Search results for: gender specific data
29134 Site Investigations and Mitigation Measures of Landslides in Sainj and Tirthan Valley of Kullu District, Himachal Pradesh, India
Authors: Laxmi Versain, R. S. Banshtu
Abstract:
Landslides are found to be the most commonly occurring geological hazards in the mountainous regions of the Himalaya. This mountainous zone is facing large number of seismic turbulences, climatic changes, and topography changes due to increasing urbanization. That eventually has lead several researchers working for best suitable methodologies to infer the ultimate results. Landslide Hazard Zonation has widely come as suitable method to know the appropriate factors that trigger the lansdslide phenomenon on higher reaches. Most vulnerable zones or zones of weaknesses are indentified and safe mitigation measures are to be suggested to mitigate and channelize the study of an effected area. Use of Landslide Hazard Zonation methodology in relative zones of weaknesses depend upon the data available for the particular site. The causative factors are identified and data is made available to infer the results. Factors like seismicity in mountainous region have closely associated to make the zones of thrust and faults or lineaments more vulnerable. Data related to soil, terrain, rainfall, geology, slope, nature of terrain, are found to be varied for various landforms and areas. Thus, the relative causes are to be identified and classified by giving specific weightage to each parameter. Factors which cause the instability of slopes are several and can be grouped to infer the potential modes of failure. The triggering factors of the landslides on the mountains are not uniform. The urbanization has crawled like ladder and emergence of concrete jungles are in a very fast pace on hilly region of Himalayas. The local terrains has largely been modified and hence instability of several zones are triggering at very fast pace. More strategic and pronounced methods are required to reduce the effect of landslide.Keywords: zonation, LHZ, susceptible, weightages, methodology
Procedia PDF Downloads 19729133 Fragility Fractures of the Pelvis: Application of an Imaging-Based Classification System and Assessment of Patient Outcome
Authors: Blake Milton, Georgette Goode, Elias Sachawars, Virgil Chan, Jason Dizon, Christopher Oldmeadow, Garbor Major
Abstract:
Fragility fractures of the pelvis (FFP) are a common and increasing fracture type in our ageing population. A novel grading classification system developed for FFP by Rommens and Hofmann attributes a severity score related to degree of pelvic ring involvement, which is assessed on CT imaging. The purpose of this study is to assess the relationship between radiologist-assigned FFP grading and patient mortality in conservatively managed patients. This retrospective review identified consecutive 100 patients aged ≥ 65 years at time of FFP. The Rommens-Hofmann severity grading was allocated to these injuries by 2 radiology trainees and a consultant radiologist. Five-year survival was determined from review of patient medical records. Patient medical records were also analysed to account for possible confounding factors including age, gender, comorbidities (Charlson score) and relative socio-economic disadvantage (SEIFA decile). Suitable FFP’s (n = 99) were classified by increasing severity by increasing severity grades: Type I (43% (n = 43)), Type II (33% (n = 33)), Type III (13% (n = 13)), Type IV (10% (n = 10)). No significant differences in survival were found between fracture groups, which persisted when also adjusting for age, gender, Charslon score or SEIFA decile. There was a lack of evidence to suggest a relationship between CT-based fracture grading and patient survival, even when accounting for the listed possible confounding factors. This may be due to small sample size or possible study biases, or possible heterogeneity within the population not adequately captured with available metrics. Given that no difference in mortality has been identified between FFP grades in conservatively managed patients, further research is important to assess mortality benefit in an operative patient population.Keywords: fragility fractures, fracture classification, pelvic CT, pelvic fracture, pelvic ring fracture
Procedia PDF Downloads 629132 In-situ Acoustic Emission Analysis of a Polymer Electrolyte Membrane Water Electrolyser
Authors: M. Maier, I. Dedigama, J. Majasan, Y. Wu, Q. Meyer, L. Castanheira, G. Hinds, P. R. Shearing, D. J. L. Brett
Abstract:
Increasing the efficiency of electrolyser technology is commonly seen as one of the main challenges on the way to the Hydrogen Economy. There is a significant lack of understanding of the different states of operation of polymer electrolyte membrane water electrolysers (PEMWE) and how these influence the overall efficiency. This in particular means the two-phase flow through the membrane, gas diffusion layers (GDL) and flow channels. In order to increase the efficiency of PEMWE and facilitate their spread as commercial hydrogen production technology, new analytic approaches have to be found. Acoustic emission (AE) offers the possibility to analyse the processes within a PEMWE in a non-destructive, fast and cheap in-situ way. This work describes the generation and analysis of AE data coming from a PEM water electrolyser, for, to the best of our knowledge, the first time in literature. Different experiments are carried out. Each experiment is designed so that only specific physical processes occur and AE solely related to one process can be measured. Therefore, a range of experimental conditions is used to induce different flow regimes within flow channels and GDL. The resulting AE data is first separated into different events, which are defined by exceeding the noise threshold. Each acoustic event consists of a number of consequent peaks and ends when the wave diminishes under the noise threshold. For all these acoustic events the following key attributes are extracted: maximum peak amplitude, duration, number of peaks, peaks before the maximum, average intensity of a peak and time till the maximum is reached. Each event is then expressed as a vector containing the normalized values for all criteria. Principal Component Analysis is performed on the resulting data, which orders the criteria by the eigenvalues of their covariance matrix. This can be used as an easy way of determining which criteria convey the most information on the acoustic data. In the following, the data is ordered in the two- or three-dimensional space formed by the most relevant criteria axes. By finding spaces in the two- or three-dimensional space only occupied by acoustic events originating from one of the three experiments it is possible to relate physical processes to certain acoustic patterns. Due to the complex nature of the AE data modern machine learning techniques are needed to recognize these patterns in-situ. Using the AE data produced before allows to train a self-learning algorithm and develop an analytical tool to diagnose different operational states in a PEMWE. Combining this technique with the measurement of polarization curves and electrochemical impedance spectroscopy allows for in-situ optimization and recognition of suboptimal states of operation.Keywords: acoustic emission, gas diffusion layers, in-situ diagnosis, PEM water electrolyser
Procedia PDF Downloads 15729131 The Portrayal of Violence Against Women in Bangladesh News Media: Seeing It Through Rumana Manzur’s Case
Authors: Zerrin Akter Anni
Abstract:
The media's role in shaping perceptions of violence against women (VAW) and their portrayal in news reporting significantly influences our understanding of this critical issue. My research delves into the portrayal of violence against women in mainstream media, using the prominent case of Dr. Rumana Manzur, a former UBC Fulbright Scholar from Bangladesh who suffered a brutal assault by her ex-husband in June 2011. Employing a qualitative research approach, this study uses an ethnographic media analysis method to scrutinize news reports of the aforementioned case from selected newspapers in Bangladesh. The primary objectives are to investigate how the popular news media in Bangladesh addresses the issue of violence against women and frames the victims of such violence. The findings of this research highlight that news media can perpetuate gender stereotypes and subtly shift blame onto the victim through various techniques, creating intricate interactions between the reader and the text. These techniques include sensationalized headlines, textual content, and graphic images. This victim-blaming process not only retraumatizes the survivor but also distorts the actual facts when presenting the case to a larger audience. Consequently, the representation of violence against women cases in media, particularly the portrayal of women as victims during reporting, significantly impacts our collective comprehension of this issue. In conclusion, this paper asserts that the Bangladeshi media, particularly news outlets, in conjunction with society, continue to follow a pattern of depicting gender-based violence in ways that devalue the image of women. This research underscores the need for critical analysis of media representations of violence against women cases, as they can perpetuate harmful stereotypes and hinder efforts to combat this pervasive problem. Therefore, the outcome of this research is to comprehend the complex dynamics between media and violence against women, which is essential for fostering a more empathetic and informed society that actively works towards eradicating this problem from our society.Keywords: media representation, violence against women (vaw), ethnographic media analysis, victim-blaming, sensationalized headline
Procedia PDF Downloads 7529130 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 2029129 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads
Authors: Dražen Cvitanić, Biljana Maljković
Abstract:
This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency
Procedia PDF Downloads 45229128 Association of Neck Circumference as an Indicator of Upper Body Obesity with Cardio-Metabolic Risk Factors among First Degree Relatives of Diabetes Patients
Authors: Hadi Abdollahi, Bijan Iraj, Maryam Mirpourian, Behzad Shariatifar
Abstract:
Background: The aim of the present study was to determine the relationship between neck circumferences (NC), as an indicator of upper body obesity, with anthropometric and cardio-metabolic factors among the first degree relatives of diabetes patients. Materials and Methods: This cross-sectional study was performed on first degree relatives of diabetes patients (n = 213). Weight, height, waist circumference (WC), hip circumference (HC), systolic blood pressure (SBP), diastolic blood pressure (DBP) and NC were measured. Laboratory data included oral glucose tolerance test (OGTT) results, high density lipoprotein (HDL), low density lipoprotein, triglyceride (TG) and total cholesterol. Results: There was no difference in NC among different results of OGTT in men or women. Factors including weight, body mass index (BMI), WC and HC were strongly associated with NC in both genders (r = 0.420-0.711). NC was weakly associated with SBP in women (r = 0.195) and moderately with DBP in men (r = 0.314). Regarding lipid profile, HDL and TG were associated with NC only in women (r = −0.268-0.325). Conclusions: NC has a significant correlation with gender and anthropometric variables, including BMI, weight and waist and HCs in both men and women, but it does not differ significantly in patients with different status in OGTT.Keywords: body mass index, cardiovascular, diabetes, neck circumference, obesity
Procedia PDF Downloads 7529127 Factors Influencing the Uptake of Vaccinations amongst Pregnant Women Following the COVID-19 Pandemic
Authors: Jo Parsons, Cath Grimley, Debra Bick, Sarah Hillman, Louise Clarke, Helen Atherton
Abstract:
The problem: Vaccinations are routinely offered to pregnant women in the UK for influenza (flu), pertussis (whooping cough), and COVID-19, yet the uptake of these vaccinations in pregnancy remains low. Pregnant women are at increased risk of hospitalisation, morbidity, and mortality from these preventable illnesses, which can also expose their unborn babies to an increased risk of serious complications, including in utero death. This research aims to explore how pregnant women feel about vaccinations offered during pregnancy (flu, whooping cough, and COVID-19), particularly following the COVID-19 pandemic. It also aims to examine factors influencing women’s decisions about vaccinations during pregnancy and how they feel about their health and vulnerabilities to illness arising from the COVID-19 pandemic. The approach: This is a qualitative study involving semi-structured interviews with pregnant women and midwives in the UK. Interviews with pregnant women explored their views since the COVID-19 pandemic about vaccinations offered during pregnancy and whether the pandemic has influenced perceptions of vulnerability to illness in pregnant women. Interviews with midwives explored vaccination discussions they routinely have with pregnant women and identified some of the barriers to vaccination that pregnant women discuss with them. Pregnant women were recruited via participating hospitals and community groups. Midwives were recruited via participating hospitals and midwife-specific social media groups. All interviews were conducted remotely (using telephone or Microsoft Teams) and analysed using thematic analysis. Findings: 43 pregnant women and 16 midwives were recruited and interviewed. The findings presented will focus on data from pregnant women. Pregnant women reported a wide range of views and vaccination behaviour, and identified several factors influencing their decision whether to accept vaccinations or not. These included internal factors (comprised of beliefs about susceptibility to illness, perceptions of immunity, fear, and feelings of responsibility), other influences (including visibility of illness and external influences such as healthcare professional recommendations), vaccination-related factors (comprised of beliefs about effectiveness and safety of vaccinations, availability and accessibility of vaccinations and preferences for alternative forms of protection to vaccination) and COVID-19 specific factors (including COVID-19 vaccinations and COVID-19 specific influences). Implications: Findings identified some of the factors that affect pregnant women’s decisions when deciding to have a vaccination or not and how these decisions have been influenced by COVID-19. Findings highlight areas where healthcare professional advice needs to focus, such as the provision of information about the increased vulnerability to illnesses during pregnancy and consideration of opportunistic vaccination at hospital appointments to maximise uptake of vaccinations during pregnancy. Findings of this study will inform the development of an intervention to increase vaccination uptake amongst pregnant women.Keywords: vaccination, pregnancy, qualitative, interviews, COVID-19
Procedia PDF Downloads 10029126 Survey of Communication Technologies for IoT Deployments in Developing Regions
Authors: Namugenyi Ephrance Eunice, Julianne Sansa Otim, Marco Zennaro, Stephen D. Wolthusen
Abstract:
The Internet of Things (IoT) is a network of connected data processing devices, mechanical and digital machinery, items, animals, or people that may send data across a network without requiring human-to-human or human-to-computer interaction. Each component has sensors that can pick up on specific phenomena, as well as processing software and other technologies that can link to and communicate with other systems and/or devices over the Internet or other communication networks and exchange data with them. IoT is increasingly being used in fields other than consumer electronics, such as public safety, emergency response, industrial automation, autonomous vehicles, the Internet of Medical Things (IoMT), and general environmental monitoring. Consumer-based IoT applications, like smart home gadgets and wearables, are also becoming more prevalent. This paper presents the main IoT deployment areas for environmental monitoring in developing regions and the backhaul options suitable for them. A detailed review of each of the list of papers selected for the study is included in section III of this document. The study includes an overview of existing IoT deployments, the underlying communication architectures, protocols, and technologies that support them. This overview shows that Low Power Wireless Area Networks (LPWANs), as summarized in Table 1, are very well suited for monitoring environment architectures designed for remote locations. LoRa technology, particularly the LoRaWAN protocol, has an advantage over other technologies due to its low power consumption, adaptability, and suitable communication range. The prevailing challenges of the different architectures are discussed and summarized in Table 3 of the IV section, where the main problem is the obstruction of communication paths by buildings, trees, hills, etc.Keywords: communication technologies, environmental monitoring, Internet of Things, IoT deployment challenges
Procedia PDF Downloads 8729125 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data
Authors: S. Nickolas, Shobha K.
Abstract:
The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing
Procedia PDF Downloads 27629124 The Redundant Kana: A Pragmatic Reading
Authors: Manal Mohammed Hisham Said Najjar
Abstract:
The Arab Grammarians shed light on the redundant kana (was) and gave it a considerable attention. However, their considerations and interpretations pertaining to using this verb varied: is it used to determine tense? Or used for further emphasis or for another function? Does it have a syntactic function? Morphologically, could it be used in other forms than the past? In addition, Arab Grammarians discussed the possibility of using kana to locate itself in between the syntactic constructs of a sentence, a phrase, or a collocation. Others questioned its position whether it is in initial or final. This study found out that the redundant kana (was) is cited in Quran and was used by the Arabs in their speech and poetry. This redundant kana, whether used in initial position or in a final position, or in between the constructs of a sentence, a phrase, or a collocation, implies pragmatic meanings intended by the speaker or the poet to serve different functions, such as to indicate the past tense, to provide emphasis, and to refer to the continuity of the effect and meaning of a verb or adjective. The study concludes that this verb kana can be utilized in different contexts to achieve a specific effect as did the old Arabs who used it to add specific shades of meanings. Kana as a redundant word could be added to further highlight the meaning aimed at in a specific utterance. In addition, this verb can be used in both the past and the present morphological form; and its availability in an utterance could be functional and could not be. In other words, the study found out that the redundant kana can be used in various positions in an utterance, initial, final, or in between a syntactic structure, provided that this use is pragmatically functional. In conclusion, this paper seeks to invite the scholars of the Arabic language to coin a new term which is the “pragmatic kana” to replace the term “kana alzae’da (redundant kana)” which might mean that its use is redundant and void of significance – a fact that is illogical due to its recurrent use in the Holy Quran. NOTE: Please take this study not the other one (sent by mistake) and titled kana alnaqisaKeywords: redundan, kana, grammarians, quran
Procedia PDF Downloads 13429123 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast
Authors: Ruixia Liu
Abstract:
Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI
Procedia PDF Downloads 23529122 Introducing, Testing, and Evaluating a Unified JavaScript Framework for Professional Online Studies
Authors: Caspar Goeke, Holger Finger, Dorena Diekamp, Peter König
Abstract:
Online-based research has recently gained increasing attention from various fields of research in the cognitive sciences. Technological advances in the form of online crowdsourcing (Amazon Mechanical Turk), open data repositories (Open Science Framework), and online analysis (Ipython notebook) offer rich possibilities to improve, validate, and speed up research. However, until today there is no cross-platform integration of these subsystems. Furthermore, implementation of online studies still suffers from the complex implementation (server infrastructure, database programming, security considerations etc.). Here we propose and test a new JavaScript framework that enables researchers to conduct any kind of behavioral research in the browser without the need to program a single line of code. In particular our framework offers the possibility to manipulate and combine the experimental stimuli via a graphical editor, directly in the browser. Moreover, we included an action-event system that can be used to handle user interactions, interactively change stimuli properties or store participants’ responses. Besides traditional recordings such as reaction time, mouse and keyboard presses, the tool offers webcam based eye and face-tracking. On top of these features our framework also takes care about the participant recruitment, via crowdsourcing platforms such as Amazon Mechanical Turk. Furthermore, the build in functionality of google translate will ensure automatic text translations of the experimental content. Thereby, thousands of participants from different cultures and nationalities can be recruited literally within hours. Finally, the recorded data can be visualized and cleaned online, and then exported into the desired formats (csv, xls, sav, mat) for statistical analysis. Alternatively, the data can also be analyzed online within our framework using the integrated Ipython notebook. The framework was designed such that studies can be used interchangeably between researchers. This will support not only the idea of open data repositories but also constitutes the possibility to share and reuse the experimental designs and analyses such that the validity of the paradigms will be improved. Particularly, sharing and integrating the experimental designs and analysis will lead to an increased consistency of experimental paradigms. To demonstrate the functionality of the framework we present the results of a pilot study in the field of spatial navigation that was conducted using the framework. Specifically, we recruited over 2000 subjects with various cultural backgrounds and consequently analyzed performance difference in dependence on the factors culture, gender and age. Overall, our results demonstrate a strong influence of cultural factors in spatial cognition. Such an influence has not yet been reported before and would not have been possible to show without the massive amount of data collected via our framework. In fact, these findings shed new lights on cultural differences in spatial navigation. As a consequence we conclude that our new framework constitutes a wide range of advantages for online research and a methodological innovation, by which new insights can be revealed on the basis of massive data collection.Keywords: cultural differences, crowdsourcing, JavaScript framework, methodological innovation, online data collection, online study, spatial cognition
Procedia PDF Downloads 26029121 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 15729120 Representation and Agency in the Life Writings of Taiwanese Disabled Women
Authors: Su-Lin Yu
Abstract:
In recent years, we have witnessed the growing scholarship on transnational theorizing and activism within disability. In particular, the universalizing discourses of disability formulated in the Global North seem inadequate in engaging the vast diversity of discourses of disability that emerge in global and local policies as well as the everyday experiences of disabled people in the Global South. This study will further consider the future possibilities of how Taiwanese and global disability studies might interchange disability knowledge. First, this study will determine how a local literature of disability can be formed in Taiwan by examining life writings written by Taiwanese disabled women. Both the texts and the personal experiences are treated as social products which can, through their discourses, offer insight into the socio-cultural practices and norms of disability and womanhood in Taiwan. This paper argues that more than by the impairment in itself, the experiences of disabled women are shaped by the social and cultural discourses and practices that define disability and womanhood as well as the normative roles, places, and contexts associated with them. Simultaneous analysis of disability and womanhood exemplifies the way in which disability operates in a complex interaction with the socio-cultural discourses and practices of womanhood, thus producing gender-differentiated disabling obstacles for disabled women. Another purpose of this study is to gain an understanding of the transformative experience of women with disabilities and their perceptions of the self. Designed to provide positive, realistic pictures of the lives of women with disabilities and the social, economic, and political issues they face, their life writings demonstrate how they as disabled women simultaneously struggle with writing a new identity and creating an ethical narrative. These strong and articulate women construct narratives that attempt to recount the remarkable journey that transformed them from dependent women to community activists and writers who speak forcefully about the needs of people with disabilities. More than a story of one woman's struggle for independence, their writing, then, is a testimony to the importance of community building and organizing to enable local people with disabilities to live fulfilling lives.Keywords: gender, disability, representation, agency
Procedia PDF Downloads 30429119 Reproducibility of Dopamine Transporter Density Measured with I-123-N-ω-Fluoropropyl-2β-Carbomethoxy-3β-(4-Iodophenyl)Nortropane SPECT in Phantom Studies and Parkinson’s Disease Patients
Authors: Yasuyuki Takahashi, Genta Hoshi, Kyoko Saito
Abstract:
Objectives: The objective of this study was to evaluate the reproducibility of I-123-N-ω-fluoropropyl-2β-carbomethoxy-3β-(4- iodophenyl) nortropane (I-123 FP-CIT) SPECT by using specific binding ratio (SBR) in phantom studies and Parkinson’s Disease (PD) patients. Methods: We made striatum phantom originally and confirmed reproducibility. The phantom studies changed head position and accumulation of FP-CIT, each. And image processing confirms influence on SBR by 30 cases. 30 PD received a SPECT for 3 hours post injection of I-123 FP-CIT 167MBq. Results: SBR decreased in rotatory direction by the patient position by the phantom studies. And, SBR improved the influence after the attenuation and the scatter correction in the cases (y=0.99x+0.57 r2=0.83). However, Stage II recognized dispersion in SBR by low accumulation. Conclusion: Than the phantom studies that assumed the normal cases, the SPECT image after the attenuation and scatter correction had better reproducibility.Keywords: 123I-FP-CIT, specific binding ratio, Parkinson’s disease
Procedia PDF Downloads 43029118 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies
Authors: Sook Ching Yee, Angela Siew Hoong Lee
Abstract:
Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)
Procedia PDF Downloads 36329117 Group Boundaries against and Due to Identity Threat
Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas
Abstract:
Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.Keywords: group boundaries, identity threat, prejudice, superordinate groups
Procedia PDF Downloads 41129116 Big Data Analysis with Rhipe
Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim
Abstract:
Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe
Procedia PDF Downloads 49829115 Beyond Text: Unveiling the Emotional Landscape in Academic Writing
Authors: Songyun Chen
Abstract:
Recent scholarly attention to sentiment analysis has provided researchers with a deeper understanding of how emotions are conveyed in writing and leveraged by academic authors as a persuasive tool. Using the National Research Council (NRC) Sentiment Lexicons (version 1.0) created by the National Research Council Canada, this study examined specific emotions in research articles (RAs) across four disciplines, including literature, education, biology, and computer & information science based on four datasets totaling over three million tokens, aiming to reveal how the emotions are conveyed by authors in academic writing. The results showed that four emotions—trust, anticipation, joy, and surprise—were observed in all four disciplines, while sadness emotion was spotted solely in literature. With the emotion of trust being overwhelmingly prominent, the rest emotions varied significantly across disciplines. The findings contribute to our understanding of emotion strategy applied in academic writing and genre characteristics of RAs.Keywords: sentiment analysis, specific emotions, emotional landscape, research articles, academic writing
Procedia PDF Downloads 3129114 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 14529113 A Numerical and Experimental Analysis of the Performance of a Combined Solar Unit for Air Conditioning and Water Desalination
Authors: Zied Guidara, Alexander Morgenstern, Aref Younes Maalej
Abstract:
In this paper, a desiccant solar unit for air conditioning and desalination is presented first. Secondly, a dynamic modelling study of the desiccant wheel is developed. After that, a simulation study and an experimental investigation of the behaviour of desiccant wheel are developed. The experimental investigation is done in the chamber of commerce in Freiburg-Germany. Indeed, the variations of calculated and measured temperatures and specific humidity of dehumidified and rejected air are presented where a good agreement is found when comparing the model predictions with experimental data under the considered range of operating conditions. Finally, the study of the compartments of desalination and water condensation shows that the unit can produce an acceptable quantity of water at the same time of the air conditioning operation.Keywords: air conditioning, desalination, condensation, design, desiccant wheel
Procedia PDF Downloads 50429112 The Effect of Calcining Temperature on Photocatalytic Activity of Porous ZnO Architecture
Authors: M. Masar, P. Janota, J. Sedlak, M. Machovsky, I. Kuritka
Abstract:
Zinc oxide (ZnO) nano crystals assembled porous architecture was prepared by thermal decomposition of zinc oxalate precursor at various temperatures ranging from 400-900°C. The effect of calcining temperature on structure and morphology was examined by scanning electron microscopy (SEM), X-ray diffractometry, thermogravimetry, and BET adsorption analysis. The porous nano crystalline ZnO morphology was developed due to the release of volatile precursor products, while the overall shape of ZnO micro crystals was retained as a legacy of the precursor. The average crystallite size increased with increasing temperature of calcination from approximately 21 nm to 79 nm, while the specific surface area decreased from 30 to 1.7 m2g-1. The photo catalytic performance of prepared ZnO powders was evaluated by degradation of methyl violet 2B, a model compound. The significantly highest photo catalytic activity was achieved with powder calcined at 500°C. This may be attributed to the sufficiently well-developed crystalline arrangement, while the specific surface area is still high enough.Keywords: ZnO, porous structure, photodegradation, methyl violet
Procedia PDF Downloads 40929111 Kauffman Model on a Network of Containers
Authors: Johannes J. Schneider, Mathias S. Weyland, Peter Eggenberger Hotz, William D. Jamieson, Oliver Castell, Alessia Faggian, Rudolf M. Füchslin
Abstract:
In the description of the origin of life, there are still some open gaps, e.g., the formation of macromolecules cannot be fully explained so far. The Kauffman model proposes the existence of autocatalytic sets of macromolecules which mutually catalyze reactions leading to each other’s formation. Usually, this model is simulated in one well-stirred pot only, with a continuous inflow of small building blocks, from which larger molecules are created by a set of catalyzed ligation and cleavage reactions. This approach represents the picture of the primordial soup. However, the conditions on the early Earth must have differed geographically, leading to spatially different outcomes whether a specific reaction could be performed or not. Guided by this picture, the Kauffman model is simulated in a large number of containers in parallel, with neighboring containers being connected by diffusion. In each container, only a subset of the overall reaction set can be performed. Under specific conditions, this approach leads to a larger probability for the existence of an autocatalytic metabolism than in the original Kauffman model.Keywords: agglomeration, autocatalytic set, differential equation, Kauffman model
Procedia PDF Downloads 6029110 Survival Data with Incomplete Missing Categorical Covariates
Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar
Abstract:
The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution
Procedia PDF Downloads 40729109 College Readiness Outcomes of No Child Left Behind: A Critical Analysis
Authors: Tianyu Chen
Abstract:
The No Child Left Behind Act (NCLB) of 2001 was a major federal education policy that aimed to improve academic outcomes for all students in the United States. This study examines whether NCLB improved college readiness, measured by access to higher education, for different demographic groups. Using data from the Integrated Public Use Microdata Series (IPUMS) from 2003-2008, regression analyses explore the relationship between gender, race, family income, and region with occupational education score. The results indicate that NCLB implementation had a positive effect on college access for women and Asian students compared to other groups. Higher family income was also associated with an increased likelihood of pursuing higher education, especially for families in the South. While NCLB intended to close achievement gaps, disparities in college readiness remained five years after implementation. Further research could examine longer-term trends and additional factors influencing the policy's effectiveness across student subgroups. This study provides evidence that simply holding schools accountable for test scores may not sufficiently improve equitable educational outcomes. More targeted support of disadvantaged groups may be needed to fulfill the goal of "no child left behind."Keywords: no child left behind act, college readiness, achievement gaps, educational equity
Procedia PDF Downloads 5829108 Breakfast Skipping and Health Status Among University Professionals in Bangladesh
Authors: Shatabdi Goon
Abstract:
OBJECTIVE: To determine the prevalence and associations between breakfast skipping and health status for university professionals in Bangladesh. DESIGN: A cross-sectional descriptive study design was performed using information on respondent’s sociodemographic status and eating behavior. Factors associated with breakfast skipping were identified using multivariate regression models. SETTINGS: Data obtained from a representative sample (n 120) of university professionals randomly selected from two distinct universities in Dhaka city, Bangladesh. SUBJECT: A total number of one hundred and twenty university professionals with a mean age of 29 years. RESULT: Results indicated that approximately 35.8% of the sample skipped breakfast. Gender was the only statistically significant sociodemographic variable, with females skipping at over two times the rate of males (OR 95% CI: 1.9; 0.90-4.13). The reasons given for skipping breakfast were almost exclusively habit (39.5%), work pressure (23.2%) and lack of time (16.2%). Skippers were significantly more likely to be obese (OR 2.4; 95% CI 1.02- 5.7), less energetic (OR 3.5; 95% CI 1.5-8.6), associated with health problems (OR 4.3; 95% CI 1.8- 10.17) and eating tendency of fast food (OR 2.5; 95% CI 1.13 - 5.5). Gastric and heart burn (X2=4.19, p<0.05) and high blood pressure (X2=5.027, p<0.05) were detected among 34.9% and 27.9 % of those employees respectively identified as breakfast skippers and they showed significantly high prevalence. CONCLUSION: Breakfast skipping is highly prevalent among university professionals with significant association of different health problems in Bangladesh. Health promotion strategies should be used to encourage all adults to eat breakfast regularly.Keywords: breakfast, healthy lifestyle, breakfast skipping, health status, university professionals
Procedia PDF Downloads 34729107 A Study of Blockchain Oracles
Authors: Abdeljalil Beniiche
Abstract:
The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.Keywords: blockchain, oracles, oracles design, human oracles
Procedia PDF Downloads 13829106 Investigation of Specific Wear Rate of Austenitic and Duplex Stainless Steel Alloys in High Temperatures
Authors: Dler Abdullah Ahmed, Zozan Ahmed Mohammed
Abstract:
Wear as an unavoidable phenomenon in stainless steel contact sliding parts is investigated In this work. Two grades of austenitic AISI 304, and S31254, as well as duplexes of S32205, and AISI 2507, were chosen to compare their wear behavior in temperatures ranging from room temperature to 550°C. The experimental results show that AISI 304 austenitic and AISI 2205 duplex stainless steel had lower wear resistance compared with S31254 and AISI 2507 in various temperatures. When the temperature rose to 140°C, and the wear rate of all grades increased, AISI 304 had the highest at 7.028x10-4 mm3/Nm, and AISI 2507 had the lowest at 4.9033 x 10-4 mm3/Nm. At 300°C, the oxides began to form on the worn surfaces, causing the wear rate to slow. As a result, when temperatures exceeded 300°C, the specific wear rate decreased significantly in all specimens. According to the XRD patterns, the main types of oxides formed on worn surfaces were magnetite, hematite, and chromite.Keywords: wear, stainless steel, temperature, groove, oxide
Procedia PDF Downloads 7729105 Investigation of Specific Wear Rate of Austenitic and Duplex Stainless Steel Alloys in High Temperatures
Authors: Dler Abdullah Ahmed, Zozan Ahmed Mohammed
Abstract:
Wear as an unavoidable phenomenon in stainless steel contact sliding parts is investigated In this work. Two grades of austenitic AISI 304, and S31254, as well as duplexes of S32205, and AISI 2507, were chosen to compare their wear behavior in temperatures ranging from room temperature to 550°C. The experimental results show that AISI 304 austenitic and AISI 2205 duplex stainless steel had lower wear resistance compared with S31254 and AISI 2507 in various temperatures. When the temperature rose to 140°C, and the wear rate of all grades increased, AISI 304 had the highest at 7.028x10-4 mm3/Nm, and AISI 2507 had the lowest at 4.9033 x 10-4 mm3/Nm. At 300°C, the oxides began to form on the worn surfaces, causing the wear rate to slow. As a result, when temperatures exceeded 300°C, the specific wear rate decreased significantly in all specimens. According to the XRD patterns, the main types of oxides formed on worn surfaces were magnetite, hematite, and chromite.Keywords: wear, stainless steel, temperature, groove, oxide
Procedia PDF Downloads 74