Search results for: earthquake disaster data collection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26204

Search results for: earthquake disaster data collection

24044 Seismic Reliability of Two-DegreE-of-Freedom Systems with Supplemental Damping

Authors: A.D. García-Soto, Miguel Jaimes, J.G. Valdés-Vázquez, A. Hernández-Martínez

Abstract:

The seismic reliability of two-degree-of-freedom (2DOF) systems with and without supplemental damping are computed. The used records are scaled from realistic records using standard incremental dynamic Analysis (IDA). The total normalized shear base is computed for both cases using different scaling factors, and it is considered as the demand. The seismic reliability is computed using codified design to stipulate the capacity and, after some assumptions, applying the first-order reliability method (FORM). The 2DOF considered can be thought as structures with non-linear behavior, with and without seismic protection, subjected to earthquake activity in Mexico City. It is found that the reliability of 2DOF structures retrofitted with supplemental damper at its first story is generally higher than the reliability of 2DOF structures without supplemental damping.

Keywords: 2DOF structures, IDA, FORM, seismic reliability

Procedia PDF Downloads 125
24043 The Impact of Professional Development in the Area of Technology Enhanced Learning on Higher Education Teaching Practices Across Atlantic Technological University - Research Methodology and Preliminary Findings

Authors: Annette Cosgrove, Carina Ginty, Tony Hall, Cornelia Connolly

Abstract:

The objectives of this research study is to examine the impact of professional development in Technology Enhanced Learning (TEL) and the digitization of learning in teaching communities across multiple higher education sites in the ATU (Atlantic Technological University *) ( 2020-2025), including the proposal of an evidence-based digital teaching model for use in a future pandemic. The research strategy undertaken for this study is a multi-site study using mixed methods. Qualitative & quantitative methods are being used in the study to collect data. A pilot study was carried out initially, feedback was collected and the research instrument was edited to reflect this feedback before being administered. The purpose of the staff questionnaire is to evaluate the impact of professional development in the area of TEL, and to capture the practitioner's views on the perceived impact on their teaching practice in the higher education sector across ATU (West of Ireland – 5 Higher education locations ). The phenomenon being explored is ‘ the impact of professional development in the area of technology-enhanced learning and on teaching practice in a higher education institution. The research methodology chosen for this study is an Action based Research Study. The researcher has chosen this approach as it is a prime strategy for developing educational theory and enhancing educational practice. This study includes quantitative and qualitative methods to elicit data that will quantify the impact that continuous professional development in the area of digital teaching practice and technologies has on the practitioner’s teaching practice in higher education. The research instruments/data collection tools for this study include a lecturer survey with a targeted TEL Practice group ( Pre and post covid experience) and semi-structured interviews with lecturers. This research is currently being conducted across the ATU multi-site campus and targeting Higher education lecturers that have completed formal CPD in the area of digital teaching. ATU, a West of Ireland university, is the focus of the study. The research questionnaire has been deployed, with 75 respondents to date across the ATU - the primary questionnaire and semi-formal interviews are ongoing currently – the purpose being to evaluate the impact of formal professional development in the area of TEL and its perceived impact on the practitioners teaching practice in the area of digital teaching and learning. This paper will present initial findings, reflections and data from this ongoing research study.

Keywords: TEL, technology, digital, education

Procedia PDF Downloads 73
24042 Analysing Tertiary Lecturers’ Teaching Practices and Their English Major Students’ Learning Practices with Information and Communication Technology (ICT) Utilization in Promoting Higher-Order Thinking Skills (HOTs)

Authors: Malini Ganapathy, Sarjit Kaur

Abstract:

Maximising learning with higher-order thinking skills with Information and Communications Technology (ICT) has been deep-rooted and emphasised in various developed countries such as the United Kingdom, the United States of America and Singapore. The transformation of the education curriculum in the Malaysia Education Development Plan (PPPM) 2013-2025 focuses on the concept of Higher Order Thinking (HOT) skills which aim to produce knowledgeable students who are critical and creative in their thinking and can compete at the international level. HOT skills encourage students to apply, analyse, evaluate and think creatively in and outside the classroom. In this regard, the National Education Blueprint (2013-2025) is grounded based on high-performing systems which promote a transformation of the Malaysian education system in line with the vision of Malaysia’s National Philosophy in achieving educational outcomes which are of world class status. This study was designed to investigate ESL students’ learning practices on the emphasis of promoting HOTs while using ICT in their curricula. Data were collected using a stratified random sampling where 100 participants were selected to take part in the study. These respondents were a group of undergraduate students who undertook ESL courses in a public university in Malaysia. A three-part questionnaire consisting of demographic information, students’ learning experience and ICT utilization practices was administered in the data collection process. Findings from this study provide several important insights on students’ learning experiences and ICT utilization in developing HOT skills.

Keywords: English as a second language students, critical and creative thinking, learning, information and communication technology and higher order thinking skills

Procedia PDF Downloads 477
24041 Comparing Emotion Recognition from Voice and Facial Data Using Time Invariant Features

Authors: Vesna Kirandziska, Nevena Ackovska, Ana Madevska Bogdanova

Abstract:

The problem of emotion recognition is a challenging problem. It is still an open problem from the aspect of both intelligent systems and psychology. In this paper, both voice features and facial features are used for building an emotion recognition system. A Support Vector Machine classifiers are built by using raw data from video recordings. In this paper, the results obtained for the emotion recognition are given, and a discussion about the validity and the expressiveness of different emotions is presented. A comparison between the classifiers build from facial data only, voice data only and from the combination of both data is made here. The need for a better combination of the information from facial expression and voice data is argued.

Keywords: emotion recognition, facial recognition, signal processing, machine learning

Procedia PDF Downloads 311
24040 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 117
24039 Key Drivers Influencing the Shopping Behaviour of Customers in Retail Store

Authors: Aamir Hasan, Subhash Mishra

Abstract:

The purpose of the study was to determine the key drivers which influence the shopping behavior of the customers in the retail store. In today‟s competitive world with increasing number of retail stores, the retailers need to be more customer oriented. Retail has changed and expanded in all lines of business, be it apparel,jewelry, footwear, groceries etc. The modern consumer is posing a challenging task for the Indian retailer. More aware, more confident and much more demanding, therefore the retailers are looking for ways to deliver better consumer value and to increase consumer purchase intention. Retailers tend to differentiate themselves by making their service easier to consumers. The study aims to study the key drivers that can influence shopping behavior in retail store. A survey (store intercept) method was employed to elicit primary information from 300 shoppers in different retail stores of Lucknow. The findings reveal the factors that play a greater role in influencing the shopping behavior of customers in retail store. As such, a survey of retail store customers‟ attitude towards reduced price, sales promotion, quality of the products, proximity to the home, customer service, store atmospherics were analyzed to identify the key drivers influencing shopping behavior in retail store. A questionnaire based on a five-item Likert scale, as well as random sampling, was employed for data collection. Data analysis was accomplished using SPSS software. The paper has found shopping experience, store image and value for money as three important variable out of which shopping experience emerged as a dominant factor which influences the consumer's shopping behavior in the retail store. Since the research has established empirical evidences in determining the key drivers which influences the shopping behavior of the customers in the retail store, it serves as a foundation for a deeper probe into the shopping behavior of the customers in the retail store research domain in the Indian context.

Keywords: retail, shopping, customers, questionnaire

Procedia PDF Downloads 416
24038 Evaluation of Percutaneous Tube Thoracostomy Performed by Trainee in Both Trauma and Non-Trauma Patients

Authors: Kulsum Maula, Md Kamrul Alam, Md Ibrahim Khalil, Md Nazmul Hasan, Mohammad Omar Faruq

Abstract:

Background: Percutaneous Tube Thoracostomy (PTT) is an invasive procedure that can save a life now and then in different traumatic and non-traumatic conditions. But still, it is an enigma; how our trainee surgeons are at home in this procedure. Objectives: To evaluate the outcome of the percutaneous tube thoracostomy performed by trainees in both trauma and non-trauma patients. Study design: Prospective, Observational Study. The duration of the study was September 2018 to February 2019. Methods: All patients who need PTT in traumatic and non-traumatic conditions were selected by purposive sampling. Thereafter, they were scrutinized according to eligibility criteria and 96 patients were finalized. A pre-tested, observation-based, peer-reviewed data collection sheet was prepared before the study. Data regarding clinical and surgical outcome profiles were recorded. Data were compiled, edited, and analyzed. Results: Among 96 patients, the highest 32.29% belonged to age group 31-40 years and the lowest 9.37% belonged to the age group ≤20. The mean age of the respondents was 29.19±9.81. We found out of 96 patients, 70(72.91%) were indicated PTT for traumatic conditions and the rest 26(27.08%) were indicated PTT for non-traumatic chest conditions, where 36(37.5%) had simple penumothorax, 21(21.87%) haemothorax, 14(14.58%) massive pleural effusion, 13(13.54%) tension pneumothorax, 10(10.41%) haemopneumothorax, and 2(2.08%) had pyothorax respectively. In 53.12% of patients had right-sided intercostal chest tube (ICT) insertion, whereas 46.87% had left-sided ICT insertion. In our study, 89.55 % of the tube was placed at the normal anatomical position. Besides, 10.41% of tube thoracostomy were performed deviated from anatomical site. Among 96 patients 62.5% patients had length of incision 2-3cm, 35.41% had >3cm and 2.08% had <2cm respectively. Out of 96 patients, 75(78.13%) showed uneventful outcomes, whereas 21(21.87%) had complications, including 11.15%(11) each had wound infection, 4.46%(4) subcutaneous emphysema, 4.28%(3) drain auto expulsion, 2.85%(2) hemorrhage, 1.45%(1) had a non-functioning drain and empyema with ascending infection respectively (p=<0.05). Conclusion: PTT is a life-saving procedure that is most frequently implemented in chest trauma patients in our country. In the majority of cases, the outcome of PTT was uneventful (78.13). Besides this, more than one-third of patients had a length of incision more than 3 cm that needed extra stitches and 10.41% of cases of PTT were placed other than the normal anatomical site. Trainees of Dhaka Medical College Hospitals are doing well in their performance of PTT insertion, but still, some anatomical orientations are necessary to avoid operative and post-operative complications.

Keywords: PTT, trainee, trauma, non-chest trauma patients

Procedia PDF Downloads 118
24037 Geomorphology and Flood Analysis Using Light Detection and Ranging

Authors: George R. Puno, Eric N. Bruno

Abstract:

The natural landscape of the Philippine archipelago plus the current realities of climate change make the country vulnerable to flood hazards. Flooding becomes the recurring natural disaster in the country resulting to lose of lives and properties. Musimusi is among the rivers which exhibited inundation particularly at the inhabited floodplain portion of its watershed. During the event, rescue operations and distribution of relief goods become a problem due to lack of high resolution flood maps to aid local government unit identify the most affected areas. In the attempt of minimizing impact of flooding, hydrologic modelling with high resolution mapping is becoming more challenging and important. This study focused on the analysis of flood extent as a function of different geomorphologic characteristics of Musimusi watershed. The methods include the delineation of morphometric parameters in the Musimusi watershed using Geographic Information System (GIS) and geometric calculations tools. Digital Terrain Model (DTM) as one of the derivatives of Light Detection and Ranging (LiDAR) technology was used to determine the extent of river inundation involving the application of Hydrologic Engineering Center-River Analysis System (HEC-RAS) and Hydrology Modelling System (HEC-HMS) models. The digital elevation model (DEM) from synthetic Aperture Radar (SAR) was used to delineate watershed boundary and river network. Datasets like mean sea level, river cross section, river stage, discharge and rainfall were also used as input parameters. Curve number (CN), vegetation, and soil properties were calibrated based on the existing condition of the site. Results showed that the drainage density value of the watershed is low which indicates that the basin is highly permeable subsoil and thick vegetative cover. The watershed’s elongation ratio value of 0.9 implies that the floodplain portion of the watershed is susceptible to flooding. The bifurcation ratio value of 2.1 indicates higher risk of flooding in localized areas of the watershed. The circularity ratio value (1.20) indicates that the basin is circular in shape, high discharge of runoff and low permeability of the subsoil condition. The heavy rainfall of 167 mm brought by Typhoon Seniang last December 29, 2014 was characterized as high intensity and long duration, with a return period of 100 years produced 316 m3s-1 outflows. Portion of the floodplain zone (1.52%) suffered inundation with 2.76 m depth at the maximum. The information generated in this study is helpful to the local disaster risk reduction management council in monitoring the affected sites for more appropriate decisions so that cost of rescue operations and relief goods distribution is minimized.

Keywords: flooding, geomorphology, mapping, watershed

Procedia PDF Downloads 226
24036 Intentional Relationship Building: Stem Faculty Perceptions of Culturally Responsive Mentoring

Authors: Niesha Douglas, Lisa Merriweather, Cathy Howell, Anna Sancyzk

Abstract:

Many studies explain that mentoring in an academic setting contributes to student success and retention. However, in the United States, where the population is diverse and filled with multiple ethnic groups, mentoring has become too generalized and fails to offer a unique individualized experience for underrepresented minorities (URM). The purpose of this paper is to describe the findings of an ongoing qualitative study that investigates the relationships among STEM doctoral faculty and URM students. Several faculty from three different predominately white institutions (PWI) in the Southeastern region of the United States were interviewed and engaged in open dialogue about their experiences with mentoring. The data collection included semi-structured interviews that took place in the classroom (pre-COVID-19) as well as virtually. The theoretical framework draws on the idea of Critical Race Theory and how cultural, social constructs interfere with effective mentoring for URM Doctoral STEM students. The findings in this study suggest that though the faculty and several years of experience mentoring students, there were some gaps in understanding the needs of URM students and how mentoring is a unique relationship that should be specialized for each student and should not fit into one mold.

Keywords: culture, critical race theory, mentoring, STEM

Procedia PDF Downloads 191
24035 The Use of Digital Stories in the Development of Critical Literacy

Authors: Victoria Zenotz

Abstract:

For Fairclough (1989) critical literacy is a tool to enable readers and writers to build up meaning in discourse. More recently other authors (Leu et al., 2004) have included the new technology context in their definition of literacy. In their view being literate nowadays means to “successfully use and adapt to the rapidly changing information and communication technologies and contexts that continuously emerge in our world and influence all areas of our personal and professional lives.” (Leu et al., 2004: 1570). In this presentation the concept of critical literacy will be related to the creation of digital stories. In the first part of the presentation concepts such as literacy and critical literacy are examined. We consider that real social practices will help learners may improve their literacy level. Accordingly, we show some research, which was conducted at a secondary school in the north of Spain (2013-2014), to illustrate how the “writing” of digital stories may contribute to the development of critical literacy. The use of several instruments allowed the collection of data at the different stages of their creative process including watching and commenting models for digital stories, planning a storyboard, creating and selecting images, adding voices and background sounds, editing and sharing the final product. The results offer some valuable insights into learners’ literacy progress.

Keywords: literacy, computer assisted language learning, esl

Procedia PDF Downloads 394
24034 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 177
24033 Water Management Scheme: Panacea to Development Using Nigeria’s University of Ibadan Water Supply Scheme as a Case Study

Authors: Sunday Olufemi Adesogan

Abstract:

The supply of potable water at least is a very important index in national development. Water tariffs depend on the treatment cost which carries the highest percentage of the total operation cost in any water supply scheme. In order to keep water tariffs as low as possible, treatment costs have to be minimized. The University of Ibadan, Nigeria, water supply scheme consists of a treatment plant with three distribution stations (Amina way, Kurumi and Lander) and two raw water supply sources (Awba dam and Eleyele dam). An operational study of the scheme was carried out to ascertain the efficiency of the supply of potable water on the campus to justify the need for water supply schemes in tertiary institutions. The study involved regular collection, processing and analysis of periodic operational data. Data collected include supply reading (water production on daily basis) and consumers metered reading for a period of 22 months (October 2013 - July 2015), and also collected, were the operating hours of both plants and human beings. Applying the required mathematical equations, total loss was determined for the distribution system, which was translated into monetary terms. Adequacies of the operational functions were also determined. The study revealed that water supply scheme is justified in tertiary institutions. It was also found that approximately 10.7 million Nigerian naira (N) is lost to leakages during the 22-month study period; the system’s storage capacity is no longer adequate, especially for peak water production. The capacity of the system as a whole is insufficient for the present university population and that the existing water supply system is not being operated in an optimal manner especially due to personnel, power and system ageing constraints.

Keywords: development, panacea, supply, water

Procedia PDF Downloads 203
24032 Communities of Practice as a Training Model for Professional Development of In-Service Teachers: Analyzing the Sharing of Knowledge by Teachers

Authors: Panagiotis Kosmas

Abstract:

The advent of new technologies in education inspires practitioners to approach teaching from a different angle with the aim to professionally develop and improve teaching practices. Online communities of practice among teachers seem to be a trend associated with the integration efforts for a modern and pioneering educational system and training program. This study attempted to explore the participation in online communities of practice and the sharing of knowledge between teachers with aims to explore teachers' incentives to participate in such a community of practice. The study aims to contribute to international research, bringing in global debate new concerns and issues related to the professional learning of current educators. One official online community was used as a case study for the purposes of research. The data collection was conducted from the content analysis of online portal, by questionnaire in 184 community members and interviews with ten active users of the portal. The findings revealed that sharing of knowledge is a key motivation of members of a community. Also, the active learning and community participation seem to be essential factors for the success of an online community of practice.

Keywords: communities of practice, teachers, sharing knowledge, professional development

Procedia PDF Downloads 341
24031 Evaluation and Proposal for Improvement of the Flow Measurement Equipment in the Bellavista Drinking Water System of the City of Azogues

Authors: David Quevedo, Diana Coronel

Abstract:

The present article carries out an evaluation of the drinking water system in the Bellavista sector of the city of Azogues, with the purpose of determining the appropriate equipment to record the actual consumption flows of the inhabitants in said sector. Taking into account that the study area is located in a rural and economically disadvantaged area, there is an urgent need to establish a control system for the consumption of drinking water in order to conserve and manage the vital resource in the best possible way, considering that the water source supplying this sector is approximately 9km away. The research began with the collection of cartographic, demographic, and statistical data of the sector, determining the coverage area, population projection, and a provision that guarantees the supply of drinking water to meet the water needs of the sector's inhabitants. By using hydraulic modeling through the United States Environmental Protection Agency Application for Modeling Drinking Water Distribution Systems EPANET 2.0 software, theoretical hydraulic data were obtained, which were used to design and justify the most suitable measuring equipment for the Bellavista drinking water system. Taking into account a minimum service life of the drinking water system of 30 years, future flow rates were calculated for the design of the macro-measuring device. After analyzing the network, it was evident that the Bellavista sector has an average consumption of 102.87 liters per person per day, but considering that Ecuadorian regulations recommend a provision of 180 liters per person per day for the geographical conditions of the sector, this value was used for the analysis. With all the collected and calculated information, the conclusion was reached that the Bellavista drinking water system needs to have a 125mm electromagnetic macro-measuring device for the first three quinquenniums of its service life and a 150mm diameter device for the following three quinquenniums. The importance of having equipment that provides real and reliable data will allow for the control of water consumption by the population of the sector, measured through micro-measuring devices installed at the entrance of each household, which should match the readings of the macro-measuring device placed after the water storage tank outlet, in order to control losses that may occur due to leaks in the drinking water system or illegal connections.

Keywords: macrometer, hydraulics, endowment, water

Procedia PDF Downloads 69
24030 Ground Response Analysis at the Rukni Irrigation Project Site Located in Assam, India

Authors: Tauhidur Rahman, Kasturi Bhuyan

Abstract:

In the present paper, Ground Response Analysis at the Rukni irrigation project has been thoroughly investigated. Surface level seismic hazard is mainly used by the practical Engineers for designing the important structures. Surface level seismic hazard can be obtained accounting the soil factor. Structures on soft soil will show more ground shaking than the structure located on a hard soil. The Surface level ground motion depends on the type of soil. Density and shear wave velocity is different for different types of soil. The intensity of the soil amplification depends on the density and shear wave velocity of the soil. Rukni irrigation project is located in the North Eastern region of India, near the Dauki fault (550 Km length) which has already produced earthquakes of magnitude (Mw= 8.5) in the past. There is a probability of a similar type of earthquake occuring in the future. There are several faults also located around the project site. There are 765 recorded strong ground motion time histories available for the region. These data are used to determine the soil amplification factor by incorporation of the engineering properties of soil. With this in view, three of soil bore holes have been studied at the project site up to a depth of 30 m. It has been observed that in Soil bore hole 1, the shear wave velocity vary from 99.44 m/s to 239.28 m/s. For Soil Bore Hole No 2 and 3, shear wave velocity vary from 93.24 m/s to 241.39 m/s and 93.24m/s to 243.01 m/s. In the present work, surface level seismic hazard at the project site has been calculated based on the Probabilistic seismic hazard approach accounting the soil factor.

Keywords: Ground Response Analysis, shear wave velocity, soil amplification, surface level seismic hazard

Procedia PDF Downloads 547
24029 Data Recording for Remote Monitoring of Autonomous Vehicles

Authors: Rong-Terng Juang

Abstract:

Autonomous vehicles offer the possibility of significant benefits to social welfare. However, fully automated cars might not be going to happen in the near further. To speed the adoption of the self-driving technologies, many governments worldwide are passing laws requiring data recorders for the testing of autonomous vehicles. Currently, the self-driving vehicle, (e.g., shuttle bus) has to be monitored from a remote control center. When an autonomous vehicle encounters an unexpected driving environment, such as road construction or an obstruction, it should request assistance from a remote operator. Nevertheless, large amounts of data, including images, radar and lidar data, etc., have to be transmitted from the vehicle to the remote center. Therefore, this paper proposes a data compression method of in-vehicle networks for remote monitoring of autonomous vehicles. Firstly, the time-series data are rearranged into a multi-dimensional signal space. Upon the arrival, for controller area networks (CAN), the new data are mapped onto a time-data two-dimensional space associated with the specific CAN identity. Secondly, the data are sampled based on differential sampling. Finally, the whole set of data are encoded using existing algorithms such as Huffman, arithmetic and codebook encoding methods. To evaluate system performance, the proposed method was deployed on an in-house built autonomous vehicle. The testing results show that the amount of data can be reduced as much as 1/7 compared to the raw data.

Keywords: autonomous vehicle, data compression, remote monitoring, controller area networks (CAN), Lidar

Procedia PDF Downloads 156
24028 A Study on the Impact of Covid-19 on Primary Healthcare Workers in Ekiti State, South-West Nigeria

Authors: Adeyinka Adeniran, Omowunmi Bakare, Esther Oluwole, Florence Chieme, Temitope Durojaiye, Modupe Akinyinka, Omobola Ojo, Babatunde Olujobi, Marcus Ilesanmi, Akintunde Ogunsakin

Abstract:

Introduction: Globally, COVID-19 has greatly impacted the human race physically, socially, mentally, and economically. However, healthcare workers seemed to bear the greatest impact. The study, therefore, sought to assess the impact of COVID-19 on the primary healthcare workers in Ekiti, South-west Nigeria. Methods: The study was a cross-sectional descriptive study using a quantitative data collection method of 716 primary healthcare workers in Ekiti state. Respondents were selected using an online convenience sampling method via their social media platforms. Data was collected, collated, and analyzed using SPSS version 25 software and presented as frequency tables, mean and standard deviation. Bivariate and multivariate analyses were conducted using a t-test, and the level of statistical significance was set at p<0.05. Results: Less than half (47.1%) of respondents were between 41-50 age group and a mean age of 44.4+6.4SD. A majority (89.4%) were female, and almost all (96.2%) were married. More than (90%) had ever heard of Coronavirus, and (85.8%) had to spend more money on activities of daily living such as transportation (90.1%), groceries (80.6%), assisting relations (95.8%) and sanitary measures (disinfection) at home (95.0%). COVID-19 had a huge negative impact on about (89.7%) of healthcare workers, with a mean score of 22+4.8. Conclusion: COVID-19 negatively impacted the daily living and professional duties of primary healthcare workers, which reflected their psychological, physical, social, and economic well-being. Disease outbreaks are unlikely to disappear in the near future. Hence, global proactive interventions and homegrown measures should be adopted to protect healthcare workers and save lives.

Keywords: Covid-19, health workforce, primary health care, health systems, depression

Procedia PDF Downloads 77
24027 Damage-Based Seismic Design and Evaluation of Reinforced Concrete Bridges

Authors: Ping-Hsiung Wang, Kuo-Chun Chang

Abstract:

There has been a common trend worldwide in the seismic design and evaluation of bridges towards the performance-based method where the lateral displacement or the displacement ductility of bridge column is regarded as an important indicator for performance assessment. However, the seismic response of a bridge to an earthquake is a combined result of cyclic displacements and accumulated energy dissipation, causing damage to the bridge, and hence the lateral displacement (ductility) alone is insufficient to tell its actual seismic performance. This study aims to propose a damage-based seismic design and evaluation method for reinforced concrete bridges on the basis of the newly developed capacity-based inelastic displacement spectra. The capacity-based inelastic displacement spectra that comprise an inelastic displacement ratio spectrum and a corresponding damage state spectrum was constructed by using a series of nonlinear time history analyses and a versatile, smooth hysteresis model. The smooth model could take into account the effects of various design parameters of RC bridge columns and correlates the column’s strength deterioration with the Park and Ang’s damage index. It was proved that the damage index not only can be used to accurately predict the onset of strength deterioration, but also can be a good indicator for assessing the actual visible damage condition of column regardless of its loading history (i.e., similar damage index corresponds to similar actual damage condition for the same designed columns subjected to very different cyclic loading protocols as well as earthquake loading), providing a better insight into the seismic performance of bridges. Besides, the computed spectra show that the inelastic displacement ratio for far-field ground motions approximately conforms to the equal displacement rule when structural period is larger than around 0.8 s, but that for near-fault ground motions departs from the rule in the whole considered spectral regions. Furthermore, the near-fault ground motions would lead to significantly greater inelastic displacement ratio and damage index than far-field ground motions and most of the practical design scenarios cannot survive the considered near-fault ground motion when the strength reduction factor of bridge is not less than 5.0. Finally, the spectrum formula is presented as a function of structural period, strength reduction factor, and various column design parameters for far-field and near-fault ground motions by means of the regression analysis of the computed spectra. And based on the developed spectrum formula, a design example of a bridge is presented to illustrate the proposed damage-based seismic design and evaluation method where the damage state of the bridge is used as the performance objective.

Keywords: damage index, far-field, near-fault, reinforced concrete bridge, seismic design and evaluation

Procedia PDF Downloads 120
24026 Beginner Steps of the First Dendrochronology Lab in Montenegro - Dendrochronology Research in The Bosnian Pine (Pinus heldreichii) Forests

Authors: Jelena Popović, Andrijana Mićanović

Abstract:

Officially, 60% of Montenegrin territory is covered in forests, but they are continually being destroyed by illegal cutting, concession politics and wildfires. Montenegrin Ecologists Society started the first dendrochronology lab in Montenegro, and data collection began in the Summer of 2021. The cores were taken from 3 localities around the peak Lisac on the mt. Prekornica, where biggest P.heldreichii forests existed until recent huge wildfires. This research is the first step towards comprehensive dendrochronology research in Montenegro. It will show how old certain forest stands of Pinus heldreichii on mountain Prekornica are, that were not destroyed in huge wildfires from the recent years. It will also show how do they correlate between each other. Per locality 15 trees were sampled. Electric sanders (150 - 2000) were used for preparation. Cores were scanned, then measured in CooRecorder. Analysis is done in Cofecha. Process will be repeated with Lintab 6 and TSAP (Time Series Analysis and Presentation for Dendrochronology and Related Applications) - Win Scientific software by Rinntech. Since this is the first dendrochronology research entirely done in Montenegro it is a foundation for the dendroclimatology research. Besides, it’ll contribute to the understanding of the life of these forests in this part of its areal, and in designing good management practices.

Keywords: dendrochronology, bosnian pine, pinus heldreichii, montenegro, forests

Procedia PDF Downloads 90
24025 Multimedia Data Fusion for Event Detection in Twitter by Using Dempster-Shafer Evidence Theory

Authors: Samar M. Alqhtani, Suhuai Luo, Brian Regan

Abstract:

Data fusion technology can be the best way to extract useful information from multiple sources of data. It has been widely applied in various applications. This paper presents a data fusion approach in multimedia data for event detection in twitter by using Dempster-Shafer evidence theory. The methodology applies a mining algorithm to detect the event. There are two types of data in the fusion. The first is features extracted from text by using the bag-ofwords method which is calculated using the term frequency-inverse document frequency (TF-IDF). The second is the visual features extracted by applying scale-invariant feature transform (SIFT). The Dempster - Shafer theory of evidence is applied in order to fuse the information from these two sources. Our experiments have indicated that comparing to the approaches using individual data source, the proposed data fusion approach can increase the prediction accuracy for event detection. The experimental result showed that the proposed method achieved a high accuracy of 0.97, comparing with 0.93 with texts only, and 0.86 with images only.

Keywords: data fusion, Dempster-Shafer theory, data mining, event detection

Procedia PDF Downloads 405
24024 Monitoring and Analysis of Bridge Crossing Ground Fissures

Authors: Zhiqing Zhang, Xiangong Zhou, Zihan Zhou

Abstract:

Ground fissures can be seen in some cities all over the world. As a special urban geological disaster, ground fissures in Xi'an have caused great harm to infrastructure. Chang'an Road Interchange in Xi'an City is a bridge across ground fissures. The damage to Chang'an Road interchange is the most serious and typical. To study the influence of ground fissures on the bridge, we established a bridge monitoring system. The main monitoring items include elevation monitoring, structural displacement monitoring, etc. The monitoring results show that the typical failure is mainly reflected in the bridge deck damage caused by horizontal tension and vertical dislocation. For the construction of urban interchange spanning ground fissures, the interchange should be divided reasonably, a simple support structure with less restriction should be adopted, and the monitoring of supports should be strengthened to prevent the occurrence of beam falling.

Keywords: bridge monitoring, ground fissures, typical disease, structural displacement

Procedia PDF Downloads 210
24023 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems

Authors: Yong-Kyu Jung

Abstract:

The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).

Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity

Procedia PDF Downloads 74
24022 Predictive Factors of Prognosis in Acute Stroke Patients Receiving Traditional Chinese Medicine Therapy: A Retrospective Study

Authors: Shaoyi Lu

Abstract:

Background: Traditional Chinese medicine has been used to treat stroke, which is a major cause of morbidity and mortality. There is, however, no clear agreement about the optimal timing, population, efficacy, and predictive prognosis factors of traditional Chinese medicine supplemental therapy. Method: In this study, we used a retrospective analysis with data collection from stroke patients in Stroke Registry In Chang Gung Healthcare System (SRICHS). Stroke patients who received traditional Chinese medicine consultation in neurology ward of Keelung Chang Gung Memorial Hospital from Jan 2010 to Dec 2014 were enrolled. Clinical profiles including the neurologic deficit, activities of daily living and other basic characteristics were analyzed. Through propensity score matching, we compared the NIHSS and Barthel index before and after the hospitalization, and applied with subgroup analysis, and adjusted by multivariate regression method. Results: Totally 115 stroke patients were enrolled with experiment group in 23 and control group in 92. The most important factor for prognosis prediction were the scores of National Institutes of Health Stroke Scale and Barthel index right before the hospitalization. Traditional Chinese medicine intervention had no statistically significant influence on the neurological deficit of acute stroke patients, and mild negative influence on daily activity performance of acute hemorrhagic stroke patient. Conclusion: Efficacy of traditional Chinese medicine as a supplemental therapy for acute stroke patients was controversial. The reason for this phenomenon might be complex and require more research to comprehend. Key words: traditional Chinese medicine, acupuncture, Stroke, NIH stroke scale, Barthel index, predictive factor. Method: In this study, we used a retrospective analysis with data collection from stroke patients in Stroke Registry In Chang Gung Healthcare System (SRICHS). Stroke patients who received traditional Chinese medicine consultation in neurology ward of Keelung Chang Gung Memorial Hospital from Jan 2010 to Dec 2014 were enrolled. Clinical profiles including the neurologic deficit, activities of daily living and other basic characteristics were analyzed. Through propensity score matching, we compared the NIHSS and Barthel index before and after the hospitalization, and applied with subgroup analysis, and adjusted by multivariate regression method. Results: Totally 115 stroke patients were enrolled with experiment group in 23 and control group in 92. The most important factor for prognosis prediction were the scores of National Institutes of Health Stroke Scale and Barthel index right before the hospitalization. Traditional Chinese medicine intervention had no statistically significant influence on the neurological deficit of acute stroke patients, and mild negative influence on daily activity performance of acute hemorrhagic stroke patient. Conclusion: Efficacy of traditional Chinese medicine as a supplemental therapy for acute stroke patients was controversial. The reason for this phenomenon might be complex and require more research to comprehend.

Keywords: traditional Chinese medicine, complementary and alternative medicine, stroke, acupuncture

Procedia PDF Downloads 357
24021 Disruptive Innovation in Low-Income Countries: The Role of the Sharing Economy in Shaping the People Transportation Market in Nigeria

Authors: D. Tappi

Abstract:

In the past decades, the idea of innovation moved from being considered the result of development to being seen as its means. Innovation and its diffusion are indeed keys to the development and economic catch-up of a country. However, the process of diffusing existing innovation in low income countries has demonstrated dependent on inadequate infrastructures and institutions. The paper examines the role of disruptive innovation in bridging the technology gap between high- and low-income countries, overcoming the lack in infrastructures and institutions. In particular, the focus of this paper goes to the role of disruptive innovation in people transportation in Nigeria. Uber, Taxify, and Smartcab are covering a small and interesting market that was underserved, between the high-end private driver markets, the personal car owners and the low-priced traditional cab and the Keke (tricycle). Indeed the small Nigerian middle class and international community have found in the sharing people transportation market a safe, reasonably priced means of transportation in Nigerian big cities. This study uses mainly qualitative data collection methods in the form of semi-structured interviews with major players and users and quantitative data analysis in the form of a survey among users in order to assess the role of these new transportation modes in shaping the market and even creating a new niche. This paper shows how the new sharing economy in people transportation is creating new solutions to old problems as well as creating new challenges for both the existing market players and institutions. By doing so, the paper shows how disruptive innovations applied to low income countries, not only can overcome the lacking infrastructure problem but could also help bridge the technology gap between those and high income countries. This contribution proves that it is indeed exactly because the market presents these obstacles that disruptive innovations can succeed in countries such as Nigeria.

Keywords: development, disruptive innovation, sharing economy, technology gap

Procedia PDF Downloads 109
24020 Sustainable Strategies for Post-Disaster Shelters: Case Study-Based Review and Future Prospects

Authors: Fangwen Ni, Hongpeng Xu

Abstract:

When disasters occur, it is important to provide temporary shelters to protect victims from their environment and to comfort them with privacy and dignity. However, the commonly used shelters like tents and shanties can not ensure a comfortable condition. Furthermore, the demand for more energy and less pollution has become a major challenge. Focusing on the sustainable of temporary shelters, this study intends to clarify the essential role of temporary shelters before the reconstruction work is done. The paper also identifies the main problems from three aspects including spatial layout, thermal comfort and utilization of passive technology. Moreover, it expounds the passive strategies of ecological design by case study and simulation. It is found that the living condition of shelters can be improved from the perspective of architectural space, ventilation theory and construction techniques. Regardless of being temporary, these shelters are crucial elements in emergency situations and should be taken more seriously.

Keywords: architectural space, construction technique, sustainable strategy, temporary shelter

Procedia PDF Downloads 266
24019 Speaker Identification by Atomic Decomposition of Learned Features Using Computational Auditory Scene Analysis Principals in Noisy Environments

Authors: Thomas Bryan, Veton Kepuska, Ivica Kostanic

Abstract:

Speaker recognition is performed in high Additive White Gaussian Noise (AWGN) environments using principals of Computational Auditory Scene Analysis (CASA). CASA methods often classify sounds from images in the time-frequency (T-F) plane using spectrograms or cochleargrams as the image. In this paper atomic decomposition implemented by matching pursuit performs a transform from time series speech signals to the T-F plane. The atomic decomposition creates a sparsely populated T-F vector in “weight space” where each populated T-F position contains an amplitude weight. The weight space vector along with the atomic dictionary represents a denoised, compressed version of the original signal. The arraignment or of the atomic indices in the T-F vector are used for classification. Unsupervised feature learning implemented by a sparse autoencoder learns a single dictionary of basis features from a collection of envelope samples from all speakers. The approach is demonstrated using pairs of speakers from the TIMIT data set. Pairs of speakers are selected randomly from a single district. Each speak has 10 sentences. Two are used for training and 8 for testing. Atomic index probabilities are created for each training sentence and also for each test sentence. Classification is performed by finding the lowest Euclidean distance between then probabilities from the training sentences and the test sentences. Training is done at a 30dB Signal-to-Noise Ratio (SNR). Testing is performed at SNR’s of 0 dB, 5 dB, 10 dB and 30dB. The algorithm has a baseline classification accuracy of ~93% averaged over 10 pairs of speakers from the TIMIT data set. The baseline accuracy is attributable to short sequences of training and test data as well as the overall simplicity of the classification algorithm. The accuracy is not affected by AWGN and produces ~93% accuracy at 0dB SNR.

Keywords: time-frequency plane, atomic decomposition, envelope sampling, Gabor atoms, matching pursuit, sparse dictionary learning, sparse autoencoder

Procedia PDF Downloads 285
24018 Stress Solitary Waves Generated by a Second-Order Polynomial Constitutive Equation

Authors: Tsun-Hui Huang, Shyue-Cheng Yang, Chiou-Fen Shieha

Abstract:

In this paper, a nonlinear constitutive law and a curve fitting, two relationships between the stress-strain and the shear stress-strain for sandstone material were used to obtain a second-order polynomial constitutive equation. Based on the established polynomial constitutive equations and Newton’s second law, a mathematical model of the non-homogeneous nonlinear wave equation under an external pressure was derived. The external pressure can be assumed as an impulse function to simulate a real earthquake source. A displacement response under nonlinear two-dimensional wave equation was determined by a numerical method and computer-aided software. The results show that a suit pressure in the sandstone generates the phenomenon of stress solitary waves.

Keywords: polynomial constitutive equation, solitary, stress solitary waves, nonlinear constitutive law

Procedia PDF Downloads 490
24017 Cry, the Peacock: A Psychoanalytic Feminist Study

Authors: Taira Bano

Abstract:

Cry, the Peacock is a famous novel by Anita Desai which deals with the psychic tumult of a young and sensitive female protagonist, Maya. The novel deals with the in-depth study of the psyche of Maya who is haunted by a childhood prophecy of a fatal disaster. This persistent obsession of death either for her or her husband within four years of their marriage is the main reason for Maya’s neurosis. The novel is not only concerned with the psychological aspect of Maya but is also a strong plea for the rights of women. The novel consists of both psychological as well as feministic elements. The attitude of Maya, not to submit to the authority of her husband gives perfect description of second wave feminism. Feminism is a movement which deals with the issues of inequality between men and women. Psychoanalysis is the study of the psychology of characters. It depicts how an incident in one’s life shapes the personality of an individual. This paper will deal with the study of the novel Cry, the Peacock from psychoanalytic perspective and will try to trace out the reason for such an extreme step that Maya takes in the end of the novel- crossing all the limits of a traditional submissive wife.

Keywords: psyche, psychological, mental, feminist

Procedia PDF Downloads 505
24016 Relationship among Teams' Information Processing Capacity and Performance in Information System Projects: The Effects of Uncertainty and Equivocality

Authors: Ouafa Sakka, Henri Barki, Louise Cote

Abstract:

Uncertainty and equivocality are defined in the information processing literature as two task characteristics that require different information processing responses from managers. As uncertainty often stems from a lack of information, addressing it is thought to require the collection of additional data. On the other hand, as equivocality stems from ambiguity and a lack of understanding of the task at hand, addressing it is thought to require rich communication between those involved. Past research has provided weak to moderate empirical support to these hypotheses. The present study contributes to this literature by defining uncertainty and equivocality at the project level and investigating their moderating effects on the association between several project information processing constructs and project performance. The information processing constructs considered are the amount of information collected by the project team, and the richness and frequency of formal communications among the team members to discuss the project’s follow-up reports. Data on 93 information system development (ISD) project managers was collected in a questionnaire survey and analyzed it via the Fisher Test for correlation differences. The results indicate that the highest project performance levels were observed in projects characterized by high uncertainty and low equivocality in which project managers were provided with detailed and updated information on project costs and schedules. In addition, our findings show that information about user needs and technical aspects of the project is less useful to managing projects where uncertainty and equivocality are high. Further, while the strongest positive effect of interactive use of follow-up reports on performance occurred in projects where both uncertainty and equivocality levels were high, its weakest effect occurred when both of these were low.

Keywords: uncertainty, equivocality, information processing model, management control systems, project control, interactive use, diagnostic use, information system development

Procedia PDF Downloads 286
24015 The Risk and Prevention of Peer-To-Peer Network Lending in China

Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang

Abstract:

How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.

Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision

Procedia PDF Downloads 162