Search results for: classical measures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4476

Search results for: classical measures

1866 Web-Based Alcohol Prevention among Iranian Medical University Students: A Randomized Control Trail

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: E-interventions as a universal approach to prevent a high-risk behavior, such as alcohol drinking. This study was conducted to evaluate web-based alcohol drinking preventative intervention efficiency among medical university students in Iran. Methods: Overall, 150 freshman and sophomore male student’s college students participated in this study as intervention and control group. This was a longitudinal randomized pre- and post-test series control group design panel study to implement a behavior modification based intervention to alcohol drinking prevention among college students. Cross-tabulation, t-test, repeated measures, and GEE by using SPSS statistical package, version 21 was used for the statistical analysis. The participants were followed up for 6 months with data collection scheduled at baseline, 3 and 6 months. The primary outcomes are attitude, self-control, and sensation seeking. Furthermore, the secondary outcome is comparing alcohol drinking among the study groups. Results: It was found significant reduce in average response for an attitude towards alcohol drinking and sensation seeking among intervention group (P < 0.05). But after intervention not significant difference between intervention and control group of improve self-control and reduce alcohol drinking (P > 0.05). Conclusion: Our intervention has been accompanied with reducing alcohol use rate. These findings indicate that e-intervention may be effectiveness approach to address the alcohol prevention among college students.

Keywords: e-interventions, alcohol drinking, students, Iran

Procedia PDF Downloads 401
1865 Multi-Atlas Segmentation Based on Dynamic Energy Model: Application to Brain MR Images

Authors: Jie Huo, Jonathan Wu

Abstract:

Segmentation of anatomical structures in medical images is essential for scientific inquiry into the complex relationships between biological structure and clinical diagnosis, treatment and assessment. As a method of incorporating the prior knowledge and the anatomical structure similarity between a target image and atlases, multi-atlas segmentation has been successfully applied in segmenting a variety of medical images, including the brain, cardiac, and abdominal images. The basic idea of multi-atlas segmentation is to transfer the labels in atlases to the coordinate of the target image by matching the target patch to the atlas patch in the neighborhood. However, this technique is limited by the pairwise registration between target image and atlases. In this paper, a novel multi-atlas segmentation approach is proposed by introducing a dynamic energy model. First, the target is mapped to each atlas image by minimizing the dynamic energy function, then the segmentation of target image is generated by weighted fusion based on the energy. The method is tested on MICCAI 2012 Multi-Atlas Labeling Challenge dataset which includes 20 target images and 15 atlases images. The paper also analyzes the influence of different parameters of the dynamic energy model on the segmentation accuracy and measures the dice coefficient by using different feature terms with the energy model. The highest mean dice coefficient obtained with the proposed method is 0.861, which is competitive compared with the recently published method.

Keywords: brain MRI segmentation, dynamic energy model, multi-atlas segmentation, energy minimization

Procedia PDF Downloads 322
1864 Review of Electronic Voting as a Panacea for Election Malpractices in Nigerian Political System: Challenges, Benefits, and Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

The Nigerian political system has witnessed rising occurrences of election malpractice in the last decade. This has been due to election rigging and other forms of electoral fraud. In order to find a sustainable solution to this malpractice, the introduction of electronic voting (e-voting) has been suggested. This paper reviews the challenges, benefits, and issues associated with e-voting as a panacea for election malpractice in Nigeria. The review of existing literature revealed that e-voting can reduce the cost of conducting elections and reduce the opportunity for electoral fraud. The review suggests that the introduction of e-voting in the Nigerian political system would require adequate cybersecurity measures, trust-building initiatives, and proper legal frameworks to ensure its successful implementation. It is recommended that there should be an effective policy that would ensure the security of the system as well as the credibility of the results. Furthermore, a comprehensive awareness campaign needs to be conducted to ensure that voters understand the process and are comfortable using the system. In conclusion, e-voting has the potential to reduce the occurrence of election malpractice in the Nigerian political system. However, the successful implementation of e-voting will require effective policy interventions and trust-building initiatives. Additionally, the costs of acquiring the necessary infrastructure and equipment and implementing proper legal frameworks need to be considered.

Keywords: electronic voting, general election, candidate, INEC, cyberattack

Procedia PDF Downloads 85
1863 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set

Authors: Seema Vaidya

Abstract:

Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.

Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth

Procedia PDF Downloads 389
1862 Viewing Entrepreneurship Through a Goal Congruity Lens: The Roles of Dominance and Communal Goal Orientations in Women’s and Men’s Venture Interests

Authors: Xiaoming Yang, Abby Folberg, Carey Ryan, Lwetzel, Tgoering

Abstract:

We examined gender differences in entrepreneurial career interests drawing on goal congruity theory, which posits that people adopt gender-stereotypic goal orientations in response to social pressures to conform to traditional gender roles. Aspiring entrepreneurs (N = 351) first wrote three to five sentences about what they believed made an entrepreneur successful. They then completed measures of agentic and communal goal orientations (i.e., male and female stereotypic orientations, respectively) and indicated their interests in starting ventures in stereotypically feminine (e.g., salon), masculine (e.g., auto-repair) and science, technology, engineering, and mathematics (STEM; e.g., software developer) ventures. Qualitative analyses demonstrated that participants ascribed agentic and, more specifically, dominance, attributes to entrepreneurs; few participants ascribed communal attributes (e.g., warmth). Bifactor structural equation modeling indicated that, as expected, agentic goal orientations included dimensions of competence, self-direction, and dominance orientations and communal goal orientations were unidimensional. Further, as expected, dominance and communal orientations partially accounted for gender differences in all three career types. We discuss implications for entrepreneurial education and practice from a goal congruity perspective and the use of bifactor modeling to improve the measurement of goal orientations.

Keywords: gender, entrepreneurship, gender stereotypes, agentic and communal goal orientations, entrepreneurship education

Procedia PDF Downloads 80
1861 Chaotic Representation: Translating Gender in Cantonese Opera Performances

Authors: Kar Yue Chan

Abstract:

Cantonese opera is a valuable heritage originated from South China, and started to span its influence across the area to Hong Kong, and became extremely popular back in the 1950s to the 1970s. It has also been honoured and recognized as one treasurable item on the Intangible Cultural Heritage of Humanity on the Representative List of UNESCO since 2009. A certain level of difficulty is encountered when one identifies the gender roles and representations from a usual performance of Cantonese opera, as conventional practices of Cantonese opera display to the audience that many of the male hero roles are played by female upon the prior knowledge of all audience, and it is understandable for them as well because in the past there were insufficient male actors and performers on the market. Female actresses, in some senses, are more capable to sing near-male voices, and their appearances in heroic operatic attires are more appreciated by general audience. Therefore, perspectives of 'feminine representation' and the 'Reception Theory' in literature are conducive to analyzing such phenomenon. In spite of some 'normal' performances with romantic love stories or historical accounts involving often a talented intellectual and a beautiful wise lady (in Chinese caizi jiaren 才子佳人), in which the male role is actually male and the female role is actually female, there have still been some opera titles specifically manifesting these extreme gender associations by putting together displacement of gender roles in the same performance in view of such chaotic complication. On top of all other factors, translators dealing with any operatic texts face plenty of challenges upon transferring Cantonese operatic performances into English. It is found that translators need to deal with cultural elements embedded in the lyrics; the form (which is as delicate as those deriving from classical Chinese poetry); the gender misplacements that affect the mood and tone of the lyrics that much when they are in the process of translating. Some lyrics and tunes are specifically designed for a particular gender role to perform, while some others are more generic; both of which require different and specific translation strategies. After scrutinizing the various sources of reference, readers of this paper should be well informed of a significance which lies in the refined nature of the poetic form and content that signifies in the way the distinguished gender voice segregation of the discourse from which the lyrics are derived, and definitely also through the on-stage performability aspect of the task. In order to produce a relatively short and concise translated version which fits performance needs, all of the above factors will be looked at in this paper with relevant examples and analysis.

Keywords: Cantonese opera, translation, chaotic gender, performance

Procedia PDF Downloads 112
1860 Knowledge, Attitude and Compliance of Secondary School Students Towards School Discipline Policy in Ibadan North Local Government Area of Oyo State, Nigeria

Authors: S. Yakubu, E. A. Isah

Abstract:

One of the objectives of the school discipline policy is to instill discipline among students. However, despite the availability of this policy in various secondary schools in Nigeria, there seem to be numerous cases of indiscipline among students, which has become a source of concern to all stakeholders in the education sector. In an attempt to proffer possible solutions to this unending challenge, the study investigated the influence of knowledge and attitude on compliance of secondary school students towards school discipline policy in Ibadan North Local Government Area of Oyo State, Nigeria. The descriptive survey research design was employed to collect the requisite data. The multi-stage sampling procedure was adopted to select 570 respondents as the sample for the study. The data collected were analyzed using statistical measures of Mean, Standard deviation and Pearson Product Moment Correlation. The findings of the study showed that knowledge and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State were significantly related (r =0.330, p<0.05). The study also revealed a significant relationship between attitude and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State (r = 0.593, p<0.05). Based on the findings, it was recommended that school rules and regulations should be emphasized and given more awareness for easy compliance. Also, students should be encouraged to portray a positive attitude towards their respective rules and regulations.

Keywords: knowledge, attitude, compliance, school discipline policy

Procedia PDF Downloads 165
1859 Ultra-Tightly Coupled GNSS/INS Based on High Degree Cubature Kalman Filtering

Authors: Hamza Benzerrouk, Alexander Nebylov

Abstract:

In classical GNSS/INS integration designs, the loosely coupled approach uses the GNSS derived position and the velocity as the measurements vector. This design is suboptimal from the standpoint of preventing GNSSoutliers/outages. The tightly coupled GPS/INS navigation filter mixes the GNSS pseudo range and inertial measurements and obtains the vehicle navigation state as the final navigation solution. The ultra‐tightly coupled GNSS/INS design combines the I (inphase) and Q(quadrature) accumulator outputs in the GNSS receiver signal tracking loops and the INS navigation filter function intoa single Kalman filter variant (EKF, UKF, SPKF, CKF and HCKF). As mentioned, EKF and UKF are the most used nonlinear filters in the literature and are well adapted to inertial navigation state estimation when integrated with GNSS signal outputs. In this paper, it is proposed to move a step forward with more accurate filters and modern approaches called Cubature and High Degree cubature Kalman Filtering methods, on the basis of previous results solving the state estimation based on INS/GNSS integration, Cubature Kalman Filter (CKF) and High Degree Cubature Kalman Filter with (HCKF) are the references for the recent developed generalized Cubature rule based Kalman Filter (GCKF). High degree cubature rules are the kernel of the new solution for more accurate estimation with less computational complexity compared with the Gauss-Hermite Quadrature (GHQKF). Gauss-Hermite Kalman Filter GHKF which is not selected in this work because of its limited real-time implementation in high-dimensional state-spaces. In ultra tightly or a deeply coupled GNSS/INS system is dynamics EKF is used with transition matrix factorization together with GNSS block processing which is well described in the paper and assumes available the intermediary frequency IF by using a correlator samples with a rate of 500 Hz in the presented approach. GNSS (GPS+GLONASS) measurements are assumed available and modern SPKF with Cubature Kalman Filter (CKF) are compared with new versions of CKF called high order CKF based on Spherical-radial cubature rules developed at the fifth order in this work. Estimation accuracy of the high degree CKF is supposed to be comparative to GHKF, results of state estimation are then observed and discussed for different initialization parameters. Results show more accurate navigation state estimation and more robust GNSS receiver when Ultra Tightly Coupled approach applied based on High Degree Cubature Kalman Filter.

Keywords: GNSS, INS, Kalman filtering, ultra tight integration

Procedia PDF Downloads 268
1858 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 60
1857 Development and Validation of the University of Mindanao Needs Assessment Scale (UMNAS) for College Students

Authors: Ryan Dale B. Elnar

Abstract:

This study developed a multidimensional need assessment scale for college students called The University of Mindanao Needs Assessment Scale (UMNAS). Although there are context-specific instruments measuring the needs of clinical and non-clinical samples, literature reveals no standardized scales to measure the needs of the college students thus a four-phase item development process was initiated to support its content validity. Comprising seven broad facets namely spiritual-moral, intrapersonal, socio-personal, psycho-emotional, cognitive, physical and sexual, a pyramid model of college needs was deconstructed through FGD sample to support the literature review. Using various construct validity procedures, the model was further tested using a total of 881 Filipino college samples. The result of the study revealed evidences of the reliability and validity of the UMNAS. The reliability indices range from .929-.933. Exploratory and confirmatory factor analyses revealed a one-factor-six-dimensional instrument to measure the needs of the college students. Using multivariate regression analysis, year level and course are found predictors of students’ needs. Content analysis attested the usefulness of the instrument to diagnose students’ personal and academic issues and concerns in conjunction with other measures. The norming process includes 1728 students from the different colleges of the University of Mindanao. Further validation is recommended to establish a national norm for the instrument.

Keywords: needs assessment scale, validity, factor analysis, college students

Procedia PDF Downloads 433
1856 Modeling Stream Flow with Prediction Uncertainty by Using SWAT Hydrologic and RBNN Neural Network Models for Agricultural Watershed in India

Authors: Ajai Singh

Abstract:

Simulation of hydrological processes at the watershed outlet through modelling approach is essential for proper planning and implementation of appropriate soil conservation measures in Damodar Barakar catchment, Hazaribagh, India where soil erosion is a dominant problem. This study quantifies the parametric uncertainty involved in simulation of stream flow using Soil and Water Assessment Tool (SWAT), a watershed scale model and Radial Basis Neural Network (RBNN), an artificial neural network model. Both the models were calibrated and validated based on measured stream flow and quantification of the uncertainty in SWAT model output was assessed using ‘‘Sequential Uncertainty Fitting Algorithm’’ (SUFI-2). Though both the model predicted satisfactorily, but RBNN model performed better than SWAT with R2 and NSE values of 0.92 and 0.92 during training, and 0.71 and 0.70 during validation period, respectively. Comparison of the results of the two models also indicates a wider prediction interval for the results of the SWAT model. The values of P-factor related to each model shows that the percentage of observed stream flow values bracketed by the 95PPU in the RBNN model as 91% is higher than the P-factor in SWAT as 87%. In other words the RBNN model estimates the stream flow values more accurately and with less uncertainty. It could be stated that RBNN model based on simple input could be used for estimation of monthly stream flow, missing data, and testing the accuracy and performance of other models.

Keywords: SWAT, RBNN, SUFI 2, bootstrap technique, stream flow, simulation

Procedia PDF Downloads 350
1855 Workplace Risk Assessment in a Paint Factory

Authors: Rula D. Alshareef, Safa S. Alqathmi, Ghadah K. Alkhouldi, Reem O. Bagabas, Farheen B. Hasan

Abstract:

Safety engineering is among the most crucial considerations in any work environment. Providing mentally, physically, and environmentally safe work conditions must be the top priority of any successful organization. Company X is a local paint production company in Saudi Arabia; in a month, the factory experienced two significant accidents, which indicates that workers’ safety is overlooked. The aim of the research is to examine the risks, assess the root causes and recommend control measures that will eventually contribute to providing a safe workplace. The methodology used is sectioned into three phases, risk identification, assessment, and finally, mitigation. In the identification phase, the team used Rapid Entire Body Assessment (REBA) and National Institute for Occupational Safety and Health Lifting Index (NIOSH LI) tools to holistically establish knowledge about the current risk posed to the factory. The physical hazards in the factory were assessed in two different operations, which are mixing and filling/packaging. For the risk assessment phase, the hazards were deeply analyzed through their severity and impact. Additionally, through risk mitigation, the Rapid Entire Body Assessment (REBA) score decreased from 11 to 7, and the National Institute for Occupational Safety and Health Lifting Index (NIOSH LI) has been reduced from 5.27 to 1.85.

Keywords: ergonomics, safety, workplace risks, hazards, awkward posture, fatigue, work environment

Procedia PDF Downloads 69
1854 Autonomy and Other Variables Related to the Expression of Love among Saudi Couples

Authors: Reshaa Alruwaili

Abstract:

The primary aim of this study was to examine the hypothesis presented by Self Determination theory which suggests that autonomy impacts positively the expression of love. Other hypotheses were also examined which suggest that other variables explain the expression of love, including: dyadic adjustment (dyadic consensus, dyadic satisfaction and dyadic cohesion), couple satisfaction, age, gender, the length of marriage, number of children and attachment styles. The participants were Saudi couples, which provided the opportunity to consider the influence of Saudi culture on the expression of love. A questionnaire was employed to obtain measures of all the relevant variables, including a measure of expression of love that was built from 27 items, constituting verbal, physical and caring features, and a measure of autonomy based on three features: authorship, interest-taking and susceptibility. Data were collected from both members of 34 Saudi couples. Descriptive analysis of both expression of love and autonomy was conducted. Correlation and regression were used to assess the relationships between expression of love and autonomy and other variables. Results indicated that Saudi couples who most often express their love tend to be more than somewhat autonomous. Not much difference was found between husbands and wives in expressing love, although wives were slightly more autonomous than husbands. Expression of love was enhanced by the autonomy of the participants to a greater extent when dyadic satisfaction was controlled, since the latter was negatively correlated with autonomy and had no effect on the expression of love. Basic psychological needs, dyadic consensus and dismissive-avoidant attachment improve the expression of love, while it is decreased by the number of children.

Keywords: autonomy, determination theory, expression of love, dyadic adjustment

Procedia PDF Downloads 223
1853 Comparative Study on Inhibiting Factors of Cost and Time Control in Nigerian Construction Practice

Authors: S. Abdulkadir, I. Y. Moh’d, S. U. Kunya, U. Nuruddeen

Abstract:

The basis of any contract formation between the client and contractor is the budgeted cost and the estimated duration of projects. These variables are paramount important to project's sponsor in a construction projects and in assessing the success or viability of construction projects. Despite the availability of various techniques of cost and time control, many projects failed to achieve their initial estimated cost and time. The paper evaluate the inhibiting factors of cost and time control in Nigerian construction practice and comparing the result with the United Kingdom practice as identified by one researcher. The populations of the study are construction professionals within Bauchi and Gombe state, Nigeria, a judgmental sampling employed in determining the size of respondents. Descriptive statistics used in analyzing the data in SPSS. Design change, project fraud and corruption, financing and payment of completed work found to be common among the top five inhibiting factors of cost and time control in the study area. Furthermore, the result had shown some comprising with slight contrast as in the case of United Kingdom practice. Study recommend the adaptation of mitigation measures developed in the UK prior to assessing its effectiveness and so also developing a mitigating measure for other top factors that are not within the one developed in United Kingdom practice. Also, it recommends a wider assessing comparison on the modify inhibiting factors of cost and time control as revealed by the study to cover almost all part of Nigeria.

Keywords: comparison, cost, inhibiting factor, United Kingdom, time

Procedia PDF Downloads 427
1852 Expanding the Atelier: Design Lead Academic Project Using Immersive User-Generated Mobile Images and Augmented Reality

Authors: David Sinfield, Thomas Cochrane, Marcos Steagall

Abstract:

While there is much hype around the potential and development of mobile virtual reality (VR), the two key critical success factors are the ease of user experience and the development of a simple user-generated content ecosystem. Educational technology history is littered with the debris of over-hyped revolutionary new technologies that failed to gain mainstream adoption or were quickly superseded. Examples include 3D television, interactive CDROMs, Second Life, and Google Glasses. However, we argue that this is the result of curriculum design that substitutes new technologies into pre-existing pedagogical strategies that are focused upon teacher-delivered content rather than exploring new pedagogical strategies that enable student-determined learning or heutagogy. Visual Communication design based learning such as Graphic Design, Illustration, Photography and Design process is heavily based on the traditional forms of the classroom environment whereby student interaction takes place both at peer level and indeed teacher based feedback. In doing so, this makes for a healthy creative learning environment, but does raise other issue in terms of student to teacher learning ratios and reduced contact time. Such issues arise when students are away from the classroom and cannot interact with their peers and teachers and thus we see a decline in creative work from the student. Using AR and VR as a means of stimulating the students and to think beyond the limitation of the studio based classroom this paper will discuss the outcomes of a student project considering the virtual classroom and the techniques involved. The Atelier learning environment is especially suited to the Visual Communication model as it deals with the creative processing of ideas that needs to be shared in a collaborative manner. This has proven to have been a successful model over the years, in the traditional form of design education, but has more recently seen a shift in thinking as we move into a more digital model of learning and indeed away from the classical classroom structure. This study focuses on the outcomes of a student design project that employed Augmented Reality and Virtual Reality technologies in order to expand the dimensions of the classroom beyond its physical limits. Augmented Reality when integrated into the learning experience can improve the learning motivation and engagement of students. This paper will outline some of the processes used and the findings from the semester-long project that took place.

Keywords: augmented reality, blogging, design in community, enhanced learning and teaching, graphic design, new technologies, virtual reality, visual communications

Procedia PDF Downloads 231
1851 Tranexamic Acid in Orthopedic Surgery in Children

Authors: K. Amanzoui, A. Erragh, M. Elharit, A. Afif, K. Elfakhr, S. Kalouch, A. Chlilek

Abstract:

Orthopedic surgery is a provider of pre and postoperative bleeding; patients are exposed to several risks, and different measures are proposed to reduce bleeding during surgery, called the transfusion-sparing method, including tranexamic acid, which has shown its effectiveness in numerous studies. A prospective analytical study in 50 children was carried out in the orthopedic traumatology operating room of the EL HAROUCHI hospital of the CHU IBN ROCHD in Casablanca over a period of six months (April to October 2022). Two groups were randomized: one receiving tranexamic acid (Group A) and a non-receiving control group (Group B). The average age was 10.3 years, of which 58.8% were female. The first type of surgery was thoracolumbar scoliosis (52%). The average preoperative hemoglobin was 12.28 g/dl in group A, against 12.67 g/dl in the control group. There was no significant difference between the two groups (p=0.148). Mean intraoperative bleeding was 396.29 ml in group A versus 412 ml in the control group. No significant difference was observed for this parameter (p=0.632). The average hemoglobin level in the immediate postoperative period in our patients is 10.2 g/dl. In group A, it was 10.95 g/dl versus 10.93 g/dl in group B. At H24 postoperative, the mean hemoglobin value was 10.29 g/dl in group A against 9.5 g/dl in group B. For group A, the blood loss recorded during the first 24 hours was 209.43 ml, against 372 ml in group B, with a significant difference between the two groups (p=0.001). There is no statistically significant difference between the 2 groups in terms of the use of fillers, ephedrine or intraoperative transfusion. While for postoperative transfusion, we note the existence of a statistically significant difference between group A and group B. It is suggested that the use of tranexamic acid is an effective, simple, and low-cost way to limit postoperative blood loss and the need for transfusion.

Keywords: tranexamic acid, blood loss, orthopedic surgery, children

Procedia PDF Downloads 57
1850 Mitigating Acid Mine Drainage Pollution: A Case Study In the Witwatersrand Area of South Africa

Authors: Elkington Sibusiso Mnguni

Abstract:

In South Africa, mining has been a key economic sector since the discovery of gold in 1886 in the Witwatersrand region, where the city of Johannesburg is located. However, some mines have since been decommissioned, and the continuous pumping of acid mine drainage (AMD) also stopped causing the AMD to rise towards the ground surface. This posed a serious environmental risk to the groundwater resources and river systems in the region. This paper documents the development and extent of the environmental damage as well as the measures implemented by the government to alleviate such damage. The study will add to the body of knowledge on the subject of AMD treatment to prevent environmental degradation. The method used to gather and collate relevant data and information was the desktop study. The key findings include the social and environmental impact of the AMD, which include the pollution of water sources for domestic use leading to skin and other health problems and the loss of biodiversity in some areas. It was also found that the technical intervention of constructing a plant to pump and treat the AMD using the high-density sludge technology was the most effective short-term solution available while a long-term solution was being explored. Some successes and challenges experienced during the implementation of the project are also highlighted. The study will be a useful record of the current status of the AMD treatment interventions in the region.

Keywords: acid mine drainage, groundwater resources, pollution, river systems, technical intervention, high density sludge

Procedia PDF Downloads 175
1849 System-Wide Impact of Energy Efficiency in the Industry Sector: A Comparative Study between Canada and Denmark

Authors: M. Baldini, H. K. Jacobsen, M. Jaccard

Abstract:

In light of the international efforts to comply with the Paris agreement and emission targets for future energy systems, Denmark and Canada are among the front-runner countries dealing with climate change. The experiences in the energy sector have seen both countries coping with trade-offs between investments in renewable energy technologies and energy efficiency, thus tackling the climate issue from the supply and demand side respectively. On the demand side, the industrial sector is going through a remarkable transformation, with implementation of energy efficiency measures, change of input fuel for end-use processes and forecasted electrification as main features under the spotlight. By looking at Canada and Denmark's experiences as pathfinders on the demand and supply approach to climate change, it is possible to obtain valuable experience that may be applied to other countries aiming at the same goal. This paper presents a comparative study on industrial energy efficiency between Canada and Denmark. The study focuses on technologies and system options, policy design and implementation and modelling methodologies when implementing industrial energy savings in optimization models in comparison to simulation models. The study identifies gaps and junctures in the approach towards climate change actions and, learning from each other, lessen the differences to further foster the adoption of energy efficiency measurements in the industrial sector, aiming at reducing energy consumption and, consequently, CO₂ emissions.

Keywords: industrial energy efficiency, comparative study, CO₂ reduction, energy system modelling

Procedia PDF Downloads 156
1848 An Approach for Reliably Transforming Habits Towards Environmental Sustainability Behaviors Among Young Adults

Authors: Dike Felix Okechukwu

Abstract:

Studies and reports from authoritative sources such as the Intergovernmental Panel on Climate Change (IPCC) have stated that to effectively solve environmental sustainability challenges such as pollution, inappropriate waste disposal, and unsustainable consumption, there is a need for more research to seek solutions towards environmentally sustainable behavior. However, literature thus far reports only sporadic developments of TL in Environmental Sustainability because there are scarce reports showing the reliable process(es) to produce TL - for sustainability projects or otherwise. Nonetheless, a recently published article demonstrates how TL can be used to help young adults gain transformed mindsets and habits toward environmental sustainability behaviors and practices. This study, however, does not demonstrate, on a repeated basis, the dependability of the method or reliability of the procedures in using its proposed methodology to help young adults achieve transformed habits towards environmental sustainability behaviors, especially in diverse contexts. In this study, it is demonstrated, through repeated measures, a reliable process that can be used to achieve transformations in habits and mindsets toward environmental sustainability behaviors. To achieve this, the design adopted is multiple case studies and a thematic analysis techniques. Five cases in diverse contexts were used to analyze pieces of evidence of Transformative Learning Outcomes toward environmentally sustainable behaviors. Results from the study offer fresh perspectives on a reliable methodology that can be adopted to achieve Transformations in Habits and mindsets toward environmental sustainability behaviors.

Keywords: environmental sustainability, transformative learning, behaviour, learning, education

Procedia PDF Downloads 81
1847 Understanding the Nexus between Dengue and Climate Variability

Authors: Edilene Mercedes Mauer Machado, Carolina Hadassa Marques Karoly, Amanda Britz, Claudineia Brazil

Abstract:

The El Niño phenomenon, characterized by the anomalous warming of surface waters in the Equatorial Pacific Ocean, can influence weather patterns in various parts of the world, including the occurrence of extreme events such as droughts or heavy rainfall. Studies have suggested a relationship between El Niño and an increase in the incidence of dengue in certain areas. During El Niño periods, there can be changes in climatic conditions, such as increased temperatures and reduced rainfall in certain tropical and subtropical regions. These conditions can favor the reproduction of the Aedes aegypti mosquito, the vector for dengue transmission. Research aims to investigate how climate events like El Niño and La Niña can influence the incidence and transmission of dengue. The results have shown that, on average, there was a significant increase in dengue cases during La Niña years compared to years of climatic neutrality, contradicting the findings of Hopp et al. (2015). The study also highlighted that regions affected by El Niño exhibited greater variability in dengue incidence. However, it is important to emphasize that the effects of El Niño on dengue transmission can vary depending on the region and local factors, such as socioeconomic context and implemented control measures, as described by Johansson et al. (2009). Not all areas affected by El Niño will necessarily experience an increase in dengue incidence, and the interaction between climate and disease transmission is complex.

Keywords: anomalous warming, climatic patterns, dengue incidence, extreme events

Procedia PDF Downloads 85
1846 Bioethical Standards as a Tool for the Improvement of Human Relations Toward Health, Animals, and Plants: The Example of Three Croatian Mediterranean Local Communities

Authors: Toni Buterin, Robert Doričić

Abstract:

Mainstream bioethics, narrowed down mainly to human medicine and research, can hardly be expected to efficiently face modern challenges related to environmental issues. Departing from the interpretation of "European Bioethics" as a discipline considering ethical duties not only toward fellow humans, but to all living beings, this paper presents the results of a study conducted in three communities in Croatian Northern Adriatic region, selected for their recent experience of ecological threats (Labin – thermo-electric power plant; Bakar – cokery), or representing a highly-valuable and vulnerable natural insular pocket (Mali Lošinj – health tourism, dolphin wildlife refuge, fragrant gardens programme, etc.). After targeted workshops and interviews had been organised in those communities, the results of the obtained insights were combined with experts' opinion and a list of around hundred “bioethical standards” was formed. "Bioethical standards" represent a set of principles and measures of the correct attitude of people towards their own health, animals, plants, and the eco-system as a whole. "Bioethical standards" charter might improve the level of local community environmental consciousness, and provide direct guidance for its sustainable development (including its tourism-advertising ace card). The present paper discusses the standards' potential benefits and some implementational risks.

Keywords: bioethical standards, croatia, European bioethics, local communities

Procedia PDF Downloads 142
1845 The Latency-Amplitude Binomial of Waves Resulting from the Application of Evoked Potentials for the Diagnosis of Dyscalculia

Authors: Maria Isabel Garcia-Planas, Maria Victoria Garcia-Camba

Abstract:

Recent advances in cognitive neuroscience have allowed a step forward in perceiving the processes involved in learning from the point of view of the acquisition of new information or the modification of existing mental content. The evoked potentials technique reveals how basic brain processes interact to achieve adequate and flexible behaviours. The objective of this work, using evoked potentials, is to study if it is possible to distinguish if a patient suffers a specific type of learning disorder to decide the possible therapies to follow. The methodology used, is the analysis of the dynamics of different areas of the brain during a cognitive activity to find the relationships between the different areas analyzed in order to better understand the functioning of neural networks. Also, the latest advances in neuroscience have revealed the existence of different brain activity in the learning process that can be highlighted through the use of non-invasive, innocuous, low-cost and easy-access techniques such as, among others, the evoked potentials that can help to detect early possible neuro-developmental difficulties for their subsequent assessment and cure. From the study of the amplitudes and latencies of the evoked potentials, it is possible to detect brain alterations in the learning process specifically in dyscalculia, to achieve specific corrective measures for the application of personalized psycho pedagogical plans that allow obtaining an optimal integral development of the affected people.

Keywords: dyscalculia, neurodevelopment, evoked potentials, Learning disabilities, neural networks

Procedia PDF Downloads 123
1844 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 41
1843 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 197
1842 Impacts of Applying Automated Vehicle Location Systems to Public Bus Transport Management

Authors: Vani Chintapally

Abstract:

The expansion of modest and minimized Global Positioning System (GPS) beneficiaries has prompted most Automatic Vehicle Location (AVL) frameworks today depending solely on satellite-based finding frameworks, as GPS is the most stable usage of these. This paper shows the attributes of a proposed framework for following and dissecting open transport in a run of the mill medium-sized city and complexities the qualities of such a framework to those of broadly useful AVL frameworks. Particular properties of the courses broke down by the AVL framework utilized for the examination of open transport in our study incorporate cyclic vehicle courses, the requirement for particular execution reports, and so forth. This paper particularly manages vehicle movement forecasts and the estimation of station landing time, combined with consequently produced reports on timetable conformance and other execution measures. Another side of the watched issue is proficient exchange of information from the vehicles to the control focus. The pervasiveness of GSM bundle information exchange advancements combined with decreased information exchange expenses have brought on today's AVL frameworks to depend predominantly on parcel information exchange administrations from portable administrators as the correspondences channel in the middle of vehicles and the control focus. This methodology brings numerous security issues up in this conceivably touchy application field.

Keywords: automatic vehicle location (AVL), expectation of landing times, AVL security, data administrations, wise transport frameworks (ITS), guide coordinating

Procedia PDF Downloads 366
1841 Risk Assessments of Longest Dry Spells Phenomenon in Northern Tunisia

Authors: Majid Mathlouthi, Fethi Lebdi

Abstract:

Throughout the world, the extent and magnitude of droughts have economic, social and environmental consequences. Today climate change has become more and more felt; most likely they increase the frequency and duration of droughts. An analysis by event of dry event, from series of observations of the daily rainfall is carried out. A daily precipitation threshold value has been set. A catchment localized in Northern Tunisia where the average rainfall is about 600 mm has been studied. Rainfall events are defined as an uninterrupted series of rainfall days understanding at least a day having received a precipitation superior or equal to a fixed threshold. The dry events are constituted of a series of dry days framed by two successive rainfall events. A rainfall event is a vector of coordinates the duration, the rainfall depth per event and the duration of the dry event. The depth and duration are found to be correlated. So we use conditional probabilities to analyse the depth per event. The negative binomial distribution fits well the dry event. The duration of the rainfall event follows a geometric distribution. The length of the climatically cycle adjusts to the Incomplete Gamma. Results of this analysis was used to study of the effects of climate change on water resources and crops and to calibrate precipitation models with little rainfall records. In response to long droughts in the basin, the drought management system is based on three phases during each of the three phases; different measurements are applied and executed. The first is before drought, preparedness and early warning; the second is drought management, mitigation in the event of drought; and the last subsequent drought, when the drought is over.

Keywords: dry spell, precipitation threshold, climate vulnerability, adaptation measures

Procedia PDF Downloads 76
1840 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 537
1839 Analysis of a Discrete-time Geo/G/1 Queue Integrated with (s, Q) Inventory Policy at a Service Facility

Authors: Akash Verma, Sujit Kumar Samanta

Abstract:

This study examines a discrete-time Geo/G/1 queueing-inventory system attached with (s, Q) inventory policy. Assume that the customers follow the Bernoulli process on arrival. Each customer demands a single item with arbitrarily distributed service time. The inventory is replenished by an outside supplier, and the lead time for the replenishment is determined by a geometric distribution. There is a single server and infinite waiting space in this facility. Demands must wait in the specified waiting area during a stock-out period. The customers are served on a first-come-first-served basis. With the help of the embedded Markov chain technique, we determine the joint probability distributions of the number of customers in the system and the number of items in stock at the post-departure epoch using the Matrix Analytic approach. We relate the system length distribution at post-departure and outside observer's epochs to determine the joint probability distribution at the outside observer's epoch. We use probability distributions at random epochs to determine the waiting time distribution. We obtain the performance measures to construct the cost function. The optimum values of the order quantity and reordering point are found numerically for the variety of model parameters.

Keywords: discrete-time queueing inventory model, matrix analytic method, waiting-time analysis, cost optimization

Procedia PDF Downloads 20
1838 The Link of the Human Immunodeficiency Virus With the Progression of Multiple Sclerosis Disease

Authors: Sina Mahdavi

Abstract:

Multiple sclerosis (MS) is a progressive inflammatory autoimmune disease of the CNS that affects the myelination process in the central nervous system (CNS). Complex interactions of various "environmental or infectious" factors may act as triggers in autoimmunity and disease progression. The association between viral infections, especially human immunodeficiency virus (HIV) and MS is one potential cause that is not well understood. This study aims to summarize the available data on human HIV infection in MS disease progression. In this study, the keywords "Multiple sclerosis", "Human immunodeficiency virus ", and "Central nervous system" in the databases PubMed, and Google Scholar between 2017 and 2022 were searched and 15 articles were chosen, studied, and analyzed. Revealed histologic signs of "MS-like illness" in the setting of HIV, which comprised widespread demyelination with reactive astrocytes, foamy macrophages, and perivascular infiltration with inflammatory cells, all of which are compatible with MS lesions. Human immunodeficiency virus causes dysfunction of the immune system, especially characterized by hypergammaglobulinemia and chronic activation of B cells. Activation of B cells leads to increased synthesis of immunoglobulin and finally to an excess of free light chains. Free light chains may be involved in autoimmune responses against neurons. There is a high expression of HIV during the course of MS, which indicates the relationship between HIV and MS, that this virus can play a role in the development of MS by creating an inflammatory state. Therefore, measures to modulate the expression of HIV may be effective in reducing inflammatory processes in demyelinated areas of MS patients.

Keywords: multiple sclerosis, human immunodeficiency virus, central nervous system, autoimmunity

Procedia PDF Downloads 70
1837 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 204