Search results for: end user programs
2275 User Perceptions Deviation from the Producers’ Intended Meaning of a Healthcare Innovation
Authors: Helle Nissen
Abstract:
Physical objects surrounding people in healthcare environments are carriers of institutional logics materialized into the objects by its producers. However, institutional logics research lacks to inform us how logics become materialized and are perceived by producers vs. users of an object. The study is based on a 3-year longitudinal case study of a Danish Public Private Innovation project aiming to co-create an innovative healthcare bed commercialized to public psychiatric hospitals. The producers are a private metal firm and industrial designers from two Danish regions. The findings demonstrate that the metal firm and designers, as producers, negotiate about materializing different logics into the bed throughout the innovation process. An aesthetic logic is prioritized most, and the producers encode it with the intention to develop a bed that looks homely and less hospital-like compared to previous and existing healthcare beds. After the bed is put into use, the aesthetic logic is decoded by the users. Their perception of it differs significantly from the producers’ intended meaning, as the healthcare bed is perceived as sterile. The study has theoretical implications: It demonstrates how logics become materialized ‘here and now’, and it reveals logics as less governed by stable and clear meanings but rather as subject to changeable perceptions.Keywords: co-creation, healthcare innovation, commercialization, institutional logics
Procedia PDF Downloads 872274 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 3242273 University Short Courses Web Application Using ASP.Net
Authors: Ahmed Hariri
Abstract:
E-Learning has become a necessity in the advanced education. It is easier for the student and teacher communication also it speed up the process with less time and less effort. With the progress and the enormous development of distance education must keep up with this age of making a website that allows students and teachers to take all the advantages of advanced education. In this regards, we developed University Short courses web application which is specially designed for Faculty of computing and information technology, Rabigh, Kingdom of Saudi Arabia. After an elaborate review of the current state-of-the-art methods of teaching and learning, we found that instructors deliver extra short courses and workshop to students to enhance the knowledge of students. Moreover, this process is completely manual. The prevailing methods of teaching and learning consume a lot of time; therefore in this context, University Short courses web application will help to make process easy and user friendly. The site allows for students can view and register short courses online conducted by instructor also they can see courses starting dates, finishing date and locations. It also allows the instructor to put things on his courses on the site and see the students enrolled in the study material. Finally, student can print the certificate after finished the course online. ASP.NET, SQLSERVER, JavaScript SQL SERVER Database will use to develop the University Short Courses web application.Keywords: e-learning, short courses, ASP.NET, SQL SERVER
Procedia PDF Downloads 1372272 Modeling User Departure Time Choice for Trips in Urban Streets
Authors: Saeed Sayyad Hagh Shomar
Abstract:
Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using questionnaire of stated preference models users’ departure time choice affected by congestion pricing plan in downtown Tehran. Experimental results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.Keywords: modeling, departure time, travel timing, time of the day, congestion pricing, transportation planning
Procedia PDF Downloads 4342271 Evaluating the Location of Effective Product Advertising on Facebook Ads
Authors: Aulia F. Hadining, Atya Nur Aisha, Dimas Kurninatoro Aji
Abstract:
Utilization of social media as a marketing tool is growing rapidly, including for SMEs. Social media allows the user to give product evaluation and recommendations to the public. In addition, the social media facilitate word-of-mouth marketing communication. One of the social media that can be used is Facebook, with Facebook Ads. This study aimed to evaluate the location of Facebook Ads, to obtain an appropriate advertising design. There are three alternatives location consist of desktop, right-hand column and mobile. The effectiveness and efficiency of advertising will be measured based on advertising metrics such as reach, click, Cost per Click (CUC) and Unique Click-Through-Rate (UCTR). Facebook's Ads Manager was used for seven days, targeted by age (18-24), location (Bandung), language (Indonesia) and keywords. The result was 13,999 total reach, as well as 342 clicks. Based on the results of comparison using ANOVA, there was a significant difference for each placement location based on advertising metrics. Mobile location was chosen to be successful ads, because it produces the lowest CUC, amounting to Rp 691,- per click and 14% UCTR. Results of this study showed Facebook Ads was useful and cost-effective media to promote the product of SME, because it could be view by many people in the same time.Keywords: marketing communication, social media, Facebook Ads, mobile location
Procedia PDF Downloads 3552270 System and Method for Providing Web-Based Remote Application Service
Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang
Abstract:
With the development of virtualization technologies, a new type of service named cloud computing service is produced. Cloud users usually encounter the problem of how to use the virtualized platform easily over the web without requiring the plug-in or installation of special software. The object of this paper is to develop a system and a method enabling process interfacing within an automation scenario for accessing remote application by using the web browser. To meet this challenge, we have devised a web-based interface that system has allowed to shift the GUI application from the traditional local environment to the cloud platform, which is stored on the remote virtual machine. We designed the sketch of web interface following the cloud virtualization concept that sought to enable communication and collaboration among users. We describe the design requirements of remote application technology and present implementation details of the web application and its associated components. We conclude that this effort has the potential to provide an elastic and resilience environment for several application services. Users no longer have to burden the system maintenances and reduce the overall cost of software licenses and hardware. Moreover, this remote application service represents the next step to the mobile workplace, and it lets user to use the remote application virtually from anywhere.Keywords: virtualization technology, virtualized platform, web interface, remote application
Procedia PDF Downloads 2902269 Aligning Cultural Practices through Information Exchange: A Taxonomy in Global Manufacturing Industry
Authors: Hung Nguyen
Abstract:
With the rise of global supply chain network, the choice of supply chain orientation is critical. The alignment between cultural similarity and supply chain information exchange could help identify appropriate supply chain orientations, which would differentiate the stronger competitors and performers from the weaker ones. Through developing a taxonomy, this study examined whether the choices of action programs and manufacturing performance differ depending on the levels of attainment cultural similarity and information exchange. This study employed statistical tests on a large-scale dataset consisting of 680 manufacturing plants from various cultures and industries. Firms need to align cultural practices with the level of information exchange in order to achieve good overall business performance. There appeared to be consistent three major orientations: the Proactive, the Initiative and the Reactive. Firms are experiencing higher payoffs from various improvements are the ones successful alignment in both information exchange and cultural similarity The findings provide step-by-step decision making for supply chain information exchange and offer guidance especially for global supply chain managers. In including both cultural similarity and information exchange, this paper adds greater comprehensiveness and richness to the supply chain literature.Keywords: culture, information exchange, supply chain orientation, similarity
Procedia PDF Downloads 3602268 Meta-Learning for Hierarchical Classification and Applications in Bioinformatics
Authors: Fabio Fabris, Alex A. Freitas
Abstract:
Hierarchical classification is a special type of classification task where the class labels are organised into a hierarchy, with more generic class labels being ancestors of more specific ones. Meta-learning for classification-algorithm recommendation consists of recommending to the user a classification algorithm, from a pool of candidate algorithms, for a dataset, based on the past performance of the candidate algorithms in other datasets. Meta-learning is normally used in conventional, non-hierarchical classification. By contrast, this paper proposes a meta-learning approach for more challenging task of hierarchical classification, and evaluates it in a large number of bioinformatics datasets. Hierarchical classification is especially relevant for bioinformatics problems, as protein and gene functions tend to be organised into a hierarchy of class labels. This work proposes meta-learning approach for recommending the best hierarchical classification algorithm to a hierarchical classification dataset. This work’s contributions are: 1) proposing an algorithm for splitting hierarchical datasets into new datasets to increase the number of meta-instances, 2) proposing meta-features for hierarchical classification, and 3) interpreting decision-tree meta-models for hierarchical classification algorithm recommendation.Keywords: algorithm recommendation, meta-learning, bioinformatics, hierarchical classification
Procedia PDF Downloads 3152267 Assessing the Current State of Wheelchair Accessibility in Shopping Centers and Stores in Saudi Arabia
Authors: Majed M. Mustafa, Abdulrahman A. Altassan
Abstract:
In recent years, ensuring accessibility for all individuals, particularly those with mobility impairments, has gained significant attention in Saudi Arabia. This research aims to evaluate wheelchair accessibility in shopping centers, malls, and stores across the kingdom, highlighting its critical role in promoting inclusivity and equal access. The study will focus on the availability and quality of ramps, automatic doors, lifts, accessible restrooms, and overall ease of navigation for wheelchair users. Utilizing a mixed-methods approach, the research will employ site assessments, user surveys, and interviews with facility managers to gather comprehensive data. Preliminary findings indicate that while some facilities have made strides in accessibility, there are still numerous areas requiring improvement. The study will provide targeted recommendations to enhance accessibility, ensuring that all users can navigate shopping environments with ease and dignity. Conclusively, this research underscores the need for continuous efforts and policy enhancements to achieve universal design standards in public spaces within Saudi Arabia.Keywords: automatic doors, equal access, ramp quality, wheelchair accessibility
Procedia PDF Downloads 392266 A Lesson in the Social Welfare System in Mexico: Limited Resources for Unlimited Needs
Authors: Vanessa L. Haro
Abstract:
Beginning with a historical foundation of Mexico, this marks the start of a close examination of this major Latin American country by providing the context needed to understand the reasons for Mexico’s strengths and struggles today, specific to their response to the issue of gender violence. Responding to the challenge of combating gender violence and inequality, Mexico has created social programs and initiatives in hopes of addressing these issues and modernizing their gender norms, which currently disempower and dehumanize women, while simultaneously denying women the necessary tools needed to fight back or bring balance to the gender scales. Nevertheless, women in Mexico have made their voices heard with the most salient image of that of the mothers protesting while holding the photos of their young daughters who lost their lives. This case study on gender issues in Mexico works to acknowledge the diverse forces that contribute to the issue of gender violence, and to make a statement that this is a crisis that requires a more dynamic response within Mexico’s social welfare policies, and should not be allowed to continue to progress as a normative phenomenon. As the advocacy groups and protesters cry out, “Ni una menos! (Not one less), meaning we will not lose one more woman and making the statement that all women’s lives matter.Keywords: gender issues, Mexico, poverty, social welfare
Procedia PDF Downloads 2662265 Case Report: A Case of Confusion with Review of Sedative-Hypnotic Alprazolam Use
Authors: Agnes Simone
Abstract:
A 52-year-old male with unknown psychiatric and medical history was brought to the Psychiatric Emergency Room by ambulance directly from jail. He had been detained for three weeks for possession of a firearm while intoxicated. On initial evaluation, the patient was unable to provide a reliable history. He presented with odd jerking movements of his extremities and catatonic features, including mutism and stupor. His vital signs were stable. Patient was transferred to the medical emergency department for work-up of altered mental status. Due to suspicion for opioid overdose, the patient was given naloxone (Narcan) with no improvement. Laboratory work-up included complete blood count, comprehensive metabolic panel, thyroid stimulating hormone, vitamin B12, folate, magnesium, rapid plasma reagin, HIV, blood alcohol level, aspirin, and Tylenol blood levels, urine drug screen, and urinalysis, which were all negative. CT head and chest X-Ray were also negative. With this negative work-up, the medical team concluded there was no organic etiology and requested inpatient psychiatric admission. Upon re-evaluation by psychiatry, it was evident that the patient continued to have an altered mental status. Of note, the medical team did not include substance withdrawal in the differential diagnosis due to stable vital signs and a negative urine drug screen. The psychiatry team decided to check California's prescription drug monitoring program (CURES) and discovered that the patient was prescribed benzodiazepine alprazolam (Xanax) 2mg BID, a sedative-hypnotic, and hydrocodone/acetaminophen 10mg/325mg (Norco) QID, an opioid. After a thorough chart review, his daughter's contact information was found, and she confirmed his benzodiazepine and opioid use, with recent escalation and misuse. It was determined that the patient was experiencing alprazolam withdrawal, given this collateral information, his current symptoms, negative urine drug screen, and recent abrupt discontinuation of medications while incarcerated. After admission to the medical unit and two doses of alprazolam 2mg, the patient's mental status, alertness, and orientation improved, but he had no memory of the events that led to his hospitalization. He was discharged with a limited supply of alprazolam and a close follow-up to arrange a taper. Accompanying this case report, a qualitative review of presentations with alprazolam withdrawal was completed. This case and the review highlights: (1) Alprazolam withdrawal can occur at low doses and within just one week of use. (2) Alprazolam withdrawal can present without any vital sign instability. (3) Alprazolam withdrawal does not respond to short-acting benzodiazepines but does respond to certain long-acting benzodiazepines due to its unique chemical structure. (4) Alprazolam withdrawal is distinct from and more severe than other benzodiazepine withdrawals. This case highlights (1) the importance of physician utilization of drug-monitoring programs. This case, in particular, relied on California's drug monitoring program. (2) The importance of obtaining collateral information, especially in cases in which the patient is unable to provide a reliable history. (3) The importance of including substance intoxication and withdrawal in the differential diagnosis even when there is a negative urine drug screen. Toxidrome of withdrawal can be delayed. (4) The importance of discussing addiction and withdrawal risks of medications with patients.Keywords: addiction risk of benzodiazepines, alprazolam withdrawal, altered mental status, benzodiazepines, drug monitoring programs, sedative-hypnotics, substance use disorder
Procedia PDF Downloads 1402264 Need of More Social Work Students to Work in Aging Fields
Authors: Mbita Mbao
Abstract:
Social work programs are grappling with changing students’ attitudes about working with older adults. Our study aimed to understand whether adding a guest speaker working in the field into weekly content would influence students’ attitudes about working with older adults. We conducted an exploratory study using a cross-sectional design with a pre and post-test to answer our question. Eighteen MSW students were enrolled in the ‘Social Work with Older Adults’ course, and 17 students completed the pre-posttests. Willingness to work with older adults was measured using the ‘Willingness to Work with Elderly People Scale (WEPS)’. Guest speakers were recruited from local area agencies on aging. A significant finding was a statistically significant (t= −3.31, p < .01) increase from pre- (M = 3.59, SD = 1.54) to post-test (M = 4.88, SD = 1.22) scores for the item, ‘My professors advise me to consider aged care career.’ In addition, there were statistically significant pre to post-test differences for all items of ‘Perceived Behavioral Control’ and ‘Intention toward working with older adults’ reflecting competence, training, skills, and capabilities to work with older adults, suggesting guest speakers may play a crucial role as influential sources to positively shape students’ attitudes and intentions toward working with older adults.Keywords: guest speakers, workforce, aging, students
Procedia PDF Downloads 252263 The Challenges of Innovation Leadership in the Public Sector
Authors: Shaker A. Aladwan
Abstract:
This paper aims to explore the Barriers to innovation leadership in Jordanian public sector organizations. Qualitative approach was adopted, and content analysis was used to analyze the 18 assessment reports which are extracted from the public innovation award in Jordan, then, 20 semi-structured interviews were conducted with the key persons who are involved with innovation initiatives in the public sector organizations in Jordan. Several Barriersthat face the innovation leadership in the Jordanian public sector organizations. Managerially, the challenges include lack of innovation vision, implementation lack of innovation core values, lack of strategic planning for innovation, bad bureaucracy culture, and excessive centralization. Technically, the challenges include lack of task assignment for employees, lack of resources, lack of innovative training programs, lack of knowledge sharing, and the failure of governments to formulate policies and regulations. most of the studies focused on innovation in the non-public sector organizations, and most of them were conducted in the American and Western countries, which are different in terms of culture, kinds of innovation, barriers, and drivers. Thus, this paper provides new insights into barriers to innovation leadership in the public sector and in a new research context. This paper also provides a theoretical contribution by diagnosing the barriers facing innovation within the context of public administration in developing countries.Keywords: innovation, excellence award, challenges, public sector, jordan
Procedia PDF Downloads 1302262 Resource Creation Using Natural Language Processing Techniques for Malay Translated Qur'an
Authors: Nor Diana Ahmad, Eric Atwell, Brandon Bennett
Abstract:
Text processing techniques for English have been developed for several decades. But for the Malay language, text processing methods are still far behind. Moreover, there are limited resources, tools for computational linguistic analysis available for the Malay language. Therefore, this research presents the use of natural language processing (NLP) in processing Malay translated Qur’an text. As the result, a new language resource for Malay translated Qur’an was created. This resource will help other researchers to build the necessary processing tools for the Malay language. This research also develops a simple question-answer prototype to demonstrate the use of the Malay Qur’an resource for text processing. This prototype has been developed using Python. The prototype pre-processes the Malay Qur’an and an input query using a stemming algorithm and then searches for occurrences of the query word stem. The result produced shows improved matching likelihood between user query and its answer. A POS-tagging algorithm has also been produced. The stemming and tagging algorithms can be used as tools for research related to other Malay texts and can be used to support applications such as information retrieval, question answering systems, ontology-based search and other text analysis tasks.Keywords: language resource, Malay translated Qur'an, natural language processing (NLP), text processing
Procedia PDF Downloads 3202261 Optimized Electron Diffraction Detection and Data Acquisition in Diffraction Tomography: A Complete Solution by Gatan
Authors: Saleh Gorji, Sahil Gulati, Ana Pakzad
Abstract:
Continuous electron diffraction tomography, also known as microcrystal electron diffraction (MicroED) or three-dimensional electron diffraction (3DED), is a powerful technique, which in combination with cryo-electron microscopy (cryo-ED), can provide atomic-scale 3D information about the crystal structure and composition of different classes of crystalline materials such as proteins, peptides, and small molecules. Unlike the well-established X-ray crystallography method, 3DED does not require large single crystals and can collect accurate electron diffraction data from crystals as small as 50 – 100 nm. This is a critical advantage as growing larger crystals, as required by X-ray crystallography methods, is often very difficult, time-consuming, and expensive. In most cases, specimens studied via 3DED method are electron beam sensitive, which means there is a limitation on the maximum amount of electron dose one can use to collect the required data for a high-resolution structure determination. Therefore, collecting data using a conventional scintillator-based fiber coupled camera brings additional challenges. This is because of the inherent noise introduced during the electron-to-photon conversion in the scintillator and transfer of light via the fibers to the sensor, which results in a poor signal-to-noise ratio and requires a relatively higher and commonly specimen-damaging electron dose rates, especially for protein crystals. As in other cryo-EM techniques, damage to the specimen can be mitigated if a direct detection camera is used which provides a high signal-to-noise ratio at low electron doses. In this work, we have used two classes of such detectors from Gatan, namely the K3® camera (a monolithic active pixel sensor) and Stela™ (that utilizes DECTRIS hybrid-pixel technology), to address this problem. The K3 is an electron counting detector optimized for low-dose applications (like structural biology cryo-EM), and Stela is also a counting electron detector but optimized for diffraction applications with high speed and high dynamic range. Lastly, data collection workflows, including crystal screening, microscope optics setup (for imaging and diffraction), stage height adjustment at each crystal position, and tomogram acquisition, can be one of the other challenges of the 3DED technique. Traditionally this has been all done manually or in a partly automated fashion using open-source software and scripting, requiring long hours on the microscope (extra cost) and extensive user interaction with the system. We have recently introduced Latitude® D in DigitalMicrograph® software, which is compatible with all pre- and post-energy-filter Gatan cameras and enables 3DED data acquisition in an automated and optimized fashion. Higher quality 3DED data enables structure determination with higher confidence, while automated workflows allow these to be completed considerably faster than before. Using multiple examples, this work will demonstrate how to direct detection electron counting cameras enhance 3DED results (3 to better than 1 Angstrom) for protein and small molecule structure determination. We will also show how Latitude D software facilitates collecting such data in an integrated and fully automated user interface.Keywords: continuous electron diffraction tomography, direct detection, diffraction, Latitude D, Digitalmicrograph, proteins, small molecules
Procedia PDF Downloads 1082260 Developing a Web GIS Tool for the Evaluation of Soil Erosion of a Watershed
Authors: Y. Fekir, K. Mederbal, M. A. Hamadouche, D. Anteur
Abstract:
The soil erosion by water has become one of the biggest problems of the environment in the world, threatening the majority of countries. There are several models to evaluate erosion. These models are still a simplified representation of reality. They permit the analysis of complex systems, measurements are complementary to allow an extrapolation in time and space and may combine different factors. The empirical model of soil loss proposed by Wischmeier and Smith (Universal Soil Loss Equation), is widely used in many countries. He considers that erosion is a multiplicative function of five factors: rainfall erosivity (the R factor) the soil erodibility factor (K), topography (LS), the erosion control practices (P) and vegetation cover and agricultural practices (C). In this work, we tried to develop a tool based on Web GIS functionality to evaluate soil losses caused by erosion taking into account five factors. This tool allows the user to integrate all the data needed for the evaluation (DEM, Land use, rainfall ...) in the form of digital layers to calculate the five factors taken into account in the USLE equation (R, K, C, P, LS). Accordingly, and after treatment of the integrated data set, a map of the soil losses will be achieved as a result. We tested the proposed tool on a watershed basin located in the weste of Algeria where a dataset was collected and prepared.Keywords: USLE, erosion, web gis, Algeria
Procedia PDF Downloads 3322259 Mentor and Mentee Based Learning
Authors: Erhan Eroğlu
Abstract:
This paper presents a new method called Mentor and Mentee Based Learning. This new method is becoming more and more common especially at workplaces. This study is significant as it clearly underlines how it works well. Education has always aimed at equipping people with the necessary knowledge and information. For many decades it went on teachers’ talk and chalk methods. In the second half of the nineteenth century educators felt the need for some changes in delivery systems. Some new terms like self- discovery, learner engagement, student centered learning, hands on learning have become more and more popular for such a long time. However, some educators believe that there is much room for better learning methods in many fields as they think the learners still cannot fulfill their potential capacities. Thus, new systems and methods are still being developed and applied at education centers and work places. One of the latest methods is assigning some mentors for the newly recruited employees and training them within a mentor and mentee program which allows both parties to see their strengths and weaknesses and the areas which can be improved. This paper aims at finding out the perceptions of the mentors and mentees on the programs they are offered at their workplaces and suggests some betterment alternatives. The study has been conducted via a qualitative method whereby some interviews have been done with both mentors and mentees separately and together. Results show that it is a great way to train inexperienced one and also to refresh the older ones. Some points to be improved have also been underlined. The paper shows that education is not a one way path to follow.Keywords: learning, mentor, mentee, training
Procedia PDF Downloads 2282258 English Learning Strategy and Proficiency Level of the First Year Students, International College, Suan Sunandha Rajabhat University
Authors: Kanokrat Kunasaraphan
Abstract:
The purpose of the study was to identify whether English language learning strategies commonly used by the first year students at International College, Suan Sunandha Rajabhat University include six direct and indirect strategies. The study served to explore whether there was a difference in these students’ use of six direct and indirect English learning strategies between the different levels of their English proficiency. The questionnaire used as a research instrument was comprised of two parts: General information of participants and the Strategy Inventory for Language Learning (SILL). The researcher employed descriptive statistics and one-way ANOVA (F-test) to analyze the data. The results of the analysis revealed that English learning strategies commonly used by the first year students include six direct and indirect strategies, including differences in strategy use of the students with different levels of English proficiency. Recommendations for future research include the study of language learning strategy use with other research methods focusing on other languages, specific language skills, and/or the relationship of language learning strategy use and other factors in other programs and/or institutions.Keywords: English learning strategies, direct strategies, indirect strategies, proficiency level
Procedia PDF Downloads 3042257 Evaluation of Cyclic Thermo-Mechanical Responses of an Industrial Gas Turbine Rotor
Authors: Y. Rae, A. Benaarbia, J. Hughes, Wei Sun
Abstract:
This paper describes an elasto-visco-plastic computational modelling method which can be used to assess the cyclic plasticity responses of high temperature structures operating under thermo-mechanical loadings. The material constitutive equation used is an improved unified multi-axial Chaboche-Lemaitre model, which takes into account non-linear kinematic and isotropic hardening. The computational methodology is a three-dimensional framework following an implicit formulation and based on a radial return mapping algorithm. The associated user material (UMAT) code is developed and calibrated across isothermal hold-time low cycle fatigue tests for a typical turbine rotor steel for use in finite element (FE) implementation. The model is applied to a realistic industrial gas turbine rotor, where the study focuses its attention on the deformation heterogeneities and critical high stress areas within the rotor structure. The potential improvements of such FE visco-plastic approach are discussed. An integrated life assessment procedure based on R5 and visco-plasticity modelling, is also briefly addressed.Keywords: unified visco-plasticity, thermo-mechanical, turbine rotor, finite element modelling
Procedia PDF Downloads 1332256 Energy Efficient Resource Allocation and Scheduling in Cloud Computing Platform
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Yu-Ching Lin
Abstract:
There has been renewal of interest in the relation between Green IT and cloud computing in recent years. Cloud computing has to be a highly elastic environment which provides stable services to users. The growing use of cloud computing facilities has caused marked energy consumption, putting negative pressure on electricity cost of computing center or data center. Each year more and more network devices, storages and computers are purchased and put to use, but it is not just the number of computers that is driving energy consumption upward. We could foresee that the power consumption of cloud computing facilities will double, triple, or even more in the next decade. This paper aims at resource allocation and scheduling technologies that are short of or have not well developed yet to reduce energy utilization in cloud computing platform. In particular, our approach relies on recalling services dynamically onto appropriate amount of the machines according to user’s requirement and temporarily shutting down the machines after finish in order to conserve energy. We present initial work on integration of resource and power management system that focuses on reducing power consumption such that they suffice for meeting the minimizing quality of service required by the cloud computing platform.Keywords: cloud computing, energy utilization, power consumption, resource allocation
Procedia PDF Downloads 3412255 Factor Associated with Smoking Cessation among Pregnant Woman: A Systematic Review
Authors: Galila Aisyah Latif Amini, Husnul Khatimah, Citra Amelia
Abstract:
Smoking among women is of particular concern for the maternal and child health community due to the strong association between prenatal smoking and adverse birth outcomes. Pregnancy is perceived to be a unique reason for smoking cessation, as motivation to care for the unborn fetus. This study aimed to find out the determinants of smoking cessation among pregnant women. Method that we use in this study is systematic review. We identified relevant studies by searching on science database online through SAGE journals, Proquest, Scopus, Emerald, JSTOR, and Springerlink. Journals were screened by title and abstract according to the research topic then filtered using the criteria exclusion and inclusion. And then we did critical appraisal. The results of the four studies reviewed were found that the determinant of smoking cessation are parity, the level of education, socioeconomic status, household SHS exposure, smoking habits of both parents, partner smoking status, psychological factors, antenatal care, intervention for health care provider, age smoking duration. The factor most strongly associated with smoking cessation is parity (OR 2,55; Cl 2,34-2,77). The results of this study are expected to give advice for developing future smoking cessation and relapse prevention programs.Keywords: pregnancy, smoking cessation, tobacco use cessation, smoking
Procedia PDF Downloads 2442254 IoT Based Approach to Healthcare System for a Quadriplegic Patient Using EEG
Authors: R. Gautam, P. Sastha Kanagasabai, G. N. Rathna
Abstract:
The proposed healthcare system enables quadriplegic patients, people with severe motor disabilities to send commands to electronic devices and monitor their vitals. The growth of Brain-Computer-Interface (BCI) has led to rapid development in 'assistive systems' for the disabled called 'assistive domotics'. Brain-Computer-Interface is capable of reading the brainwaves of an individual and analyse it to obtain some meaningful data. This processed data can be used to assist people having speech disorders and sometimes people with limited locomotion to communicate. In this Project, Emotiv EPOC Headset is used to obtain the electroencephalogram (EEG). The obtained data is processed to communicate pre-defined commands over the internet to the desired mobile phone user. Other Vital Information like the heartbeat, blood pressure, ECG and body temperature are monitored and uploaded to the server. Data analytics enables physicians to scan databases for a specific illness. The Data is processed in Intel Edison, system on chip (SoC). Patient metrics are displayed via Intel IoT Analytics cloud service.Keywords: brain computer interface, Intel Edison, Emotiv EPOC, IoT analytics, electroencephalogram
Procedia PDF Downloads 1872253 Accessibility for the Disabled in Public Buildings: The Case of a Nigerian University
Authors: S. P. Akinbogun, P. Oloruntoyin
Abstract:
One of the millennium development goals is the reduction of illiteracy. The state of user friendliness of the educational buildings is expected to play a significant role in the quest, particularly among the physically challenged. This study considers the state of access of educational buildings to disabled on wheel chair and crutches. It draws context from one of the federal universities in Nigeria. The study is basically qualitative; data were collected through structured interview and observation to assess compliance with the prescribed accessibility standard of academic buildings in the Federal University of Technology Akure. The study found that narrow entrances and routes of buildings, raised steps at entrances of the buildings, and ramps were absent. This implies exclusion as it renders most of the buildings inaccessible to wheelchair users. Perhaps, it accounts for low enrolment of wheelchair users in the institution despite many of them in the city. The implication is a challenge in the achievement of the millennium development goal concerning the reduction in the level of illiteracy in the country. The study suggests that government should strictly ensure that public buildings should satisfy or retrofitted to meet disabled access before development approval. This should be followed with the issuance of certificate of compliance upon completion.Keywords: public building, accessibility, physically challenged, education
Procedia PDF Downloads 2202252 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2142251 Data Integrity: Challenges in Health Information Systems in South Africa
Authors: T. Thulare, M. Herselman, A. Botha
Abstract:
Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical records. System features like pop-up reminders, complex menus, and poor user interfaces can make medical records far more time consuming than paper cards as well as affect decision-making processes. Although errors associated with health information and their real and likely effect on the quality of care and patient safety have been documented for many years, more research is needed to measure the occurrence of these errors and determine the causes to implement solutions. Therefore, the purpose of this paper is to identify data integrity challenges in hospital information systems through a scoping review and based on the results provide recommendations on how to manage these. Only 34 papers were found to be most suitable out of 297 publications initially identified in the field. The results indicated that human and computerized systems are the most common challenges associated with data integrity and factors such as policy, environment, health workforce, and lack of awareness attribute to these challenges but if measures are taken the data integrity challenges can be managed.Keywords: data integrity, data integrity challenges, hospital information systems, South Africa
Procedia PDF Downloads 1822250 Intelligent Rainwater Reuse System for Irrigation
Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao
Abstract:
The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency
Procedia PDF Downloads 1522249 The Algorithm of Semi-Automatic Thai Spoonerism Words for Bi-Syllable
Authors: Nutthapat Kaewrattanapat, Wannarat Bunchongkien
Abstract:
The purposes of this research are to study and develop the algorithm of Thai spoonerism words by semi-automatic computer programs, that is to say, in part of data input, syllables are already separated and in part of spoonerism, the developed algorithm is utilized, which can establish rules and mechanisms in Thai spoonerism words for bi-syllables by utilizing analysis in elements of the syllables, namely cluster consonant, vowel, intonation mark and final consonant. From the study, it is found that bi-syllable Thai spoonerism has 1 case of spoonerism mechanism, namely transposition in value of vowel, intonation mark and consonant of both 2 syllables but keeping consonant value and cluster word (if any). From the study, the rules and mechanisms in Thai spoonerism word were applied to develop as Thai spoonerism word software, utilizing PHP program. the software was brought to conduct a performance test on software execution; it is found that the program performs bi-syllable Thai spoonerism correctly or 99% of all words used in the test and found faults on the program at 1% as the words obtained from spoonerism may not be spelling in conformity with Thai grammar and the answer in Thai spoonerism could be more than 1 answer.Keywords: algorithm, spoonerism, computational linguistics, Thai spoonerism
Procedia PDF Downloads 2382248 Textile Based Physical Wearable Sensors for Healthcare Monitoring in Medical and Protective Garments
Authors: Sejuti Malakar
Abstract:
Textile sensors have gained a lot of interest in recent years as it is instrumental in monitoring physiological and environmental changes, for a better diagnosis that can be useful in various fields like medical textiles, sports textiles, protective textiles, agro textiles, and geo-textiles. Moreover, with the development of flexible textile-based wearable sensors, the functionality of smart clothing is augmented for a more improved user experience when it comes to technical textiles. In this context, conductive textiles using new composites and nanomaterials are being developed while considering its compatibility with the textile manufacturing processes. This review aims to provide a comprehensive and detailed overview of the contemporary advancements in textile-based wearable physical sensors, used in the field of medical, security, surveillance, and protection, from a global perspective. The methodology used is through analysing various examples of integration of wearable textile-based sensors with clothing for daily use, keeping in mind the technological advances in the same. By comparing various case studies, we come across various challenges textile sensors, in terms of stability, the comfort of movement, and reliable sensing components to enable accurate measurements, in spite of progress in the engineering of the wearable. Addressing such concerns is critical for the future success of wearable sensors.Keywords: flexible textile-based wearable sensors, contemporary advancements, conductive textiles, body conformal design
Procedia PDF Downloads 1862247 Exploration of Perceived Value of a Special Education Laws and Ethics’ Course Impact on Administrator Capacity
Authors: Megan Chaney
Abstract:
In the United States, research continues to show school administrators do not view themselves as adequately prepared in the area of special education. Often, special education is an omitted topic of study for school administrator preparation programs. The majority of special education teachers do not view their principals as well-prepared to support them in the educational context. Administrator preparation in the area of special education may begin at the foundational levels of understanding but is fundamentally an equity issue when serving individuals from marginalized populations with an urgent need to increase inclusionary practices. Special education and building-level administrators have a direct impact on teacher quality, instructional practices, inclusion, and equity with the opportunity to shape positive school culture. The current study was situated within an innovative IHE/LEA partnership pathway implemented with current K-12 administrators earning a Mild/Moderate Education Specialist Credential or coursework equivalent. Specifically, the study examined administrator’s perception of the Special Education Laws and Ethics’ course value and impact on the capacity to serve children with exceptionalities within the comprehensive school site context.Keywords: special education laws and ethics, school adminstrator perspectives, school administrator training, inclusive practices
Procedia PDF Downloads 1112246 Prevalence of Drug Injection among Male Prisoners in the West of Iran
Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh
Abstract:
Background: Substance addiction is one of the major worldwide problems that destroys economy, familial relationships, and the abuser’s career and has several side effects; in the meantime drug injection due to the possibility of shared use of syringes among drug users could have multiple complications to be followed. The purpose of this study was to determine the prevalence of drug injection among male prisoners in Kermanshah city, the west of Iran. Methods: In this cross-sectional study 615 male prisoners were randomly selected to participate voluntarily in the study. Participants filled out a writing self-report questionnaire. Data were analyzed by the SPSS software (ver. 21.0) at 95% significant level. Results: The mean age of respondents was 31.13 years [SD: 7.76]. Mean initiation age for drug use was 14.36 years (range, 9-34 years). Almost, 39.4 % reported a history of drug use before prison. Opium (33.2%) and crystal (27.1%) was the most used drug among prisoners. Furthermore, 9.3 % had a history of injection addiction. There was a significant correlation between age, crime type, marital status, economic status, unprotected sex and drug injection (P < 0.05). Conclusion: The low age of drug abuse and the prevalence of drug injection among offenders can be as a warning for responsible; in this regard, implementation of prevention programs to risky behavior and harm reduction among high-risk groups can follow useful results.Keywords: substance abuse, drug injection, prison, Iran
Procedia PDF Downloads 486