Search results for: internet protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2666

Search results for: internet protocol

776 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 126
775 Comparison of Fuel Properties from Species of Microalgae and Selected Second-Generation Oil Feedstocks

Authors: Andrew C. Eloka Eboka, Freddie L. Inambao

Abstract:

Comparative investigation and assessment of microalgal technology as a biodiesel production option was studied alongside other second generation feedstocks. This was carried out by comparing the fuel properties of species of Chlorella vulgaris, Duneliella spp, Synechococus spp and Senedesmus spp with the feedstock of Jatropha (ex-basirika variety), Hura crepitans, rubber and Natal mahogany seed oils. The micro-algae were cultivated in an open pond using a photobioreactor (New Brunsink set-up model BF-115 Bioflo/CelliGen made in the US) with operating parameters: 14L capacity, working volume of 7.5L media, including 10% inoculum, at optical density of 3.144 @540nm and light intensity of 200 lux, for 23 and 16 days respectively. Various produced/accumulated biomasses were harvested by draining, flocculation, centrifugation, drying and then subjected to lipid extraction processes. The oils extracted from the algae and feedstocks were characterised and used to produce biodiesel fuels, by the transesterification method, using modified optimization protocol. Fuel properties of the final biodiesel products were evaluated for chemo-physical and fuel properties. Results revealed Chlorella vulgaris as the best strain for biomass cultivation, having the highest lipid productivity (5.2mgL-1h-1), the highest rate of CO2 absorption (17.85mgL-1min-1) and the average carbon sequestration in the form of CO2 was 76.6%. The highest biomass productivity was 35.1mgL-1h-1 (Chlorella), while Senedesmus had the least output (3.75mgL-1h-1, 11.73mgL-1min-1). All species had good pH value adaptation, ranging from 6.5 to 8.5. The fuel properties of the micro-algal biodiesel in comparison with Jatropha, rubber, Hura and Natal mahogany were within ASTM specification and AGO used as the control. Fuel cultivation from microalgae is feasible and will revolutionise the biodiesel industry.

Keywords: biodiesel, fuel properties, microalgae, second generation, seed oils, feedstock, photo-bioreactor, open pond

Procedia PDF Downloads 354
774 Caregiver’s Perception Regarding Diagnosis Disclosure to Children Living with Human Immunodeficiency Virus in Resource-Limited Settings: Observational Study from India

Authors: Ramesh Chand Chauhan, Sanjay Kumar Rai, Shashi kant, Rakesh Lodha, Nand Kumar

Abstract:

Background: With a better understanding of HIV pathogenesis and availability of antiretroviral therapy more children are growing and entering in teenage group; informing children of their own HIV status has become an important aspect of long-term disease management. There is little evidence of how and when this type of disclosure takes place in a resource-limited setting. Methods: A cross-sectional study was conducted from June 2010 to May 2011 among a dyads of 156 HIV-infected children and their caregivers, those were visiting pediatric clinic at a tertiary care hospital in Delhi, India. The study protocol was approved by the Institute Ethics Committee. After taking written informed consent; pretested structured questionnaire was administered to caregivers during routine clinic visits. Information regarding socio-demographic characteristics, awareness of HIV infection status among children and their perception regarding disclosure was collected. Mean and frequencies were calculated and chi-square and logistic regression test were applied. Results: The mean age of children was 8.4 ±3.45 years. Among them 73.7% were male and 39.1% were orphans. Among 156 enrolled children, 74.4% (n=116) were of ≥ 6 years and were assessed for disclosure. Only 18.1% (n=21) children had been informed of their HIV status. Of those under 9 years, 6.4% knew their status, whereas 18.4% of 9-11 years and 35.5% of 12-14 years children knew they had HIV. Awareness among males (23.3%) was higher than females (3.3%). Both age and sex of child were significantly (p<0.01) associated with disclosure status. Other factors favoring disclosure were orphan-hood, non-perinatal mode of transmission (OR = 4.32; 95% CI 1.01-7.12), ART initiation (OR = 4.21; 95% CI 1.03-6.98), and caregiver educated beyond primary level (OR = 1.89; 95% CI 1.03-3.26). Repeated enquiry regarding the visit to clinic was the most common reason (66.6%) for disclosure. In 52.4% children disclosure was done with the involvement of other family members. 82.5% caregivers felt the age of > 10 years is appropriate for disclosing the HIV infection status to the child. Conclusion: Detailed guidelines on disclosure are required focusing on children of school-going age with perinatal infection who are not on ART and with caregivers of low educational status.

Keywords: HIV, children, India, disclosure

Procedia PDF Downloads 621
773 Effects of E-Learning Mode of Instruction and Conventional Mode of Instruction on Student’s Achievement in English Language in Senior Secondary Schools, Ibadan Municipal, Nigeria

Authors: Ibode Osa Felix

Abstract:

The use of e-Learning is presently intensified in the academic world following the outbreak of the Covid-19 pandemic in early 2020. Hitherto, e-learning had made its debut in teaching and learning many years ago when it emerged as an aspect of Computer Based Teaching, but never before has its patronage become so important and popular as currently obtains. Previous studies revealed that there is an ongoing debate among researchers on the efficacy of the E-learning mode of instruction over the traditional teaching method. Therefore, the study examined the effect of E-learning and Conventional Mode of Instruction on Students Achievement in the English Language. The study is a quasi-experimental study in which 230 students, from three public secondary schools, were selected through a simple random sampling technique. Three instruments were developed, namely, E-learning Instructional Guide (ELIG), Conventional Method of Instructional Guide (CMIG), and English Language Achievement Test (ELAT). The result revealed that students taught through the conventional method had better results than students taught online. The result also shows that girls taught with the conventional method of teaching performed better than boys in the English Language. The study, therefore, recommended that effort should be made by the educational authorities in Nigeria to provide internet facilities to enhance practices among learners and provide electricity to power e-learning equipment in the secondary schools. This will boost e-learning practices among teachers and students and consequently overtake conventional method of teaching in due course.

Keywords: e-learning, conventional method of teaching, achievement in english, electricity

Procedia PDF Downloads 160
772 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 136
771 A Study on the Prevalence and Microbiological Profile of Nosocomial Infections in the ICU of a Tertiary Care Hospital in Eastern India

Authors: Pampita Chakraborty, Sukumar Mukherjee

Abstract:

This study was done to determine the prevalence of nosocomial infections in the ICU and to identify the common microorganisms causing these infections and their antimicrobial sensitivity pattern. Nosocomial infection or hospital-acquired infection is a localized or a systemic condition resulting from an adverse reaction to the presence of infectious agents. Nosocomial infections are not present or incubating when the patient is admitted to hospital or other health care facility. They are caused by pathogens that easily spread through the body. Many hospitalized patients have compromised immune systems, so they are less able to fight off infections. These infections occur worldwide, both in the developed and developing the world. They are a significant burden to patients and public health. They are a major cause of death and increased morbidity in hospitalized patients, which is a matter of serious concern today. This study was done during the period of one year (2012-2013) in the ICU of the tertiary care hospital in eastern India. Prevalence of nosocomial infection was determined; site of infection and the pattern of microorganisms were identified along with the assessment of antibiotic susceptibility profile. Patients who developed an infection after 48 hours of admission to the ICU were included in the study. A total of 324 ICU patients were analyzed, of these 79 patients were found to have developed a nosocomial infection (24.3% prevalence). Urinary tract infection was found to be more predominant followed by respiratory tract infection and soft tissue infection. The most frequently isolated microorganism was E. coli, Pseudomonas aeruginosa, Klebsiella pneumoniae followed by other organisms respectively. Antibiotic susceptibility test of these isolates was done against commonly used antibiotics. Patients admitted to the ICU are especially susceptible to nosocomial infections. Despite adequate antimicrobial treatment, nosocomial ICU infections can significantly affect ICU stay and can cause an increase in patient’s morbidity and mortality. Adherence to infection protocol, proper monitoring and the judicious use of antibiotics are important in preventing such infections on a regular basis.

Keywords: antibiotic susceptibility, intensive care unit, nosocomial infection, nosocomial pathogen

Procedia PDF Downloads 311
770 Long-Term Effects of Psychosocial Interventions for Adolescents on Depression and Anxiety: A Systematic Review and Meta-Analysis

Authors: Denis Duagi, Ben Carter, Maria Farrelly, Stephen Lisk, June S. L. Brown

Abstract:

Background: Adolescence represents a distinctive phase of development, and variables linked to this developmental period could affect the efficiency of prevention and treatment for depression and anxiety, as well as the long-term prognosis. The objectives of this study were to investigate the long-term effectiveness of psychosocial interventions for adolescents on depression and anxiety symptoms and to assess the influence of different intervention parameters on the long-term effects. Methods: Searches were carried out on the 11ᵗʰ of August 2022 using five databases (Cochrane Library, Embase, Medline, PsychInfo, Web of Science), as well as trial registers. Randomized controlled trials of psychosocial interventions targeting specifically adolescents were included if they assessed outcomes at 1-year post-intervention or more. The Cochrane risk of bias-2 quality assessment tool was used. The primary outcome was depression, and studies were pooled using a standardised mean difference, with an associated 95% confidence interval, p-value, and I². The study protocol was pre-registered (CRD42022348668). Findings: A total of 57 reports (n= 46,678 participants) were included in the review. Psychosocial interventions led to small reductions in depressive symptoms, with a standardised mean difference (SMD) at 1-year of -0.08 (95%CI -0.20, -0.03, p=0.002, I²=72%), 18-months SMD=-0.12, 95% CI -0.22, -0.01, p=0.03, I²=63%) and 2-years SMD=-0.12 (95% CI -0.20, -0.03, p=0.01, I²=68%). Sub-group analyses indicated that targeted interventions produced stronger effects, particularly when delivered by trained mental health professionals (K=18, SMD=-0.24, 95% CI -0.38, -0.10, p=0.001, I²=60%). No effects were detected for anxiety at any assessment. Conclusion: Psychosocial interventions specifically targeting adolescents were shown to have small but positive effects on depression symptoms but not anxiety symptoms, which were sustained for up to 2 years. These findings highlight the potential population-level preventive effects if such psychosocial interventions become widely implemented in accessible settings such as schools.

Keywords: psychosocial, adolescent, interventions, depression, anxiety, meta-analysis, randomized controlled trial

Procedia PDF Downloads 60
769 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 41
768 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 356
767 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 243
766 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 513
765 Exploration of Correlation between Design Principles and Elements with the Visual Aesthetic in Residential Interiors

Authors: Ikra Khan, Reenu Singh

Abstract:

Composition is essential when designing the interiors of residential spaces. The ability to adopt a unique style of using design principles and design elements is another. This research report explores how the visual aesthetic within a space is achieved through the use of design principles and design elements while maintaining a signature style. It also observes the relationship between design styles and compositions that are achieved as a result of the implementation of the principles. Information collected from books and the internet helped to understand how a composition can be achieved in residential interiors by resorting to design principles and design elements as tools for achieving an aesthetic composition. It also helped determine the results of authentic representation of design ideas and how they make one’s work exceptional. A questionnaire survey was also conducted to understand the impact of a visually aesthetic residential interior of a signature style on the lifestyle of individuals residing in them. The findings denote a pattern in the application of design principles and design elements. Individual principles and elements or a combination of the same are used to achieve an aesthetically pleasing composition. This was supported by creating CAD illustrations of two different residential projects with varying approaches and design styles. These illustrations include mood boards, 3D models, and sectional elevations as rendered views to understand the concept design and its translation via these mediums. A direct relation is observed between the application of design principles and design elements to achieve visually aesthetic residential interiors that suit an individual’s taste. These practices can be applied when designing bespoke commercial as well as industrial interiors that are suited to specific aesthetic and functional needs.

Keywords: composition, design principles, elements, interiors, residential spaces

Procedia PDF Downloads 90
764 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact

Authors: Abdullah Almowanes

Abstract:

The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.

Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia

Procedia PDF Downloads 236
763 Algerian EFL Students' Perceptions towards the Development of Writing through Weblog Storytelling

Authors: Nawel Mansouri

Abstract:

Weblog as a form of internet-based resources has become popular as an authentic and constructive learning tool, especially in the language classroom. This research explores the use of weblog storytelling as a pedagogical tool to develop Algerian EFL students’ creative writing. This study aims to investigate the effectiveness of weblog- writing and the attitudes of both Algerian EFL students and teachers towards weblog storytelling. It also seeks to explore the potential benefits and problems that may affect the use of weblog and investigate the possible solutions to overcome the problems encountered. The research work relies on a mixed-method approach which combines both qualitative and quantitative methods. A questionnaire will be applied to both EFL teachers and students as a means to obtain preliminary data. Interviews will be integrated in accordance with the primary data that will be gathered from the questionnaire with the aim of validating its accuracy or as a strategy to follow up any unexpected results. An intervention will take place on the integration of weblog- writing among 15 Algerian EFL students for a period of two months where students are required to write five narrative essays about their personal experiences, give feedback through the use of a rubric to two or three of their peers, and edit their work based on the feedback. After completion, questionnaires and interviews will also take place as a medium to obtain both the students’ perspectives towards the use of weblog as an innovative teaching approach. This study is interesting because weblog storytelling has recently been emerged as a new form of digital communication and it is a new concept within Algerian context. Furthermore, the students will not just develop their writing skill through weblog storytelling but it can also serve as a tool to develop students’ critical thinking, creativity, and autonomy.

Keywords: Weblog writing, EFL writing, EFL learners' attitudes, EFL teachers' views

Procedia PDF Downloads 162
762 Induction of Different Types of Callus and Somatic Embryogenesis in Various Explants of Taraxacum Kok-Saghyz Rodin

Authors: Kairat Uteulin, Azhar Iskakova, Serik Mukhambetzhanov, Bayan Yesbolayeva, Gabit Bari, Aslan Zheksenbai, Kabyl Zhambakin, Chingis Dzhabykbayev, Vladimir Piven, Izbasar Rakhimbaiev

Abstract:

To explore the potential for in vitro rapid regeneration of Russian dandelion (Taraxacum kok-saghyz Rodin), different concentrations of 6-Benzylaminopurine (BAP), 2,4-Dichlorophenoxyacetic acid (2.4-D) and BAP combined with Indole-3-acetic acid (IAA) were evaluated for their effects on the induction of somatic embryos from leaf, seed stem and root explants. Different explants were cultured on MS medium supplemented with various concentrations (0, 0.5, 1, 1.5, 2, 2.5 and 3 mg/l) of each kind of hormone. Callus induction percentage, fresh weight, color and texture of the callus were assessed after 14 and 28 days of culture. The optimum medium for the proliferation of embryogenic calli from leaf and root explants was MS supplemented with 2.5 mg/L BAP and 0.5 mg/L 2.4-D. Concentrations of 2.5 mg/L BAP and 1.5 mg/L IAA also had a remarkable effect on root and stem explants. The best concentration to produce callus from stem explants was 0.5 mg/L BAP and 1 mg/L IAA. Results of mean comparison showed that BAP and 2.4-D were more effective on different explants than BAP and IAA. Results of the double staining method proved that somatic embryogenesis occurred in the most concentrations of BAP and 2.4-D. Under microscopic observations, the different developmental stages of the embryos (globular, heart, torpedo and cotyledonary) were revealed together in callus cells, indicating that the most tested hormone combinations were effective for somatic embryogenesis formation in this species. Seed explants formed torpedo and cotyledonary stages faster than leaf and root explants in the most combinations. Most calli from seed explants were cream colored and friable, while calli were compact and light green from leaf and root explants. Some combinations gave direct regeneration and (3 mg/L BAP and 2 mg/L IAA) in seed explants and (0.5 mg/L BAP and 2.5 mg/L IAA) in leaf explants had the highest number of shoots with average of 21 and 27 shoots per callus. The developed protocol established the production of different callus types from seed, leaf, and root explants and plant regeneration through somatic embryogenesis.

Keywords: taraxacum kok-saghyz Rodin, callus, somatic embryogenesis

Procedia PDF Downloads 358
761 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 143
760 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 384
759 The Predictability of Three Implants to Support a Fixed Prosthesis in the Edentulous Mandible

Authors: M. Hirani, M. Devine, O. Obisesan, C. Bryant

Abstract:

Introduction: The use of four or more implants to support a fixed prosthesis in the edentulous mandible is well documented, with high levels of clinical outcomes recorded. Despite this, the use of three implant-supported fixed prostheses offers the potential to deliver a more cost-effective method of oral rehabilitation in the lower arch, an important consideration given that edentulism is most prevalent in low-income subpopulations. The purpose of this study aimed to evaluate the implant and prosthetic survival rate, changes in marginal bone level, and patient satisfaction associated with a three-implant-supported fixed prosthesis for rehabilitation of the edentulous mandible over a follow-up period of at least one year. Methods: A comprehensive literature search was performed to evaluate studies that met the selection criteria. The information extracted included the study design and population, participant demographics, observation period, loading protocol, and the number of implants placed together with the required outcome measures. Mean values and standard deviations (SD) were calculated using SPSS® (IBM Corporation, New York, USA), and the level of statistical significance across all comparative studies described was set at P < 0.05. Results: The eligible studies included a total of 1968 implants that were placed in 652 patients. The subjects ranged in age from 33-89 years, with a mean of 63.2 years. The mean cumulative implant and prosthetic survival rates were 95.5% and 96.2%, respectively, over a mean follow-up period of 3.25 years. The mean marginal bone loss recorded was 1.04 mm, and high patient satisfaction rates were reported across the studies. Conclusion: Current evidence suggests that a three implant-supported fixed prosthesis for the edentulous mandible is a successful treatment strategy presenting high implant and prosthetic survival rates over the short-to-medium term. Further well-designed controlled clinical trials are required to evaluate longer-term outcomes, with supplemental data correlating implant dimensions and prosthetic design.

Keywords: implants, mandible, fixed, prosthesis

Procedia PDF Downloads 121
758 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 235
757 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 378
756 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 272
755 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 116
754 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 97
753 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 262
752 Site Analysis’ Importance as a Valid Factor in Building Design

Authors: Mekwa Eme, Anya chukwuma

Abstract:

The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.

Keywords: analysis, climate, statistics, design

Procedia PDF Downloads 232
751 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 23
750 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 221
749 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 225
748 Exhaust Gas Cleaning Systems on Board Ships and Impact on Crews’ Health: A Feasibility Study Protocol

Authors: Despoina Andrioti Bygvraa, Ida-Maja Hassellöv, George Charalambous

Abstract:

Exhaust gas cleaning systems, also known as scrubbers, are today widely used to allow for the use of High Sulphur Heavy Fuel Oil and still comply with the regulations limiting sulphur content in marine fuels. There are extensive concerns about environmental consequences, especially in the Baltic Sea, from the wide-scale use of scrubbers, as the wash water is acidic (ca pH 3) and contains high concentrations of toxic, carcinogenic, and mutagenic substances. The aim of this feasibility study is to investigate the potential adverse effects on seafarers’ health with the ultimate goal of raising awareness of chemical-related health and safety issues in the shipping environment. The project got funding from the Swedish Foundation. The team will extend previously compiled data on scrubber wash water concentrations of hazardous substances and pH to include the use of strong base in closed-loop scrubbers, and scoping assessment on handling and disposing practices. Based on the findings (a), a systematic review of risk assessment will follow to show the risk of exposures, the establishment of the hazardous levels for human health as well as the respective prevention practices. In addition, the researchers will perform (b) a systematic review to identify facilitators and barriers of the crew on compliance with the safe handling of chemicals. The study will run for 12 months, delivering (a) a risk assessment inventory with risk exposures and (b) a course description of safe handling practices. This feasibility study could provide valuable knowledge on how pollutants found in scrubbers should be considered from a human health perspective to facilitate evidence-based informed decisions in future technology- and policy development to make shipping a safer, healthier, and more attractive workplace.

Keywords: health and safety, seafarers, scrubbers, chemicals, risk exposures

Procedia PDF Downloads 39
747 Results of an Educative Procedure by Nursing on Patients Subjected to a Transplant from Hematopoietic Parents

Authors: C. Catalina Zapata, Z. Claudia Montoya

Abstract:

Transplant from hematopoietic parents (THP) or medulla (MT) is a procedure used to replace the medulla that does not work as part of a disease or when it is destroyed either by a treatment of high medication doses against cancer or by radiation. The transplant process has three stages, a stage prior to transplant, during and after the transplant. It is held with the help of an interdisciplinary team, including nursing, carrying out mainly educative procedures to warrant the adhesion and the changes in lifestyles needed to whom will undergo this procedure. The aim of the study was to assess the results of an educative procedure by nursing, on adult patients subjected to a transplant from hematopoietic parents at a high complexity institution of Medellin city, Colombia. This study had an observational longitudinal design. According to the rules of protocol, the educative activity must be held on all patients joining the procedure. Four instruments were designed in order to collect all the information. One of them to measure the sociodemographic variables, another one to measure self-care practices, another one to measure transplant knowledge and its cares and the other one to measure the 30-day post-transplant complications. The last three instruments were applied before and after the educative procedure. A univaried analysis was carried out but the bivaried analysis was not carried out since there were not statistically meaningful differences before and after. Within the results, ten patients were evaluated. The average age was 38.2 (13.38 SD – standard deviation), 8/10 were men. Some self-care practices such us having pets and plants and consuming some specific food as well as little use of UV protection are all present in this type of patients and are not modified after the procedure. In measuring the knowledge, something stands out among the answers. It is the fact that some patients do not know what the medulla is, the nature of separating wastes at home and the need to consult about vomit and nausea. The most frequent complications during the first thirty days were: nausea, vomit, fever, and rash. They are considered to be expected within this period. Patients do not exhibit differences in their level of knowledge before and after the educative procedure by nursing. The patients’ self-care practices do not involve all the necessary ones to avoid complications. During the first 30 days, most of the complications are typical of the transplant process from hematopoietic parents.

Keywords: bone marrow transplant, education, family, nursing, patients, Transplantation of hematopoietic progenitors

Procedia PDF Downloads 118