Search results for: current spectral analysis
15377 Impact of an Educational Intervention on Knowledge, Attitude and Practices of Community Members on Schistosomiasis in Nelson Mandela Bay
Authors: Prince S. Campbell, Janine B. Adams, Melusi Thwala, Opeoluwa Oyedele, Paula E. Melariri
Abstract:
Schistosomiasis, often known as bilharzia, is a parasitic water-borne disease caused by trematode flatworms of the genus Schistosoma. Schistosomiasis infection and prevention have been found to be influenced by a range of socio-cultural risk factors, including human characteristics (e.g., gender, age, education, knowledge, attitude, and practices), as well as environmental and economic elements. Lack of awareness of the disease may also contribute to an individual's tendency to participate in behaviours or activities that heighten their susceptibility to infection. The current study assessed the community knowledge, attitude and practices (KAP) on schistosomiasis and implemented an educational intervention following pre-test interviews. A cross-sectional quasi-experimental research design was used in this quantitative study. Pre- and post-intervention interview format surveys were conducted using a structured questionnaire, targeting individuals aged 18–65 years residing within 5 km of select water bodies. The questionnaire contained 54 close-ended questions about schistosomiasis causes, transmission, and clinical symptoms and the participants were interviewed face-to-face in their homes. Data was captured on Question Pro and analyzed using Microsoft Office Excel 365 (2019) and R (version 4.3.1) software. Overall, 380 individuals completed the pre and post-intervention assessments; 194 and 185 were males (51.1%) and females (48.7%), respectively. A notable 91.3% of participants did not know about schistosomiasis in the pre-intervention phase; however, the mean post-intervention test score (9.4 ± 1.4) for knowledge among participants was higher than the pre-intervention test score (2.2 ± 2.1) indicating a good and improved knowledge of schistosomiasis among the participants. Furthermore, the paired samples t-test results demonstrated that the increase in knowledge levels was statistically significant (p<0.001). Also, the post-intervention improvement of both practice (p<0.001) and attitude (p<0.001) levels was statistically significant. A positive correlation (r=0.23, p<0.001) was found between knowledge and attitude in the pre-intervention stage. Knowledgeable participants had a more positive attitude towards obtaining medical assistance and disease prevention. Moreover, attitudes and practices correlated negatively (r=-0.13, p=0.013) post-intervention; hence, those with positive attitudes did not engage in risky water-related practices, which was the desired outcome. The educational intervention had a favourable impact on the KAP of the study population as the majority were able to recall the disease aetiology, symptoms, transmission pattern, and preventative measures three months post-intervention. Nevertheless, previous research has suggested that participants were unable to recall information about the disease following the intervention. Consequently, research should prioritize behavioural modification strategies that may result in a more persistent outcome in terms of the participants' knowledge, which could ultimately contribute to the development of long-term positive attitudes and practices.Keywords: educational intervention, knowledge, attitudes and practices, schistosomiasis
Procedia PDF Downloads 1815376 Closed Form Exact Solution for Second Order Linear Differential Equations
Authors: Saeed Otarod
Abstract:
In a different simple and straight forward analysis a closed-form integral solution is found for nonhomogeneous second order linear ordinary differential equations, in terms of a particular solution of their corresponding homogeneous part. To find the particular solution of the homogeneous part, the equation is transformed into a simple Riccati equation from which the general solution of non-homogeneouecond order differential equation, in the form of a closed integral equation is inferred. The method works well in manyimportant cases, such as Schrödinger equation for hydrogen-like atoms. A non-homogenous second order linear differential equation has been solved as an extra exampleKeywords: explicit, linear, differential, closed form
Procedia PDF Downloads 6315375 Prophylactic Effect of Dietary Garlic (Allium sativum) Inclusion in Feed of Commercial Broilers with Coccidiosis Raised at the Experimental Animal Unit of the Department of Veterinary Medicine, University of Ibadan, Oyo State, Nigeria
Authors: Ogunlesi Olufunso, John Ogunsola, Omolade Oladele, Benjamin Emikpe
Abstract:
Context: Coccidiosis is a parasitic disease that affects poultry production, leading to economic losses. Garlic is known for medicinal properties and has been used as a natural remedy for various diseases. This study aims to investigate the prophylactic effect of garlic inclusion in the feed of commercial broilers with coccidiosis. Research Aim: The aim of this study is to determine the possible effect of garlic meal inclusion in poultry feed on the body weight gain of commercial broilers and to investigate it's therapeutic effect on broilers with coccidiosis. Methodology: The study conducted a case-control study for eight weeks with One hundred Arbor acre commercial broilers separated into five (5) groups from day-old, where 6,000 Eimeria oocysts were orally inoculated into each broiler in the different groups. Feed intake, body weight gain, feed conversion ratio, oocyt shedding rate, histopathology and erythrocyte indices were assessed. Findings: The inclusion of garlic meal in the broilers' diet resulted in an improved feed conversion ratio, decreased oocyst counts, reduced diarrhoeic fecal spots, decreased susceptibility to coccidial infection, and increased packed cell volume (PCV). Theoretical Importance: This study contributes to the understanding of the prophylactic effect of garlic supplementation, including its antiparasitic properties on commercial broilers with coccidiosis. It highlights the potential use of non-conventional feed additives or ayurvedic herb and spices in the treatment of poultry diseases. Data Collection and Analysis Procedures: The study collected data on feed intake, body weight gain, oocyst shedding rate, histopathological observations, and erythrocyte indices. Data were analyzed using Analysis of Variance and Duncan's Multiple range Test. Questions Addressed: The study addressed the possible effect of garlic meal inclusion in poultry feed on the body weight gain of broilers and its therapeutic effect on broilers with coccidiosis. Conclusion: The study concludes that garlic inclusion in the feed of broilers has a prophylactic effect, including antiparasitic properties, resulting in improved feed conversion ratio, reduced oocyst counts and increased PCV.Keywords: broilers, eimeria spp, garlic, Ibadan
Procedia PDF Downloads 8815374 Understanding Face-to-Face Household Gardens’ Profitability and Local Economic Opportunity Pathways
Authors: Annika Freudenberger, Sin Sokhong
Abstract:
In just a few years, the Face-to-Face Victory Gardens Project (F2F) in Cambodia has developed a high-impact project that has provided immediate and tangible benefits to local families. This has been accomplished with a relatively hands-off approach that relies on households’ own motivation and personal investments of time and resources -which is both unique and impressive in the landscape of NGO and government initiatives in the area. Households have been growing food both for their own consumption and to sell or exchange. Not all targeted beneficiaries are equally motivated and maximizing their involvement, but there is a clear subset of households -particularly those who serve as facilitators- whose circumstances have been transformed as a result of F2F. A number of household factors and contextual economic factors affect families’ income generation opportunities. All the households we spoke with became involved with F2F with the goal of selling some proportion of their produce (i.e., not exclusively for their own consumption). For some, this income is marginal and supplemental to their core household income; for others, it is substantial and transformative. Some engage directly with customers/buyers in their immediate community, while others sell in larger nearby markets, and others link up with intermediary vendors. All struggle, to a certain extent, to compete in a local economy flooded with cheap produce imported from large-scale growers in neighboring provinces, Thailand, and Vietnam, although households who grow and sell herbs and greens popular in Khmer cuisine have found a stronger local market. Some are content with the scale of their garden, the income they make, and the current level of effort required to maintain it; others would like to expand but are faced with land constraints and water management challenges. Households making a substantial income from selling their products have achieved success in different ways, making it difficult to pinpoint a clear “model” for replication. Within our small sample size of interviewees, it seems as though the families with a clear passion for their gardens and high motivation to work hard to bring their products to market have succeeded in doing so. Khmer greens and herbs have been the most successful; they are not high-value crops, but they are fairly easy to grow, and there is a constant demand. These crops are also not imported as much, so prices are more stable than those of crops such as long beans. Although we talked to a limited number of individuals, it also appears as though successful families either restricted their crops to those that would grow well in drought or flood conditions (depending on which they are affected by most); or benefit already from water management infrastructure such as water tanks which helps them diversify their crops and helps them build their resilience.Keywords: food security, Victory Gardens, nutrition, Cambodia
Procedia PDF Downloads 5615373 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID
Procedia PDF Downloads 40115372 Floorboards, Whitewalls and Butterflies: Ethnography of a Community Mental Health Cafe
Authors: J. N. Bardi, N. Wright, S. Timmons, P. Crawford
Abstract:
Introduction: In the United Kingdom (UK), the transfer of care from the asylums to the community has meant that some people with mental health problems (MHP) may not have access to suitable or adequate statutory community mental health services (CMHS). However, in addition to statutory CMHS, there are informal CMHS that provide spaces where people with MHP can attend such as faith communities, clubhouses, user-led organisations, day centres including drop-in-centres and community hubs and community mental health cafés (CMHCs). Aim: To qualitatively understand what happens in a community mental health café in relation to the place, people and processes, from the participant's perspective. Methodology: Ethnography Methods: Data collection will be field notes from observations written as thick description and interviews with participants. Data analysis will be thematic and narrative analysis. Relevance: The study seeks to observe what happens in a user-led community mental health café and explore if it provides the services that it claims to offer. Therefore, a literature review was conducted to examine the research evidence related to informal CMHS, focusing on similarities and differences. Results indicated that informal CMHS differ with regards to why, how, who set them up and who funds them, but they are similar because people with MHP who attend them report related psychological, vocational, and social interaction benefits. In addition to the differences listed above, CMHCs differ in their adoption of the commercial café model of social space and some CMHCs claim to address needs of social isolation and loneliness which they assert are not properly addressed by statutory CMHS and some informal CMHS. Therefore, CMHCs explicitly differentiate themselves from statutory CMHS and some informal CMHS such as day centres, hospitals and social services. However, CMHCs were found to be like drop-in-centres and community hubs which are also free for MHP to attend without the need for assessments, membership or appointments. To situate community mental health café within other informal CMHS and provide a rationale for the proposed study a scoping review was conducted to determine the scope of available research evidence on CMHCs. Findings from the scoping review reflected the literature review findings with regards to the benefits of attending informal CMHCs for people with MHP. Of the ten studies included in the scoping review, seven were on CMHCs for people living with dementia and two were on CMHCs for people with a broader range of MHP. The researcher hopes that findings from the proposed PhD study will build on the existing understanding of informal CMHS, extend the research evidence on CMHCs and address any gap in the literature.Keywords: cafe, community, ethnography, mental health
Procedia PDF Downloads 19915371 Men's Intimate Violence: Theory and Practice Relationship
Authors: Omer Zvi Shaked
Abstract:
Intimate Partner Violence (IPV) is a widespread social problem. Since the 1970's, and due to political changes resulting from the feminist movement, western society has been changing its attitude towards the phenomenon and has been taking an active approach to reduce its magnitude. Enterprises in the form of legislation, awareness and prevention campaigns, women's shelters, and community intervention programs became more prevalent as years progressed. Although many initiatives were found to be productive, the effectiveness of one, however, remained questionable throughout the years: intervention programs for men's intimate violence. Surveys outline two main intervention models for men's intimate violence. The first is the Duluth model, which argued that men are socialized to be dominant - while women are socialized to be subordinate - and men are therefore required by social imperative to enforce, physically if necessary, their dominance. The Duluth model became the chief authorized intervention program, and some states in the US even regulated it as the standard criminal justice program for men's intimate violence. However, meta-analysis findings demonstrated that based on a partner's reports, Duluth treatment completers have 44% recidivism rate, and between 40% and 85% dropout range. The second model is the Cognitive-Behavioral Model (CBT), which is a highly accepted intervention worldwide. The model argues that cognitive misrepresentations of intimate situations precede violent behaviors frequently when anger predisposition exists. Since anger dysregulation mediates between one's cognitive schemes and violent response, anger regulation became the chief purpose of the intervention. Yet, a meta-analysis found only a 56% risk reduction for CBT interventions. It is, therefore, crucial to understand the background behind the domination of both the Duluth model and CBT interventions. This presentation will discuss the ways in which theoretical conceptualizations of men's intimate violence, as well as ideologies, had contributed to the above-mentioned interventions' wide acceptance, despite known lack of scientific and evidential support. First, the presentation will review the prominent interventions for male intimate violence, the Duluth model, and CBT. Second, the presentation will review the prominent theoretical models explaining men's intimate violence: The Patriarchal model, the Abusive Personality model, and the Post-Traumatic Stress model. Third, the presentation will discuss the interrelation between theory and practice, and the nature of affinity between research and practice regarding men's intimate violence. Finally, the presentation will set new directions for further research, aiming to improve intervention's efficiency with men's intimate violence and advance social work practice in the field.Keywords: intimate partner violence, theory and practice relationship, Duluth, CBT, abusive personality, post-traumatic stress
Procedia PDF Downloads 12615370 Developing the Morphological Field of Problem Context to Assist Multi-Methodology in Operations Research
Authors: Mahnaz Hosseinzadeh, Mohammad Reza Mehregan
Abstract:
In this paper, we have developed a morphological field to assist multi- methodology (combining methodologies together in whole or part) in Operations Research (OR) for the problem contexts in Iranian organizations. So, we have attempted to identify some dimensions for problem context according to Iranian organizational problems. Then, a general morphological program is designed which helps the OR practitioner to determine the suitable OR methodology as output for any configuration of conditions in a problem context as input and to reveal the fields necessary to be improved in OR. Applying such a program would have interesting results for OR practitioners.Keywords: hard, soft and emancipatory operations research, General Morphological Analysis (GMA), multi-methodology, problem context
Procedia PDF Downloads 29815369 Internalized HIV Stigma, Mental Health, Coping, and Perceived Social Support among People Living with HIV/AIDS in Aizawl District, Mizoram
Authors: Mary Ann L. Halliday, Zoengpari Gohain
Abstract:
The stigma associated with HIV-AIDS negatively affect mental health and ability to effectively manage the disease. While the number of People living with HIV/AIDS (PLHIV) has been increasing day by day in Mizoram (a small north-eastern state in India), research on HIV/AIDS stigma has so far been limited. Despite the potential significance of Internalized HIV Stigma (IHS) in the lives of PLHIV, there has been very limited research in this area. It was therefore, felt necessary to explore the internalized HIV stigma, mental health, coping and perceived social support of PLHIV in Aizawl District, Mizoram. The present study was designed with the objectives to determine the degree of IHS, to study the relationship between the socio-demographic characteristics and level of IHS, to highlight the mental health status, coping strategies and perceived social support of PLHIV and to elucidate the relationship between these psychosocial variables. In order to achieve the objectives of the study, six hypotheses were formulated and statistical analyses conducted accordingly. The sample consisted of 300 PLWHA from Aizawl District, 150 males and 150 females, of the age group 20 to 70 years. Two- way classification of “Gender” (male and female) and three-way classification of “Level of IHS” (High IHS, Moderate IHS, Low IHS) on the dependent variables was employed, to elucidate the relationship between Internalized HIV Stigma, mental health, coping and perceived social support of PLHIV. The overall analysis revealed moderate level of IHS (67.3%) among PLHIV in Aizawl District, with a small proportion of subjects reporting high level of IHS. IHS was found to be significantly different on the basis of disclosure status, with the disclosure status of PLHIV accounting for 9% variability in IHS. Results also revealed more or less good mental health among the participants, which was assessed by minimal depression (50.3%) and minimal anxiety (45%), with females with high IHS scoring significantly higher in both depression and anxiety (p<.01). Examination of the coping strategies of PLHIV found that the most frequently used coping styles were Acceptance (91%), Religion (84.3%), Planning (74.7%), Active Coping (66%) and Emotional Support (52.7%). High perception of perceived social support (48%) was found in the present study. Correlation analysis revealed significant positive relationships between IHS and depression as well as anxiety (p<.01), thus revealing that IHS negatively affects the mental health of PLHIV. Results however revealed that this effect may be lessened by the use of various coping strategies by PLHIV as well as their perception of social support.Keywords: Aizawl, anxiety, depression, internalized HIV stigma, HIV/AIDS, mental health, mizoram, perceived social support
Procedia PDF Downloads 26215368 An Analysis of Turn-Taking in ESL Classrooms
Authors: Nursuhaila Ibrahim, Noor Hanim Rahmat, Nurul Ain Hasni, Nursyuhada Zakaria
Abstract:
Past studies have shown that class discussions in the ESL classrooms not only helped students exchange ideas with their peers. Students also learn turn taking skills throughout the discussion. Through interacting with their peers, learners learn to use turn-taking strategies. They learn to wait for their turn, to listen to the ideas of others, to disagree, or to agree, and to add on more points in the conversation. This quantitative research explores students’ perception on class discussions and how the discussions influence their choice of turn-taking strategies. Findings of this research will have interesting implications towards the use of class discussions in the ESL classrooms.Keywords: ESL, class discussions, turn-taking skills, peers
Procedia PDF Downloads 49315367 Thematic Analysis of Ramayana Narrative Scroll Paintings: A Need for Knowledge Preservation
Authors: Shatarupa Thakurta Roy
Abstract:
Along the limelight of mainstream academic practices in Indian art, exist a significant lot of habitual art practices that are mutually susceptible in their contemporary forms. Narrative folk paintings of regional India has successfully dispersed to its audience social messages through pulsating pictures and orations. The paper consists of images from narrative scroll paintings on ‘Ramayana’ theme from various neighboring states as well as districts in India, describing their subtle differences in style of execution, method, and use of material. Despite sharing commonness in the choice of subject matter, habitual and ceremonial Indian folk art in its formative phase thrived within isolated locations to yield in remarkable variety in the art styles. The differences in style took place district wise, cast wise and even gender wise. An open flow is only evident in the contemporary expressions as a result of substantial changes in social structures, mode of communicative devices, cross-cultural exposures and multimedia interactivities. To decipher the complex nature of popular cultural taste of contemporary India it is important to categorically identify its root in vernacular symbolism. The realization of modernity through European primitivism was rather elevated as a perplexed identity in Indian cultural margin in the light of nationalist and postcolonial ideology. To trace the guiding factor that has still managed to obtain ‘Indianness’ in today’s Indian art, researchers need evidences from the past that are yet to be listed in most instances. They are commonly created on ephemeral foundations. The artworks are also found in endangered state and hence, not counted much friendly for frequent handling. The museums are in dearth of proper technological guidelines to preserve them. Even though restoration activities are emerging in the country, the existing withered and damaged artworks are in threat to perish. An immediacy of digital achieving is therefore envisioned as an alternative to save this cultural legacy. The method of this study is, two folded. It primarily justifies the richness of the evidences by conducting categorical aesthetic analysis. The study is supported by comments on the stylistic variants, thematic aspects, and iconographic identities alongside its anthropological and anthropomorphic significance. Further, it explores the possible ways of cultural preservation to ensure cultural sustainability that includes technological intervention in the form of digital transformation as an altered paradigm for better accessibility to the available recourses. The study duly emphasizes on visual description in order to culturally interpret and judge the rare visual evidences following Feldman’s four-stepped method of formal analysis combined with thematic explanation. A habitual design that emerges and thrives within complex social circumstances may experience change placing its principle philosophy at risk by shuffling and altering with time. A tradition that respires in the modern setup struggles to maintain timeless values that operate its creative flow. Thus, the paper hypothesizes the survival and further growth of this practice within the dynamics of time and concludes in realization of the urgency to transform the implicitness of its knowledge into explicit records.Keywords: aesthetic, identity, implicitness, paradigm
Procedia PDF Downloads 36915366 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 23915365 Exploration into Bio Inspired Computing Based on Spintronic Energy Efficiency Principles and Neuromorphic Speed Pathways
Authors: Anirudh Lahiri
Abstract:
Neuromorphic computing, inspired by the intricate operations of biological neural networks, offers a revolutionary approach to overcoming the limitations of traditional computing architectures. This research proposes the integration of spintronics with neuromorphic systems, aiming to enhance computational performance, scalability, and energy efficiency. Traditional computing systems, based on the Von Neumann architecture, struggle with scalability and efficiency due to the segregation of memory and processing functions. In contrast, the human brain exemplifies high efficiency and adaptability, processing vast amounts of information with minimal energy consumption. This project explores the use of spintronics, which utilizes the electron's spin rather than its charge, to create more energy-efficient computing systems. Spintronic devices, such as magnetic tunnel junctions (MTJs) manipulated through spin-transfer torque (STT) and spin-orbit torque (SOT), offer a promising pathway to reducing power consumption and enhancing the speed of data processing. The integration of these devices within a neuromorphic framework aims to replicate the efficiency and adaptability of biological systems. The research is structured into three phases: an exhaustive literature review to build a theoretical foundation, laboratory experiments to test and optimize the theoretical models, and iterative refinements based on experimental results to finalize the system. The initial phase focuses on understanding the current state of neuromorphic and spintronic technologies. The second phase involves practical experimentation with spintronic devices and the development of neuromorphic systems that mimic synaptic plasticity and other biological processes. The final phase focuses on refining the systems based on feedback from the testing phase and preparing the findings for publication. The expected contributions of this research are twofold. Firstly, it aims to significantly reduce the energy consumption of computational systems while maintaining or increasing processing speed, addressing a critical need in the field of computing. Secondly, it seeks to enhance the learning capabilities of neuromorphic systems, allowing them to adapt more dynamically to changing environmental inputs, thus better mimicking the human brain's functionality. The integration of spintronics with neuromorphic computing could revolutionize how computational systems are designed, making them more efficient, faster, and more adaptable. This research aligns with the ongoing pursuit of energy-efficient and scalable computing solutions, marking a significant step forward in the field of computational technology.Keywords: material science, biological engineering, mechanical engineering, neuromorphic computing, spintronics, energy efficiency, computational scalability, synaptic plasticity.
Procedia PDF Downloads 4315364 Performance Analysis of Ad-Hoc Network Routing Protocols
Authors: I. Baddari, A. Riahla, M. Mezghich
Abstract:
Today in the literature, we discover a lot of routing algorithms which some have been the subject of normalization. Two great classes Routing algorithms are defined, the first is the class reactive algorithms and the second that of algorithms proactive. The aim of this work is to make a comparative study between some routing algorithms. Two comparisons are considered. The first will focus on the protocols of the same class and second class on algorithms of different classes (one reactive and the other proactive). Since they are not based on analytical models, the exact evaluation of some aspects of these protocols is challenging. Simulations have to be done in order to study their performances. Our simulation is performed in NS2 (Network Simulator 2). It identified a classification of the different routing algorithms studied in a metrics such as loss of message, the time transmission, mobility, etc.Keywords: ad-hoc network routing protocol, simulation, NS2, delay, packet loss, wideband, mobility
Procedia PDF Downloads 40015363 An Econometric Analysis of the Flat Tax Revolution
Authors: Wayne Tarrant, Ethan Petersen
Abstract:
The concept of a flat tax goes back to at least the Biblical tithe. A progressive income tax was first vociferously espoused in a small, but famous, pamphlet in 1848 (although England had an emergency progressive tax for war costs prior to this). Within a few years many countries had adopted the progressive structure. The flat tax was only reinstated in some small countries and British protectorates until Mart Laar was elected Prime Minister of Estonia in 1992. Since Estonia’s adoption of the flat tax in 1993, many other formerly Communist countries have likewise abandoned progressive income taxes. Economists had expectations of what would happen when a flat tax was enacted, but very little work has been done on actually measuring the effect. With a testbed of 21 countries in this region that currently have a flat tax, much comparison is possible. Several countries have retained progressive taxes, giving an opportunity for contrast. There are also the cases of Czech Republic and Slovakia, which have adopted and later abandoned the flat tax. Further, with over 20 years’ worth of economic history in some flat tax countries, we can begin to do some serious longitudinal study. In this paper we consider many economic variables to determine if there are statistically significant differences from before to after the adoption of a flat tax. We consider unemployment rates, tax receipts, GDP growth, Gini coefficients, and market data where the data are available. Comparisons are made through the use of event studies and time series methods. The results are mixed, but we draw statistically significant conclusions about some effects. We also look at the different implementations of the flat tax. In some countries there are equal income and corporate tax rates. In others the income tax has a lower rate, while in others the reverse is true. Each of these sends a clear message to individuals and corporations. The policy makers surely have a desired effect in mind. We group countries with similar policies, try to determine if the intended effect actually occurred, and then report the results. This is a work in progress, and we welcome the suggestion of variables to consider. Further, some of the data from before the fall of the Iron Curtain are suspect. Since there are new ruling regimes in these countries, the methods of computing different statistical measures has changed. Although we first look at the raw data as reported, we also attempt to account for these changes. We show which data seem to be fictional and suggest ways to infer the needed statistics from other data. These results are reported beside those on the reported data. Since there is debate about taxation structure, this paper can help inform policymakers of change the flat tax has caused in other countries. The work shows some strengths and weaknesses of a flat tax structure. Moreover, it provides beginnings of a scientific analysis of the flat tax in practice rather than having discussion based solely upon theory and conjecture.Keywords: flat tax, financial markets, GDP, unemployment rate, Gini coefficient
Procedia PDF Downloads 33915362 Dry Reforming of Methane Using Metal Supported and Core Shell Based Catalyst
Authors: Vinu Viswanath, Lawrence Dsouza, Ugo Ravon
Abstract:
Syngas typically and intermediary gas product has a wide range of application of producing various chemical products, such as mixed alcohols, hydrogen, ammonia, Fischer-Tropsch products methanol, ethanol, aldehydes, alcohols, etc. There are several technologies available for the syngas production. An alternative to the conventional processes an attractive route of utilizing carbon dioxide and methane in equimolar ratio to generate syngas of ratio close to one has been developed which is also termed as Dry Reforming of Methane technology. It also gives the privilege to utilize the greenhouse gases like CO2 and CH4. The dry reforming process is highly endothermic, and indeed, ΔG becomes negative if the temperature is higher than 900K and practically, the reaction occurs at 1000-1100K. At this temperature, the sintering of the metal particle is happening that deactivate the catalyst. However, by using this strategy, the methane is just partially oxidized, and some cokes deposition occurs that causing the catalyst deactivation. The current research work was focused to mitigate the main challenges of dry reforming process such coke deposition, and metal sintering at high temperature.To achieve these objectives, we employed three different strategies of catalyst development. 1) Use of bulk catalysts such as olivine and pyrochlore type materials. 2) Use of metal doped support materials, like spinel and clay type material. 3) Use of core-shell model catalyst. In this approach, a thin layer (shell) of redox metal oxide is deposited over the MgAl2O4 /Al2O3 based support material (core). For the core-shell approach, an active metal is been deposited on the surface of the shell. The shell structure formed is a doped metal oxide that can undergo reduction and oxidation reactions (redox), and the core is an alkaline earth aluminate having a high affinity towards carbon dioxide. In the case of metal-doped support catalyst, the enhanced redox properties of doped CeO2 oxide and CO2 affinity property of alkaline earth aluminates collectively helps to overcome coke formation. For all of the mentioned three strategies, a systematic screening of the metals is carried out to optimize the efficiency of the catalyst. To evaluate the performance of them, the activity and stability test were carried out under reaction conditions of temperature ranging from 650 to 850 ̊C and an operating pressure ranging from 1 to 20 bar. The result generated infers that the core-shell model catalyst showed high activity and better stable DR catalysts under atmospheric as well as high-pressure conditions. In this presentation, we will show the results related to the strategy.Keywords: carbon dioxide, dry reforming, supports, core shell catalyst
Procedia PDF Downloads 17915361 Populism and the Democratic Crisis: Comparative Study of Four Countries
Authors: Hyein Ko
Abstract:
In 2017, many signs of populism occurred around the world. This paper suggests that populism is not a sudden phenomenon, but a manifestation of common people’s will. By analyzing previous research, this paper proposes three factors related to populism: Inequality, experience of economic crisis, and rapid cultural change. With these three elements, four cases will be investigated in this article; two countries experienced populism, and the other two countries did not experience it. Comparing four cases by using three elements will give a fruitful foundation for further analysis regarding populism. In sum, aforementioned three elements are highly related to the occurrence of populism. However, there is one hidden factor: dissatisfaction with established politics. Thus, populism is not a temporal phenomenon. It is a red alert for democratic crisis.Keywords: common people, democratic crisis, populism, Trump phenomenon
Procedia PDF Downloads 24115360 Analysis of Flexural Behavior of Wood-Concrete Beams
Authors: M. Li, V. D. Thi, M. Khelifa, M. El Ganaoui
Abstract:
This study presents an overview of the work carried out by the use of wood waste as coarse aggregate in mortar. The paper describes experimental and numerical investigations carried on pervious concrete made of wood chips and also sheds lights on the mechanical properties of this new product. The properties of pervious wood-concrete such as strength, elastic modulus, and failure modes are compared and evaluated. The characterization procedure of the mechanical properties of wood waste ash are presented and discussed. The numerical and tested load–deflection response results are compared. It was observed that the numerical results are in good agreement with the experimental results.Keywords: wood waste ash, characterization, mechanical properties, bending tests
Procedia PDF Downloads 30715359 Voluntary Information of Intellectual Capital Disclosed Online by Public Spanish Universities
Authors: Yolanda Ramírez, Ángel Tejada, Agustín Baidez
Abstract:
The purpose of this paper is to examine the quality of voluntary intellectual capital disclosure by public Spanish universities on their websites. To this end, a content analysis was used to analyze the websites of 50 public Spanish universities i 2016. The results of this study show that human capital was the most disclosed category with relational capital being the least frequently disclosed in Spain. However, the quality of structural capital disclosures was higher than relational and human capital. Finally, most IC disclosures were narrative in nature.Keywords: intellectual capital, quality disclosure, websites, universities, Spain
Procedia PDF Downloads 23115358 Analysis of Creative City Indicators in Isfahan City, Iran
Authors: Reza Mokhtari Malek Abadi, Mohsen Saghaei, Fatemeh Iman
Abstract:
This paper investigates the indices of a creative city in Isfahan. Its main aim is to evaluate quantitative status of the creative city indices in Isfahan city, analyze the dispersion and distribution of these indices in Isfahan city. Concerning these, this study tries to analyze the creative city indices in fifteen area of Isfahan through secondary data, questionnaire, TOPSIS model, Shannon entropy and SPSS. Based on this, the fifteen areas of Isfahan city have been ranked with 12 factors of creative city indices. The results of studies show that fifteen areas of Isfahan city are not equally benefiting from creative indices and there is much difference between the areas of Isfahan city.Keywords: grading, creative city, creative city evaluation indicators, regional planning model
Procedia PDF Downloads 47115357 Phenomenology of Child Labour in Estates, Farms and Plantations in Zimbabwe: A Comparative Analysis of Tanganda and Eastern Highlands Tea Estates
Authors: Chupicai Manuel
Abstract:
The global efforts to end child labour have been increasingly challenged by adages of global capitalism, inequalities and poverty affecting the global south. In the face the of rising inequalities whose origin can be explained from historical and political economy analysis between the poor and the rich countries, child labour is also on the rise particularly on the global south. The socio-economic and political context of Zimbabwe has undergone serious transition from colonial times through the post-independence normally referred to as the transition period up to the present day. These transitions have aided companies and entities in the business and agriculture sector to exploit child labour while country provided conditions that enhance child labour due to vulnerability of children and anomic child welfare system that plagued the country. Children from marginalised communities dominated by plantations and farms are affected most. This paper explores the experiences and perceptions of children working in tea estates, plantations and farms, and the adults who formerly worked in these plantations during their childhood to share their experiences and perceptions on child labour in Zimbabwe. Childhood theories that view children as apprentices and a human rights perspectives were employed to interrogate the concept of childhood, child labour and poverty alleviation strategies. Phenomenological research design was adopted to describe the experiences of children working in plantations and interpret the meanings they have on their work and livelihoods. The paper drew form 30 children from two plantations through semi-structured interviews and 15 key informant interviews from civil society organisations, international labour organisation, adults who formerly worked in the plantations and the personnel of the plantations. The findings of the study revealed that children work on the farms as an alternative model for survival against economic challenges while the majority cited that poverty compel them to work and get their fees and food paid for. Civil society organisations were of the view that child rights are violated and the welfare system of the country is malfunctional. The perceptions of the majority of the children interviewed are that the system on the plantations is better and this confirmed the socio-constructivist theory that views children as apprentices. The study recommended child sensitive policies and welfare regime that protects children from exploitation together with policing and legal measures that secure child rights.Keywords: child labour, child rights, phenomenology, poverty reduction
Procedia PDF Downloads 25615356 Educational Innovation and ICT: Before and during 21st Century
Authors: Carlos Monge López, Patricia Gómez Hernández
Abstract:
Educational innovation is a quality factor of teaching-learning processes and institutional accreditation. There is an increasing of these change processes, especially after 2000. However, the publications about this topic are more associated with ICTs in currently century. The main aim of the study was to determine the tendency of educational innovations around ICTs. The used method was mixed research design (content analysis, review of scientific literature and descriptive, comparative and correlation study) with 649 papers. In summary, the results indicated that, progressively, the educational innovation is associated with ICTs, in comparison with this type of change processes without ICTs. In conclusion, although this tendency, scientific literature must divulgate more kinds of pedagogical innovation with the aim of deepening in other new resources.Keywords: descriptive study, knowledge society, pedagogical innovation, technologies
Procedia PDF Downloads 48515355 Nigerian Media Coverage of the Chibok Girls Kidnap: A Qualitative News Framing Analysis of the Nation Newspaper
Authors: Samuel O. Oduyela
Abstract:
Over the last ten years, many studies have examined the media coverage of terrorism across the world. Nevertheless, most of these studies have been inclined to the western narrative, more so in relation to the international media. This study departs from that partiality to explore the Nigerian press and its coverage of the Boko Haram. The study intends to illustrate how the Nigerian press has reported its homegrown terrorism within its borders. On 14 April 2014, the Shekau-led Boko Haram kidnapped over 200 female students from Chibok in the Borno State. This study analyses a structured sample of news stories, feature articles, editorial comments, and opinions from the Nation newspaper. The study examined the representation of the Chibok girls kidnaps by concentrating on four main viewpoints. The news framing of the Chibok girls’ kidnap under Presidents Goodluck Jonathan (2014) and Mohammadu Buhari (2016-2018), the sourcing model present in the news reporting of the kidnap and the challenges Nation reporters face in reporting Boko Haram. The study adopted the use of qualitative news framing analysis to provide further insights into significant developments established from the examination of news contents. The study found that the news reportage mainly focused on the government response to Chibok girls kidnap, international press and Boko Haram. Boko Haram was also framed, as a political conspiracy, as prevailing, and as instilling fear. Political, and economic influence appeared to be a significant determinant of the reportage. The study found that the Nation newspaper's portrayal of the crisis under President Jonathan differed significantly from under President Buhari. While the newspaper framed the action of President Jonathan as lacklustre, dismissive, and confusing, it was less critical of President Buhari's government's handling of the crisis. The Nation newspaper failed to promote or explore non-violent approaches. News reports of the kidnap, thus, were presented mainly from a political and ethnoreligious perspective. The study also raised questions of what roles should journalists play in covering conflicts? Should they merely report comments on and interpret it, or should they be actors in the resolution or, more importantly, the prevention of conflicts? The study underlined the need for the independence of the media, more training for journalists to advance a more nuanced and conflict-sensitive news coverage in the Nigerian context.Keywords: boko haram, chibok girls kidnap, conflict in nigeria, media framing
Procedia PDF Downloads 15015354 Advertising Message Strategy on Ghana’s TV
Authors: Aisha Iddrisu, Ferruh Uztuğ
Abstract:
This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type.Keywords: advertising, message strategy, Ghana, television
Procedia PDF Downloads 18415353 The Significance of Picture Mining in the Fashion and Design as a New Research Method
Authors: Katsue Edo, Yu Hiroi
Abstract:
T Increasing attention has been paid to using pictures and photographs in research since the beginning of the 21th century in social sciences. Meanwhile we have been studying the usefulness of Picture mining, which is one of the new ways for a these picture using researches. Picture Mining is an explorative research analysis method that takes useful information from pictures, photographs and static or moving images. It is often compared with the methods of text mining. The Picture Mining concept includes observational research in the broad sense, because it also aims to analyze moving images (Ochihara and Edo 2013). In the recent literature, studies and reports using pictures are increasing due to the environmental changes. These are identified as technological and social changes (Edo et.al. 2013). Low price digital cameras and i-phones, high information transmission speed, low costs for information transferring and high performance and resolution of the cameras of mobile phones have changed the photographing behavior of people. Consequently, there is less resistance in taking and processing photographs for most of the people in the developing countries. In these studies, this method of collecting data from respondents is often called as ‘participant-generated photography’ or ‘respondent-generated visual imagery’, which focuses on the collection of data and its analysis (Pauwels 2011, Snyder 2012). But there are few systematical and conceptual studies that supports it significance of these methods. We have discussed in the recent years to conceptualize these picture using research methods and formalize theoretical findings (Edo et. al. 2014). We have identified the most efficient fields of Picture mining in the following areas inductively and in case studies; 1) Research in Consumer and Customer Lifestyles. 2) New Product Development. 3) Research in Fashion and Design. Though we have found that it will be useful in these fields and areas, we must verify these assumptions. In this study we will focus on the field of fashion and design, to determine whether picture mining methods are really reliable in this area. In order to do so we have conducted an empirical research of the respondents’ attitudes and behavior concerning pictures and photographs. We compared the attitudes and behavior of pictures toward fashion to meals, and found out that taking pictures of fashion is not as easy as taking meals and food. Respondents do not often take pictures of fashion and upload their pictures online, such as Facebook and Instagram, compared to meals and food because of the difficulty of taking them. We concluded that we should be more careful in analyzing pictures in the fashion area for there still might be some kind of bias existing even if the environment of pictures have drastically changed in these years.Keywords: empirical research, fashion and design, Picture Mining, qualitative research
Procedia PDF Downloads 36315352 Status of Communication and Swallowing Therapy in Patient with a Tracheostomy
Authors: Ya-Hui Wang
Abstract:
Lower speech therapy rate of tracheostomized patient was noted in comparison with previous researches. This study is aim to shed light on the referral status of speech therapy in those patients in Taiwan. This study developed an analysis for the size and key characteristics of the population of tracheostomized in-patient in the Taiwan. Method: We analyzed National Healthcare Insurance data (The Collaboration Center of Health Information Application, CCHIA) from Jan 1 2010 to Dec 31 2010. Result: over ages 3, number of tracheostomized in-patient is directly proportional to age. A high service loading was observed in North region in comparison with other regions. Only 4.87% of the tracheostomized in-patients were referred for speech therapy, and 1.9% for swallow examination, 2.5% for communication evaluation.Keywords: refer, speech therapy, training, rehabilitation
Procedia PDF Downloads 44015351 TARF: Web Toolkit for Annotating RNA-Related Genomic Features
Abstract:
Genomic features, the genome-based coordinates, are commonly used for the representation of biological features such as genes, RNA transcripts and transcription factor binding sites. For the analysis of RNA-related genomic features, such as RNA modification sites, a common task is to correlate these features with transcript components (5'UTR, CDS, 3'UTR) to explore their distribution characteristics in terms of transcriptomic coordinates, e.g., to examine whether a specific type of biological feature is enriched near transcription start sites. Existing approaches for performing these tasks involve the manipulation of a gene database, conversion from genome-based coordinate to transcript-based coordinate, and visualization methods that are capable of showing RNA transcript components and distribution of the features. These steps are complicated and time consuming, and this is especially true for researchers who are not familiar with relevant tools. To overcome this obstacle, we develop a dedicated web app TARF, which represents web toolkit for annotating RNA-related genomic features. TARF web tool intends to provide a web-based way to easily annotate and visualize RNA-related genomic features. Once a user has uploaded the features with BED format and specified a built-in transcript database or uploaded a customized gene database with GTF format, the tool could fulfill its three main functions. First, it adds annotation on gene and RNA transcript components. For every features provided by the user, the overlapping with RNA transcript components are identified, and the information is combined in one table which is available for copy and download. Summary statistics about ambiguous belongings are also carried out. Second, the tool provides a convenient visualization method of the features on single gene/transcript level. For the selected gene, the tool shows the features with gene model on genome-based view, and also maps the features to transcript-based coordinate and show the distribution against one single spliced RNA transcript. Third, a global transcriptomic view of the genomic features is generated utilizing the Guitar R/Bioconductor package. The distribution of features on RNA transcripts are normalized with respect to RNA transcript landmarks and the enrichment of the features on different RNA transcript components is demonstrated. We tested the newly developed TARF toolkit with 3 different types of genomics features related to chromatin H3K4me3, RNA N6-methyladenosine (m6A) and RNA 5-methylcytosine (m5C), which are obtained from ChIP-Seq, MeRIP-Seq and RNA BS-Seq data, respectively. TARF successfully revealed their respective distribution characteristics, i.e. H3K4me3, m6A and m5C are enriched near transcription starting sites, stop codons and 5’UTRs, respectively. Overall, TARF is a useful web toolkit for annotation and visualization of RNA-related genomic features, and should help simplify the analysis of various RNA-related genomic features, especially those related RNA modifications.Keywords: RNA-related genomic features, annotation, visualization, web server
Procedia PDF Downloads 20815350 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 39815349 Effect of Parameters for Exponential Loads on Voltage Transmission Line with Compensation
Authors: Benalia Nadia, Bensiali Nadia, Zerzouri Noura
Abstract:
This paper presents an analysis of the effects of parameters np and nq for exponential load on the transmission line voltage profile, transferred power and transmission losses for different shunt compensation size. For different values for np and nq in which active and reactive power vary with it is terminal voltages as in exponential form, variations of the load voltage for different sizes of shunt capacitors are simulated with a simple two-bus power system using Matlab SimPowerSystems Toolbox. It is observed that the compensation level is significantly affected by the voltage sensitivities of loads.Keywords: static load model, shunt compensation, transmission system, exponentiel load model
Procedia PDF Downloads 36815348 Concentration of Some Hazardous Metals (Cd, Pb and Ni) in Egg Samples Analysed from Poultry Farms Located near Automechanics Workshops, Industrial Areas and Roadsides in Kano and Kaduna
Authors: M. I. Mohammed, A. M. Sani, A. S. Bayero
Abstract:
The aim of this work is to study the effect of farm site location by determining the levels of hazardous metals in poultry eggs samples collected near auto mechanics, industrial areas and roadsides in Kaduna and Kano States of Nigeria. Atomic absorption spectrophotometer was used for the analysis of the metals. The mean concentration ranges of the metals analysed in egg white and egg yolk were Pb: 0.05-0.10mgkg⁻¹, Ni: 0.10-0.30mgkg⁻¹ and Cd: not detected -0.03mgkg⁻¹. It was concluded that farm site locations has very low significant effect on the concentration of hazardous metals level.Keywords: albumen, Egg, hazardous metals, poultry farms
Procedia PDF Downloads 263