Search results for: traditional communication
6743 Tea Club (Singapore)-Learning to Navigate the Social World without Fear: Adapted from PEERS® for Young Adults
Authors: Janice Cheong, Tan Seying
Abstract:
The growing years in adolescence are often a tumultuous time for both the individual and family; this is especially so for individuals with Autism Spectrum Disorder (ASD) and Social Communication Disorder (SCD). Tea Club, which is adapted from the PEERS® for Young Adults, seeks to address some of the social challenges faced by Singaporean adolescents with ASD/SCD while navigating social situations. Tea club (hybrid) consists of face-to-face sessions and virtual sessions. These sessions work with both the adolescent and their parents to tackle the individual's difficulties with social skills, empathy, and loneliness. Prior to the group intervention, both participants and their parents scored on the Test of Adolescent Social Skills Knowledge (TASSK) and Autism Spectrum Quotient (AQ), respectively. The session was spread across four months. At the end of the group based intervention, participants’ and parents’ scores were collected again and compared. Inputs on the programme and participant’s confidence in socialization were also gathered from both participants and their parents and looked at thematically. The findings highlight some of the challenges faced by teens with ASD in Singapore and the benefits of the intervention. Parental sentiments are also examined and discussed.Keywords: adolescence autism, group intervention, social communication disorder, social skills
Procedia PDF Downloads 1456742 An Improved Adaptive Dot-Shape Beamforming Algorithm Research on Frequency Diverse Array
Authors: Yanping Liao, Zenan Wu, Ruigang Zhao
Abstract:
Frequency diverse array (FDA) beamforming is a technology developed in recent years, and its antenna pattern has a unique angle-distance-dependent characteristic. However, the beam is always required to have strong concentration, high resolution and low sidelobe level to form the point-to-point interference in the concentrated set. In order to eliminate the angle-distance coupling of the traditional FDA and to make the beam energy more concentrated, this paper adopts a multi-carrier FDA structure based on proposed power exponential frequency offset to improve the array structure and frequency offset of the traditional FDA. The simulation results show that the beam pattern of the array can form a dot-shape beam with more concentrated energy, and its resolution and sidelobe level performance are improved. However, the covariance matrix of the signal in the traditional adaptive beamforming algorithm is estimated by the finite-time snapshot data. When the number of snapshots is limited, the algorithm has an underestimation problem, which leads to the estimation error of the covariance matrix to cause beam distortion, so that the output pattern cannot form a dot-shape beam. And it also has main lobe deviation and high sidelobe level problems in the case of limited snapshot. Aiming at these problems, an adaptive beamforming technique based on exponential correction for multi-carrier FDA is proposed to improve beamforming robustness. The steps are as follows: first, the beamforming of the multi-carrier FDA is formed under linear constrained minimum variance (LCMV) criteria. Then the eigenvalue decomposition of the covariance matrix is performed to obtain the diagonal matrix composed of the interference subspace, the noise subspace and the corresponding eigenvalues. Finally, the correction index is introduced to exponentially correct the small eigenvalues of the noise subspace, improve the divergence of small eigenvalues in the noise subspace, and improve the performance of beamforming. The theoretical analysis and simulation results show that the proposed algorithm can make the multi-carrier FDA form a dot-shape beam at limited snapshots, reduce the sidelobe level, improve the robustness of beamforming, and have better performance.Keywords: adaptive beamforming, correction index, limited snapshot, multi-carrier frequency diverse array, robust
Procedia PDF Downloads 1306741 A Conceptual Model of the Factors Affecting Saudi Citizens' Use of Social Media to Communicate with the Government
Authors: Reemiah Alotaibi, Muthu Ramachandran, Ah-Lian Kor, Amin Hosseinian-Far
Abstract:
In the past decade, developers of Web 2.0 technologies have shown increasing interest in the topic of e-government. There has been a rapid growth in social media technology because of its significant role in backing up some essential social needs. Its importance and power is derived from its capacity to support two-way communication. Governments are curious to get engaged in these websites, hoping to benefit from the new forms of communication and interaction offered by such technology. Greater participation by the public can be viewed as a chief indicator of effective government communication. Yet, the level of public participation in government 2.0 is not quite satisfactory. In general, it is still at the early stage in most developing countries, including Saudi Arabia. Although it is a fact that Saudi people are among the most active in using social media, the number of people who use social media to communicate with the public institutions is not high. Furthermore, most of the governmental organisations are not using social media tools to communicate with the public. They use these platforms to disseminate information. Our study focuses on the factors affecting citizens’ adoption of social media in Saudi Arabia. Our research question is: what are the factors affecting Saudi citizens’ use of social media to communicate with the government? To answer this research question, the research aims to validate the UTAUT model for examining social media tools from the citizen perspective. An amendment will be proposed to fit the adoption of social media platforms as a communication channel in government by using a developed conceptual model which integrates constructs from the UTAUT model and others external variables based on the literature review. The set of potential factors that affect these citizens' decisions to adopt social media to communicate with their government has been identified as perceived encouragement, trust and cultural influence. The connection between the above-mentioned constructs from the basis for the research hypothesis will be examined in the light of a quantitative methodology. Data collection will be performed through a survey targeting a number of Saudi citizens who are social media users. The data collected from the primary survey will later be analysed by using statistical methods. The outcomes of this research project are argued to have potential contributions to the fields of social media and e-Government adoption, both on the theoretical and practical levels. It is believed that this research project is the first of its type that attempts to identify the factors that affect citizens’ adoption of social media to communicate with the government. The importance of identifying these factors stems from the potential use of them to enhance the government’s implementation of social media and help in making more accurate decisions and strategies based on comprehending the most important factors that affect citizens’ decisions.Keywords: social media, adoption, citizen, UTAUT model
Procedia PDF Downloads 4186740 The Use of Sustainability Criteria on Infrastructure Design to Encourage Sustainable Engineering Solutions on Infrastructure Projects
Authors: Shian Saroop, Dhiren Allopi
Abstract:
In order to stay competitive and to meet upcoming stricter environmental regulations and customer requirements, designers have a key role in designing civil infrastructure so that it is environmentally sustainable. There is an urgent need for engineers to apply technologies and methods that deliver better and more sustainable performance of civil infrastructure as well as a need to establish a standard of measurement for greener infrastructure, rather than merely use tradition solutions. However, there are no systems in place at the design stage that assesses the environmental impact of design decisions on township infrastructure projects. This paper identifies alternative eco-efficient civil infrastructure design solutions and developed sustainability criteria and a toolkit to analyse the eco efficiency of infrastructure projects. The proposed toolkit is aimed at promoting high-performance, eco-efficient, economical and environmentally friendly design decisions on stormwater, roads, water and sanitation related to township infrastructure projects. These green solutions would bring a whole new class of eco-friendly solutions to current infrastructure problems, while at the same time adding a fresh perspective to the traditional infrastructure design process. A variety of projects were evaluated using the green infrastructure toolkit and their results are compared to each other, to assess the results of using greener infrastructure verses the traditional method of designing infrastructure. The application of ‘green technology’ would ensure a sustainable design of township infrastructure services assisting the design to consider alternative resources, the environmental impacts of design decisions, ecological sensitivity issues, innovation, maintenance and materials, at the design stage of a project.Keywords: eco-efficiency, green infrastructure, infrastructure design, sustainable development
Procedia PDF Downloads 2276739 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 2716738 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit
Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana
Abstract:
Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification
Procedia PDF Downloads 1556737 Maritime English Communication Training for Japanese VTS Operators in the Congested Area Including the Narrow Channel of Akashi Strait
Authors: Kenji Tanaka, Kazumi Sugita, Yuto Mizushima
Abstract:
This paper introduces a noteworthy form of English communication training for the officers and operators of the Osaka-Bay Marine Traffic Information Service (Osaka MARTIS) of the Japan Coast Guard working in the congested area at the Akashi Strait in Hyogo Prefecture, Japan. The authors of this paper, Marine Technical College’s (MTC) English language instructors, have been holding about forty lectures and exercises in basic and normal Maritime English (ME) for several groups of MARTIS personnel at Osaka MARTIS annually since they started the training in 2005. Trainees are expected to be qualified Maritime Third-Class Radio Operators who are responsible for providing safety information to a daily average of seven to eight hundred vessels that pass through the Akashi Strait, one of Japan’s narrowest channels. As of 2022, the instructors are conducting 55 remote lessons at MARTIS. One lesson is 90 minutes long. All 26 trainees are given oral and written assessments. The trainees need to pass the examination to become qualified operators every year, requiring them to train and maintain their linguistic levels even during the pandemic of Corona Virus Disease-19 (COVID-19). The vessel traffic information provided by Osaka MARTIS in Maritime English language is essential to the work involving the use of very high frequency (VHF) communication between MARTIS and vessels in the area. ME is the common language mainly used on board merchant, fishing, and recreational vessels, normally at sea. ME was edited and recommended by the International Maritime Organization in the 1970s, was revised in 2002, and has undergone continual revision. The vessel’s circumstances are much more serious at the strait than those at the open sea, so these vessels need ME to receive guidance from the center when passing through the narrow strait. The imminent and challenging situations at the strait necessitate that textbooks’ contents include the basics of the phrase book for seafarers as well as specific and additional navigational information, pronunciation exercises, notes on keywords and phrases, explanations about collocations, sample sentences, and explanations about the differences between synonyms especially those focusing on terminologies necessary for passing through the strait. Additionally, short Japanese-English translation quizzes about these topics, as well as prescribed readings about the maritime sector, are include in the textbook. All of these exercises have been trained in the remote education system since the outbreak of COVID-19. According to the guidelines of ME edited in 2009, the lowest level necessary for seafarers is B1 (lower individual users) of The Common European Framework of Reference for Languages: Learning, Teaching, Assessment (CEFR). Therefore, this vocational ME language training at Osaka MARTIS aims for its trainees to communicate at levels higher than B1. A noteworthy proof of improvement from this training is that most of the trainees have become qualified marine radio communication officers.Keywords: akashi strait, B1 of CEFR, maritime english communication training, osaka martis
Procedia PDF Downloads 1246736 The Significance of Computer Assisted Language Learning in Teaching English Grammar in Tribal Zone of Chhattisgarh
Authors: Yogesh Kumar Tiwari
Abstract:
Chhattisgarh has realized the fundamental role of information and communication technology in the globalized world where knowledge is at the top for the growth and intellectual development. They are spreading so widely that one feels lagging behind if not using them. The influence of these radiating and technological tools has encompassed all aspects of the educational, business, and economic sectors of our world. Undeniably the computer has not only established itself globally in all walks of life but has acquired a fundamental role of paramount importance in the educational process also. This role is getting all pervading and more powerful as computers are being manufactured to be cheaper, smaller in size, adaptable and easy to handle. Computers are becoming indispensable to teachers because of their enormous capabilities and extensive competence. This study aims at observing the effect of using computer based software program of English language on the achievement of undergraduate level students studying in tribal area like Sarguja Division, Chhattisgarh, India. To testify the effect of an innovative teaching in the graduate classroom in tribal area 50 students were randomly selected and separated into two groups. The first group of 25 students were taught English grammar i.e., passive voice/narration, through traditional method using chalk and blackboard asking some formal questions. The second group, the experimental one, was taught English grammar i.e., passive voice/narration, using computer, projector with power point presentation of grammatical items. The statistical analysis was done on the students’ learning capacities and achievement. The result was extremely mesmerizing not only for the teacher but for taught also. The process of the recapitulation demonstrated that the students of experimental group responded the answers of the questions enthusiastically with innovative sense of learning. In light of the findings of the study, it was recommended that teachers and professors of English ought to use self-made instructional program in their teaching process particularly in tribal areas.Keywords: achievement computer assisted language learning, use of instructional program
Procedia PDF Downloads 1496735 Seismic Performance Evaluation of the Composite Structural System with Separated Gravity and Lateral Resistant Systems
Authors: Zi-Ang Li, Mu-Xuan Tao
Abstract:
During the process of the industrialization of steel structure housing, a composite structural system with separated gravity and lateral resistant systems has been applied in engineering practices, which consists of composite frame with hinged beam-column joints, steel brace and RC shear wall. As an attempt in steel structural system area, seismic performance evaluation of the separated composite structure is important for further application in steel housing. This paper focuses on the seismic performance comparison of the separated composite structural system and traditional steel frame-shear wall system under the same inter-story drift ratio (IDR) provision limit. The same architectural layout of a high-rise building is designed as two different structural systems at the same IDR level, and finite element analysis using pushover method is carried out. Static pushover analysis implies that the separated structural system exhibits different lateral deformation mode and failure mechanism with traditional steel frame-shear wall system. Different indexes are adopted and discussed in seismic performance evaluation, including IDR, safe factor (SF), shear wall damage, etc. The performance under maximum considered earthquake (MCE) demand spectrum shows that the shear wall damage of two structural systems are similar; the separated composite structural system exhibits less plastic hinges; and the SF index value of the separated composite structural system is higher than the steel frame shear wall structural system.Keywords: finite element analysis, new composite structural system, seismic performance evaluation, static pushover analysis
Procedia PDF Downloads 1366734 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars
Authors: Busra Nur Ozguler Aktel
Abstract:
This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.Keywords: civil wars, tribes, alignment formation, side-switching, Iraq
Procedia PDF Downloads 876733 Positioning Mama Mkubwa Indigenous Model into Social Work Practice through Alternative Child Care in Tanzania: Ubuntu Perspective
Authors: Johnas Buhori, Meinrad Haule Lembuka
Abstract:
Introduction: Social work expands its boundary to accommodate indigenous knowledge and practice for better competence and services. In Tanzania, Mama Mkubwa Mkubwa (MMM) (Mother’s elder sister) is an indigenous practice of alternative child care that represents other traditional practices across African societies known as Ubuntu practice. Ubuntu is African Humanism with values and approaches that are connected to the social work. MMM focuses on using the elder sister of a deceased mother or father, a trusted elder woman from the extended family or indigenous community to provide alternative care to an orphan or vulnerable child. In Ubuntu's perspective, it takes a whole village or community to raise a child, meaning that every person in the community is responsible for child care. Methodology: A desk review method guided by Ubuntu theory was applied to enrich the study. Findings: MMM resembles the Ubuntu ideal of traditional child protection of those in need as part of alternative child care throughout Tanzanian history. Social work practice, along with other formal alternative child care, was introduced in Tanzania during the colonial era in 1940s and socio-economic problems of 1980s affected the country’s formal social welfare system, and suddenly HIV/AIDS pandemic triggered the vulnerability of children and hampered the capacity of the formal sector to provide social welfare services, including alternative child care. For decades, AIDS has contributed to an influx of orphans and vulnerable children that facilitated the re-emerging of traditional alternative child care at the community level, including MMM. MMM strongly practiced in regions where the AIDS pandemic affected the community, like Njombe, Coastal region, Kagera, etc. Despite of existing challenges, MMM remained to be the remarkably alternative child care practiced in both rural and urban communities integrated with social welfare services. Tanzania envisions a traditional mechanism of family or community environment for alternative child care with the notion that sometimes institutionalization care fails to offer children all they need to become productive members of society, and later, it becomes difficult to reconnect in the society. Implications to Social Work: MMM is compatible with social work by using strengths perspectives; MMM reflects Ubuntu's perspective on the ground of humane social work, using humane methods to achieve human goals. MMM further demonstrates the connectedness of those who care and those cared for and the inextricable link between them as Ubuntu-inspired models of social work that view children from family, community, environmental, and spiritual perspectives. Conclusion: Social work and MMM are compatible at the micro and mezzo levels; thus, application of MMM can be applied in social work practice beyond Tanzania when properly designed and integrated into other systems. When MMM is applied in social work, alternative care has the potential to support not only children but also empower families and communities. Since MMM is a community-owned and voluntary base, it can relieve the government, social workers, and other formal sectors from the annual burden of cost in the provision of institutionalized alternative child care.Keywords: ubuntu, indigenous social work, african social work, ubuntu social work, child protection, child alternative care
Procedia PDF Downloads 676732 Management of ASD with Co-morbid OCD: A Literature Review to Compare the Pharmacological and Psychological Treatment Options in Individuals Under the Age of 18
Authors: Gursimran Jandu, Melissa Nelson, Mia Ingram, Hana Jalal
Abstract:
There is a significant overlap between autism spectrum disorder (ASD) and obsessive-compulsive disorder (OCD), with up to 90% of young people diagnosed with ASD having this co-morbidity. Distinguishing between the symptoms of the two leads to issues with accurate treatment, yet this is paramount in benefiting the young person. There are two distinct methods of treatment, psychological or pharmacological, with clinicians tending to choose one or the other, potentially due to the lack of research available. This report reviews the efficacy of psychological and pharmacological treatments for young people diagnosed with ASD and co-morbid OCD. A literature review was performed on papers from the last fifteen years including ‘ASD’, ‘OCD’ and individuals under the age of 18. Eleven papers were selected as relevant. The report looks at the comparison between more traditional methods, such as selective-serotonin-reuptake-inhibitors (SSRI) and Cognitive behaviour therapy (CBT), and newer therapies, such as modified or intensive ASD focused psychotherapies, and the use of other medication classes. On reviewing the data, it was identified that there was a distinct lack of information on this important topic. The most widely used treatment was medication such as Fluoxetine, an SSRI, which rarely showed improvement in symptoms or outcomes. This is in contrast to modified forms of CBT which often reduces symptoms or even results in OCD remission. With increased research into non-traditional management of these co-morbid conditions, it is clear there is scope that modified CBT may become the future treatment of choice for OCD in young people with ASD.Keywords: autism spectrum disorder, intensive or adapted cognitive behavioural therapy, obsessive compulsive disorder, pharmacological management
Procedia PDF Downloads 106731 Effects of Microbiological and Physicochemical Processes on the Quality of Complementary Foods Based on Maize (Zea mays) Fortification with Bambara Groundnut (Vigna subterranea)
Authors: T. I. Mbata, M. J. Ikenebomeh
Abstract:
Background: The study was aim at formulating a complementary foods based on maize and bambara groundnut with a view of reducing malnutrition in low income families. Protein-energy malnutrition is a major health challenge attributed to the inappropriate complementary feeding practices, low nutritional quality of traditional complementary foods and high cost of quality protein-based complementary foods. Methods: The blends 70% maize, 30% bambara groundnut were evaluated for proximate analyses, minerals, amino acids profile, and antinutritional factors, using proprietary formula (‘Nutrend’) as standard. Antinutritional factors, amino acids, microbiological properties and sensory attributes were determined using standard methods. Results; For Protein, the results were 15.0% for roasted bambara groundnut maize germinated flour (RBMGF), 13.80% for cooked bambara groundnut maize germinated flour (CBMGF), 15.18% for soaked bambara groundnut maize germinated flour (SBMGF); values for maize flour and nutrend had 10.4% and 23.21% respectively. With respect to energy value, RBMGF, CBMGF, SBMGF, maize flour and nutrend had 494.9, 327.58, 356.49, 366.8 and 467.2 kcal respectively. The percentages of total essential amino acids in the composition of the blends were 36.9%, 40.7% and 38.9% for CBMGF, SBMGF and RBMGF, respectively, non-essential amino acids contents were 63.1%, 59.3% and 61.1% for CBMGF, SBMGF and RBMGF respectively. The mineral content, that is, calcium, potassium, magnesium and sodium, of formulated samples were higher than those obtained for maize flour and Nutrend. The antinutrient composition of RBMGF and CBMGF were lower than of SBMGF. The rats fed with the control diet exhibited better growth performance such as feed intake (1527 g) and body weight gain (93.8 g). For the microbial status, microflora gradually changed from gram negative enteric bacteria, molds, lactic acid bacteria and yeast to be dominated by gram positive lactic acid bacteria (LAB) and yeasts. Yeasts and LAB growth counts in the complementary food varied between 4.44 and 7.36 log cfu/ml. LAB number increased from 5.40 to 7.36 log cfu/ml during fermentation. Yeasts increased from 4.44 to 5.60 log cfu/ml. Organoleptic evaluation revealed that the foods were well accepted. Conclusion: Based on the findings the application of bambara groundnut fortification to traditional foods can promote the nutritional quality of African maize - based traditional foods with acceptable rheological and cooking qualities.Keywords: bambara groundnut, maize, fortification, complementary food
Procedia PDF Downloads 3586730 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 1926729 Study on Safety Management of Deep Foundation Pit Construction Site Based on Building Information Modeling
Authors: Xuewei Li, Jingfeng Yuan, Jianliang Zhou
Abstract:
The 21st century has been called the century of human exploitation of underground space. Due to the characteristics of large quantity, tight schedule, low safety reserve and high uncertainty of deep foundation pit engineering, accidents frequently occur in deep foundation pit engineering, causing huge economic losses and casualties. With the successful application of information technology in the construction industry, building information modeling has become a research hotspot in the field of architectural engineering. Therefore, the application of building information modeling (BIM) and other information communication technologies (ICTs) in construction safety management is of great significance to improve the level of safety management. This research summed up the mechanism of the deep foundation pit engineering accident through the fault tree analysis to find the control factors of deep foundation pit engineering safety management, the deficiency existing in the traditional deep foundation pit construction site safety management. According to the accident cause mechanism and the specific process of deep foundation pit construction, the hazard information of deep foundation pit engineering construction site was identified, and the hazard list was obtained, including early warning information. After that, the system framework was constructed by analyzing the early warning information demand and early warning function demand of the safety management system of deep foundation pit. Finally, the safety management system of deep foundation pit construction site based on BIM through combing the database and Web-BIM technology was developed, so as to realize the three functions of real-time positioning of construction site personnel, automatic warning of entering a dangerous area, real-time monitoring of deep foundation pit structure deformation and automatic warning. This study can initially improve the current situation of safety management in the construction site of deep foundation pit. Additionally, the active control before the occurrence of deep foundation pit accidents and the whole process dynamic control in the construction process can be realized so as to prevent and control the occurrence of safety accidents in the construction of deep foundation pit engineering.Keywords: Web-BIM, safety management, deep foundation pit, construction
Procedia PDF Downloads 1546728 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 156727 A Mixing Matrix Estimation Algorithm for Speech Signals under the Under-Determined Blind Source Separation Model
Authors: Jing Wu, Wei Lv, Yibing Li, Yuanfan You
Abstract:
The separation of speech signals has become a research hotspot in the field of signal processing in recent years. It has many applications and influences in teleconferencing, hearing aids, speech recognition of machines and so on. The sounds received are usually noisy. The issue of identifying the sounds of interest and obtaining clear sounds in such an environment becomes a problem worth exploring, that is, the problem of blind source separation. This paper focuses on the under-determined blind source separation (UBSS). Sparse component analysis is generally used for the problem of under-determined blind source separation. The method is mainly divided into two parts. Firstly, the clustering algorithm is used to estimate the mixing matrix according to the observed signals. Then the signal is separated based on the known mixing matrix. In this paper, the problem of mixing matrix estimation is studied. This paper proposes an improved algorithm to estimate the mixing matrix for speech signals in the UBSS model. The traditional potential algorithm is not accurate for the mixing matrix estimation, especially for low signal-to noise ratio (SNR).In response to this problem, this paper considers the idea of an improved potential function method to estimate the mixing matrix. The algorithm not only avoids the inuence of insufficient prior information in traditional clustering algorithm, but also improves the estimation accuracy of mixing matrix. This paper takes the mixing of four speech signals into two channels as an example. The results of simulations show that the approach in this paper not only improves the accuracy of estimation, but also applies to any mixing matrix.Keywords: DBSCAN, potential function, speech signal, the UBSS model
Procedia PDF Downloads 1356726 An Edusemiotic Approach to Multimodal Poetry Teaching for Afrikaans
Authors: Kruger Uys
Abstract:
Poetry analysis plays a vital role in promoting critical thinking, literary appreciation, and language skills among learners. This paper proposes an innovative multimodal teaching approach that combines traditional textual analysis of poems with multimodal educational semiotic analysis of animated poetry films. The aim is to present a methodological framework through which poetry concepts and elements, along with the visual and auditory components in animated poetry films, can be comprehensively illuminated. Traditional textual analysis involves close reading, linguistic examination, and thematic exploration to identify, discuss, and apply poetry concepts. When combined with a multimodal edusemiotic analysis of the semiotic signs and codes present in animated poetry films, new perspectives emerge that enrich the interpretation of poetry. Furthermore, the proposed integrated approach, as prescribed by CAPS, enhances a holistic understanding of poetry terminology and elements, as well as complex linguistic and visual patterns that promote visual literacy, refined data interpretation skills, and learner engagement in the poetry classroom. To illustrate this phenomenon, the poem My mamma is bossies (My mom’s bonkers) by Jeanne Goosen (prescribed for Grade 10 Afrikaans Home Language learners in the CAPS curriculum) will be discussed. This study aims to contribute to the existing Afrikaans poetry curriculum but also equip all language educators to cultivate poetry appreciation, critical thinking, and creativity among learners in the ever-evolving landscape of education.Keywords: edusemiotics, multimodality, poetry education, animated poetry films
Procedia PDF Downloads 246725 A Longitudinal Study of Social Engagement in Classroom in Children with Autism Spectrum Disorder
Authors: Cecile Garry, Katia Rovira, Julie Brisson
Abstract:
Autism Spectrum Disorder (ASD) is defined by a qualitative and quantitative impairment of social interaction. Indeed early intervention programs, such as the Early Start Denver Model (ESDM), aimed at encouraging the development of social skills. In classroom, the children need to be socially engaged to learn. Early intervention programs can thus be implemented in kindergarten schools. In these schools, ASD children have more opportunities to interact with their peers or adults than in elementary schools. However, the preschool children with ASD are less socially engaged than their typically developing peers in the classroom. They initiate, respond and maintain less the social interactions. In addition, they produce more responses than initiations. When they interact, the non verbal communication is more used than verbal or symbolic communication forms and they are more engaged with adults than with peers. Nevertheless, communicative patterns may vary according to the clinical profiles of ASD children. Indeed, the ASD children with better cognitive skills interact more with their peers and use more symbolic communication than the ASD children with a low cognitive level. ASD children with the less severe symptoms use more the verbal communication than ASD children with the more severe symptoms. Small groups and structured activities encourage coordinated joint engagement episodes in ASD children. Our goal is to evaluate ASD children’s social engagement development in class, with their peers or adults, during dyadic or group activities. Participants were 19 preschool children with ASD aged from 3 to 6 years old that benefited of an early intervention in special kindergarten schools. Severity of ASD symptoms was measured with the CARS at the beginning of the follow-up. Classroom situations of interaction were recorded during 10 minutes (5 minutes of dyadic interaction and 5 minutes of a group activity), every 2 months, during 10 months. Social engagement behaviors of children, including initiations, responses and imitation, directed to a peer or an adult, were then coded. The Observer software (Noldus) that allows to annotate behaviors was the coding system used. A double coding was conducted and revealed a good inter judges fidelity. Results show that ASD children were more often and longer socially engaged in dyadic than in groups situations. They were also more engaged with adults than with peers. Children with the less severe symptoms of ASD were more socially engaged in groups situations than children with the more severe symptoms of ASD. Then, ASD children with the less severe symptoms of ASD were more engaged with their peers than ASD children with the more severe symptoms of ASD. However, the engagement frequency increased during the 10 month of follow-up but only for ASD children with the more severe symptoms at the beginning. To conclude, these results highlighted the necessity of individualizing early intervention programs according to the clinical profile of the child.Keywords: autism spectrum disorder, preschool children, developmental psychology, early interventions, social interactions
Procedia PDF Downloads 1596724 Addressing the Water Shortage in Beijing: Increasing Water Use Efficiency in Domestic Sector
Authors: Chenhong Peng
Abstract:
Beijing, the capital city of China, is running out of water. The water resource per capita in Beijing is only 106 cubic meter, accounts for 5% of the country’s average level and less than 2% of the world average level. The tension between water supply and demand is extremely serious. For one hand, the surface and ground water have been over-exploited during the last decades; for the other hand, water demand keep increasing as the result of population and economic growth. There is a massive gap between water supply and demand. This paper will focus on addressing the water shortage in Beijing city by increasing water use efficiency in domestic sector. First, we will emphasize on the changing structure of water supply and demand in Beijing under the economic development and restructure during the last decade. Second, by analyzing the water use efficiency in agriculture, industry and domestic sectors in Beijing, we identify that the key determinant for addressing the water crisis is to increase the water use efficiency in domestic sector. Third, this article will explore the two primary causes for the water use inefficiency in Beijing: The ineffective water pricing policy and the poor water education and communication policy. Finally, policy recommendation will offered to improve the water use efficiency in domestic sector by making and implementing an effective water pricing policy and people-engaged water education and communication policy.Keywords: Beijing, water use efficiency, domestic sector, water pricing policy, water education policy
Procedia PDF Downloads 5426723 Traditional Lifestyles of the 'Mbuti' Indigenous Communities and the Relationship with the Preservation of Natural Resources in the Landscape of the Okapi Wildlife Reserve in a Context of Socio-cultural Upheaval, Democratic Republic of Congo
Authors: Chales Mumbere Musavandalo, Lucie B. Mugherwa, Gloire Kayitoghera Mulondi, Naanson Bweya, Muyisa Musongora, Francis Lelo Nzuzi
Abstract:
The landscape of the Okapi Wildlife Reserve in the Democratic Republic of Congo harbors a large community of Mbuti indigenous peoples, often described as the guardians of nature. Living in and off the forest has long been a sustainable strategy for preserving natural resources. This strategy, seen as a form of eco-responsible citizenship, draws upon ethnobotanical knowledge passed down through generations. However, these indigenous communities are facing socio-cultural upheaval, which impacts their traditional way of life. This study aims to assess the relationship between the Mbuti indigenous people’s way of life and the preservation of the Okapi Wildlife Reserve. The study was conducted under the assumption that, despite socio-cultural upheavals, the forest and its resources remain central to the Mbuti way of life. The study was conducted in six encampments, three of which were located inside the forest and two in the anthropized zone. The methodological approach initially involved group interviews in six Mbuti encampments. The objective of these interviews was to determine how these people perceive the various services provided by the forest and the resources obtained from this habitat. The technique of using pebbles was adopted to adapt the exercise of weighting services and resources to the understanding of these people. Subsequently, the study carried out ethnobotanical surveys to identify the wood resources frequently used by these communities. This survey was completed in third position by a transect inventory of 1000 m length and 25 m width in order to enhance the understanding of the abundance of these resources around the camps. Two transects were installed in each camp to carry out this inventory. Traditionally, the Mbuti communities sustain their livelihood through hunting, fishing, gathering for self-consumption, and basketry. The Manniophyton fulvum-based net remains the main hunting tool. The primary forest and the swamp are two habitats from which these peoples derive the majority of their resources. However, with the arrival of the Bantu people, who introduced agriculture based on cocoa production, the Mbuti communities started providing services to the Bantu in the form of labor and field guarding. This cultural symbiosis between Mbute and Bantu has also led to non-traditional practices, such as the use of hunting rifles instead of nets and fishing nets instead of creels. The socio-economic and ecological environment in which Mbuti communities live is changing rapidly, including the resources they depend on. By incorporating the time factor into their perception of ecosystem services, only their future (p-value = 0, 0,121), the provision of wood for energy (p-value = 0,1976), and construction (p-value = 0,2548) would be closely associated with the forest in their future. For other services, such as food supply, medicine, and hunting, adaptation to Bantu customs is conceivable. Additionally, the abundance of wood used by the Mbuti people has been high around encampments located in intact forests and low in those in anthropized areas. The traditional way of life of the Mbuti communities is influenced by the cultural symbiosis, reflected in their habits and the availability of resources. The land tenure security of Mbuti areas is crucial to preserve their tradition and forest biodiversity. Conservation efforts in the Okapi Wildlife Reserve must consider this cultural dynamism and promote positive values for the flagship species. The oversight of subsistence hunting is imperative to curtail the transition of these communities to poaching.Keywords: traditional life, conservation, Indigenous people, cultural symbiosis, forest
Procedia PDF Downloads 596722 Knowledge, Attitude, and Practices of Small Scale Farmers on Organic Agriculture in a Rural Community in Ifugao, Philippines
Authors: Marah Joy A. Nanglegan
Abstract:
A survey was conducted to describe knowledge, attitude, practices, information needs, and information seeking behavior of small-scale farmers on Organic Agriculture Production (OAP) in a rural community in Ifugao, Philippines. Respondents’ age ranged from 23-67 years old. Most of them are male, married, and have reached high school level. The major source of income is farming with an average monthly income of less than Php 5,000 for a household size of seven. More than fifty percent of the respondents are members of a farmer’s organization. Farm size is less than one hectare. Majority of them own their farms and have been farming for more than twenty years. Very few attended training on Organic Agriculture Production (OAP). Most of them are not aware of any OAP program in their community. Hence, their farming practices are mostly conventional. The overall level of knowledge on OAP among all respondents was below the average. On attitude, most of the respondents agreed that organic farming would decrease production costs by reducing input purchases. They believe it benefits both the consumer and the producer. In fact, they are aware of the many benefits of organic farming, especially on health. Likewise, many of them agreed on the benefits of organic farming to soil fertility, to the environment, and to increase the income of farmers. Many of them, however, see organic farming as troublesome and difficult in terms of time and effort, obtaining organic inputs, limited production, and marketing aspects. They also have heavy reliance on pesticides and herbicides to control pests and diseases. On practices, majority of the respondents stated that they practiced crop rotation, manual weeding, and the use of animal manure. Most of them desired to do organic farming but needed information such as production techniques, costs, and marketing opportunities. Their most preferred communication channel is through extension agents and contact farmers. Their most preferred communication method is through trainings and seminars as well as through farm demonstrations. Results of this study will serve as a basis for developing appropriate communication strategies to improve knowledge, attitude, and practices of respondents on organic agriculture as well as enhance the promotion of organic agriculture production in the community.Keywords: Ifugao, knowledge attitude practices, organic agriculture, Philippines
Procedia PDF Downloads 1646721 Ideas for Musical Activities and Games in the Early Year (IMAGINE-Autism): A Case Study Approach
Authors: Tania Lisboa, Angela Voyajolu, Adam Ockelford
Abstract:
The positive impact of music on the development of children with autism is widely acknowledged: music offers a unique channel for communication, wellbeing and self-regulation, as well as access to culture and a means of creative engagement. Yet, no coherent program exists for parents, carers and teachers to follow with their children in the early years, when the need for interventions is often most acute. Hence, research and the development of resources is urgently required. Autism is a project with children on the autism spectrum. The project aims at promoting the participants’ engagement with music through involvement in specially-designed musical activities with parents and carers. The main goal of the research is to verify the effectiveness of newly designed resources and strategies, which are based on the Sounds of Intent in the Early Years (SoI-EY) framework of musical development. This is a pilot study, comprising case studies of five children with autism in the early years. The data comprises semi-structured interviews, observations of videos, and feedback from parents on resources. Interpretative Phenomenological Analysis was chosen to analyze the interviews. The video data was coded in relation to the SoI-EY framework. The feedback from parents was used to evaluate the resources (i.e. musical activity cards). The participants’ wider development was also assessed through selected elements of the Early Years Foundation Stage (EYFS), a national assessment framework used in England: specifically, communication, language and social-emotional development. Five families of children on the autism spectrum (aged between 4-8 years) participated in the pilot. The research team visited each family 4 times over a 3-month period, during which the children were observed, and musical activities were suggested based on the child’s assessed level of musical development. Parents then trialed the activities, providing feedback and gathering further video observations of their child’s musical engagement between visits. The results of one case study will be featured in this paper, in which the evidence suggests that specifically tailored musical activity may promote communication and social engagement for a child with language difficulties on the autism spectrum. The resources were appropriate for the children’s involvement in musical activities. Findings suggest that non-specialist musical engagement with family and carers can be a powerful means to foster communication. The case study featured in this paper illustrates this with a child of limited verbal ability. There is a need for further research and development of resources that can be made available to all those working with children on the autism spectrum.Keywords: autism, development, music education, resources
Procedia PDF Downloads 1036720 Human Computer Interaction Using Computer Vision and Speech Processing
Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas
Abstract:
Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android
Procedia PDF Downloads 3626719 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 2896718 High Performance Computing Enhancement of Agent-Based Economic Models
Authors: Amit Gill, Lalith Wijerathne, Sebastian Poledna
Abstract:
This research presents the details of the implementation of high performance computing (HPC) extension of agent-based economic models (ABEMs) to simulate hundreds of millions of heterogeneous agents. ABEMs offer an alternative approach to study the economy as a dynamic system of interacting heterogeneous agents, and are gaining popularity as an alternative to standard economic models. Over the last decade, ABEMs have been increasingly applied to study various problems related to monetary policy, bank regulations, etc. When it comes to predicting the effects of local economic disruptions, like major disasters, changes in policies, exogenous shocks, etc., on the economy of the country or the region, it is pertinent to study how the disruptions cascade through every single economic entity affecting its decisions and interactions, and eventually affect the economic macro parameters. However, such simulations with hundreds of millions of agents are hindered by the lack of HPC enhanced ABEMs. In order to address this, a scalable Distributed Memory Parallel (DMP) implementation of ABEMs has been developed using message passing interface (MPI). A balanced distribution of computational load among MPI-processes (i.e. CPU cores) of computer clusters while taking all the interactions among agents into account is a major challenge for scalable DMP implementations. Economic agents interact on several random graphs, some of which are centralized (e.g. credit networks, etc.) whereas others are dense with random links (e.g. consumption markets, etc.). The agents are partitioned into mutually-exclusive subsets based on a representative employer-employee interaction graph, while the remaining graphs are made available at a minimum communication cost. To minimize the number of communications among MPI processes, real-life solutions like the introduction of recruitment agencies, sales outlets, local banks, and local branches of government in each MPI-process, are adopted. Efficient communication among MPI-processes is achieved by combining MPI derived data types with the new features of the latest MPI functions. Most of the communications are overlapped with computations, thereby significantly reducing the communication overhead. The current implementation is capable of simulating a small open economy. As an example, a single time step of a 1:1 scale model of Austria (i.e. about 9 million inhabitants and 600,000 businesses) can be simulated in 15 seconds. The implementation is further being enhanced to simulate 1:1 model of Euro-zone (i.e. 322 million agents).Keywords: agent-based economic model, high performance computing, MPI-communication, MPI-process
Procedia PDF Downloads 1286717 To Identify the Importance of Telemedicine in Diabetes and Its Impact on Hba1c
Authors: Sania Bashir
Abstract:
A promising approach to healthcare delivery, telemedicine makes use of communication technology to reach out to remote regions of the world, allowing for beneficial interactions between diabetic patients and healthcare professionals as well as the provision of affordable and easily accessible medical care. The emergence of contemporary care models, fueled by the pervasiveness of mobile devices, provides better information, offers low cost with the best possible outcomes, and is known as digital health. It involves the integration of collected data using software and apps, as well as low-cost, high-quality outcomes. The goal of this study is to assess how well telemedicine works for diabetic patients and how it impacts their HbA1c levels. A questionnaire-based survey of 300 diabetics included 150 patients in each of the groups receiving usual care and via telemedicine. A descriptive and observational study that lasted from September 2021 to May 2022 was conducted. HbA1c has been gathered for both categories every three months. A remote monitoring tool has been used to assess the efficacy of telemedicine and continuing therapy instead of the customary three monthly meetings like in-person consultations. The patients were (42.3) 18.3 years old on average. 128 men were outnumbered by 172 women (57.3% of the total). 200 patients (66.6%) have type 2 diabetes, compared to over 100 (33.3%) candidates for type 1. Despite the average baseline BMI being within normal ranges at 23.4 kg/m², the mean baseline HbA1c (9.45 1.20) indicates that glycemic treatment is not well-controlled at the time of registration. While patients who use telemedicine experienced a mean percentage change of 10.5, those who visit the clinic experienced a mean percentage change of 3.9. Changes in HbA1c are dependent on several factors, including improvements in BMI (61%) after 9 months of research and compliance with healthy lifestyle recommendations for diet and activity. More compliance was achieved by the telemedicine group. It is an undeniable reality that patient-physician communication is crucial for enhancing health outcomes and avoiding long-term issues. Telemedicine has shown its value in the management of diabetes and holds promise as a novel technique for improved clinical-patient communication in the twenty-first century.Keywords: diabetes, digital health, mobile app, telemedicine
Procedia PDF Downloads 916716 Enhancing Learning Ability among Deaf Students by Using Photographic Images
Authors: Aidah Alias, Mustaffa Halabi Azahari, Adzrool Idzwan Ismail, Salasiah Ahmad
Abstract:
Education is one of the most important elements in a human life. Educations help us in learning and achieve new things in life. The ability of hearing gave us chances to hear voices and it is important in our communication. Hearing stories told by others; hearing news and music to create our creative and sense; seeing and hearing make us understand directly the message trying to deliver. But, what will happen if we are born deaf or having hearing loss while growing up? The objectives of this paper are to identify the current practice in teaching and learning among deaf students and to analyse an appropriate method in enhancing learning process among deaf students. A case study method was employed by using methods of observation and interview to selected deaf students and teachers. The findings indicated that the suitable method of teaching for deaf students is by using pictures and body movement. In other words, by combining these two medium of images and body movement, the best medium that the study suggested is by using video or motion pictures. The study concluded and recommended that video or motion pictures is recommended medium to be used in teaching and learning for deaf students.Keywords: deaf, photographic images, visual communication, education, learning ability
Procedia PDF Downloads 2846715 High-Performance Thin-layer Chromatography (HPTLC) Analysis of Multi-Ingredient Traditional Chinese Medicine Supplement
Authors: Martin Cai, Khadijah B. Hashim, Leng Leo, Edmund F. Tian
Abstract:
Analysis of traditional Chinese medicinal (TCM) supplements has always been a laborious task, particularly in the case of multi‐ingredient formulations. Traditionally, herbal extracts are analysed using one or few markers compounds. In the recent years, however, pharmaceutical companies are introducing health supplements of TCM active ingredients to cater to the needs of consumers in the fast-paced society in this age. As such, new problems arise in the aspects of composition identification as well as quality analysis. In most cases of products or supplements formulated with multiple TCM herbs, the chemical composition, and nature of each raw material differs greatly from the others in the formulation. This results in a requirement for individual analytical processes in order to identify the marker compounds in the various botanicals. Thin-layer Chromatography (TLC) is a simple, cost effective, yet well-regarded method for the analysis of natural products, both as a Pharmacopeia-approved method for identification and authentication of herbs, and a great analytical tool for the discovery of chemical compositions in herbal extracts. Recent technical advances introduced High-Performance TLC (HPTLC) where, with the help of automated equipment and improvements on the chromatographic materials, both the quality and reproducibility are greatly improved, allowing for highly standardised analysis with greater details. Here we report an industrial consultancy project with ONI Global Pte Ltd for the analysis of LAC Liver Protector, a TCM formulation aimed at improving liver health. The aim of this study was to identify 4 key components of the supplement using HPTLC, following protocols derived from Chinese Pharmacopeia standards. By comparing the TLC profiles of the supplement to the extracts of the herbs reported in the label, this project proposes a simple and cost-effective analysis of the presence of the 4 marker compounds in the multi‐ingredient formulation by using 4 different HPTLC methods. With the increasing trend of small and medium-sized enterprises (SMEs) bringing natural products and health supplements into the market, it is crucial that the qualities of both raw materials and end products be well-assured for the protection of consumers. With the technology of HPTLC, science can be incorporated to help SMEs with their quality control, thereby ensuring product quality.Keywords: traditional Chinese medicine supplement, high performance thin layer chromatography, active ingredients, product quality
Procedia PDF Downloads 2806714 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 179