Search results for: critical links
3847 Media Richness Perspective on Web 2.0 Usage for Knowledge Creation: The Case of the Cocoa Industry in Ghana
Authors: Albert Gyamfi
Abstract:
Cocoa plays critical role in the socio-economic development of Ghana. Meanwhile, smallholder farmers most of whom are illiterate dominate the industry. According to the cocoa-based agricultural knowledge and information system (AKIS) model knowledge is created and transferred to the industry between three key actors: cocoa researchers, extension experts, and cocoa farmers. Dwelling on the SECI model, the media richness theory (MRT), and the AKIS model, a conceptual model of web 2.0-based AKIS model (AKIS 2.0) is developed and used to assess the possible effects of social media usage for knowledge creation in the Ghanaian cocoa industry. A mixed method approach with a survey questionnaire was employed, and a second-order multi-group structural equation model (SEM) was used to analyze the data. The study concludes that the use of web 2.0 applications for knowledge creation would lead to sustainable interactions among the key knowledge actors for effective knowledge creation in the cocoa industry in Ghana.Keywords: agriculture, cocoa, knowledge, media, web 2.0
Procedia PDF Downloads 3333846 Change to the Location/Ownership and Control of Liquid Metering Skids
Authors: Mahmoud Jumah
Abstract:
This paper presents the circumstances and decision making in case of change management in any industrial processes, and the effective strategic planning ensured to provide with the on time completion of projects. In this specific case, the Front End Engineering Design and the awarded Lump Sum Turn Key Contract had provided for full control and ownership of all Liquid Metering Skids by Controlling Team. The demarcation and location were changed, and the Ownership and Control of the Liquid Metering Skids inside the boundaries of the Asset Owner were transferred from Controlling Team to Asset Owner after the award of the LSTK Contract. The requested changes resulted in Adjustment Order and the relevant scope of work is an essential part of the original Contract. The majority of equipment and materials (i.e. liquid metering skids, valves, piping, etc.) has already been in process.Keywords: critical path, project change management, stakeholders problem solving, strategic planning
Procedia PDF Downloads 2673845 Digital Skepticism In A Legal Philosophical Approach
Authors: dr. Bendes Ákos
Abstract:
Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.Keywords: legal philosophy, privacy, security, ethics, digital skepticism
Procedia PDF Downloads 443844 Relationship between Iron-Related Parameters and Soluble Tumor Necrosis Factor-Like Weak Inducer of Apoptosis in Obese Children
Authors: Mustafa M. Donma, Orkide Donma
Abstract:
Iron is physiologically essential. However, it also participates in the catalysis of free radical formation reactions. Its deficiency is associated with amplified health risks. This trace element establishes some links with another physiological process related to cell death, apoptosis. Both iron deficiency and iron overload are closely associated with apoptosis. Soluble tumor necrosis factor-like weak inducer of apoptosis (sTWEAK) has the ability to trigger apoptosis and plays a dual role in the physiological versus pathological inflammatory responses of tissues. The aim of this study was to investigate the status of these parameters as well as the associations among them in children with obesity, a low-grade inflammatory state. The study was performed on groups of children with normal body mass index (N-BMI) and obesity. Forty-three children were included in each group. Based upon age- and sex-adjusted BMI percentile tables prepared by World Health Organization, children whose values varied between 85 and 15 were included in N-BMI group. Children whose BMI percentile values were between 99 and 95 comprised obese (OB) group. Institutional ethical committee approval and informed consent forms were taken prior to the study. Anthropometric measurements (weight, height, waist circumference, hip circumference, head circumference, neck circumference) and blood pressure values (systolic blood pressure and diastolic blood pressure) were recorded. Routine biochemical analysis including serum iron, total iron binding capacity (TIBC), transferrin saturation percent (Tf Sat %), and ferritin were performed. Soluble tumor necrosis factor-like weak inducer of apoptosis levels were determined by enzyme-linked immunosorbent assay. Study data was evaluated using appropriate statistical tests performed by the statistical program SPSS. Serum iron levels were 91±34 mcrg/dl and 75±31 mcrg/dl in N-BMI and OB children, respectively. The corresponding values for TIBC, Tf Sat %, ferritin were 265 mcrg/dl vs 299 mcrg/dl, 37.2±19.1 % vs 26.7±14.6 %, and 41±25 ng/ml vs 44±26 ng/ml. in N-BMI and OB groups, sTWEAK concentrations were measured as 351 ng/L and 325 ng/L, respectively (p>0.05). Correlation analysis revealed significant associations between sTWEAK levels and iron related parameters (p<0.05) except ferritin. In conclusion, iron contributes to apoptosis. Children with iron deficiency have decreased apoptosis rate in comparison with that of healthy children. sTWEAK is inducer of apoptosis. Obese children had lower levels of both iron and sTWEAK. Low levels of sTWEAK are associated with several types of cancers and poor survival. Although iron deficiency state was not observed in this study, the correlations detected between decreased sTWEAK and decreased iron as well as Tf Sat % values were valuable findings, which point out decreased apoptosis. This may induce a proinflammatory state, potentially leading to malignancies in the future lives of obese children.Keywords: apoptosis, children, iron-related parameters, obesity, soluble tumor necrosis factor-like weak inducer of apoptosis
Procedia PDF Downloads 1323843 Applying the Fuzzy Analytic Network Process to Establish the Relative Importance of Knowledge Sharing Barriers
Authors: Van Dong Phung, Igor Hawryszkiewycz, Kyeong Kang, Muhammad Hatim Binsawad
Abstract:
Knowledge sharing (KS) is the key to creativity and innovation in any organizations. Overcoming the KS barriers has created new challenges for designing in dynamic and complex environment. There may be interrelations and interdependences among the barriers. The purpose of this paper is to present a review of literature of KS barriers and impute the relative importance of them through the fuzzy analytic network process that is a generalization of the analytical hierarchy process (AHP). It helps to prioritize the barriers to find ways to remove them to facilitate KS. The study begins with a brief description of KS barriers and the most critical ones. The FANP and its role in identifying the relative importance of KS barriers are explained. The paper, then, proposes the model for research and expected outcomes. The study suggests that the use of the FANP is appropriate to impute the relative importance of KS barriers which are intertwined and interdependent. Implications and future research are also proposed.Keywords: FANP, ANP, knowledge sharing barriers, knowledge sharing, removing barriers, knowledge management
Procedia PDF Downloads 3343842 ‘Ethical Relativism’ in Offshore Business: A Critical Assessment
Authors: Biswanath Swain
Abstract:
Ethical relativism, as an ethical perspective, holds that moral worth of a course of action is dependent on a particular space and time. Moral rightness or wrongness of a course of action varies from space to space and from time to time. In short, ethical relativism holds that morality is relative to the context. If we reflect conscientiously on the scope of this perspective, we will find that it is wide-spread amongst the marketers involved in the offshore business. However, the irony is that most of the marketers gone along with ethical relativism in their offshore business have been found to be unsuccessful in terms of loss in market-share and bankruptcy. The upshot is purely self-defeating in nature for the marketers. GSK in China and Nestle Maggi in India are some of the burning examples of that sort. The paper argues and recommends that a marketer, as an alternative, should have recourse to Kantian ethical perspective to deliberate courses of action sensitive to offshore business as Kantian ethical perspective is logically and methodologically sound in nature.Keywords: business, course of action, Kant, morality, offshore, relativism
Procedia PDF Downloads 3033841 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 2373840 'You’re Not Alone': Peer Feedback Practices for Cross-Cultural Writing Classrooms and Centers
Authors: Cassandra Branham, Danielle Farrar
Abstract:
As writing instructors and writing center administrators at a large research university with a significant population of English language learners (ELLs), we are interested in how peer feedback pedagogy can be effectively translated for writing center purposes, as well as how various modes of peer feedback can enrich the learning experiences of L1 and L2 writers in these spaces. Although peer feedback is widely used in classrooms and centers, instructor, student, and researcher opinions vary in respect to its effectiveness. We argue that peer feedback - traditional and digital, synchronous and asynchronous - is an indispensable element for both classrooms and centers and emphasize that it should occur with both L1 and L2 students to further develop an array of reading and writing skills. We also believe that further understanding of the best practices of peer feedback in such cross-cultural spaces, like the classroom and center, can optimize the benefits of peer feedback. After a critical review of the literature, we implemented an embedded tutoring program in our university’s writing center in collaboration with its First-Year Composition (FYC) program and Language Institute. The embedded tutoring program matches a graduate writing consultant with L1 and L2 writers enrolled in controlled-matriculation composition courses where ELLs make up at least 50% of each class. Furthermore, this program is informed by what we argue to be some best practices of peer feedback for both classroom and center purposes, including expectation-based training through rubrics, modeling effective feedback, hybridizing traditional and digital modes of feedback, recognizing the significance the body in composition (what we call writer embodiment), and maximizing digital technologies to exploit extended cognition. After conducting surveys and follow-up interviews with students, instructors, and writing consultants in the embedded tutoring program, we found that not only did students see an increased value in peer feedback, but also instructors saw an improvement in both writing style and critical thinking skills. Our L2 participants noted improvements in language acquisition while our L1 students recognized a broadening of their worldviews. We believe that both L1 and L2 students developed self-efficacy and agency in their identities as writers because they gained confidence in their abilities to offer feedback, as well as in the legitimacy of feedback they received from peers. We also argue that these best practices situate novice writers as experts, as writers become a valued and integral part of the revision process with their own and their peers’ papers. Finally, the use of iPads in embedded tutoring recovered the importance of the body and its senses in writing; the highly sensory feedback from these multi-modal sessions that offer audio and visual input underscores the significant role both the body and mind play in compositional practices. After beginning with a brief review of the literature that sparked this research, this paper will discuss the embedded tutoring program in detail, report on the results of the pilot program, and will conclude with a discussion of the pedagogical implications that arise from this research for both classroom and center.Keywords: English language learners, peer feedback, writing center, writing classroom
Procedia PDF Downloads 4023839 Control of Belts for Classification of Geometric Figures by Artificial Vision
Authors: Juan Sebastian Huertas Piedrahita, Jaime Arturo Lopez Duque, Eduardo Luis Perez Londoño, Julián S. Rodríguez
Abstract:
The process of generating computer vision is called artificial vision. The artificial vision is a branch of artificial intelligence that allows the obtaining, processing, and analysis of any type of information especially the ones obtained through digital images. Actually the artificial vision is used in manufacturing areas for quality control and production, as these processes can be realized through counting algorithms, positioning, and recognition of objects that can be measured by a single camera (or more). On the other hand, the companies use assembly lines formed by conveyor systems with actuators on them for moving pieces from one location to another in their production. These devices must be previously programmed for their good performance and must have a programmed logic routine. Nowadays the production is the main target of every industry, quality, and the fast elaboration of the different stages and processes in the chain of production of any product or service being offered. The principal base of this project is to program a computer that recognizes geometric figures (circle, square, and triangle) through a camera, each one with a different color and link it with a group of conveyor systems to organize the mentioned figures in cubicles, which differ from one another also by having different colors. This project bases on artificial vision, therefore the methodology needed to develop this project must be strict, this one is detailed below: 1. Methodology: 1.1 The software used in this project is QT Creator which is linked with Open CV libraries. Together, these tools perform to realize the respective program to identify colors and forms directly from the camera to the computer. 1.2 Imagery acquisition: To start using the libraries of Open CV is necessary to acquire images, which can be captured by a computer’s web camera or a different specialized camera. 1.3 The recognition of RGB colors is realized by code, crossing the matrices of the captured images and comparing pixels, identifying the primary colors which are red, green, and blue. 1.4 To detect forms it is necessary to realize the segmentation of the images, so the first step is converting the image from RGB to grayscale, to work with the dark tones of the image, then the image is binarized which means having the figure of the image in a white tone with a black background. Finally, we find the contours of the figure in the image to detect the quantity of edges to identify which figure it is. 1.5 After the color and figure have been identified, the program links with the conveyor systems, which through the actuators will classify the figures in their respective cubicles. Conclusions: The Open CV library is a useful tool for projects in which an interface between a computer and the environment is required since the camera obtains external characteristics and realizes any process. With the program for this project any type of assembly line can be optimized because images from the environment can be obtained and the process would be more accurate.Keywords: artificial intelligence, artificial vision, binarized, grayscale, images, RGB
Procedia PDF Downloads 3793838 Implementation of 5S Lean Methodology in Reviewing Competencies in a Higher Education Institution
Authors: Jasim Saleh Said AlDairi
Abstract:
The potential of applying Lean Management in Higher Education Institutions has increased significantly in last few years, leading to tremendous savings. Reviewing and updating competencies’ curriculum matrix is one of the critical and complicated processes that consume time and effort, and this has triggered searching for a scientific and sustainable approach to manage the such review. This paper presents a novel approach of implementing Lean (5S) methodology in reviewing technical competencies required for the graduates of the Military Technological College (MTC) in the Sultanate of Oman. The 5S framework has been imbedded into an action plan using the PDCA cycle. As a result, the method applied has helped in sorting out the actual required competencies, the team has identified the required (new, amended, and deleted) competencies in all of the targeted Engineering Departments, in addition, the major wastes within the overall process were identified, and the future review process was standardized and documented.Keywords: PDCA, 5S, lean, MTC, competencies, curriculum matrix, higher education
Procedia PDF Downloads 943837 A Constructive Analysis of the Formation of LGBTQ Families: Where Utopia and Reality Meet
Authors: Panagiotis Pentaris
Abstract:
The issue of social and legal recognition of LGBTQ families is of high importance when exploring the possibility of a family. Of equal importance is the fact that both society and the individual contribute to the overall recognition of LGBTQ families. This paper is a conceptual discussion, by methodology, of both sides; it uses a method of constructive analysis to expound on this issue. This method’s aim is to broaden conceptual theory, and introduce a new relationship between concepts that were previously not associated by evidence. This exploration has found that LGBTQ realities from an international perspective may differ and both legal and social rights are critical toward self-consciousness and the formation of a family. This paper asserts that internalised and historic oppression of LGBTQ individuals, places them, not always and not in all places, in a disadvantageous position as far as engaging with the potential of forming a family goes. The paper concludes that lack of social recognition and internalised oppression are key barriers regarding LGBTQ families.Keywords: family, gay, self-worth, LGBTQ, social rights
Procedia PDF Downloads 1253836 Chip Less Microfluidic Device for High Throughput Liver Spheroid Generation
Authors: Sourita Ghosh, Falguni Pati, Suhanya Duraiswamy
Abstract:
Spheroid, a simple three-dimensional cellular aggregate, allows us to simulate the in-vivo complexity of cellular signaling and interactions in greater detail than traditional 2D cell culture. It can be used as an in-vitro model for drug toxicity testing, tumor modeling and many other such applications specifically for cancer. Our work is focused on the development of an affordable, user-friendly, robust, reproducible, high throughput microfluidic device for water in oil droplet production, which can, in turn, be used for spheroids manufacturing. Here, we have investigated the droplet breakup between two non-Newtonian fluids, viz. silicone oil and decellularized liver matrix, which acts as our extra cellular matrix (ECM) for spheroids formation. We performed some biochemical assays to characterize the liver ECM, as well as rheological studies on our two fluids and observed a critical dependence of capillary number (Ca) on droplet breakup and homogeneous drop formationKeywords: chip less, droplets, extracellular matrix, liver spheroid
Procedia PDF Downloads 893835 The Relationships between Human Resource Management and Entrepreneurship: Case Study SME in Thailand
Authors: Bella Llego
Abstract:
This study aims to investigate the relationships between human resource management and entrepreneurship in the view of owner-managers and employees, and among employees with in the SME in Thailand. The research method used a qualitative method to confirm the phenomenology interest with top management position which women are regarding their career path by using purposive sampling method. The results showed that human resources management has positive relate with the corporate entrepreneurship are including the recruitment process, training worker, professional career development and reward system impact to entrepreneur’s knowledge and innovation of corporate entrepreneurship in respectively to bring a very reliable way. Then, the key informant suggested that women’s career experiences predisposed them to find an alternative route for entrepreneurship, despite having achieved top management. The understanding factors that successfully contribute to the development of women entrepreneurs from career development perspective are critical endeavours for any type of organization as well.Keywords: entrepreneurship, firm performance, human resource management, work efficiency
Procedia PDF Downloads 2703834 Learning Environments in the Early Years: A Case Study of an Early Childhood Centre in Australia
Authors: Mingxi Xiao
Abstract:
Children’s experiences in the early years build and shape the brain. The early years learning environment plays a significantly important role in children’s development. A well-constructed environment will facilitate children’s physical and mental well-being. This case study used an early learning centre in Australia called SDN Hurstville as an example, describing the learning environment in the centre, as well as analyzing the functions of the affordances. In addition, this report talks about the sustainability of learning in the centre, and how the environment supports cultural diversity and indigenous learning. The early years for children are significant. Different elements in the early childhood centre should work together to help children develop better. This case study found that the natural environment and the artificial environment are both critical to children; only when they work together can children have better development in physical and mental well-being and have a sense of belonging when playing and learning in the centre.Keywords: early childhood center, early childhood education, learning environment, Australia
Procedia PDF Downloads 2423833 Numerical Study on the Cavity-Induced Piping Failure of Embankment
Authors: H. J. Kim, G. C. Park, K. C. Kim, J. H. Shin
Abstract:
Cavities are frequently found beneath conduits on pile foundations in old embankments. Cavity reduces seepage length significantly and consequently causes piping failure of embankments. Case studies of embankment failures indicate that the relative settlement between ground and pile supported-concrete conduit was the main reason of the cavity. In this paper, an attempt to simulate the cavity-induced piping failure mechanism was made using finite element numerical method. Piping potential is examined by carrying out parametric study for influencing factors such as cavity length, water level, and flow conditions. The concentration of hydraulic gradient adjacent to cavity was found. It is found that the hydraulic gradient close to the cavity exceeds considerably the critical hydraulic gradient causing piping. Piping failure potential due to the existence of cavity is evaluated and contour map for the potential risk of an embankment for piping failure is proposed.Keywords: cavity, hydraulic gradient, levee, piping
Procedia PDF Downloads 5203832 Recent Developments in the Internal Arc Test Standard IEC 62271-200 for Switchgear Assemblies
Authors: Rajaramamohanarao Chennu, S. Sudhakara Reddy, Gurudev T, Maroti
Abstract:
With the invent of recent available technology and cost optimization, the switchgear assemblies are becoming more compact and designed to operate at critical levels of thermal and dielectric stress. At the same time, the switchgear assemblies shall be designed for protection of persons, met in the event of internal arc for specified installation conditions, according to the latest available national/international standards. These standards are revising regularly for better product design and personal safety. The switchgear assemblies design shall be modified in accordance with the change in requirements in the latest edition of the standards. This paper presents the signifying changes brought in the latest edition of 62271-200:2021 and effect of these changes and the necessitated design improvements for meeting internal arc test requirements is presented by carrying out the internal arc testing experiments on the switchgear assemblies at High Power Laboratory, Central Power Research Institute, Bangalore, India.Keywords: internal arc, switchgear assembly, high speed videography, IEC 62271-200
Procedia PDF Downloads 1903831 Pedagogy of the Oppressed: Fifty Years Later. Implications for Policy and Reforms
Authors: Mohammad Ibrahim Alladin
Abstract:
The Pedagogy of the Oppressed by Paulo Freire was first published in 1970. Since its publication it has become one of most cited book in the social sciences. Over a million copies have been sold worldwide. The Pedagogy of the Oppressed by Paulo Freire was published in 1970 (New York: Herder and Herder), The book has caused a “revolution” in the education world and his theory has been examined and analysed. It has influenced educational policy, curriculum development and teacher education. The revolution started half a century ago. “Paolo Freire’s Pedagogy of the Oppressed develops a theory of education fitted to the needs of the disenfranchised and marginalized members of capitalist societies. Combining educational and political philosophy, the book offers an analysis of oppression and a theory of liberation. Freire believes that traditional education serves to support the dominance of the powerful within society and thereby maintain the powerful’s social, political, and economic status quo. To overcome the oppression endemic to an exploitative society, education must be remade to inspire and enable the oppressed in their struggle for liberation. This new approach to education focuses on consciousness-raising, dialogue, and collaboration between teacher and student in the effort to achieve greater humanization for all. For Freire, education is political and functions either to preserve the current social order or to transform it. The theories of education and revolutionary action he offers in Pedagogy of the Oppressed are addressed educators committed to the struggle for liberation from oppression. Freire’s own commitment to this struggle developed through years of teaching literacy to Brazilian and Chilean peasants and laborers. His efforts at educational and political reform resulted in a brief period of imprisonment followed exile from his native Brazil for fifteen years. In Pedagogy of the Oppressed begins Freire asserts the importance of consciousness-raising, or conscientização, as the means enabling the oppressed to recognize their oppression and commit to the effort to overcome it, taking full responsibility for themselves in the struggle for liberation. He addresses the “fear of freedom,” which inhibits the oppressed from assuming this responsibility. He also cautions against the dangers of sectarianism, which can undermine the revolutionary purpose as well as serve as a refuge for the committed conservative. Freire provides an alternative view of education by attacking tradition education and knowledge. He is highly critical of how is imparted and how knowledge is structured that limits the learner’s thinking. Hence, education becomes oppressive and school functions as an institution of social control. Since its publication, education has gone through a series of reforms and in some areas total transformation. This paper addresses the following: The role of education in social transformation The teacher/learner relationship :Critical thinking The paper essentially examines what happened in the last fifty years since Freire’s book. It seeks to explain what happened to Freire’s education revolution, and what is the status of the movement that started almost fifty years ago.Keywords: pedagogy, reform, curriculum, teacher education
Procedia PDF Downloads 933830 Risk Assessment of Reinforcement System on Fractured Rock Mass, Gate Shaft Project, Jatigede Dam, Sumedang, West Java, Indonesia
Authors: A. Ardianto, M. A. Putera Agung, S. Pramusandi
Abstract:
Power waterway is one of dam structures and as an intake vertical tunnel or well function for hydroelectric power plants in Jatigede area, Sumedang, West Java. Gate shaft is also one of parts the power waterway system. The paper concerns some consideration in determining a critical state parameter on the back stability analysis of gate shaft or excavation wall stability during excavation. Study analysis was carried out using without and with reinforcement system. Results study showed that reinforcement shaft could reduce the total displacement and safety factor could increases significantly. Based on the back calculation results, it was recommended to install some reinforcement materials and drainage system to reduce pore water pressure.Keywords: power waterway, reinforcement, displacement, safety
Procedia PDF Downloads 4103829 Intensive Care Experience of Providing Palliative Care for a Terminal Lung Cancer Patient
Authors: Ting-I Lin
Abstract:
Objective: This article explores the nursing care experience of a 51-year-old terminal lung cancer patient admitted to the intensive care unit (ICU) following an upper right lobectomy. The patient initially sought emergency treatment due to worsening cough and dyspnea, which led to the placement of an endotracheal tube following sudden deterioration. Subsequent CT scans and chest X-rays revealed a tumor in the upper right lung with metastases to the lungs, liver, bones, and adrenal glands. The patient underwent a right upper lobectomy and a wedge resection of the right middle lobe. Pathology staging: T4N3M1c and the patient was diagnosed with advanced cancer postoperatively. Method: During the care period, nursing staff continuously monitored the patient’s physiological data through observations, direct care, interviews, physical assessments, and review of the patient’s medical records. The nursing team collaborated with the critical care team and the palliative care team, using Gordon's Eleven Functional Health Patterns to conduct a comprehensive assessment. The key health problems identified included pain related to postoperative cancer resection and invasive devices, fear of death due to rapid disease progression, and altered tissue perfusion associated with hemodynamic instability. Results: Postoperatively, the patient experienced pain from the surgical wound and dyspnea due to extensive metastasis, often leading to confusion. Through the adjustment of pain medication, the patient’s discomfort was alleviated, using Morphine 8 mg in 0.9% normal saline 60 ml IV drip q6h prn, and Ultracet 37.5 mg/325 mg 1# PO q6h. Additionally, lavender essential oil inhalation and limb massage were provided for 15 minutes four times a day. The patient’s FLACC pain score decreased from 7 to below 3. After respiratory training, the endotracheal tube was successfully removed, and the patient was weaned off the ventilator. Triflow exercises were used to promote alveolar expansion, with the goal of achieving 2 balls for 10 seconds, 5 repetitions per session, 6-8 times a day. The patient’s breathing stabilized at 16-18 breaths per minute, body temperature remained between 35.8°C and 36.1°C, and the mean arterial pressure was maintained between 60-80 mmHg. Conclusion: The critical care team and the palliative care team held a family meeting to discuss not only the patient’s care but also the emotional well-being of the family. Visiting hours were increased to two times per day, one hour each time, allowing the patient and family to express love and gratitude, which strengthened their emotional connection and reduced the patient’s anxiety from severe to mild. The family expressed that they had no regrets. After the patient was transferred to the general ward, the nursing team continued to provide end-of-life care with genuine empathy, compassion, and religious support, helping both the patient and family through the final stage of life.Keywords: multiple metastases, lung cancer, palliative care, nursing experience
Procedia PDF Downloads 283828 Improving Physical, Social, and Mental Health Outcomes for People Living with an Intellectual Disability through Cycling
Authors: Sarah Faulkner, Patrick Faulkner, Caroline Ellison
Abstract:
Improved mental and physical health, community connection, and increased life satisfaction has been strongly associated with bike riding for those with and without a disability. However, much evidence suggests that people living with a disability face increased barriers to engaging in cycling compared to members of the general population. People with an intellectual disability often live more sedentary and socially isolated lives that negatively impact their mental and physical health, as well as life satisfaction. This paper is based on preliminary findings from a three-year intervention cycling project funded by the South Australian Government. The cycling project was developed in partnership with community stakeholders that provided weekly instruction, training, and support to individuals living with intellectual disabilities to increase their capacity in cycling. This project aimed to support people living with intellectual disabilities to foster and facilitate improved physical and mental health, confidence, and independence and enhance social networking through their engagement in community cycling. The program applied principles of social role valorisation (SRV) theory as its guiding framework. Preliminary data collected is based on qualitative interviews with over 50 program participants, results from two participant wellness questionnaires, as well as a perceptually regulated exercise test administered throughout the project implementation. Preliminary findings are further supplemented with ethnographic analyses by the researchers who took a phenology of life experience approach. Preliminary findings of the program suggest a variety of social motivations behind participants' desire to learn cycling that acknowledges previous barriers to engagement and cycling’s role to address feelings of loneliness and social isolation. Meaningful health benefits can be achieved as demonstrated by increases in predicted V02 max measures, suggesting that physical intervention can not only improve physical health outcomes but also provide a variety of other social benefits. Initial engagement in the project has demonstrated an increase in participants' sense of confidence, well-being, and physical fitness. Implementation of the project in partnership with a variety of community stakeholders has identified a number of critical factors and processes necessary for future service replication, sustainability, and success. Findings from this intervention study contribute to the development of a knowledge base on how best to support individuals living with an intellectual disability to partake in bike riding and increase positive outcomes associated with their capacity building, social interaction, increased physical activity, physical health, and mental well-being. The initial findings of this study provide critical academic insights into the social and physical benefits of cycling for people living with a disability, as well as practical advice for future human service applications.Keywords: cycling, disability, social inclusion, capacity building
Procedia PDF Downloads 663827 Critical Evaluation of Key Performance Indicators in Procurement Management Information System: In Case of Bangladesh
Authors: Qazi Mahdia Ghyas
Abstract:
Electronic Government Procurement (e-GP) has implemented in Bangladesh to ensure the good Governance. e-GP has transformed Bangladesh's procurement process electronically. But, to our best knowledge, there is no study to understand the key features of e-GP in Bangladesh. So, this study tries to identify the features of performance improvement after implementing an e-GP system that will help for further improvements. Data was collected from the PROMIS Overall Report (Central Procurement Technical Unit website) for the financial year from Q1 _July- Sep 2015-16 to Q4 _Apr- Jun 2021-22. This study did component factor analysis on KPIs and found nineteen KPIs that are statistically significant and represent time savings, efficiency, accountability, anti-corruption and compliance key features in procurement activities of e-GP. Based on the analysis, some practical measures have been recommended for better improvement of e-GP. This study has some limitations. Because of having multicollinearity issues, all the 42 KPIs (except 19) did not show a good fit for component factor analysis.Keywords: public procurement, electronic government procurement, KPI, performance evaluation
Procedia PDF Downloads 953826 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3353825 Solar Architecture of Low-Energy Buildings for Industrial Applications
Authors: P. Brinks, O. Kornadt, R. Oly
Abstract:
This research focuses on the optimization of glazed surfaces and the assessment of possible solar gains in industrial buildings. Existing window rating methods for single windows were evaluated and a new method for a simple analysis of energy gains and losses by single windows was introduced. Furthermore extensive transient building simulations were carried out to appraise the performance of low cost polycarbonate multi-cell sheets in interaction with typical buildings for industrial applications. Mainly, energy-saving potential was determined by optimizing the orientation and area of such glazing systems in dependency on their thermal qualities. Moreover the impact on critical aspects such as summer overheating and daylight illumination was considered to ensure the user comfort and avoid additional energy demand for lighting or cooling. Hereby the simulated heating demand could be reduced by up to 1/3 compared to traditional architecture of industrial halls using mainly skylights.Keywords: solar architecture, Passive Solar Building Design, glazing, Low-Energy Buildings, industrial buildings
Procedia PDF Downloads 2363824 A Comparative Study of Milton’s Paradise Lost and the Quran in Islam
Authors: Najmeh Dehghanitafti
Abstract:
Paradise Lost, John Milton's epic poem of theology and cosmology, gained substantial critical attention in the twentieth century. Milton's illustration of Satan and Eve and his allusions to the Bible can be an interesting source of criticism for the scholars who try to analyze Milton's works in terms of religious studies. Therefore, various studies of Paradise Lost try to investigate this epic in terms of religions beyond Christianity. Paradise Lost's comparison with religious books such as the Qur’an in Islam in terms of character illustration created multiple translations of this epic into Arabic. Accordingly, this paper aims to compare Miltonic Satan versus Quranic Iblis based on Inani’s translation of Paradise Lost into Arabic. This study also tries to investigate Miltonic and Quranic view of Eve to find out the similarities and differences between Christianity and Islam in terms of feminism.Keywords: Eve, feminism, Iblis, Paradise Lost, Satan, The Quran
Procedia PDF Downloads 2593823 Characterisation of the Physical Properties of Debris and Residual Soils Implications for the Possible Landslides Occurrence on Cililin West Java
Authors: Ikah Ning Prasetiowati Permanasari, Gunawan Handayani, Lilik Hendrajaya
Abstract:
Landslide occurence at Mukapayung, Cililin West Java with material movement downward slope as far as 500m and hit residential areas of the village Nagrog cause eighteen people died and ten homes were destroyed and twenty-three heads of families evacuated. In order to test the hypothesis that soil at the landslides area is prone to landslides, we do drilling and the following tests were taken: particle size distribution, atterberg limits, shear strength, density, shringkage limits and triaxial unconsolidated and consolidated undrained test. Factor of safety was calculated to find out the possibility of subsequent landslides. The value of FOS of three layers is 1,05 which means that the soil in a critical condition and would be imminent to slide if there is disruption from the outside.Keywords: atterberg limits, particle size distribution, shear strength parameters, slope geometry, factor of safety
Procedia PDF Downloads 1493822 Trajectory Generation Procedure for Unmanned Aerial Vehicles
Authors: Amor Jnifene, Cedric Cocaud
Abstract:
One of the most constraining problems facing the development of autonomous vehicles is the limitations of current technologies. Guidance and navigation controllers need to be faster and more robust. Communication data links need to be more reliable and secure. For an Unmanned Aerial Vehicles (UAV) to be useful, and fully autonomous, one important feature that needs to be an integral part of the navigation system is autonomous trajectory planning. The work discussed in this paper presents a method for on-line trajectory planning for UAV’s. This method takes into account various constraints of different types including specific vectors of approach close to target points, multiple objectives, and other constraints related to speed, altitude, and obstacle avoidance. The trajectory produced by the proposed method ensures a smooth transition between different segments, satisfies the minimum curvature imposed by the dynamics of the UAV, and finds the optimum velocity based on available atmospheric conditions. Given a set of objective points and waypoints a skeleton of the trajectory is constructed first by linking all waypoints with straight segments based on the order in which they are encountered in the path. Secondly, vectors of approach (VoA) are assigned to objective waypoints and their preceding transitional waypoint if any. Thirdly, the straight segments are replaced by 3D curvilinear trajectories taking into account the aircraft dynamics. In summary, this work presents a method for on-line 3D trajectory generation (TG) of Unmanned Aerial Vehicles (UAVs). The method takes as inputs a series of waypoints and an optional vector of approach for each of the waypoints. Using a dynamic model based on the performance equations of fixed wing aircrafts, the TG computes a set of 3D parametric curves establishing a course between every pair of waypoints, and assembling these sets of curves to construct a complete trajectory. The algorithm ensures geometric continuity at each connection point between two sets of curves. The geometry of the trajectory is optimized according to the dynamic characteristics of the aircraft such that the result translates into a series of dynamically feasible maneuvers. In summary, this work presents a method for on-line 3D trajectory generation (TG) of Unmanned Aerial Vehicles (UAVs). The method takes as inputs a series of waypoints and an optional vector of approach for each of the waypoints. Using a dynamic model based on the performance equations of fixed wing aircraft, the TG computes a set of 3D parametric curves establishing a course between every pair of waypoints, and assembling these sets of curves to construct a complete trajectory. The algorithm ensures geometric continuity at each connection point between two sets of curves. The geometry of the trajectory is optimized according to the dynamic characteristics of the aircraft such that the result translates into a series of dynamically feasible maneuvers.Keywords: trajectory planning, unmanned autonomous air vehicle, vector of approach, waypoints
Procedia PDF Downloads 4093821 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 5483820 The Latest Salt Caravans: The Chinese Presence between Danakil and Tigray: Interdisciplinary Study to Integrate Chinese and African Relations in Ethiopia: Analyzing Road Evolution and Ethnographic Contexts
Authors: Erika Mattio
Abstract:
The aim of this project is to study the Chinese presence in Ethiopia, in the area between the Saba River and the Coptic areas of the Tigray, with detailed documentation of the Danakil region, from which the salt pickers caravans departed; the study was created to understand the relationships and consequences of the Chinese advance in these areas, inhabited by tribes linked to ancient, still practiced religious rituals, and home to unique landscapes and archaeological sites. Official estimates of the number of Chinese in Africa vary widely; on the continent, there are increasingly diverse groups of Chinese migrants in terms of language, dialect, class, education, and employment. Based on this and on a very general state of the art, it was decided to increase the studies on this phenomenon, focusing the attention on one of the most interesting countries for its diversity, cultural wealth, and for strong Chinese presence: Ethiopia. The study will be integrated with interdisciplinary investigation methods, such as landscape archeology, historiographic research, participatory anthropology, geopolitics, and cultural anthropology and ethnology. There are two main objectives of the research. The first is to predict what will happen to these populations and how the territory will be modified, trying to monitor the growth of infrastructure in the country and the effects it will have on the population. Risk analyzes will be carried out to understand what the foreign presence may entail, such as the absence of sustenance for local populations, the ghettoization of foreigners, unemployment of natives and the exodus of the population to the capital; the relationships between families and the local population will be analyzed, trying to understand the dynamics of socialization and interaction. Thanks to the use of GIS, the areas affected by the Chinese presence will be geo-referenced and mapped, delimiting the areas most affected and creating a risk analysis, both in desert areas and in archaeologically and historically relevant areas. The second point is to document the life and rituals of Ethiopian populations in order not to lose the aspects of uniqueness that risk being lost. Local interviews will collect impressions and criticisms from the local population to understand if the Chinese presence is perceived as a threat or as a solution. Furthermore, Afar leaders in the Logya area will be interviewed, in truly exclusive research, to understand their links with the foreign presence. From the north, along the Saba river, we will move to the northwest, in the Tigray region, to know the impressions in the Coptic area, currently less threatened by the Chinese presence but still affected by urbanization proposals. There will also be documented the Coptic rituals of Gennà and Timkat, unique expressions of a millennial tradition. This will allow the understanding of whether the Maoist presence could influence the religious rites and forms of belief present in the country, or the country will maintain its cultural independence.Keywords: Ethiopia, GIS, risk perceptions, salt caravans
Procedia PDF Downloads 1903819 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 3593818 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain
Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani
Abstract:
The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.Keywords: blockchain, hyperledger fabric, internet of things, security, traceability
Procedia PDF Downloads 149