Search results for: multi-layers decision engine
2206 Vital Pulp Therapy: A Paradigm Shift in Treating Irreversible Pulpitis
Authors: Fadwa Chtioui
Abstract:
Vital Pulp Therapy (VPT) is nowadays challenging the deep-rooted dogma of root canal treatment, being the only therapeutic option for permanent teeth diagnosed with irreversible pulpitis or carious pulp exposure. Histologic and clinical research has shown that compromised dental pulp can be treated without the full removal or excavation of all healthy pulp, and the outcome of the partial or full pulpotomy followed by a Tricalcium-Silicate-based dressing seems to show promising results in maintaining pulp vitality and preserving affected teeth in the long term. By reviewing recent advances in the techniques of VPT and their clinical effectiveness and safety in permanent teeth with irreversible Pulpitis, this work provides a new understanding of pulp pathophysiology and defense mechanisms and will reform dental practitioners' decision-making in treating irreversible pulpits from root canal therapy to vital pulp therapy by taking advantage of the biological effects of Tricalcium Silicate materials.Keywords: irreversible pulpitis, vital pulp therapy, pulpotomy, Tricalcium Silicate
Procedia PDF Downloads 602205 Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control
Authors: Bogusław Schreyer
Abstract:
The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking.Keywords: select-high, select-low, torque distribution, wheeled robots
Procedia PDF Downloads 1192204 Propagation of DEM Varying Accuracy into Terrain-Based Analysis
Authors: Wassim Katerji, Mercedes Farjas, Carmen Morillo
Abstract:
Terrain-Based Analysis results in derived products from an input DEM and these products are needed to perform various analyses. To efficiently use these products in decision-making, their accuracies must be estimated systematically. This paper proposes a procedure to assess the accuracy of these derived products, by calculating the accuracy of the slope dataset and its significance, taking as an input the accuracy of the DEM. Based on the output of previously published research on modeling the relative accuracy of a DEM, specifically ASTER and SRTM DEMs with Lebanon coverage as the area of study, analysis have showed that ASTER has a low significance in the majority of the area where only 2% of the modeled terrain has 50% or more significance. On the other hand, SRTM showed a better significance, where 37% of the modeled terrain has 50% or more significance. Statistical analysis deduced that the accuracy of the slope dataset, calculated on a cell-by-cell basis, is highly correlated to the accuracy of the input DEM. However, this correlation becomes lower between the slope accuracy and the slope significance, whereas it becomes much higher between the modeled slope and the slope significance.Keywords: terrain-based analysis, slope, accuracy assessment, Digital Elevation Model (DEM)
Procedia PDF Downloads 4462203 A Real Time Expert System for Decision Support in Nuclear Power Plants
Authors: Andressa dos Santos Nicolau, João P. da S.C Algusto, Claudio Márcio do N. A. Pereira, Roberto Schirru
Abstract:
In case of abnormal situations, the nuclear power plant (NPP) operators must follow written procedures to check the condition of the plant and to classify the type of emergency. In this paper, we proposed a Real Time Expert System in order to improve operator’s performance in case of transient or accident with reactor shutdown. The expert system’s knowledge is based on the sequence of events (SoE) of known accident and two emergency procedures of the Brazilian Pressurized Water Reactor (PWR) NPP and uses two kinds of knowledge representation: rule and logic trees. The results show that the system was able to classify the response of the automatic protection systems, as well as to evaluate the conditions of the plant, diagnosing the type of occurrence, recovery procedure to be followed, indicating the shutdown root cause, and classifying the emergency level.Keywords: emergence procedure, expert system, operator support, PWR nuclear power plant
Procedia PDF Downloads 3332202 Dissecting ESG: The Impact of Environmental, Social, and Governance Factors on Stock Price Risk in European Markets
Authors: Sylwia Frydrych, Jörg Prokop, Michał Buszko
Abstract:
This study investigates the complex relationship between corporate ESG (Environmental, Social, Governance) performance and stock price risk within the European market context. By analyzing a dataset of 435 companies across 19 European countries, the research assesses the impact of both combined ESG performance and its individual components on various risk measures, including volatility, idiosyncratic risk, systematic risk, and downside risk. The findings reveal that while overall ESG scores do not significantly influence stock price risk, disaggregating the ESG components uncovers significant relationships. Governance practices are shown to consistently reduce market risk, positioning them as critical in risk management. However, environmental engagement tends to increase risk, particularly in times of regulatory shifts like those introduced in the EU post-2018. This research provides valuable insights for investors and corporate managers on the nuanced roles of ESG factors in financial risk, emphasizing the need for careful consideration of each ESG pillar in decision-making processes.Keywords: ESG performance, ESG factors, ESG pillars, ESG scores
Procedia PDF Downloads 262201 The Effect of Technology on Hospitality, Tourism Marketing and Management
Authors: Reda Moussa Massoud Embark
Abstract:
Tourism and hospitality graduate development is key to the future state of the tourism and hospitality industry. Meanwhile, Information and Communication Technology is increasingly becoming the engine for improving productivity and business opportunities in the travel and hospitality industry. Given the challenges and fierce global competition that have arisen in today's hospitality industry, it was important to shed light on strategic management. In addition, five-star hotels play a key role in supporting the tourism industry and investments in Egypt. Therefore, this study aims to examine the extent to which strategic management practices are implemented in five-star hotels in Egypt and to examine the differences between resort and inner-city hotels in terms of the implementation of strategic management processes. The influence of different hotel types on the implementation of the strategic management process is examined. A simple random sampling technique is used to select a sample of the target population, including hotels in the cities of Sharm el-Sheikh, Cairo and Hurghada. The data collection tool used in this study is an interviewer-administered questionnaire. Finally, combining the study results with the literature review allowed to present a set of recommendations to be addressed to hoteliers in the area of strategic management practices. Education and training in tourism and hospitality must take these changes into account in order to improve the ability of future managers to use a variety of tools and strategies to make their organizations more efficient and competitive. Therefore, this study aims to examine the types and effectiveness of training courses offered by tourism and hospitality departments in Egypt and to assess the importance of these training courses from the perspective of the graduate. The survey is aimed at graduates who have completed three different majors in the past decade: tourism and hospitality. Findings discussed the nature, level and effectiveness of the training provided at these faculties and the extent to which the training programs were valued by graduates working in different fields, and finally recommended specific practices to improve learning effectiveness increase and increase perceived employee benefits in the tourism and hospitality industry.Keywords: marketing channels, crisis, hotel, international, tour, operators, online travel agencies, e-tourism, hotel websites, tourism, web-tourism, strategic-management, strategic tools, five-star hotels, resorts, downtown hotels, Egyptian Markets.
Procedia PDF Downloads 662200 An Application to Predict the Best Study Path for Information Technology Students in Learning Institutes
Authors: L. S. Chathurika
Abstract:
Early prediction of student performance is an important factor to be gained academic excellence. Whatever the study stream in secondary education, students lay the foundation for higher studies during the first year of their degree or diploma program in Sri Lanka. The information technology (IT) field has certain improvements in the education domain by selecting specialization areas to show the talents and skills of students. These specializations can be software engineering, network administration, database administration, multimedia design, etc. After completing the first-year, students attempt to select the best path by considering numerous factors. The purpose of this experiment is to predict the best study path using machine learning algorithms. Five classification algorithms: decision tree, support vector machine, artificial neural network, Naïve Bayes, and logistic regression are selected and tested. The support vector machine obtained the highest accuracy, 82.4%. Then affecting features are recognized to select the best study path.Keywords: algorithm, classification, evaluation, features, testing, training
Procedia PDF Downloads 1192199 Analytic Hierarchy Process Method for Supplier Selection Considering Green Logistics: Case Study of Aluminum Production Sector
Authors: H. Erbiyik, A. Bal, M. Sirakaya, Ö. Yesildal, E. Yolcu
Abstract:
The emergence of many environmental issues began with the Industrial Revolution. The depletion of natural resources and emerging environmental challenges over time requires enterprises and managers to take into consideration environmental factors while managing business. If we take notice of these causes; the design and implementation of environmentally friendly green purchasing, production and waste management systems become very important at green logistics systems. Companies can adopt green supply chain with the awareness of these facts. The concept of green supply chain constitutes from green purchasing, green production, green logistics, waste management and reverse logistics. In this study, we wanted to identify the concept of green supply chain and why green supply chain should be applied. In the practice part of the study an analytic hierarchy process (AHP) study is conducted on an aluminum production company to evaluate suppliers.Keywords: aluminum sector, analytic hierarchy process, decision making, green logistics
Procedia PDF Downloads 3542198 Escaping Domestic Violence in Time of Conflict: The Ways Female Refugees Decide to Flee
Authors: Zofia Wlodarczyk
Abstract:
I study the experiences of domestic violence survivors who flee their countries of origin in times of political conflict using insight and evidence from forty-five biographical interviews with female Chechen refugees and twelve refugee resettlement professionals in Poland. Both refugees and women are often described as having less agency—that is, they lack the power to decide to migrate – refugees less than economic migrants and women less than men. In this paper, I focus on how female refugees who have been victims of domestic violence make decisions about leaving their countries of origin during times of political conflict. I use several existing migration theories to trace how the migration experience of these women is shaped by dynamics at different levels of society: the macro level, the meso level and the micro level. At the macro level of analysis, I find that political conflict can be both a source of and an escape from domestic violence. Ongoing conflict can strengthen the patriarchal cultural norms, increase violence and constrain women’s choices when it comes to marriage. However, political conflict can also destabilize families and make pathways for women to escape. At the meso level I demonstrate that other political migrants and institutions that emerge due to politically triggered migration can guide those fleeing domestic violence. Finally, at the micro level, I show that family dynamics often force domestic abuse survivors to make their decision to escape alone or with the support of only the most trusted female relatives. Taken together, my analyses show that we cannot look solely at one level of society when describing decision-making processes of women fleeing domestic violence. Conflict-related micro, meso and macro forces interact with and influence each other: on the one hand, strengthening an abusive trap, and on the other hand, opening a door to escape. This study builds upon several theoretical and empirical debates. First, it expands theories of migration by incorporating both refugee and gender perspectives. Few social scientists have used the migration theory framework to discuss the unique circumstances of refugee flows. Those who have mainly focus on “political” migrants, a designation that frequently fails to account for gender, does not incorporate individuals fleeing gender-based violence, including domestic-violence victims. The study also enriches migration scholarship, typically focused on the US and Western-European context, with research from Eastern Europe and Caucasus. Moreover, it contributes to the literature on the changing roles of gender in the context of migration. I argue that understanding how gender roles and hierarchies influence the pre-migration stage of female refugees is crucial, as it may have implications for policy-making efforts in host countries that recognize the asylum claims of those fleeing domestic violence. This study also engages in debates about asylum and refugee law. Domestic violence is normatively and often legally considered an individual-level problem whereas political persecution is recognized as a structural or societal level issue. My study challenges these notions by showing how the migration triggered by domestic violence is closely intertwined with politically motivated refuge.Keywords: AGENCY, DOMESTIC VIOLENCE, FEMALE REFUGEES, POLITICAL REFUGE, SOCIAL NETWORKS
Procedia PDF Downloads 1692197 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 3922196 Integrated Environmental Management System and Environmental Impact Assessment in Evaluation of Environmental Protective Action
Authors: Moustafa Osman
Abstract:
The paper describes and analyses different good practice examples of protective levels, and initiatives actions (“framework conditions”) and encourages the uptake of environmental management systems (EMSs) to small and medium-sized enterprises (SMEs). Most of industries tend to take EMS as tools leading towards sustainability planning. The application of these tools has numerous environmental obligations that neither suggests decision nor recommends what a company should achieve ultimately. These set up clearly defined criteria to evaluate environmental protective action (EEPA) into sustainability indicators. The physical integration will evaluate how to incorporate traditional knowledge into baseline information, preparing impact prediction, and planning mitigation measures in monitoring conditions. Thereby efforts between the government, industry and community led protective action to concern with present needs for future generations, meeting the goal of sustainable development. The paper discusses how to set out distinct aspects of sustainable indicators and reflects inputs, outputs, and modes of impact on the environment.Keywords: environmental management, sustainability, indicators, protective action
Procedia PDF Downloads 4432195 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability
Authors: Mahsa Pishdar
Abstract:
Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos
Procedia PDF Downloads 2072194 A Resilience-Based Approach for Assessing Social Vulnerability in New Zealand's Coastal Areas
Authors: Javad Jozaei, Rob G. Bell, Paula Blackett, Scott A. Stephens
Abstract:
In the last few decades, Social Vulnerability Assessment (SVA) has been a favoured means in evaluating the susceptibility of social systems to drivers of change, including climate change and natural disasters. However, the application of SVA to inform responsive and practical strategies to deal with uncertain climate change impacts has always been challenging, and typically agencies resort back to conventional risk/vulnerability assessment. These challenges include complex nature of social vulnerability concepts which influence its applicability, complications in identifying and measuring social vulnerability determinants, the transitory social dynamics in a changing environment, and unpredictability of the scenarios of change that impacts the regime of vulnerability (including contention of when these impacts might emerge). Research suggests that the conventional quantitative approaches in SVA could not appropriately address these problems; hence, the outcomes could potentially be misleading and not fit for addressing the ongoing uncertain rise in risk. The second phase of New Zealand’s Resilience to Nature’s Challenges (RNC2) is developing a forward-looking vulnerability assessment framework and methodology that informs the decision-making and policy development in dealing with the changing coastal systems and accounts for complex dynamics of New Zealand’s coastal systems (including socio-economic, environmental and cultural). Also, RNC2 requires the new methodology to consider plausible drivers of incremental and unknowable changes, create mechanisms to enhance social and community resilience; and fits the New Zealand’s multi-layer governance system. This paper aims to analyse the conventional approaches and methodologies in SVA and offer recommendations for more responsive approaches that inform adaptive decision-making and policy development in practice. The research adopts a qualitative research design to examine different aspects of the conventional SVA processes, and the methods to achieve the research objectives include a systematic review of the literature and case study methods. We found that the conventional quantitative, reductionist and deterministic mindset in the SVA processes -with a focus the impacts of rapid stressors (i.e. tsunamis, floods)- show some deficiencies to account for complex dynamics of social-ecological systems (SES), and the uncertain, long-term impacts of incremental drivers. The paper will focus on addressing the links between resilience and vulnerability; and suggests how resilience theory and its underpinning notions such as the adaptive cycle, panarchy, and system transformability could address these issues, therefore, influence the perception of vulnerability regime and its assessment processes. In this regard, it will be argued that how a shift of paradigm from ‘specific resilience’, which focuses on adaptive capacity associated with the notion of ‘bouncing back’, to ‘general resilience’, which accounts for system transformability, regime shift, ‘bouncing forward’, can deliver more effective strategies in an era characterised by ongoing change and deep uncertainty.Keywords: complexity, social vulnerability, resilience, transformation, uncertain risks
Procedia PDF Downloads 1012193 Criteria Analysis of Residential Location Preferences: An Urban Dwellers’ Perspective
Authors: Arati Siddharth Petkar, Joel E. M. Macwan
Abstract:
Preferences for residential location are of a diverse nature. Primarily they are based on the socio-economic, socio-cultural, socio-demographic characteristics of the household. It also depends on character, and the growth potential of different areas in a city. In the present study, various criteria affecting residential location preferences from the Urban Dwellers’ perspective have been analyzed. The household survey has been conducted in two parts: Existing Buyers’ survey and Future Buyers’ survey. The analysis reveals that workplace location is the most governing criterion in deciding residential location from the majority of the urban dwellers perspective. For analyzing the importance of varied criteria, Analytical Hierarchy Process approach has been explored. The suggested approach will be helpful for urban planners, decision makers and developers, while designating a new residential area or redeveloping an existing one.Keywords: analytical hierarchy process (AHP), household, preferences, residential location preferences, residential land use, urban dwellers
Procedia PDF Downloads 2082192 A Predictive Machine Learning Model of the Survival of Female-led and Co-Led Small and Medium Enterprises in the UK
Authors: Mais Khader, Xingjie Wei
Abstract:
This research sheds light on female entrepreneurs by providing new insights on the survival predictions of companies led by females in the UK. This study aims to build a predictive machine learning model of the survival of female-led & co-led small & medium enterprises (SMEs) in the UK over the period 2000-2020. The predictive model built utilised a combination of financial and non-financial features related to both companies and their directors to predict SMEs' survival. These features were studied in terms of their contribution to the resultant predictive model. Five machine learning models are used in the modelling: Decision tree, AdaBoost, Naïve Bayes, Logistic regression and SVM. The AdaBoost model had the highest performance of the five models, with an accuracy of 73% and an AUC of 80%. The results show high feature importance in predicting companies' survival for company size, management experience, financial performance, industry, region, and females' percentage in management.Keywords: company survival, entrepreneurship, females, machine learning, SMEs
Procedia PDF Downloads 1012191 An Auxiliary Technique for Coronary Heart Disease Prediction by Analyzing Electrocardiogram Based on ResNet and Bi-Long Short-Term Memory
Authors: Yang Zhang, Jian He
Abstract:
Heart disease is one of the leading causes of death in the world, and coronary heart disease (CHD) is one of the major heart diseases. Electrocardiogram (ECG) is widely used in the detection of heart diseases, but the traditional manual method for CHD prediction by analyzing ECG requires lots of professional knowledge for doctors. This paper introduces sliding window and continuous wavelet transform (CWT) to transform ECG signals into images, and then ResNet and Bi-LSTM are introduced to build the ECG feature extraction network (namely ECGNet). At last, an auxiliary system for coronary heart disease prediction was developed based on modified ResNet18 and Bi-LSTM, and the public ECG dataset of CHD from MIMIC-3 was used to train and test the system. The experimental results show that the accuracy of the method is 83%, and the F1-score is 83%. Compared with the available methods for CHD prediction based on ECG, such as kNN, decision tree, VGGNet, etc., this method not only improves the prediction accuracy but also could avoid the degradation phenomenon of the deep learning network.Keywords: Bi-LSTM, CHD, ECG, ResNet, sliding window
Procedia PDF Downloads 892190 The Optimum Biodiesel Blend in Low Sulfur Diesel and Its Physico-Chemical Properties and Economic Aspect
Authors: Ketsada Sutthiumporn, Sittichot Thongkaw, Malee Santikunaporn
Abstract:
In Thailand, biodiesel has been utilized as an attractive substitute of petroleum diesel and the government imposes a mandatory biodiesel blending requirement in transport sector to improve energy security, support agricultural sector and reduce emissions. Though biodiesel blend has many advantages over diesel fuel such as improved lubricity, low sulfur content and higher flash point, there are still some technical problems such as oxidative stability, poor cold- flow properties and impurity. Such problems were related to the fatty acid composition in feedstock. Moreover, Thailand has announced the use of low sulfur diesel as a base diesel and will be continually upgrading to EURO 5 in 2023. With ultra low sulfur content, it may affect the diesel fuel properties especially lubricity as well. Therefore, in this study, the physical and chemical properties of palm oil-based biodiesel in low sulfur diesel blends from different producers will be investigated by standard methods per ASTM and EN. Also, its economic benefits based on diesel price structure in Thailand will be highlighted. The appropriate biodiesel blend ratio can affect the physico-chemical properties and reasonable price in the country. Properties of biodiesel, including specific gravity, kinematic viscosity, FAME composition, flash point, sulfur, water, oxidation stability and lubricity were measured by standard methods of ASTM and EN. The results show that the FAME composition of biodiesel has the fatty acid of C12:0 to C20:1, mostly in C16:0, C18:0, C18:1, and C18:2, which were main characteristic compositions of palm biodiesel. The physical and chemical properties of biodiesel blended diesel was found to be increases with an increasing amount of biodiesel such as specific gravity, flash point and kinematic viscosity while sulfur value was decreased. Moreover, in this study, the various properties of each biodiesel blends were plotted to determine the appropriate proportional range of biodiesel-blended diesel with an optimum fuel price.It can be seen that the amount of B100 can be filled from 1% up to 7% in which the quality was in accordance with Notification of the department of Energy business.The understanding of relation between physico-chemical properties of palm oil-based biodiesel and pricing is beneficial to guide the better development of desired feedstock in Thailand and to implement biodiesel blends with comparative price and diesel engine performance.Keywords: fatty acid methyl ester, biodiesel, fuel price structure, palm oil in Thailand
Procedia PDF Downloads 1162189 Migrant and Population Health, Two Sides of a Coin: A Descriptive Study
Authors: A. Sottomayor, M. Perez Duque, M. C. Henriques
Abstract:
Introduction: Migration is not a new phenomenon; nomads often traveled, seeking better living conditions, including food and water. The increase of migrations affects all countries, rising health-related challenges. In Portugal, we have had migrant movements in the last decades, pairing with economic behavior. Irregular immigrants are detained in Santo António detention center from Portuguese Immigration and Borders Service (USHA-SEF) in Porto until court decision for a maximum of 60 days. It is the only long stay officially designated detention center for immigrants in Portugal. Immigrant health is important for public health (PH). It affects and is affected by the community. The XXVII Portuguese Government considered immigrant integration, including access to health, health promotion, protection and reduction of inequities a political priority. Many curative, psychological and legal services are provided for detainees, but until 2015, no structured health promotion or prevention actions were being held at USHA-SEF. That year, Porto Occidental PH Local Unit started to provide vaccination and health literacy on this theme for detainees and SEF workers. Our activities include a vaccine lecture, a medical consultation with vaccine prescription and administration, along with documented proof of vaccination. All vaccines are volunteer and free of charge. This action reduces the risk of importation and transmission of diseases, contributing to world eradication and elimination programs. We aimed to characterize the demography of irregular immigrant detained at UHSA-SEF and describe our activity. Methods: All data was provided by Porto Occidental Public Health Unit. All paper registers of vaccination were uploaded to MicrosoftExcel®. We included all registers and collected demographic variables, nationality, vaccination date, category, and administered vaccines. Descriptive analysis was performed using MicrosoftExcel®. Results: From 2015 to 2018, we delivered care to 256 individuals (179 immigrants; 77 workers). Considering immigrants, 72% were male, and 8 (16%) women were pregnant. 85% were between 20-54 years (ᵡ=30,8y; 2-71y), and 11 didn’t report any age. Migrants came from 48 countries, and India had the highest number (9%). MMR and Tetanus vaccines had > 90% vaccination rate and Poliomyelitis, hepatitis B and flu vaccines had around 85% vaccination rates. We had a consistent number of refusals. Conclusion: Our irregular migrant population comes from many different countries, which increases the risk of disease importation. Pregnant women are present as a particular subset of irregular migrants, and vaccination protects them and the baby. Vaccination of migrant is valuable for them and for the countries in which they pass. It contributes to universal health coverage, for eradication programmes and accomplishment of the Sustainable Development Goals. Peer influence may present as a determinant of refusals so we must consistently educate migrants before vaccination. More studies would be valuable, particularly on the migrant trajectory, duration of stay, destiny after court decision and health impact.Keywords: migrants, public health, universal health coverage, vaccination
Procedia PDF Downloads 1242188 Assessment of Memetic and Genetic Algorithm for a Flexible Integrated Logistics Network
Authors: E. Behmanesh, J. Pannek
Abstract:
The distribution-allocation problem is known as one of the most comprehensive strategic decision. In real-world cases, it is impossible to solve a distribution-allocation problem in traditional ways with acceptable time. Hence researchers develop efficient non-traditional techniques for the large-term operation of the whole supply chain. These techniques provide near-optimal solutions particularly for large scales test problems. This paper, presents an integrated supply chain model which is flexible in the delivery path. As the solution methodology, we apply a memetic algorithm with a novelty in population presentation. To illustrate the performance of the proposed memetic algorithm, LINGO optimization software serves as a comparison basis for small size problems. In large size cases that we are dealing with in the real world, the Genetic algorithm as the second metaheuristic algorithm is considered to compare the results and show the efficiency of the memetic algorithm.Keywords: integrated logistics network, flexible path, memetic algorithm, genetic algorithm
Procedia PDF Downloads 3742187 A Taxonomy of Behavior for a Medical Coordinator by Utlizing Leadership Styles
Authors: Aryana Collins Jackson, Elisabetta Bevacqua, Pierre De Loor, Ronan Querrec
Abstract:
This paper presents a taxonomy of non-technical skills, communicative intentions, and behavior for an individual acting as a medical coordinator. In medical emergency situations, a leader among the group is imperative to both patient health and team emotional and mental health. Situational Leadership is used to make clear and easy-to-follow guidelines for behavior depending on circumstantial factors. Low-level leadership behaviors belonging to two different styles, directive and supporting, are identified from literature and are included in the proposed taxonomy. The high-level information in the taxonomy consists of the necessary non-technical skills belonging to a medical coordinator: situation awareness, decision making, task management, and teamwork. Finally, communicative intentions, dimensions, and functions are included. Thus this work brings high-level and low-level information - medical non-technical skills, communication capabilities, and leadership behavior - into a single versatile taxonomy of behavior.Keywords: human behavior, leadership styles, medical, taxonomy
Procedia PDF Downloads 1592186 Erosion Wear of Cast Al-Si Alloys
Authors: Pooja Verma, Rajnesh Tyagi, Sunil Mohan
Abstract:
Al-Si alloys are widely used in various components such as liner-less engine blocks, piston, compressor bodies and pumps for automobile sector and aerospace industries due to their excellent combination of properties like low thermal expansion coefficient, low density, excellent wear resistance, high corrosion resistance, excellent cast ability, and high hardness. The low density and high hardness of primary Si phase results in significant reduction in density and improvement in wear resistance of hypereutectic Al-Si alloys. Keeping in view of the industrial importance of the alloys, hypereutectic Al-Si alloys containing 14, 16, 18 and 20 wt. % of Si were prepared in a resistance furnace using adequate amount of deoxidizer and degasser and their erosion behavior was evaluated by conducting tests at impingement angles of 30°, 60°, and 90° with an erodent discharge rate of 7.5 Hz, pressure 1 bar using erosion test rig. Microstructures of the cast alloys were examined using Optical microscopy (OM) and scanning electron microscopy (SEM) and the presence of Si particles was confirmed by x-ray diffractometer (XRD). The mechanical properties and hardness were measured using uniaxial tension tests at a strain rate of 10-3/s and Vickers hardness tester. Microstructures of the alloys and X-ray examination revealed the presence of primary and eutectic Si particles in the shape of cuboids or polyhedral and finer needles. Yield strength (YS), ultimate tensile strength (UTS), and uniform elongation of the hypereutectic Al-Si alloys were observed to increase with increasing content of Si. The optimal strength and ductility was observed for Al-20 wt. % Si alloy which is significantly higher than the Al-14 wt. % Si alloy. The increased hardness and the strength of the alloys with increasing amount of Si has been attributed presence of Si in the solid solution which creates strain, and this strain interacts with dislocations resulting in solid-solution strengthening. The interactions between distributed primary Si particles and dislocations also provide Orowan strengthening leading to increased strength. The steady state erosion rate was found to decrease with increasing angle of impact as well as Si content for all the alloys except at 900 where it was observed to increase with the increase in the Si content. The minimum erosion rate is observed in Al-20 wt. % Si alloy at 300 and 600 impingement angles because of its higher hardness in comparison to other alloys. However, at 90° impingement angle the wear rate for Al-20 wt. % Si alloy is found to be the minimum due to deformation, subsequent cracking and chipping off material.Keywords: Al-Si alloy, erosion wear, cast alloys, dislocation, strengthening
Procedia PDF Downloads 662185 Tribological Behavior of Hybrid Nanolubricants for Internal Combustion Engines
Authors: José M. Liñeira Del Río, Ramón Rial, Khodor Nasser, María J.G. Guimarey
Abstract:
The need to develop new lubricants that offer better anti-friction and anti-wear performance in internal combustion vehicles is one of the great challenges of lubrication in the automotive field. The addition of nanoparticles has emerged as a possible solution and, combined with the lubricating power of ionic liquids, may become one of the alternatives to reduce friction losses and wear of the contact surfaces in the conditions to which tribo-pairs are subjected, especially in the contact of the piston rings and the cylinder liner surface. In this study, the improvement in SAE 10W-40 engine oil tribological performance after the addition of magnesium oxide (MgO) nanoadditives and two different phosphonium-based ionic liquids (ILs) was investigated. The nanoparticle characterization was performed by means of transmission electron microscopy (TEM), Fourier-transform infrared spectroscopy (FTIR), Raman spectroscopy, X-ray diffraction (XRD), and scanning electron microscopy (SEM). The tribological properties, friction coefficients and wear parameters of the formulated oil modified with 0.01 wt.% MgO and 1 wt.% ILs compared with the neat 10W-40 oil were performed and analyzed using a ball-on-three-pins tribometer and a 3D optical profilometer, respectively. Further analysis on the worn surface was carried out by Raman spectroscopy and SEM microscopy, illustrating the formation of the protective IL and MgO tribo-films as hybrid additives. In friction tests with sliding steel-steel tribo-pairs, IL3-based hybrid nanolubricant decreased the friction coefficient and wear volume by 7% and 59%, respectively, in comparison with the neat SAE 10W-40, while the one based on IL1 only achieved a reduction of these parameters by 6% and 39%, respectively. Thus, the tribological characterization also revealed that the MgO and IL3 addition has a positive synergy over the commercial lubricant, adequately meeting the requirements for their use in internal combustion engines. In summary, this study has shown that the addition of ionic liquids to MgO nanoparticles can improve the stability and lubrication behavior of MgO nanolubricant and encourages more investigations on using nanoparticle additives with green solvents such as ionic liquids to protect the environment as well as prolong the lifetime of machinery. The improvement in the lubricant properties was attributed to the following wear mechanisms: the formation of a protective tribo-film and the ability of nanoparticles to fill out valleys between asperities, thereby effectively smoothing out the shearing surfaces.Keywords: lubricant, nanoparticles, phosphonium-based ionic liquids, tribology
Procedia PDF Downloads 822184 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2682183 Private Technology Parks–The New Engine for Innovation Development in Russia
Authors: K. Volkonitskaya, S. Lyapina
Abstract:
According to the National Monitoring Centre of innovation infrastructure, scientific and technical activities and regional innovation systems by December 2014. 166 technology parks were established in Russia. Comparative analysis of technological parks performance in Russia, the USA, Israel and the European Union countries revealed significant reduction of key performance indicators in Russian innovation infrastructure institutes. The largest deviations were determined in the following indicators: new products and services launched, number of companies and jobs, amount of venture capital invested. Lower performance indicators of Russian technology parks can be partly explained by slack demand for national high-tech products and services, lack of qualified specialists in the sphere of innovation management and insufficient cooperation between different innovation infrastructure institutes. In spite of all constraints in innovation segment of Russian economy in 2010-2012 private investors for the first time proceeded to finance building of technological parks. The general purpose of the research is to answer two questions: why despite the significant investment risks private investors continue to implement such comprehensive infrastructure projects in Russia and is business model of private technological park more efficient than strategies of state innovation infrastructure institutes? The goal of the research was achieved by analyzing business models of private technological parks in Moscow, Kaliningrad, Astrakhan and Kazan. The research was conducted in two stages: the on-line survey of key performance indicators of private and state Russian technological parks and in-depth interviews with top managers and investors, who have already build private technological parks in by 2014 or are going to complete investment stage in 2014-2016. The results anticipated are intended to identify the reasons of efficient and inefficient technological parks performance. Furthermore, recommendations for improving the efficiency of state technological and industrial parks were formulated. Particularly, the recommendations affect the following issues: networking with other infrastructural institutes, services and infrastructure provided, mechanisms of public-private partnership and investment attraction. In general intensive study of private technological parks performance and development of effective mechanisms of state support can have a positive impact on the growth rates of the number of Russian technological, industrial and science parks.Keywords: innovation development, innovation infrastructure, private technology park, public-private partnership
Procedia PDF Downloads 4362182 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 3032181 Crossroads of Care: Ethical Navigation in Faith-Based Counseling
Authors: Alexander Dolin
Abstract:
In the practice of Faith-based counseling, the clinician frequently faces multifaceted issues that come together when theological directives meet professional ethics to create a special set of dilemmas. The study narrates one working through the professional dilemmas of these Faith-based counselors, thereby looking into the tensions between the necessity of fidelity to faith and the requirements to follow the American Counseling Association Code of Ethics. Through a qualitative analysis of interviews with practitioners from various denominational backgrounds, the study has identified common ethical challenges and best practices that enable the integration of faith and ethics in practice. The findings provide insight into how faith-based counselors would reconcile a situation of conflict between religious belief and professional obligations but are striving to provide care that honors both their spiritual convictions and ethical responsibilities. This will add to existing discussions related to ethical decision-making in faith-based counseling by providing practical ways of dealing with these dilemmas in support of the counselor's professional integrity and spiritual mission.Keywords: ethics, faith, common challenges, practical tools, counseling
Procedia PDF Downloads 292180 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.Keywords: attacker, defender, game theory, information
Procedia PDF Downloads 4682179 Improving the Analytical Power of Dynamic DEA Models, by the Consideration of the Shape of the Distribution of Inputs/Outputs Data: A Linear Piecewise Decomposition Approach
Authors: Elias K. Maragos, Petros E. Maravelakis
Abstract:
In Dynamic Data Envelopment Analysis (DDEA), which is a subfield of Data Envelopment Analysis (DEA), the productivity of Decision Making Units (DMUs) is considered in relation to time. In this case, as it is accepted by the most of the researchers, there are outputs, which are produced by a DMU to be used as inputs in a future time. Those outputs are known as intermediates. The common models, in DDEA, do not take into account the shape of the distribution of those inputs, outputs or intermediates data, assuming that the distribution of the virtual value of them does not deviate from linearity. This weakness causes the limitation of the accuracy of the analytical power of the traditional DDEA models. In this paper, the authors, using the concept of piecewise linear inputs and outputs, propose an extended DDEA model. The proposed model increases the flexibility of the traditional DDEA models and improves the measurement of the dynamic performance of DMUs.Keywords: Dynamic Data Envelopment Analysis, DDEA, piecewise linear inputs, piecewise linear outputs
Procedia PDF Downloads 1612178 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails
Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith
Abstract:
Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.Keywords: cybersecurity, human-centric, phishing, psychology
Procedia PDF Downloads 832177 The Traveling Behavior and Needs for Tourist Support Facilities of Inbound Tourists Visiting Ratanakosin Island
Authors: Sakul Jariyachamsit
Abstract:
The objectives of this research were to study the behaviour of inbound tourist who visited Ratanakosin Island and to study their needs concerning support facilities. The independent variables included gender, age, levels of education, occupation, and income while the dependent variables were classified into two groups: tourists’ behaviour variables and tourists’ need of supporting facilities. A simple random sampling method was utilized to get 225 respondents. The majority of respondents were both male and female in the same proportion but most were between 21-30 years old. Most were married with a graduated degree. The average income of the respondents was between $20,000-30,000. The findings revealed that the majority of respondents came to Thailand for the first time and spent about 8 days in Thailand and preferred to travel in small groups. Their decision to come to Thailand was influenced by word of mouth. When they first thought of Thailand, they thought of Thai food. In terms of the needs for tourists around the Ratanakosin Island, and ranked in importance, are as follows: a tourist centre, somebody who can speak English, a trustable agency, police patrol, and the availability of maps and brochures.Keywords: Rattanakosin Island, tourist, travelling behaviour, media engineering
Procedia PDF Downloads 357