Search results for: data communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27133

Search results for: data communication

24793 Conversational Assistive Technology of Visually Impaired Person for Social Interaction

Authors: Komal Ghafoor, Tauqir Ahmad, Murtaza Hanif, Hira Zaheer

Abstract:

Assistive technology has been developed to support visually impaired people in their social interactions. Conversation assistive technology is designed to enhance communication skills, facilitate social interaction, and improve the quality of life of visually impaired individuals. This technology includes speech recognition, text-to-speech features, and other communication devices that enable users to communicate with others in real time. The technology uses natural language processing and machine learning algorithms to analyze spoken language and provide appropriate responses. It also includes features such as voice commands and audio feedback to provide users with a more immersive experience. These technologies have been shown to increase the confidence and independence of visually impaired individuals in social situations and have the potential to improve their social skills and relationships with others. Overall, conversation-assistive technology is a promising tool for empowering visually impaired people and improving their social interactions. One of the key benefits of conversation-assistive technology is that it allows visually impaired individuals to overcome communication barriers that they may face in social situations. It can help them to communicate more effectively with friends, family, and colleagues, as well as strangers in public spaces. By providing a more seamless and natural way to communicate, this technology can help to reduce feelings of isolation and improve overall quality of life. The main objective of this research is to give blind users the capability to move around in unfamiliar environments through a user-friendly device by face, object, and activity recognition system. This model evaluates the accuracy of activity recognition. This device captures the front view of the blind, detects the objects, recognizes the activities, and answers the blind query. It is implemented using the front view of the camera. The local dataset is collected that includes different 1st-person human activities. The results obtained are the identification of the activities that the VGG-16 model was trained on, where Hugging, Shaking Hands, Talking, Walking, Waving video, etc.

Keywords: dataset, visually impaired person, natural language process, human activity recognition

Procedia PDF Downloads 52
24792 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 256
24791 Analysis of Citation Rate and Data Reuse for Openly Accessible Biodiversity Datasets on Global Biodiversity Information Facility

Authors: Nushrat Khan, Mike Thelwall, Kayvan Kousha

Abstract:

Making research data openly accessible has been mandated by most funders over the last 5 years as it promotes reproducibility in science and reduces duplication of effort to collect the same data. There are evidence that articles that publicly share research data have higher citation rates in biological and social sciences. However, how and whether shared data is being reused is not always intuitive as such information is not easily accessible from the majority of research data repositories. This study aims to understand the practice of data citation and how data is being reused over the years focusing on biodiversity since research data is frequently reused in this field. Metadata of 38,878 datasets including citation counts were collected through the Global Biodiversity Information Facility (GBIF) API for this purpose. GBIF was used as a data source since it provides citation count for datasets, not a commonly available feature for most repositories. Analysis of dataset types, citation counts, creation and update time of datasets suggests that citation rate varies for different types of datasets, where occurrence datasets that have more granular information have higher citation rates than checklist and metadata-only datasets. Another finding is that biodiversity datasets on GBIF are frequently updated, which is unique to this field. Majority of the datasets from the earliest year of 2007 were updated after 11 years, with no dataset that was not updated since creation. For each year between 2007 and 2017, we compared the correlations between update time and citation rate of four different types of datasets. While recent datasets do not show any correlations, 3 to 4 years old datasets show weak correlation where datasets that were updated more recently received high citations. The results are suggestive that it takes several years to cumulate citations for research datasets. However, this investigation found that when searched on Google Scholar or Scopus databases for the same datasets, the number of citations is often not the same as GBIF. Hence future aim is to further explore the citation count system adopted by GBIF to evaluate its reliability and whether it can be applicable to other fields of studies as well.

Keywords: data citation, data reuse, research data sharing, webometrics

Procedia PDF Downloads 170
24790 Significance of Transient Data and Its Applications in Turbine Generators

Authors: Chandra Gupt Porwal, Preeti C. Porwal

Abstract:

Transient data reveals much about the machine's condition that steady-state data cannot. New technologies make this information much more available for evaluating the mechanical integrity of a machine train. Recent surveys at various stations indicate that simplicity is preferred over completeness in machine audits throughout the power generation industry. This is most clearly shown by the number of rotating machinery predictive maintenance programs in which only steady-state vibration amplitude is trended while important transient vibration data is not even acquired. Efforts have been made to explain what transient data is, its importance, the types of plots used for its display, and its effective utilization for analysis. In order to demonstrate the value of measuring transient data and its practical application in rotating machinery for resolving complex and persistent issues with turbine generators, the author presents a few case studies that highlight the presence of rotor instabilities due to the shaft moving towards the bearing centre in a 100 MM LMZ unit located in the Northern Capital Region (NCR), heavy misalignment noticed—especially after 2993 rpm—caused by loose coupling bolts, which prevented the machine from being synchronized for more than four months in a 250 MW KWU unit in the Western Region (WR), and heavy preload noticed at Intermediate pressure turbine (IPT) bearing near HP- IP coupling, caused by high points on coupling faces at a 500 MW KWU unit in the Northern region (NR), experienced at Indian power plants.

Keywords: transient data, steady-state-data, intermediate -pressure-turbine, high-points

Procedia PDF Downloads 58
24789 Instructional Leadership and Competency in Capacity Development among Principals: A Mediation with Self Efficacy in Moderate Performing Schools

Authors: Mohd Ibrahim K. Azeez, Mohammed Sani Ibrahim, Rosemawati Mustapa, Maisarah A. Malik, Chandrakala Varatharajoo, Wee Akina Sia Seng Lee

Abstract:

The leadership of the principals is known to be a key indicator in development and school performance. Therefore, this study was undertaken to assess the extent of the influence of instructional leadership in the field of supervision and curriculum focus on capacity development competence in the field of communication and teamwork. In addition, this study also examines self-efficacy mediator school leadership in the field of self-improvement and self-management of school principals. The study involved 383 guest teachers from 55 secondary schools for leadership in schools. Data was analyzed using SEM aid program AMOS 21. The final result shows partial mediation model was the best model fit to obtain the best goodness of fit of (X2/df = 4.663, CFI = 0.922, GFI = 0.778, TLI = 0914, NFI = 0.903, and RMSEA = 0.098) compared to the direct effect model of the findings (X2/df = 5.319, CFI = 0.908, GFI = 0755, TLI = 0.899, NFI = 0.889, and RMSEA = 0.106). While the findings of the fully mediator model with a self-efficacy refers principals as a mediator as follows (X2/df = 4.838, CFI = 0918, GFI = 0772, TLI = 0.910, NFI = 0.899, and RMSEA = 0.100). Therefore, it can be concluded that the findings clearly demonstrate self-efficacy variables principals become a mediator in the relationship between instructional leadership capacity and competency development.

Keywords: instructional leadership, capacity development, self-efficacy, competency

Procedia PDF Downloads 717
24788 Geographic Information System for District Level Energy Performance Simulations

Authors: Avichal Malhotra, Jerome Frisch, Christoph van Treeck

Abstract:

The utilization of semantic, cadastral and topological data from geographic information systems (GIS) has exponentially increased for building and urban-scale energy performance simulations. Urban planners, simulation scientists, and researchers use virtual 3D city models for energy analysis, algorithms and simulation tools. For dynamic energy simulations at city and district level, this paper provides an overview of the available GIS data models and their levels of detail. Adhering to different norms and standards, these models also intend to describe building and construction industry data. For further investigations, CityGML data models are considered for simulations. Though geographical information modelling has considerably many different implementations, extensions of virtual city data can also be made for domain specific applications. Highlighting the use of the extended CityGML models for energy researches, a brief introduction to the Energy Application Domain Extension (ADE) along with its significance is made. Consequently, addressing specific input simulation data, a workflow using Modelica underlining the usage of GIS information and the quantification of its significance over annual heating energy demand is presented in this paper.

Keywords: CityGML, EnergyADE, energy performance simulation, GIS

Procedia PDF Downloads 162
24787 Post-Disaster Recovery and Impacts on Construction Resources: Case Studies of Queensland Catastrophic Events

Authors: Scott A. Abbott

Abstract:

This paper examines the increase in the occurrence of natural disasters worldwide and the need to support vulnerable communities in post-disaster recovery. Preparation and implementation of post-disaster recovery projects need to be improved to allow communities to recover infrastructure, housing, economically and socially following a catastrophe. With the continual rise in catastrophic events worldwide due to climate change, impacts on construction resources affect the ability for post-disaster recovery to be undertaken. This research focuses on case studies of catastrophic events in Queensland, Australia, to contribute to the body of knowledge and gain valuable insights on lessons learned from past events and how they have been managed. The aim of this research is to adopt qualitative data using semi-structured interviews from participants predominantly from the insurance sector to understand barriers that have previously and currently exist in post-disaster recovery. Existing literature was reviewed to reveal gaps in knowledge that needed to be tested. Qualitative data was collected and summarised from field research with the results analysed and discussed. Barriers that impacted post-disaster recovery included time, cost, and resource capability and capacity. Causal themes that impacted time and cost were identified as decision making, pre-planning, and preparedness, as well as effective communication across stakeholders. The research study applied a qualitative approach to the existing literature and case studies across Queensland, Australia, to identify existing and new barriers that impact post-disaster recovery. It was recommended to implement effective procurement strategies to assist in cost control; implement pre-planning and preparedness strategies across funder, contractor, and local governments; more effective and timely decision making to reduce time and cost impacts.

Keywords: construction recovery, cost, disaster recovery, resources, time

Procedia PDF Downloads 122
24786 Large-Scale Simulations of Turbulence Using Discontinuous Spectral Element Method

Authors: A. Peyvan, D. Li, J. Komperda, F. Mashayek

Abstract:

Turbulence can be observed in a variety fluid motions in nature and industrial applications. Recent investment in high-speed aircraft and propulsion systems has revitalized fundamental research on turbulent flows. In these systems, capturing chaotic fluid structures with different length and time scales is accomplished through the Direct Numerical Simulation (DNS) approach since it accurately simulates flows down to smallest dissipative scales, i.e., Kolmogorov’s scales. The discontinuous spectral element method (DSEM) is a high-order technique that uses spectral functions for approximating the solution. The DSEM code has been developed by our research group over the course of more than two decades. Recently, the code has been improved to run large cases in the order of billions of solution points. Running big simulations requires a considerable amount of RAM. Therefore, the DSEM code must be highly parallelized and able to start on multiple computational nodes on an HPC cluster with distributed memory. However, some pre-processing procedures, such as determining global element information, creating a global face list, and assigning global partitioning and element connection information of the domain for communication, must be done sequentially with a single processing core. A separate code has been written to perform the pre-processing procedures on a local machine. It stores the minimum amount of information that is required for the DSEM code to start in parallel, extracted from the mesh file, into text files (pre-files). It packs integer type information with a Stream Binary format in pre-files that are portable between machines. The files are generated to ensure fast read performance on different file-systems, such as Lustre and General Parallel File System (GPFS). A new subroutine has been added to the DSEM code to read the startup files using parallel MPI I/O, for Lustre, in a way that each MPI rank acquires its information from the file in parallel. In case of GPFS, in each computational node, a single MPI rank reads data from the file, which is specifically generated for the computational node, and send them to other ranks on the node using point to point non-blocking MPI communication. This way, communication takes place locally on each node and signals do not cross the switches of the cluster. The read subroutine has been tested on Argonne National Laboratory’s Mira (GPFS), National Center for Supercomputing Application’s Blue Waters (Lustre), San Diego Supercomputer Center’s Comet (Lustre), and UIC’s Extreme (Lustre). The tests showed that one file per node is suited for GPFS and parallel MPI I/O is the best choice for Lustre file system. The DSEM code relies on heavily optimized linear algebra operation such as matrix-matrix and matrix-vector products for calculation of the solution in every time-step. For this, the code can either make use of its matrix math library, BLAS, Intel MKL, or ATLAS. This fact and the discontinuous nature of the method makes the DSEM code run efficiently in parallel. The results of weak scaling tests performed on Blue Waters showed a scalable and efficient performance of the code in parallel computing.

Keywords: computational fluid dynamics, direct numerical simulation, spectral element, turbulent flow

Procedia PDF Downloads 129
24785 Achieving High Renewable Energy Penetration in Western Australia Using Data Digitisation and Machine Learning

Authors: A. D. Tayal

Abstract:

The energy industry is undergoing significant disruption. This research outlines that, whilst challenging; this disruption is also an emerging opportunity for electricity utilities. One such opportunity is leveraging the developments in data analytics and machine learning. As the uptake of renewable energy technologies and complimentary control systems increases, electricity grids will likely transform towards dense microgrids with high penetration of renewable generation sources, rich in network and customer data, and linked through intelligent, wireless communications. Data digitisation and analytics have already impacted numerous industries, and its influence on the energy sector is growing, as computational capabilities increase to manage big data, and as machines develop algorithms to solve the energy challenges of the future. The objective of this paper is to address how far the uptake of renewable technologies can go given the constraints of existing grid infrastructure and provides a qualitative assessment of how higher levels of renewable energy penetration can be facilitated by incorporating even broader technological advances in the fields of data analytics and machine learning. Western Australia is used as a contextualised case study, given its abundance and diverse renewable resources (solar, wind, biomass, and wave) and isolated networks, making a high penetration of renewables a feasible target for policy makers over coming decades.

Keywords: data, innovation, renewable, solar

Procedia PDF Downloads 356
24784 Emotion Recognition Using Artificial Intelligence

Authors: Rahul Mohite, Lahcen Ouarbya

Abstract:

This paper focuses on the interplay between humans and computer systems and the ability of these systems to understand and respond to human emotions, including non-verbal communication. Current emotion recognition systems are based solely on either facial or verbal expressions. The limitation of these systems is that it requires large training data sets. The paper proposes a system for recognizing human emotions that combines both speech and emotion recognition. The system utilizes advanced techniques such as deep learning and image recognition to identify facial expressions and comprehend emotions. The results show that the proposed system, based on the combination of facial expression and speech, outperforms existing ones, which are based solely either on facial or verbal expressions. The proposed system detects human emotion with an accuracy of 86%, whereas the existing systems have an accuracy of 70% using verbal expression only and 76% using facial expression only. In this paper, the increasing significance and demand for facial recognition technology in emotion recognition are also discussed.

Keywords: facial reputation, expression reputation, deep gaining knowledge of, photo reputation, facial technology, sign processing, photo type

Procedia PDF Downloads 109
24783 Dynamics of Agricultural Information and Effect on Income of Melon Farmers in Enugu Ezike Agricultural Zone of Enugu State, Nigeria

Authors: Iwuchukwu J. C., Ekeh G. Madukwe, M. C., Asadu A. N.

Abstract:

Melon has significant importance of easy to plant, early maturing, low nutrient requirement and high yielding. Yet many melon farmers in the study area are either diversifying or abandoning this enterprise probably because of lack of agricultural knowledge/information and consequent reduction in output and income. The study was therefore carried out to asses effects of agricultural information on income of melon farmers in Enugu-Ezike Agricultural zone of Enugu state, Nigeria. Three blocks, nine circles and ninety melon farmers who were purposively selected constituted the sample for the study..Data were collected with interview schedule. Percentage and chart were used to present some of the data while some were analysed with mean score and correlation. The findings reveal that. average annual income of these respondents from melon was about seven thousand and five hundred Naira (approximately forty five Dollars). while their total average monthly income (income from melon and other sources) was about one thousand and two hundred Naira (approximately seven Dollars). About 42.% and 62% of the respondents in their respective order did not receive information on agricultural matters and melon production. Among the minority that received information on melon production, most of them sourced it from neighbours/friends/relatives. Majority of the respondents needed information on how to plant melon through interpersonal contact (face to face) using Igbo language as medium of communication and extension agent as teacher or resource person. The study also reveal a significant and positive relationship between number of times respondents received information on agriculture and their total monthly income. There was also a strong, positive and significant relationship between number of times respondents received information on melon and their annual income on melon production. The study therefore recommends that governmental and non-governmental organizations/ institutions should strengthen these farmers access to information on agriculture and melon specifically so as to boost their output and income.

Keywords: farmers, income, information, melon

Procedia PDF Downloads 238
24782 A New Paradigm to Make Cloud Computing Greener

Authors: Apurva Saxena, Sunita Gond

Abstract:

Demand of computation, data storage in large amount are rapidly increases day by day. Cloud computing technology fulfill the demand of today’s computation but this will lead to high power consumption in cloud data centers. Initiative for Green IT try to reduce power consumption and its adverse environmental impacts. Paper also focus on various green computing techniques, proposed models and efficient way to make cloud greener.

Keywords: virtualization, cloud computing, green computing, data center

Procedia PDF Downloads 545
24781 Managing Change in the Academic Libraries in the Perspective of Web 2.0

Authors: Raj Kumar, Navjyoti Dhingra

Abstract:

Academic libraries are the hubs in which knowledge is a major resource and the performances of these knowledge in terms of adding and delivering value to their users depend upon their ability and effectiveness in engendering, arranging, managing, and using this knowledge. Developments in Information and Communication Technology’s (ICT), the libraries have been incorporated at the electronic edge to facilitate a rapid transfer of information on a global scale. Web2.0 refers to the development of online services that encourage collaboration, communication and information sharing. Web 2.0 reflects changes in how one can use the web rather than describing any technical or structural change. Libraries provide manifold channels of Information access to its e-users. The rapid expansion of tools, formats, services and technologies has presented many options to unfold Library Collection. Academic libraries must develop ways and means to meet their user’s expectations and remain viable. Web 2.0 tools are the first step on that journey. Web 2.0 has been widely used by the libraries to promote functional services like access to catalogue or for external activities like information or photographs of library events, enhancement of usage of library resources and bringing users closer to the library. The purpose of this paper is to provide a reconnaissance of Web 2.0 tools for enhancing library services in India. The study shows that a lot of user-friendly tools can be adopted by information professionals to effectively cater to information needs of its users. The authors have suggested a roadmap towards a revitalized future for providing various information opportunities to techno-savvy users.

Keywords: academic libraries, change management, social media, Web 2.0

Procedia PDF Downloads 207
24780 Calculation of Organ Dose for Adult and Pediatric Patients Undergoing Computed Tomography Examinations: A Software Comparison

Authors: Aya Al Masri, Naima Oubenali, Safoin Aktaou, Thibault Julien, Malorie Martin, Fouad Maaloul

Abstract:

Introduction: The increased number of performed 'Computed Tomography (CT)' examinations raise public concerns regarding associated stochastic risk to patients. In its Publication 102, the ‘International Commission on Radiological Protection (ICRP)’ emphasized the importance of managing patient dose, particularly from repeated or multiple examinations. We developed a Dose Archiving and Communication System that gives multiple dose indexes (organ dose, effective dose, and skin-dose mapping) for patients undergoing radiological imaging exams. The aim of this study is to compare the organ dose values given by our software for patients undergoing CT exams with those of another software named "VirtualDose". Materials and methods: Our software uses Monte Carlo simulations to calculate organ doses for patients undergoing computed tomography examinations. The general calculation principle consists to simulate: (1) the scanner machine with all its technical specifications and associated irradiation cases (kVp, field collimation, mAs, pitch ...) (2) detailed geometric and compositional information of dozens of well identified organs of computational hybrid phantoms that contain the necessary anatomical data. The mass as well as the elemental composition of the tissues and organs that constitute our phantoms correspond to the recommendations of the international organizations (namely the ICRP and the ICRU). Their body dimensions correspond to reference data developed in the United States. Simulated data was verified by clinical measurement. To perform the comparison, 270 adult patients and 150 pediatric patients were used, whose data corresponds to exams carried out in France hospital centers. The comparison dataset of adult patients includes adult males and females for three different scanner machines and three different acquisition protocols (Head, Chest, and Chest-Abdomen-Pelvis). The comparison sample of pediatric patients includes the exams of thirty patients for each of the following age groups: new born, 1-2 years, 3-7 years, 8-12 years, and 13-16 years. The comparison for pediatric patients were performed on the “Head” protocol. The percentage of the dose difference were calculated for organs receiving a significant dose according to the acquisition protocol (80% of the maximal dose). Results: Adult patients: for organs that are completely covered by the scan range, the maximum percentage of dose difference between the two software is 27 %. However, there are three organs situated at the edges of the scan range that show a slightly higher dose difference. Pediatric patients: the percentage of dose difference between the two software does not exceed 30%. These dose differences may be due to the use of two different generations of hybrid phantoms by the two software. Conclusion: This study shows that our software provides a reliable dosimetric information for patients undergoing Computed Tomography exams.

Keywords: adult and pediatric patients, computed tomography, organ dose calculation, software comparison

Procedia PDF Downloads 150
24779 A Study on the Improvement of Mobile Device Call Buzz Noise Caused by Audio Frequency Ground Bounce

Authors: Jangje Park, So Young Kim

Abstract:

The market demand for audio quality in mobile devices continues to increase, and audible buzz noise generated in time division communication is a chronic problem that goes against the market demand. In the case of time division type communication, the RF Power Amplifier (RF PA) is driven at the audio frequency cycle, and it makes various influences on the audio signal. In this paper, we measured the ground bounce noise generated by the peak current flowing through the ground network in the RF PA with the audio frequency; it was confirmed that the noise is the cause of the audible buzz noise during a call. In addition, a grounding method of the microphone device that can improve the buzzing noise was proposed. Considering that the level of the audio signal generated by the microphone device is -38dBV based on 94dB Sound Pressure Level (SPL), even ground bounce noise of several hundred uV will fall within the range of audible noise if it is induced by the audio amplifier. Through the grounding method of the microphone device proposed in this paper, it was confirmed that the audible buzz noise power density at the RF PA driving frequency was improved by more than 5dB under the conditions of the Printed Circuit Board (PCB) used in the experiment. A fundamental improvement method was presented regarding the buzzing noise during a mobile phone call.

Keywords: audio frequency, buzz noise, ground bounce, microphone grounding

Procedia PDF Downloads 132
24778 Communication Skills for Physicians: Adaptation to the Third Gender and Language Cross Cultural Influences

Authors: Virginia Guillén Cañas, Miren Agurtzane Ortiz-Jauregi, Sonia Ruiz De Azua, Naiara Ozamiz

Abstract:

We want to focus on relationship of the communicational skills in several key aspects of medicine. The most relevant competencies of a health professional are an adequate communication capacity, which will influence the satisfaction of professionals and patients, therapeutic compliance, conflict prevention, clinical outcomes’ improvement and efficiency of health services. We define empathy as it as Sympathy and connection to others and capability to communicate this understanding. Some outcomes favoring empathy are female gender, younger age, and specialty choice. Third gender or third sex is a concept in which allows a person not to be categorized in a dual way but as a continuous variable, giving the choice of moving along it. This point of view recognizes three or more genders. The subject of Ethics and Clinical Communication is dedicated to sensitizing students about the importance and effectiveness of a good therapeutic relationship. We are also interested in other communicational aspects related to empathy as active listening, assertivity and basic and advanced Social Skills. Objectives: 1. To facilitate the approach of the student in the Medicine Degree to the reality of the medical profession 2. Analyze interesting outcome variables in communication 3. Interactive process to detect the areas of improvement in the learning process of the Physician throughout his professional career needs. Design: A comparative study with a cross-sectional approach was conducted in successive academic year cohorts of health professional students at a public Basque university. Four communicational aspects were evaluated through these questionnaires in Basque, Spanish and English: The active listening questionnaire, the TECA empathy questionnaire, the ACDA questionnaire and the EHS questionnaire Social Skills Scale. Types of interventions for improving skills: Interpersonal skills training intervention, Empathy intervention, Writing about experiential learning, Drama through role plays, Communicational skills training, Problem-based learning, Patient interviews ´videos, Empathy-focused training, Discussion. Results: It identified the need for a cross cultural adaptation and no gender distinction. The students enjoyed all the techniques in comparison to the usual master class. There was medium participation but these participative methodologies are not so usual in the university. According to empathy, men have a greater empathic capacity to fully understand women (p < 0.05) With regard to assertiveness there have been no differences between men and women in self-assertiveness but nevertheless women are more heteroassertive than men. Conclusions: These findings suggest that educational interventions with adequate feedback can be effective in maintaining and enhancing empathy in undergraduate medical students.

Keywords: physician's communicational skills, patient satisfaction, third gender, cross cultural adaptation

Procedia PDF Downloads 188
24777 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 288
24776 Physiological Action of Anthraquinone-Containing Preparations

Authors: Dmitry Yu. Korulkin, Raissa A. Muzychkina, Evgenii N. Kojaev

Abstract:

In review the generalized data about biological activity of anthraquinone-containing plants and specimens on their basis is presented. Data of traditional medicine, results of bioscreening and clinical researches of specimens are analyzed.

Keywords: anthraquinones, physiologically active substances, phytopreparation, Ramon

Procedia PDF Downloads 370
24775 Nursing Professionals’ Perception of the Work Environment, Safety Climate and Job Satisfaction in the Brazilian Hospitals during the COVID-19 Pandemic

Authors: Ana Claudia de Souza Costa, Beatriz de Cássia Pinheiro Goulart, Karine de Cássia Cavalari, Henrique Ceretta Oliveira, Edineis de Brito Guirardello

Abstract:

Background: During the COVID-19 pandemic, nursing represents the largest category of health professionals who were on the front line. Thus, investigating the practice environment and the job satisfaction of nursing professionals during the pandemic becomes fundamental since it reflects on the quality of care and the safety climate. The aim of this study was to evaluate and compare the nursing professionals' perception of the work environment, job satisfaction, and safety climate of the different hospitals and work shifts during the COVID-19 pandemic. Method: This is a cross-sectional survey with 130 nursing professionals from public, private and mixed hospitals in Brazil. For data collection, was used an electronic form containing the personal and occupational variables, work environment, job satisfaction, and safety climate. The data were analyzed using descriptive statistics and ANOVA or Kruskal-Wallis tests according to the data distribution. The distribution was evaluated by means of the Shapiro-Wilk test. The analysis was done in the SPSS 23 software, and it was considered a significance level of 5%. Results: The mean age of the participants was 35 years (±9.8), with a mean time of 6.4 years (±6.7) of working experience in the institution. Overall, the nursing professionals evaluated the work environment as favorable; they were dissatisfied with their job in terms of pay, promotion, benefits, contingent rewards, operating procedures and satisfied with coworkers, nature of work, supervision, and communication, and had a negative perception of the safety climate. When comparing the hospitals, it was found that they did not differ in their perception of the work environment and safety climate. However, they differed with regard to job satisfaction, demonstrating that nursing professionals from public hospitals were more dissatisfied with their work with regard to promotion when compared to professionals from private (p=0.02) and mixed hospitals (p< 0.01) and nursing professionals from mixed hospitals were more satisfied than those from private hospitals (p= 0.04) with regard to supervision. Participants working in night shifts had the worst perception of the work environment related to nurse participation in hospital affairs (p= 0.02), nursing foundations for quality care (p= 0.01), nurse manager ability, leadership and support (p= 0.02), safety climate (p< 0.01), job satisfaction related to contingent rewards (p= 0.04), nature of work (p= 0.03) and supervision (p< 0.01). Conclusion: The nursing professionals had a favorable perception of the environment and safety climate but differed among hospitals regarding job satisfaction for the promotion and supervision domains. There was also a difference between the participants regarding the work shifts, being the night shifts, those with the lowest scores, except for satisfaction with operational conditions.

Keywords: health facility environment, job satisfaction, patient safety, nursing

Procedia PDF Downloads 149
24774 Wrong Site Surgery Should Not Occur In This Day And Age!

Authors: C. Kuoh, C. Lucas, T. Lopes, I. Mechie, J. Yoong, W. Yoong

Abstract:

For all surgeons, there is one preventable but still highly occurring complication – wrong site surgeries. They can have potentially catastrophic, irreversible, or even fatal consequences on patients. With the exponential development of microsurgery and the use of advanced technological tools, the consequences of operating on the wrong side, anatomical part, or even person is seen as the most visible and destructive of all surgical errors and perhaps the error that is dreaded by most clinicians as it threatens their licenses and arouses feelings of guilt. Despite the implementation of the WHO surgical safety checklist more than a decade ago, the incidence of wrong-site surgeries remains relatively high, leading to tremendous physical and psychological repercussions for the clinicians involved, as well as a financial burden for the healthcare institution. In this presentation, the authors explore various factors which can lead to wrong site surgery – a combination of environmental and human factors and evaluate their impact amongst patients, practitioners, their families, and the medical industry. Major contributing factors to these “never events” include deviations from checklists, excessive workload, and poor communication. Two real-life cases are discussed, and systems that can be implemented to prevent these errors are highlighted alongside lessons learnt from other industries. The authors suggest that reinforcing speaking-up, implementing medical professional trainings, and higher patient’s involvements can potentially improve safety in surgeries and electrosurgeries.

Keywords: wrong side surgery, never events, checklist, workload, communication

Procedia PDF Downloads 179
24773 The Perceptions of High School English Home Language Learners on Fostering 21st Century Skills Through the Use of Technology in the Classroom

Authors: Lisa Naudine Parrock, Geoffrey Lautenbach

Abstract:

The changes brought to society by the technological development in the Fourth Industrial Revolution are also reaching the sphere of education and the education system needs to respond. Students need skills such as communication, collaboration, creativity and critical thinking in order to be successful in the 21st Century, which could be developed through the meaningful use of technology. This study is theorized by the 21st Century Framework for Learning and examines the student perceptions of grade 10 and 11 English Home language learners on how the technology used in their English classroom contributes to the development of 21st Century skills. The researcher adopted a constructivist paradigm and presented findings based on a general qualitative method. The study found that students perceived the use of technology in the classroom positively contributed to their development of communication, collaboration, creativity and critical thinking. Students also perceived technology as contributing to their access to information, a positive classroom atmosphere, heightened engagement in learning and developing skills necessary for their future. In addition, this study highlighted certain pedagogical strategies and digital tools that support the development of 21st Century skills. The findings suggest that the meaningful integration of technology fosters the development of 21st Century skills in grade 10 and 11 learners.

Keywords: educational technology, 21st century skills, fourth industrial revolution, affordances of technology

Procedia PDF Downloads 126
24772 Personal Data Protection: A Legal Framework for Health Law in Turkey

Authors: Veli Durmus, Mert Uydaci

Abstract:

Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.

Keywords: data protection, personal data, privacy, healthcare, health law

Procedia PDF Downloads 211
24771 Formalizing a Procedure for Generating Uncertain Resource Availability Assumptions Based on Real Time Logistic Data Capturing with Auto-ID Systems for Reactive Scheduling

Authors: Lars Laußat, Manfred Helmus, Kamil Szczesny, Markus König

Abstract:

As one result of the project “Reactive Construction Project Scheduling using Real Time Construction Logistic Data and Simulation”, a procedure for using data about uncertain resource availability assumptions in reactive scheduling processes has been developed. Prediction data about resource availability is generated in a formalized way using real-time monitoring data e.g. from auto-ID systems on the construction site and in the supply chains. The paper focuses on the formalization of the procedure for monitoring construction logistic processes, for the detection of disturbance and for generating of new and uncertain scheduling assumptions for the reactive resource constrained simulation procedure that is and will be further described in other papers.

Keywords: auto-ID, construction logistic, fuzzy, monitoring, RFID, scheduling

Procedia PDF Downloads 506
24770 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.

Keywords: discrete wavelet transforms, AES, dynamic SBox

Procedia PDF Downloads 427
24769 Using Data from Foursquare Web Service to Represent the Commercial Activity of a City

Authors: Taras Agryzkov, Almudena Nolasco-Cirugeda, Jose L. Oliver, Leticia Serrano-Estrada, Leandro Tortosa, Jose F. Vicent

Abstract:

This paper aims to represent the commercial activity of a city taking as source data the social network Foursquare. The city of Murcia is selected as case study, and the location-based social network Foursquare is the main source of information. After carrying out a reorganisation of the user-generated data extracted from Foursquare, it is possible to graphically display on a map the various city spaces and venues –especially those related to commercial, food and entertainment sector businesses. The obtained visualisation provides information about activity patterns in the city of Murcia according to the people`s interests and preferences and, moreover, interesting facts about certain characteristics of the town itself.

Keywords: social networks, spatial analysis, data visualization, geocomputation, Foursquare

Procedia PDF Downloads 416
24768 Experiences during the First Year of Practice among New Nurses

Authors: Chanya Thanomlikhit, Pataraporn Kheawwan

Abstract:

Transition from student to staff nurse can be difficult for nurses beginning their nursing profession. Objective: The purpose of this study was to explore the transition experiences during the first year of practice among new nurses in Thailand. Methods: A descriptive design using a survey questionnaire was used. One hundred seventy-eight new graduate nurses from one tertiary hospital in Thailand participated in this study. Data were collected using paper-and-pencil format of the Revised Casey-Fink Graduate Nurse Experience Survey. Results: Participants reported three types of difficulties they were experiencing during the first year of practice including role expectation, lack of confidence, and workload. New nurses reported uncomfortable to perform high risk skills such as code/emergency, ventilator care, EKG, and chest tube care. Organizing, prioritizing and communication were rated as difficult tasks during 12-month transition period. New nurses satisfied the benefit package they received from the institution, however, salary was lowest satisfied. Conclusion: Results inform transition program development for new nurses. Initiative of systems that support for the graduate nurse during the first year of practice is suggested.

Keywords: new graduate nurse, transition, nurse residency program, clinical education

Procedia PDF Downloads 233
24767 Application of Data Mining Techniques for Tourism Knowledge Discovery

Authors: Teklu Urgessa, Wookjae Maeng, Joong Seek Lee

Abstract:

Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms.

Keywords: classification algorithms, data mining, knowledge discovery, tourism

Procedia PDF Downloads 286
24766 United Nations Sustainable Development Goals and Digital Exclusion: Reconsidering Sustainable Development and Digital Poverty in the Post-Pandemic World

Authors: Serena Clark, Katriona O'Sullivan, Kevin Marshall, Mac MacLachlan

Abstract:

This paper explores the United Nation's sustainable development goals (SDGs) alongside digital poverty and proposes that digital poverty should be a new SDG. The SDGs concentrate on 17 key areas, including economic growth, reducing inequalities, climate action, ending poverty, gender equality, and quality education. Many of the plans to fulfill these goals involve the creation and adaptation of new technologies. As we have seen with COVID-19, access to these technologies has determined communities and societies' ability to respond to these challenges in both developed and developing nations. For example, the transition to online education due to the lockdowns had a detrimental effect on children who did not have access to technology to provide continuity in their educational development. Digitalization and emerging technologies, especially information and communication technologies (ICTs), can help address each goal. Digital poverty and exclusion exacerbate the gap between rich and poor within our societies and internationally, and COVID-19 has further highlighted these issues. Closing this gap can support achieving the SDGs. If access to digital technologies measure society's response and resilience in addressing the challenges the SDGs seek to resolve, should reducing digital poverty be an SDG of its own? This paper will explore this question, arguing that digital poverty should be an independent SDG working alongside and supporting the achievement of the other 17 SDGs.

Keywords: digital poverty, digital exclusion, United Nations sustainable development goals, information and communication technologies

Procedia PDF Downloads 134
24765 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 187
24764 Detection of Keypoint in Press-Fit Curve Based on Convolutional Neural Network

Authors: Shoujia Fang, Guoqing Ding, Xin Chen

Abstract:

The quality of press-fit assembly is closely related to reliability and safety of product. The paper proposed a keypoint detection method based on convolutional neural network to improve the accuracy of keypoint detection in press-fit curve. It would provide an auxiliary basis for judging quality of press-fit assembly. The press-fit curve is a curve of press-fit force and displacement. Both force data and distance data are time-series data. Therefore, one-dimensional convolutional neural network is used to process the press-fit curve. After the obtained press-fit data is filtered, the multi-layer one-dimensional convolutional neural network is used to perform the automatic learning of press-fit curve features, and then sent to the multi-layer perceptron to finally output keypoint of the curve. We used the data of press-fit assembly equipment in the actual production process to train CNN model, and we used different data from the same equipment to evaluate the performance of detection. Compared with the existing research result, the performance of detection was significantly improved. This method can provide a reliable basis for the judgment of press-fit quality.

Keywords: keypoint detection, curve feature, convolutional neural network, press-fit assembly

Procedia PDF Downloads 221