Search results for: personalized interactive medical information
12048 Methodological Support for Teacher Training in English Language
Authors: Comfort Aina
Abstract:
Modern English, as we all know it to be a foreign language to many, will require training and re-training on the path of the teacher and learners alike. As a teacher, you cannot give that which you do not have. Teachers, many of whom are non-native speakers, are required to be competent in solving problems occurring in the teaching and learning processes. They should be conscious of up to date information about new approaches, methods, techniques as well as they should be capable in the use of information and communication technology (ICT) and, of course, should work on the improvement of their language components and competence. For teachers to be successful in these goals, they need to be encouraged and motivated. So, for EFL teachers to be successful, they are enrolled to in-service teacher training, ICT training, some of the training they undergo and the benefits accrued to it will be the focus of the paper.Keywords: training, management, method, english language, EFL teachers
Procedia PDF Downloads 11512047 The Decrease of Collagen or Mineral Affect the Fracture in the Turkey Long Bones
Authors: P. Vosynek, T. Návrat, M. Peč, J. Pořízka, P. Diviš
Abstract:
Changes of mechanical properties and response behavior of bones is an important external sign of medical problems like osteoporosis, bone remodeling after fracture or surgery, osteointegration, or bone tissue loss of astronauts in space. Measuring of mechanical behavior of bones in physiological and osteoporotic states, quantified by different degrees of protein (collagen) and mineral loss, is thus an important topic in biomechanical research. This contribution deals with the relation between mechanical properties of the turkey long bone–tibia in physiological, demineralized, and deproteinized state. Three methods for comparison were used: densitometry, three point bending and harmonic response analysis. The results help to find correlations between the methods and estimate their possible application in medical practice.Keywords: bone properties, long bone, osteoporosis, response behavior
Procedia PDF Downloads 48212046 Research on Contract's Explicit Incentive and Reputation's Implicit Incentive Mechanism towards Construction Contractors
Authors: Li Ma, Meishuang Ma, Mengying Huang
Abstract:
The quality of construction projects reflects the credit and responsibilities of construction contractors for the owners and the whole society. Because the construction contractors master more relevant information about the entrusted engineering project under construction while the owners are in unfavorable position of gaining information, asymmetric information may lead the contractors act against the owners in order to pursue their own interests. Building a powerful motivation mechanism is the key to guarantee investor economic interests and the life and property of users in construction projects. Based on principal-agent theory and game theory, the authors develop relevant mathematical models to analyze and compare the contractor’s utility functions under different combinations of contracts’ explicit incentive mechanism and reputation’s implicit incentive mechanism aiming at finding out the conditions for incentive validity. The research concludes that the most rational motivation way is to combine the explicit and implicit incentive effects of both contracts and reputation mechanism, and puts forth some measures for problems on account of China’s current situation.Keywords: construction contractors, contract, reputation, incentive mechanism
Procedia PDF Downloads 50912045 A Multi Sensor Monochrome Video Fusion Using Image Quality Assessment
Authors: M. Prema Kumar, P. Rajesh Kumar
Abstract:
The increasing interest in image fusion (combining images of two or more modalities such as infrared and visible light radiation) has led to a need for accurate and reliable image assessment methods. This paper gives a novel approach of merging the information content from several videos taken from the same scene in order to rack up a combined video that contains the finest information coming from different source videos. This process is known as video fusion which helps in providing superior quality (The term quality, connote measurement on the particular application.) image than the source images. In this technique different sensors (whose redundant information can be reduced) are used for various cameras that are imperative for capturing the required images and also help in reducing. In this paper Image fusion technique based on multi-resolution singular value decomposition (MSVD) has been used. The image fusion by MSVD is almost similar to that of wavelets. The idea behind MSVD is to replace the FIR filters in wavelet transform with singular value decomposition (SVD). It is computationally very simple and is well suited for real time applications like in remote sensing and in astronomy.Keywords: multi sensor image fusion, MSVD, image processing, monochrome video
Procedia PDF Downloads 57212044 Teaching Writing in the Virtual Classroom: Challenges and the Way Forward
Authors: Upeksha Jayasuriya
Abstract:
The sudden transition from onsite to online teaching/learning due to the COVID-19 pandemic called for a need to incorporate feasible as well as effective methods of online teaching in most developing countries like Sri Lanka. The English as a Second Language (ESL) classroom faces specific challenges in this adaptation, and teaching writing can be identified as the most challenging task compared to teaching the other three skills. This study was therefore carried out to explore the challenges of teaching writing online and to provide effective means of overcoming them while taking into consideration the attitudes of students and teachers with regard to learning/teaching English writing via online platforms. A survey questionnaire was distributed (electronically) among 60 students from the University of Colombo, the University of Kelaniya, and The Open University in order to find out the challenges faced by students, while in-depth interviews were conducted with 12 lecturers from the mentioned universities. The findings reveal that the inability to observe students’ writing and to receive real-time feedback discourage students from engaging in writing activities when taught online. It was also discovered that both students and teachers increasingly prefer Google Slides over other platforms such as Padlet, Linoit, and Jam Board as it boosts learner autonomy and student-teacher interaction, which in turn allows real-time formative feedback, observation of student work, and assessment. Accordingly, it can be recommended that teaching writing online can be better facilitated by using interactive platforms such as Google Slides, for it promotes active learning and student engagement in the ESL class.Keywords: ESL, teaching writing, online teaching, active learning, student engagement
Procedia PDF Downloads 8912043 Revisiting Corporate Social Responsibility in the Lens of Board Accountability
Authors: Jingchen Zhao
Abstract:
Corporate social responsibility (CSR), a major contemporary focus for companies, governments, NGOs and communities, is discussed from a multi-disciplinary perspective. The term is introduced and defined to achieve a combination of economic, social, environmental and philanthropic goals, and its adoption in company law legislations in a few jurisdictions is discussed. Despite its positive social and environmental impacts, the notion has been widely criticised for being ill-defined and fundamentally flawed in the domain of corporate law. The value and effectiveness of CSR have been interrogated for many reasons, always inter-related. This article aims to consider and address some of these problems and assess how CSR could be sharpened and made more effective through the lens of accountability, focussing on the rationale behind and the means of regulation of CSR. The article aims to achieve two interrelated goals. First, it examines the function of accountability in the arguments in favour of CSR by investigating the extent to which the notion of accountability could be used as a criterion for regulating CSR, so that companies may be held accountable for corporate decisions affecting their stakeholders. Second, this article will examine the scope and goals of CSR and board accountability, creating the possibility of a more comprehensive understanding of the two notions from an interactive perspective. In order to link CSR and accountability closely to generate a more appropriate definition of CSR that is could be more appropriately and effectively applied in corporate law, the concept of corporate social accountability (CSA) will be evaluated, with the aim of broadening its latitude beyond disclosure. This will involve a rigorous assessment of the process of fulfilling directors’ duties via questioning from stakeholder groups during meetings or committees, together with explanations and justifications from the board. This will be followed by discussions on enforcement measures in relation to the concept of CSA.Keywords: corporate governance, CSR, board accountability, corporate law
Procedia PDF Downloads 30812042 The Correlation between the Anxiety of the Family Members of the Patients Referring to the Emergency Department and Their Views on the Communication Skills of Nurses
Authors: Mahnaz Seyedoshohadaee
Abstract:
Background and Aims: Hospitalization of one of the family members in the hospital, especially in the emergency department, causes anxiety and psychological problems in family members and others. The way nurses interact with patients and their companions can play an important role in controlling and managing their anxiety. This study aims to determine the relationship between the anxiety of family members of patients referring to emergency departments and their views on the communication skills of nurses. Materials and Methods: The current research was a descriptive-correlation cross-sectional study on 263 family members of patients referred to the department. The emergency of two selected medical training centers affiliated with Iran University of Medical Sciences was performed. The samples were selected continuously in 2018 based on the inclusion criteria. Information was collected using the Health Communication Questionnaire (HCCQ) and Beck Anxiety Questionnaire (BAI). To analyze the data, Pearson's correlation coefficient, independent t-tests, analysis of variance, and Kruskal-Wallis were used at a significance level of 0.05. The data was analyzed using SPSS version 16 statistical software. Results: The mean score of communication skills of emergency department nurses from the point of view of patients' companions was at a low level (74.36 with a standard deviation of 3.7). 3.75% of patients' companions had anxiety at a mild level. There was no statistically significant correlation between the anxieties of the patient's companions. The anxiety of the patient's companions had a statistically significant relationship with the educational level (P=0.039), economic status (P=0.033), and family relationship with the patient (P=0.001). Also, the average anxiety score in children was significantly higher than that of patients' wives (P=0.008). The triage level of the patient also had a statistically significant relationship with the anxiety of the patient's companions (P>0.001). Conclusion: Most of the family members of the patients referred to the emergency room experienced mild anxiety. Also, from their point of view, the communication skills of emergency nurses were at a weak level. Despite the fact that there was no statistically significant relationship between the patient's family member's anxiety and their opinion about nurses' communication skills in this study, it seems that the weak communication skills of nurses from the patient's family member's point of view need special attention. The results of the present study can provide the necessary grounds for planning to improve the communication skills of nurses and also control the anxiety of patient caregivers through in-service training or other incentive mechanisms.Keywords: anxiety, family, emergency department, communication skills, nurse
Procedia PDF Downloads 5412041 Blood Flow in Stenosed Arteries: Analytical and Numerical Study
Authors: Shashi Sharma, Uaday Singh, V. K. Katiyar
Abstract:
Blood flow through a stenosed tube, which is of great interest to mechanical engineers as well as medical researchers. If stenosis exists in an artery, normal blood flow is disturbed. The deposition of fatty substances, cholesterol, cellular waste products in the inner lining of an artery results to plaque formation .The present study deals with a mathematical model for blood flow in constricted arteries. Blood is considered as a Newtonian, incompressible, unsteady and laminar fluid flowing in a cylindrical rigid tube along the axial direction. A time varying pressure gradient is applied in the axial direction. An analytical solution is obtained using the numerical inversion method for Laplace Transform for calculating the velocity profile of fluid as well as particles.Keywords: blood flow, stenosis, Newtonian fluid, medical biology and genetics
Procedia PDF Downloads 51612040 Poland and the Dawn of the Right to Education and Development: Moving Back in Time
Authors: Magdalena Zabrocka
Abstract:
The terror of women throughout the governance of the current populist ruling party in Poland, PiS, has been a subject of a heated debate alongside the issues of minorities’ rights, the rule of law, and democracy in the country. The challenges that women and other vulnerable groups are currently facing, however, come down to more than just a lack of comprehensive equality laws, severely limited reproductive rights, hateful slogans, and messages propagated by the central authority and its sympathisers, or a common disregard for women’s fundamental rights. Many sources and media reports are available only in Polish, while international rapporteurs fail to acknowledge the whole picture of the tragedy happening in the country and the variety of factors affecting it. Starting with the authorities’ and Polish catholic church’s propaganda concerning CEDAW and the Istanbul Convention Action against Violence against Women and Domestic Violence by spreading strategic disinformation that it codifies ‘gender ideology’ and ‘anti-Christian values’ in order to convince the electorate that the legal instruments should be ‘abandoned’. Alongside severely restricted abortion rights, bullying medical professionals helping women exercise their reproductive rights, violating women’s privacy by introducing a mandatory registry of pregnancies (so that one’s pregnancy or its ‘loss’ can be tracked and traced), restricting access to the ‘day after pill’ and real sex education at schools (most schools have a subject of ‘knowledge of living in a family’), introducing prison punishment for teachers accused of spreading ‘sex education’, and many other, the current tyrant government, has now decided to target the youngest with its misinformation and indoctrination, via strategically designed textbooks and curriculum. Biology books have seen a big restriction on the size of the chapters devoted to evolution, reproductive system, and sexual health. Approved religion books (which are taught 2-3 times a week as compared to 1 a week sciences) now cover false information about Darwin’s theory and arguments ‘against it’. Most recently, however, the public spoke up against the absurd messages contained in the politically rewritten history books, where the material about some figures not liked by the governing party has already been manipulated. In the recently approved changes to the history textbook, one can find a variety of strongly biased and politically-charged views representative of the conservatives in the states, most notably, equating the ‘gender ideology’ and feminism with Nazism. Thus, this work, by employing a human rights approach, would focus on the right to education and development as well as the considerate obstacles to access to scientific information by the youth.Keywords: Poland, right to education, right to development, authoritarianism, access to information
Procedia PDF Downloads 10512039 The Role and Tasks of a Social Worker in the Care of a Terminally Ill Child with Regard to the Malopolska Hospice for Children
Authors: Ewelina Zdebska
Abstract:
A social worker is an integral part of an interdisciplinary team working with the child and his family in a terminal state. Social support is an integral part of the medical procedure in the care of hospice. This is the basis and prerequisite of full treatment and good care of the child - patient, whose illness often finds at least the expected period of his life when his personal and legal issues are not regulated, and the family burdened with the problem requires care and support specialists - professionals. Hospice for Children in Krakow: a palliative care team operating in the province of Krakow and Malopolska, conducts specialized care for terminally ill children in place of their residence from the time when parents and doctors decided to end of treatment in hospital, allows parents to carry out medical care at home, provides parents social and legal assistance and provides care, psychological support and friendship to families throughout the life of the child's illness and after his death, as long as it is needed. The social worker in a hospice does not bear the burden of solving social problems, which is the responsibility of other authorities, but provides support possible and necessary at the moment. The most common form of assistance is to provide information on benefits, which for the child and his family may be subject to any treatment and fight for the life and health of a child. Employee assists in the preparation and completion of documents, requests to increase the degree of disability because of progressive disease or Allowance care because of the inability to live independently. It works in settling all the issues with the Department of Social Security, as well as with the Municipal and District Team Affairs of disability. Seeking help and support using multi-faceted childcare. With the Centres for Social Welfare contacts are also often on the organization of additional respite care for the sick at home (care), especially in the work of the other members of the family or if the family can not cope with the care and needs extra help. Hospice for Children in Cracow completing construction of Poland's first Respite Care Centre for chronically and terminally ill children, will be an open house where children suffering from chronic and incurable diseases and their families can get professional help, whenever - when they need it. The social worker has to pick up a very important role in caring for a terminally ill child. His presence gives a little patient and family the opportunity to be at this difficult time together while organizing assistance and support.Keywords: social worker, care, terminal care, hospice
Procedia PDF Downloads 24812038 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 39012037 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications
Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani
Abstract:
In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks
Procedia PDF Downloads 10112036 Healthcare Providers’ Perception Towards Utilization of Health Information Applications and Its Associated Factors in Healthcare Delivery in Health Facilities in Cape Coast Metropolis, Ghana
Authors: Richard Okyere Boadu, Godwin Adzakpah, Nathan Kumasenu Mensah, Kwame Adu Okyere Boadu, Jonathan Kissi, Christiana Dziyaba, Rosemary Bermaa Abrefa
Abstract:
Information and communication technology (ICT) has significantly advanced global healthcare, with electronic health (e-Health) applications improving health records and delivery. These innovations, including electronic health records, strengthen healthcare systems. The study investigates healthcare professionals' perceptions of health information applications and their associated factors in the Cape Coast Metropolis of Ghana's health facilities. Methods: We used a descriptive cross-sectional study design to collect data from 632 healthcare professionals (HCPs), in the three purposively selected health facilities in the Cape Coast municipality of Ghana in July 2022. Shapiro-Wilk test was used to check the normality of dependent variables. Descriptive statistics were used to report means with corresponding standard deviations for continuous variables. Proportions were also reported for categorical variables. Bivariate regression analysis was conducted to determine the factors influencing the Benefits of Information Technology (BoIT); Barriers to Information Technology Use (BITU); and Motives of Information Technology Use (MoITU) in healthcare delivery. Stata SE version 15 was used for the analysis. A p-value of less than 0.05 served as the basis for considering a statistically significant accepting hypothesis. Results: Healthcare professionals (HCPs) generally perceived moderate benefits (Mean score (M)=5.67) from information technology (IT) in healthcare. However, they slightly agreed that barriers like insufficient computers (M=5.11), frequent system downtime (M=5.09), low system performance (M=5.04), and inadequate staff training (M=4.88) hindered IT utilization. Respondents slightly agreed that training (M=5.56), technical support (M=5.46), and changes in work procedures (M=5.10) motivated their IT use. Bivariate regression analysis revealed significant influences of education, working experience, healthcare profession, and IT training on attitudes towards IT utilization in healthcare delivery (BoIT, BITU, and MoITU). Additionally, the age of healthcare providers, education, and working experience significantly influenced BITU. Ultimately, age, education, working experience, healthcare profession, and IT training significantly influenced MoITU in healthcare delivery. Conclusions: Healthcare professionals acknowledge moderate benefits of IT in healthcare but encounter barriers like inadequate resources and training. Motives for IT use include staff training and support. Bivariate regression analysis shows education, working experience, profession, and IT training significantly influence attitudes toward IT adoption. Targeted interventions and policies can enhance IT utilization in the Cape Coast Metropolis, Ghana.Keywords: health information application, utilization of information application, information technology use, healthcare
Procedia PDF Downloads 6512035 Feasibility and Impact of the Community Based Supportive Housing Intervention for Individuals with Chronic Mental Illness in Bangladesh
Authors: Rubina Jahan, Mohammad Zayeed Bin Alam, Razia Sultana, Md. Faroque Miah
Abstract:
Mental health remains a significant global public health challenge, profoundly affecting millions worldwide. In Bangladesh, the situation is dire, with the National Mental Health Survey 2018-19 indicating that 19% of adults suffer from any kind of mental disorders, including severe mental disorder of around 2%. Despite these high prevalence rates, there is a substantial treatment gap in low- and middle-income countries, including Bangladesh, where up to 92% of individuals with mental illnesses do not receive adequate care. This gap is exacerbated by social barriers such as stigma, discrimination, social exclusion, poverty, homelessness, and human rights violations. To address these challenges, the SAJIDA Foundation launched the Proshanti in November 2022. Proshanti is a community based supportive housing intervention designed to provide cost-effective, sustainable, long-term care for individuals with chronic mental illnesses. It aims to rehabilitate participants by improving their mental health, quality of life, and equipping them with skills necessary for independent living and social mobility. Currently, Proshanti operates seven houses in Manikganj and Habiganj districts of Bangladesh, accommodating up to 40 individuals. Over a two-year period, individuals have received personalized support from trained personal assistants and care coordinators, regular health checkups, and opportunities for vocational training and community engagement. In this presentation, we will present the outcome of such intervention on individual’s functionality, quality of life and psychological health generated from 24 months of journey. Additionally, a qualitative approach will be employed to understand the facilitators and barriers of program implementation. The Proshanti program represents a promising model for addressing the significant mental health treatment gap in Bangladesh at the community level. Our findings will provide crucial insights into the program's feasibility, effectiveness, and the factors influencing its implementation, potentially guiding future mental health interventions in similar contexts.Keywords: mental health, community based supportive housing, treatment gap, bangladesh
Procedia PDF Downloads 5112034 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain
Authors: M. Pushparani, A. Sagaya
Abstract:
Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems
Procedia PDF Downloads 28512033 Restructuring the College Classroom: Scaffolding Student Learning and Engagement in Higher Education
Authors: Claire Griffin
Abstract:
Recent years have witnessed a surge in the use of innovative teaching approaches to support student engagement and higher-order learning within higher education. This paper seeks to explore the use of collaborative, interactive teaching and learning strategies to support student engagement in a final year undergraduate Developmental Psychology module. In particular, the use of the jigsaw method, in-class presentations and online discussion fora were adopted in a ‘lectorial’ style teaching approach, aimed at scaffolding learning, fostering social interdependence and supporting various levels of student engagement in higher education. Using the ‘Student Course Engagement Questionnaire’, the impact of such teaching strategies on students’ college classroom experience was measured, with additional qualitative student feedback gathered. Results illustrate the positive impact of the teaching methodologies on students’ levels of engagement, with positive implications emerging across the four engagement factors: skills engagement, emotional engagement, participation/interaction engagement and performance engagement. Thematic analysis on students’ qualitative comments also provided greater insight into the positive impact of the ‘lectorial’ teaching approach on students’ classroom experience within higher level education. Implications of the findings are presented in terms of informing effective teaching practices within higher education. Additional avenues for future research and strategy usage will also be discussed, in light of evolving practice and cutting edge literature within the field.Keywords: learning, higher education, scaffolding, student engagement
Procedia PDF Downloads 37812032 Tourists' Percepion of Osun Osogbo Festival in Osogbo, Osun State Nigeria
Authors: Yina Donald Orga
Abstract:
Osun Osogbo festival is one of the biggest art festivals in Nigeria with over 235, 518 tourist visits in 2014. The purpose of this study is to generate data on the tourists’ perception of Osun Osogbo Festival in Osogbo, Osun State Nigeria. Based on the population of 199, 860 tourist visits at Osun Osogbo festival in 2013, Krejcie and Morgan sample size table was used to select 768 tourists/respondents. Likert questionnaire were used to elicit data from the respondents. Descriptive statistic was used to describe the characteristics of respondents and analyse the tourists’ perception of the festival. The findings from data analysed suggest that the trend of domestic and international tourist visits in the past ten years for the festival had shown a consistent increase since 2004 except in 2007 and 2008 and continue to increase up to 2013. This is an indication that the tourists are satisfied with traditional, historical and authenticity features of the festival. Also, findings from the study revealed that the tourists are not satisfied with the number of toilets at Osun Sacred Grove, crowd control of visitors during the festival, medical personnel to cater for visitors during the festival, etc. In view of the findings of the study, the following recommendations are suggested; provision of more toilets at Osun Sacred grove, Osogbo Heritage Council to recruit festival guides to help control the huge crowd at the festival, the Government of State of Osun in conjunction with Red Cross Society should engage adequate medical personnel to cater for medical needs of visitors at the festival, etc.Keywords: festival, perception, positive, tourists
Procedia PDF Downloads 20612031 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 30612030 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application
Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa
Abstract:
Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.Keywords: bio medical, mental helath care, empower youths & adults, counselling
Procedia PDF Downloads 15512029 Willingness and Attitude towards Organ Donation of Nurses in Taiwan
Authors: ShuYing Chung, Minchuan Huang, Iping Chen
Abstract:
Taking the medical staff in an emergency ward of a medical center in Central Taiwan as the research object, the questionnaire data were collected by anonymous and voluntary reporting methods with structured questionnaire to explore the actual situation, willingness and attitude of organ donation. Only 80 valid questionnaires were collected. Among the 8 questions, the average correct rate was 5.9 + 1.2, and the correct rate was 73.13%. The willingness of organ donation that 7.5% of the people are not willing; 92.5% of the people are willing, of which 62.5% have considered but have not yet decided; 21.3% are willing but have not signed the consent of organ donation; They have signed the consent of organ donation 8.7%. The average total score (standard deviation) of attitude towards organ donation was 36.2. There is no significant difference between the demographic variables and the awareness and willingness of organ donation, but there is a significant correlation between the marital status and the attitude of organ donation.Keywords: clinical psychology, organ donation, doctors affecting psychological disorders, commitment
Procedia PDF Downloads 13712028 “I” on the Web: Social Penetration Theory Revised
Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology
Abstract:
The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information
Procedia PDF Downloads 37212027 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure
Authors: Jiri Barta, Jiří F. Urbanek
Abstract:
This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity
Procedia PDF Downloads 29912026 Utilization of Acupuncture in Palliative Care for Cancer Patients
Authors: Jui-Hung Hung, Ching-Liang Hsieh, Yi-Wen Lin
Abstract:
Modern medicine highly emphasizes the importance of palliative treatment. The inception of palliative and hospice care recently developed into the concept of caring for the patients’ and families’ physical, psychological and spiritual problems. There are several benefits related to palliative care such as reducing medical expenses, decreasing patients’ suffer, and supporting patient go through the finale of the life. Nowadays, in Taiwan, over 60-70% terminal cancer patients were covered in hospice care, and the coverage rate increased annually. Acupuncture is a well-known therapy used more than thousand years to relieve symptoms of cancer patient. Many reports showed that, even in the Western society, many reputable medical centers can provide Acupuncture therapy for patients. Accordingly, using Acupuncture for cancer patient care is a global trend. There are increased evidences indicate that Acupuncture can relieve the symptoms for cancer patients including pain, reduce the dosage of anesthetic, improve the cancer-related fatigue, relieve the chemotherapy-related nausea and vomiting, ease anxiety mood and even improving the quality of life. Furthermore, some trials show that Acupuncture may help relieve xerostomia, hot flash, sleep disorders, and some GI discomfort and so on. Acupuncture therapy has many advantages for clinical use with effective, low-cost, minimal side effect, suitable for cancer patients and even for elderly population. Especially in nowadays, there are more diversified challenges in modern medicine, all of them will make the higher medical budget. We suggest that Acupuncture will be one of methods for palliative care for cancer patients.Keywords: Acupuncture, cancer, integrative medicine, palliative care
Procedia PDF Downloads 35312025 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis
Authors: Michael Lognoul
Abstract:
In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements
Procedia PDF Downloads 31712024 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning
Authors: Kuliya Muhammed
Abstract:
This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.Keywords: electronic, ICT, institution, internet, learning, technology
Procedia PDF Downloads 38812023 Rumour Containment Using Monitor Placement and Truth Propagation
Authors: Amrah Maryam
Abstract:
The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation
Procedia PDF Downloads 16112022 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China
Authors: Lan Luo
Abstract:
In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects
Procedia PDF Downloads 34312021 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela
Authors: Maria Antonieta Erna Castillo Holly
Abstract:
During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela
Procedia PDF Downloads 13112020 Cells Detection and Recognition in Bone Marrow Examination with Deep Learning Method
Authors: Shiyin He, Zheng Huang
Abstract:
In this paper, deep learning methods are applied in bio-medical field to detect and count different types of cells in an automatic way instead of manual work in medical practice, specifically in bone marrow examination. The process is mainly composed of two steps, detection and recognition. Mask-Region-Convolutional Neural Networks (Mask-RCNN) was used for detection and image segmentation to extract cells and then Convolutional Neural Networks (CNN), as well as Deep Residual Network (ResNet) was used to classify. Result of cell detection network shows high efficiency to meet application requirements. For the cell recognition network, two networks are compared and the final system is fully applicable.Keywords: cell detection, cell recognition, deep learning, Mask-RCNN, ResNet
Procedia PDF Downloads 19012019 The Hidden Characteristics That Tutors Hope Dundee Mmed Graduates Might Have after Graduation
Authors: Afnan Khoja, Ittisak Subrungruang, Kritchaya Ritruechai, Linda Jones, David Wall
Abstract:
Background: Some characteristics might be stated as an objective of the curriculum and some might be hidden. The hidden curriculum is the unwritten and unintended lessons and perspectives that students absorb in school. Though, the hidden characteristics are expected that tutors hope students might have in order to become medical educators. We suspected our faculty hoped we would develop skills, know and develop beyond the written outcomes. Our research question aimed to explore the hidden curriculum; as part of our learning; we had to design and report findings. Summary of Work: We undertook semi-structured interviews with a sample of the centre for medical education faculty at Dundee. Participants answered the question , of what are the hidden characteristics that they hope Dundee MMed graduates might have after graduation. Thematic analysis was carried out on the interview scripts. Summary of Results: A thematic analysis was carried out on the interview transcripts. Three main themes were identified from all respondents' comments. These were lifelong learners, being flexible and problem solvers. In addition individual respondents also described sense of humour, collaboration, humility, role model, inquisitiveness, optimism, and ability to express oneself clearly. Discussion: Tutors put great value on three behaviours lifelong learner, flexible, and problem solver, which are part of professional characteristics in leadership. Therefore, leadership characteristics is incorporated as the outcomes of hidden characteristics that tutors would like to see. Conclusion: Tutors in the Master's program of medical education at the University of Dundee hope that medical education students should present the three main hidden characteristics, which are lifelong learner, flexible, and problem solver after graduation. Take-home Messages: These hidden characteristics are considered as informal unless a change has been made to the formal curriculum. Therefore, to reach the tutors’ expectations, further studies might be held to make this personal characteristics transformation more accessible.Keywords: characteristics, hidden curriculum, transformation, informal
Procedia PDF Downloads 89