Attention ResNet with their quaternion variants that use cross-channel weight sharing to assess the effect on image classification. We expect the quaternion enhancements to produce improved feature maps with more interlinked representations. We experiment with the stem of the network, the bottleneck layer, and the fully connected backend by replacing them with quaternion versions. These modifications lead to novel architectures which yield improved accuracy performance on the ImageNet300k classification dataset. Our baseline networks for comparison were the original real-valued ResNet, the original quaternion-valued ResNet, and the Axial Attention ResNet. Since improvement was observed regardless of which part of the network was modified, there is a promise that this technique may be generally useful in improving classification accuracy for a large class of networks.Keywords: axial attention, representational networks, weight sharing, cross-channel correlations, quaternion-enhanced axial attention, deep networks
Procedia PDF Downloads 682127 Analysis of Vocal Fold Vibrations from High-Speed Digital Images Based on Dynamic Time Warping
Authors: A. I. A. Rahman, Sh-Hussain Salleh, K. Ahmad, K. Anuar
Abstract:
Analysis of vocal fold vibration is essential for understanding the mechanism of voice production and for improving clinical assessment of voice disorders. This paper presents a Dynamic Time Warping (DTW) based approach to analyze and objectively classify vocal fold vibration patterns. The proposed technique was designed and implemented on a Glottal Area Waveform (GAW) extracted from high-speed laryngeal images by delineating the glottal edges for each image frame. Feature extraction from the GAW was performed using Linear Predictive Coding (LPC). Several types of voice reference templates from simulations of clear, breathy, fry, pressed and hyperfunctional voice productions were used. The patterns of the reference templates were first verified using the analytical signal generated through Hilbert transformation of the GAW. Samples from normal speakers’ voice recordings were then used to evaluate and test the effectiveness of this approach. The classification of the voice patterns using the technique of LPC and DTW gave the accuracy of 81%.Keywords: dynamic time warping, glottal area waveform, linear predictive coding, high-speed laryngeal images, Hilbert transform
Procedia PDF Downloads 2322126 The Communication Library DIALOG for iFDAQ of the COMPASS Experiment
Authors: Y. Bai, M. Bodlak, V. Frolov, S. Huber, V. Jary, I. Konorov, D. Levit, J. Novy, D. Steffen, O. Subrt, M. Virius
Abstract:
Modern experiments in high energy physics impose great demands on the reliability, the efficiency, and the data rate of Data Acquisition Systems (DAQ). This contribution focuses on the development and deployment of the new communication library DIALOG for the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN. The iFDAQ utilizing a hardware event builder is designed to be able to readout data at the maximum rate of the experiment. The DIALOG library is a communication system both for distributed and mixed environments, it provides a network transparent inter-process communication layer. Using the high-performance and modern C++ framework Qt and its Qt Network API, the DIALOG library presents an alternative to the previously used DIM library. The DIALOG library was fully incorporated to all processes in the iFDAQ during the run 2016. From the software point of view, it might be considered as a significant improvement of iFDAQ in comparison with the previous run. To extend the possibilities of debugging, the online monitoring of communication among processes via DIALOG GUI is a desirable feature. In the paper, we present the DIALOG library from several insights and discuss it in a detailed way. Moreover, the efficiency measurement and comparison with the DIM library with respect to the iFDAQ requirements is provided.Keywords: data acquisition system, DIALOG library, DIM library, FPGA, Qt framework, TCP/IP
Procedia PDF Downloads 3092125 Impact of the COVID-19 Pandemic and Social Isolation on the Clients’ Experiences in Counselling and their Access to Services: Perspectives of Violence Against Women Program Staff - A Qualitative Study
Authors: Habiba Nahzat, Karen Crow, Lisa Manuel, Maria Huijbregts
Abstract:
Background and Rationale: The World Health Organization (WHO) declared COVID-19 a pandemic on March 11, 2020. Shortly after, the Ontario provincial and Toronto municipal governments also released multiple directives that led to the mass closure of businesses both in the public and private sectors. Recent research has identified connections between Intimate Partner Violence (IPV) and COVID-19 related stressors - especially because of lockdown and social isolation measures. Psychological impacts of lengthy seclusion coupled with disconnection from extended family and diminished support services can take a toll on families at risk and may increase mental health issues and the prevalence of IPV. Research Question: Thus, the purpose of the study was to understand the perspective of the Violence Against Women (VAW) program staff on the impact of the COVID-19 pandemic; we especially wanted to understand staff views of restrictions on clients’ counseling experiences and the ability to access services in general. The study also aimed to examine VAW program staff experiences regarding remote work and explore how the pandemic restriction measures affected the ability of their program operations to support their clients and each other. Method: A cross-sectional, descriptive qualitative study was conducted with a purposive sample of 9 VAW program staff – eight VAW counselors and one VAW manager. Prior to data collection, program staff collaborated in the development of the study purpose, interview questions and methodology. Ethics approval was obtained from the sponsoring organization’s Research Ethics Board. In-depth individual interviews were conducted with study participants using a semi-structured interview questionnaire. Brief demographic information was also collected prior to the interview. Descriptive statistics were used to analyze quantitative data and qualitative data was analyzed by thematic content analysis. Results: Findings from this study indicate that the COVID-19 pandemic restrictions had an adverse impact on clients seeking VAW services based on VAW staff perspectives. Program staff reported a perceived increase in abuse among women, especially in emotional and financial abuse and experiences of isolation and trauma. Findings further highlight the challenges women experienced when trying to access services in general as well as counseling and legal services. This was perceived to be more prominent among newcomers and marginalized women. The study also revealed client and staff challenges when participating in virtual counseling, their innovations and clients’ creativity in accessing needed counseling and how staff over time adapted to providing virtual support during the pandemic. Conclusion and Next Steps: This study builds upon existing evidence on the impact of COVID-19 restrictions on VAW and may inform future research to better understand the association between the COVID-19 pandemic restrictions and VAW on a broader scale and to inform and support possible short-term and long-term changes in the client experience and counselling practice.Keywords: COVID-19, pandemic, virtual, violence against women (VAW)
Procedia PDF Downloads 1812124 Interplay of Power Management at Core and Server Level
Authors: Jörg Lenhardt, Wolfram Schiffmann, Jörg Keller
Abstract:
While the feature sizes of recent Complementary Metal Oxid Semiconductor (CMOS) devices decrease the influence of static power prevails their energy consumption. Thus, power savings that benefit from Dynamic Frequency and Voltage Scaling (DVFS) are diminishing and temporal shutdown of cores or other microchip components become more worthwhile. A consequence of powering off unused parts of a chip is that the relative difference between idle and fully loaded power consumption is increased. That means, future chips and whole server systems gain more power saving potential through power-aware load balancing, whereas in former times this power saving approach had only limited effect, and thus, was not widely adopted. While powering off complete servers was used to save energy, it will be superfluous in many cases when cores can be powered down. An important advantage that comes with that is a largely reduced time to respond to increased computational demand. We include the above developments in a server power model and quantify the advantage. Our conclusion is that strategies from datacenters when to power off server systems might be used in the future on core level, while load balancing mechanisms previously used at core level might be used in the future at server level.Keywords: power efficiency, static power consumption, dynamic power consumption, CMOS
Procedia PDF Downloads 2112123 Investigation of Possible Precancerous Viral Markers in Dental Follicles of Asymptomatic Impacted Teeth
Authors: Serap Keskin Tunç, Cennet Neslihan Eroğlu, Sevinç Şahin, Selda Seçkin
Abstract:
It has been suggested that various viruses may play a role in the pathogenesis of cancerous oral lesions in the literature. The aim of this study was to investigate the presence of both possible precancerous viral markers (HPV, HHV8, HSV1, HSV2, and EBV), and p53 and Ki-67 in the dental follicles of asymptomatic impacted teeth. A hundred healthy volunteers, older than 18 years old, included in the study. Dental follicles of extracted impacted teeth were excised and fixated in 10% formaldehyde. Histopathological and immunohistochemical examinations using HPV (containing HPV 8 and HPV 11), p16 (containing HPV 16), HHV8, HSV1, HSV2, EBV, p53 and Ki-67 antibodies were carried out. Also, the immunohistochemical results were correlated with the clinicopathological feature by Chi-square test statistically No dysplasia or neoplasm was observed. 62% of the cases were positive for p16, 32% were positive for EBV, 26% were positive for HSV1, immunohistochemically. All cases were immunonegative for HPV, HSV2, and HHV8. There was statistically significant correlation between overexpression of p53 with both EBV and p16 positivity (p<0.05). Direct correlation between higher expression of Ki-67 between EBV immunopositivity was detected (p<0.05). Thus, these viruses may be suggested to show trophism to the dental follicles acting as a reservoir. In conclusion, all dental follicles of extracted impacted teeth should be examined histopathologically in order to detect and prevent possible viral oncogenesis.Keywords: dental follicles, Ki67, p53, precancerous markers viral markers
Procedia PDF Downloads 2802122 Towards Long-Range Pixels Connection for Context-Aware Semantic Segmentation
Authors: Muhammad Zubair Khan, Yugyung Lee
Abstract:
Deep learning has recently achieved enormous response in semantic image segmentation. The previously developed U-Net inspired architectures operate with continuous stride and pooling operations, leading to spatial data loss. Also, the methods lack establishing long-term pixels connection to preserve context knowledge and reduce spatial loss in prediction. This article developed encoder-decoder architecture with bi-directional LSTM embedded in long skip-connections and densely connected convolution blocks. The network non-linearly combines the feature maps across encoder-decoder paths for finding dependency and correlation between image pixels. Additionally, the densely connected convolutional blocks are kept in the final encoding layer to reuse features and prevent redundant data sharing. The method applied batch-normalization for reducing internal covariate shift in data distributions. The empirical evidence shows a promising response to our method compared with other semantic segmentation techniques.Keywords: deep learning, semantic segmentation, image analysis, pixels connection, convolution neural network
Procedia PDF Downloads 902121 Investigating Effective Factors on the Customer Switching Behaviour in the Saipa Emdad Khodro Company of Iran
Authors: Rohollah Asadian Kohestani, Mustafa Hashemzadeh
Abstract:
The present paper is the outcome of a field research that was conducted with the study objective of influencing factor's effect on the behavior of customers switching in the Saipa Emdad Khodro Company. To achieve this goal, six factors of service quality, service cost, waiting time to receive services, reputation of organization, costs of switching and the way to respond the needs of customers as the independent variables of research and their effect on the customer switching was studied as the variable related to the research. The statistical society of this research included all customers of the Saipa Emdad Khodro company that possess the vehicles of automobile manufacturing group of Saipa throughout the country and the statistical sample included 150 persons of such customers. The results of this research indicated that all under study factors excluding the reputation factor effect on the behavior of customer switching.Keywords: customer services, switching cost, service price, customer switching behavior
Procedia PDF Downloads 2882120 Skin Manifestations in Children With Inborn Errors of Immunity in a Tertiary Care Hospital in Iran
Authors: Zahra Salehi Shahrbabaki, Zahra Chavoshzadeh, Fahimeh Abdollahimajd, Samin Sharafian, Tolue Mahdavi, Mahnaz Jamee
Abstract:
Background: Inborn errors of immunity (IEIs) are monogenic diseases of the immune the system with broad clinical manifestations. Despite the increasing genetic advancements, the diagnosis of IEIs still leans on clinical diagnosis. Dermatologic manifestations are observed in a large number of IEI patients and can lead to proper approach, prompt intervention and improved prognosis. Methods: This cross-sectional study was carried out between 2018 and 2020 on IEIs at a Children's tertiary care center in Tehran, Iran. Demographic details (including age, sex, and parental consanguinity), age at onset of symptoms and family history of IEI with were recorded. Results :212 patients were included. Cutaneous findings were reported in (95 ,44.8%) patients. and 61 of 95 (64.2%) reported skin lesions as the first clinical presentation. Skin infection (69, 72.6%) was the most frequent cutaneous manifestation, followed by an eczematous rash (24, 25 %). Conclusions: Skin manifestations are common feature in IEI patients and can be readily recognizable by healthcare providers. This study tried to provide information on prognostic consequences.Keywords: primary immuno deficiency, inborn errror of metabolism, skin manifestation, skin infection
Procedia PDF Downloads 842119 The Importance of Affinity Groups for Organizations and Employees
Authors: Helio Arthur Reis Irigaray, Fabricio Stocker
Abstract:
This study aims to discover the extent to which affinity groups effectively act to combat inequalities, promote diversity, and contribute to the inclusion of non-hegemonic groups in the work environment. To this end, we have built empirical research, in which we interviewed 36 leaders and members of the collectives of non-hegemonic groups, namely women, blacks, and LGBTQ. With the proper authorization of the participants, their interviews were transcribed and submitted for critical analysis of the discourse. The field revealed that collectives are the result of the articulation of non-hegemonic groups, which create and participate in legitimate and institutional spaces to promote diversity. We also identified that diversity actions have happened as a market trend and reproduced mimetically. As the largest companies implement these actions, they become benchmarking and thus create a flow that is reproduced by other companies. However, there is no effective change in the structures that could promote inclusion and belonging. We state that a diverse group of employees are not enough to claim that the organization is diverse and inclusive. There remains much more to discuss and delve into deeply, including gender, diversity, and intersectionality.Keywords: diversity, inclusion, collectives, affinity groups, employee resource groups
Procedia PDF Downloads 822118 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware
Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.Keywords: digital forensic, detection, eradication, targeted attack, malware
Procedia PDF Downloads 2632117 Federalism, a System of Government: Comparative Study of Australia and Canada
Authors: Rana Tajammal Rashid
Abstract:
Federalism is a political system in which government power and responsibility are divided between a federal legislature and units of the state or provincial legislatures. This system provides the structure for the states having large territory and through that can manage the state affairs and administration easily. Many of the largest countries in the world are federations, like; The United States, Canada, India, Pakistan South Africa, Argentina, and Australia. Every large democratic nation has a federal system of government. This study will explore the feature and good governance of two developed countries Canada and Australia. This study will be helpful to the developing countries like Pakistan, India which have a federal form of structure to run the affairs of the state. In the federal system of Pakistan there are lot of issues and conflicts with the provinces with a comparative study of these two developed countries, i.e., Australia and Canada, our policy and decision maker political actors will understand in which way a state will successfully manage the issues related to federalism. This study will also provide the help to the students of comparative politics that how to analysis the different political system of the developed countries of the world.Keywords: federalism, features of federalism, types of federalism, history of federalism, Australian federalism, Canadian federalism, federalism developments, executives, federal and provincial autonomy legislative, judicial
Procedia PDF Downloads 2742116 Deep Supervision Based-Unet to Detect Buildings Changes from VHR Aerial Imagery
Authors: Shimaa Holail, Tamer Saleh, Xiongwu Xiao
Abstract:
Building change detection (BCD) from satellite imagery is an essential topic in urbanization monitoring, agricultural land management, and updating geospatial databases. Recently, methods for detecting changes based on deep learning have made significant progress and impressive results. However, it has the problem of being insensitive to changes in buildings with complex spectral differences, and the features being extracted are not discriminatory enough, resulting in incomplete buildings and irregular boundaries. To overcome these problems, we propose a dual Siamese network based on the Unet model with the addition of a deep supervision strategy (DS) in this paper. This network consists of a backbone (encoder) based on ImageNet pre-training, a fusion block, and feature pyramid networks (FPN) to enhance the step-by-step information of the changing regions and obtain a more accurate BCD map. To train the proposed method, we created a new dataset (EGY-BCD) of high-resolution and multi-temporal aerial images captured over New Cairo in Egypt to detect building changes for this purpose. The experimental results showed that the proposed method is effective and performs well with the EGY-BCD dataset regarding the overall accuracy, F1-score, and mIoU, which were 91.6 %, 80.1 %, and 73.5 %, respectively.Keywords: building change detection, deep supervision, semantic segmentation, EGY-BCD dataset
Procedia PDF Downloads 1012115 Baseline Study on Human Trafficking Crimes: A Case Study of Mapping Human Trafficking Crimes in East Java Province, Indonesia
Authors: Ni Komang Desy Arya Pinatih
Abstract:
Transnational crime is a crime with 'unique' feature because the activities benefit the lack of state monitoring on the borders so dealing with it cannot be based on conventional engagement but also need joint operation with other countries. On the other hand with the flow of globalization and the growth of information technology and transportation, states become more vulnerable to transnational crime threats especially human trafficking. This paper would examine transnational crime activities, especially human trafficking in Indonesia. With the case study on the mapping of human trafficking crime in East Java province, Indonesia, this paper would try to analyze how the difference in human trafficking crime trends at the national and sub-national levels. The findings of this research were first, there is difference in human trafficking crime trends whereas at the national level the trend is rising, while at sub-national (province) level the trend is declining. Second, regarding the decline of human trafficking number, it’s interesting to see how the method to decrease human trafficking crime in East Jawa Province in order to reduce transnational crime accounts in the region. These things are hopefully becoming a model for transnational crimes engagement in other regions to reduce human trafficking numbers as much as possible.Keywords: transnational crime, human trafficking, southeast Asia, anticipation model on transnational crimes
Procedia PDF Downloads 2912114 An Integrative Computational Pipeline for Detection of Tumor Epitopes in Cancer Patients
Authors: Tanushree Jaitly, Shailendra Gupta, Leila Taher, Gerold Schuler, Julio Vera
Abstract:
Genomics-based personalized medicine is a promising approach to fight aggressive tumors based on patient's specific tumor mutation and expression profiles. A remarkable case is, dendritic cell-based immunotherapy, in which tumor epitopes targeting patient's specific mutations are used to design a vaccine that helps in stimulating cytotoxic T cell mediated anticancer immunity. Here we present a computational pipeline for epitope-based personalized cancer vaccines using patient-specific haplotype and cancer mutation profiles. In the workflow proposed, we analyze Whole Exome Sequencing and RNA Sequencing patient data to detect patient-specific mutations and their expression level. Epitopes including the tumor mutations are computationally predicted using patient's haplotype and filtered based on their expression level, binding affinity, and immunogenicity. We calculate binding energy for each filtered major histocompatibility complex (MHC)-peptide complex using docking studies, and use this feature to select good epitope candidates further.Keywords: cancer immunotherapy, epitope prediction, NGS data, personalized medicine
Procedia PDF Downloads 2422113 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 802112 Analysis Of Fine Motor Skills in Chronic Neurodegenerative Models of Huntington’s Disease and Amyotrophic Lateral Sclerosis
Authors: T. Heikkinen, J. Oksman, T. Bragge, A. Nurmi, O. Kontkanen, T. Ahtoniemi
Abstract:
Motor impairment is an inherent phenotypic feature of several chronic neurodegenerative diseases, and pharmacological therapies aimed to counterbalance the motor disability have a great market potential. Animal models of chronic neurodegenerative diseases display a number deteriorating motor phenotype during the disease progression. There is a wide array of behavioral tools to evaluate motor functions in rodents. However, currently existing methods to study motor functions in rodents are often limited to evaluate gross motor functions only at advanced stages of the disease phenotype. The most commonly applied traditional motor assays used in CNS rodent models, lack the sensitivity to capture fine motor impairments or improvements. Fine motor skill characterization in rodents provides a more sensitive tool to capture more subtle motor dysfunctions and therapeutic effects. Importantly, similar approach, kinematic movement analysis, is also used in clinic, and applied both in diagnosis and determination of therapeutic response to pharmacological interventions. The aim of this study was to apply kinematic gait analysis, a novel and automated high precision movement analysis system, to characterize phenotypic deficits in three different chronic neurodegenerative animal models, a transgenic mouse model (SOD1 G93A) for amyotrophic lateral sclerosis (ALS), and R6/2 and Q175KI mouse models for Huntington’s disease (HD). The readouts from walking behavior included gait properties with kinematic data, and body movement trajectories including analysis of various points of interest such as movement and position of landmarks in the torso, tail and joints. Mice (transgenic and wild-type) from each model were analyzed for the fine motor kinematic properties at young ages, prior to the age when gross motor deficits are clearly pronounced. Fine motor kinematic Evaluation was continued in the same animals until clear motor dysfunction with conventional motor assays was evident. Time course analysis revealed clear fine motor skill impairments in each transgenic model earlier than what is seen with conventional gross motor tests. Motor changes were quantitatively analyzed for up to ~80 parameters, and the largest data sets of HD models were further processed with principal component analysis (PCA) to transform the pool of individual parameters into a smaller and focused set of mutually uncorrelated gait parameters showing strong genotype difference. Kinematic fine motor analysis of transgenic animal models described in this presentation show that this method isa sensitive, objective and fully automated tool that allows earlier and more sensitive detection of progressive neuromuscular and CNS disease phenotypes. As a result of the analysis a comprehensive set of fine motor parameters for each model is created, and these parameters provide better understanding of the disease progression and enhanced sensitivity of this assay for therapeutic testing compared to classical motor behavior tests. In SOD1 G93A, R6/2, and Q175KI mice, the alterations in gait were evident already several weeks earlier than with traditional gross motor assays. Kinematic testing can be applied to a wider set of motor readouts beyond gait in order to study whole body movement patterns such as with relation to joints and various body parts longitudinally, providing a sophisticated and translatable method for disseminating motor components in rodent disease models and evaluating therapeutic interventions.Keywords: Gait analysis, kinematic, motor impairment, inherent feature
Procedia PDF Downloads 3472111 Violence Detection and Tracking on Moving Surveillance Video Using Machine Learning Approach
Authors: Abe Degale D., Cheng Jian
Abstract:
When creating automated video surveillance systems, violent action recognition is crucial. In recent years, hand-crafted feature detectors have been the primary method for achieving violence detection, such as the recognition of fighting activity. Researchers have also looked into learning-based representational models. On benchmark datasets created especially for the detection of violent sequences in sports and movies, these methods produced good accuracy results. The Hockey dataset's videos with surveillance camera motion present challenges for these algorithms for learning discriminating features. Image recognition and human activity detection challenges have shown success with deep representation-based methods. For the purpose of detecting violent images and identifying aggressive human behaviours, this research suggested a deep representation-based model using the transfer learning idea. The results show that the suggested approach outperforms state-of-the-art accuracy levels by learning the most discriminating features, attaining 99.34% and 99.98% accuracy levels on the Hockey and Movies datasets, respectively.Keywords: violence detection, faster RCNN, transfer learning and, surveillance video
Procedia PDF Downloads 872110 The Appeal of Vocal Islamism in the West: The Case of Hizb ut-Tahrir vis-à-vis Its Competitors
Authors: Elisa Orofino
Abstract:
Islamism is a very debated topic in the West but almost exclusively explored in its violent forms. Nevertheless, a number of “vocal radical Islamist” groups exist in the West and legally operate because of their non-violent nature. Vocal radicals continually inspire individuals and lead them towards specific goals and priorities, sometimes even towards violence. This paper uses the long-living group Hizb ut-Tahrir (HT) to explore the elements that make the organization appealing to segments of Muslim community in the West. This paper uses three agency variables - reflexive monitoring, the rationalization of action and the motivations for actions – to analyze HT’s appeal vis-à-vis two other Islamist groups, Ikhwan al-Muslimun and Jamaat-e-Islami (JeI), having similar goals and the same high international profile. This paper concludes that HT’s uniqueness is given by its method, detailed vision of the caliphate, consistency over time and the emphasis placed on the caliphate as the leading force of HT’s unchanged motivation for action.Keywords: agency, caliphate, Islamist groups, radicalization, vocal radicals
Procedia PDF Downloads 1132109 Digital Preservation: Requirement of 21st Century
Authors: Gaurav Kumar, Shilpa
Abstract:
Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.Keywords: preservation, digital preservation, digital dark age, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format
Procedia PDF Downloads 4402108 Radon and Thoron Determination in Natural Ancient Mine Using Nuclear Track Detectors: Radiation Dose Assessment
Authors: L. Oufni, M. Amrane, R. Rabi
Abstract:
Radon (and thoron) is a naturally occurring radioactive noble gas, having variable distribution in the geological environment. The exposure of human beings to ionizing radiation from natural sources is a continuing and inescapable feature of life on earth. Radon, thoron and their short-lived decay products in the atmosphere are the most important contributors to human exposure from natural sources. The aim of this study is to determine alpha-and beta-activities per unit volume of air due to radon (222Rn), thoron (220Rn) and their progenies in the air of ancient mine of Aouli in which there is no working activity is situated at approximately 25 km north of the city of Midelt (Morocco), by using LR-115 type II and CR-39 solid state nuclear track detectors (SSNTDs). Equilibrium factors between radon and its daughters and between thoron and its progeny were evaluated in the studied atmospheres. The committed equivalent doses due to the 218Po and 214Po radon short-lived progeny were evaluated in different tissues of the respiratory tract of the visitors of the considered ancient mine. The visitors in these mines spent a good amount of time. It was essential to let the staff know about these values and take the needed steps to prevent any health complications.Keywords: radon, thoron, concentration, exposure dose, SSNTD, mine
Procedia PDF Downloads 527