Search results for: research methods
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 34984

Search results for: research methods

8434 The Ancient Port of Gaza 'Anthedon' and Relationship with Mediterranean Basin Ports

Authors: Ayman Hassouna

Abstract:

Gaza was famous in the history of trade, because it lies at the end of overland trade route, then the goods transferred by Gazzian merchants to different places around the Mediterranean, so it is described as ‘Mediterranean port of Arabs’, but Gaza is not located directly at the sea shore, so it is fortified by two ports: the first is Anthedon, and second is Maiomas. It is possible to dig in Anthedon but it is too difficult to do that in Maiomas because the site is full of modern buildings. Archaeological excavations at Anthedon's port provided us much archaeological and historical information about cooperation between Anthedon's port and different places at the Mediterranean basin. This research speaks about the roots of Anthedon's name, and it is related with other names in Greek land, by use different dictionaries language, and produce historical introduction were covering the ages beginning from the Iron Age to Greek, Roman and Byzantine periods. Then the study reviewed the most important architectural discoveries in the site, and highlighted the relationship with the civilizations' ports of the Mediterranean basin by studying number of artefacts pottery were imported from different places as Cyprus, Greece, Italy, North Africa, Carthage and Tripoli workshops. On the other hand, the archaeologists discovered some of local pottery made in Gaza at different sites on the Mediterranean basin which confirms the relationship of Gaza merchants with those areas. At the end of this study, there are some conclusions and recommendations about the site.

Keywords: ancient port of Gaza, pottery typology, Mediterranean basin ports, Palestine archaeology

Procedia PDF Downloads 351
8433 Attentional Engagement for Movie

Authors: Wuon-Shik Kim, Hyoung-Min Choi, Jeonggeon Woo, Sun Jung Kwon, SeungHee Lee

Abstract:

The research on attentional engagement (AE) in movies using physiological signals is rare and controversial. Therefore, whether physiological responses can be applied to evaluate AE in actual movies is unclear. To clarify this, we measured electrocardiogram and electroencephalogram (EEG) of 16 Japanese university students as they watched the American movie Iron Man. After the viewing, we evaluated the subjective AE and affection levels for 11 film content segments in Iron Man. Based on self-reports for AE, we selected two film content segments as stimuli: Film Content 9 describing Tony Stark (the main character) flying through the night sky (with the highest AE score) and Film Content 1, describing Tony Stark and his colleagues telling indecent jokes (with the lowest score). We divided these two content segments into two time intervals, respectively. Results indicated that the Film Content by Interval interaction for HR was significant, at F (1, 11)=35.64, p<.001, η2=.76; while HR in Film Content 1 decreased, that of in Film Content 9 increased. In Film Content 9, the main effects of the Interval for respiratory sinus arrhythmia (RSA) (F (1, 11)=5.91, p<.05, η2=.35) and for the attention index of EEG (F (1, 11)=5.23, p<.05, η2=.37) were significant. The increase in the RSA was significant (p<.05) as well, whereas that of the EEG attention index was nearly significant (p=.069). In conclusion, while RSA increases, HR decreases when people direct their attention toward normal films. However, while paying attention to a film evoking excitement, HR as well as RSA can increase.

Keywords: attentional engagement, electroencephalogram, movie, respiratory sinus arrhythmia

Procedia PDF Downloads 361
8432 The Presence of Anglicisms in Italian Fashion Magazines and Fashion Blogs

Authors: Vivian Orsi

Abstract:

The present research investigates the lexicon of a fashion magazine, whose universe is very receptive to lexical loans, especially those from English, called Anglicisms. Specifically, we intend to discuss the presence of English items and expressions in the Vogue Italia fashion magazine. Besides, we aim to study the anglicisms used in an Italian fashion blog called The Blonde Salad. Within the discussion of fashion blogs and their contributions to scientific studies, we adopt the theories of Lexicology / Lexicography to define Anglicism (BIDERMAN, 2001), and the observation of its prestige in the Italian Language (ROGATO, 2008; BISETTO, 2003). According to the theoretical basis mentioned, we intend to make a brief analysis of the Anglicisms collected from posts of the first year of existence of such fashion blog, emphasizing also the keywords that have the role to encapsulate the content of the text, allowing the reader to retrieve information from the post of the blog. About the use of English in Italian magazines and blogs, we can affirm that it seems to represent sophistication, assuming the value of prerequisite to participate in the fashion centers of the world. Besides, we believe, as Barthes says (1990, p. 215), that “Fashion does not evolve, it changes: its lexicon is new each year, like that of a language which always keeps the same system but suddenly and regularly ‘changes’ the currency of its words”. Fashion is a mode of communication: it is present in man's interaction with the world, which means that such lexical universe is represented according to the particularities of each culture.

Keywords: anglicism, lexicology, magazines, blogs, fashion

Procedia PDF Downloads 329
8431 Electronic Media and Physical Activity of Primary School Children

Authors: Srna Jenko Miholic, Marta Borovec, Josipa Persun

Abstract:

The constant expansion of technology has further accelerated the development of media and vice versa. Although its promotion includes all kinds of interesting and positive sides, the poor functioning of the media is still being researched and proven. Young people, as well as children from the earliest age, resort to the media the most, so it is necessary to defend the role of adults as it were parents, teachers, and environment against virtual co-educators such as the media. The research aim of this study was to determine the time consumption of using electronic media by primary school children as well as their involvement in certain physical activities. Furthermore, to determine what is happening when parents restrict their children's access to electronic media and encourage them to participate in alternative contents during their leisure time. Result reveals a higher percentage of parents restrict their children's access to electronic media and then encourage children to socialize with family and friends, spend time outdoors, engage in physical activity, read books or learn something unrelated to school content even though it would not be children's favorite activity. The results highlight the importance of parental control when it comes to children's use of electronic media and the positive effects that parental control has in terms of encouraging children to be useful, socially desirable, physically active, and healthy activities.

Keywords: elementary school, digital media, leisure time, parents, physical engagement

Procedia PDF Downloads 145
8430 Building Learning Organization: Case Study of Transforming a Banking Company with 21st Century Creative Services Company

Authors: Zeynep Aykul Yavuz

Abstract:

Misconception about design is about making a product pretty. However, the holistic approaches such as design thinking or human-centered design could take the design from making things nice to things inspired by real people and work with real-world limitations. Design thinking helps companies to understand not only problem area but also opportunities. It can be used by any people from any background which provide a space for companies where employees from different departments work together to solve the same problem. While demanding skills changing year to year into the market, previous technical skills are commons anymore. The frontier companies in the sectors look for interactive methods to solve problems. Moreover, the recruiter aims to understand the candidate’s design thinking skills (. The study includes a case study where a 21st century creative services company “ATÖLYE” offers innovation transformation with design thinking to a banking company. Both companies are located in İstanbul in Turkey. The banking company contacted with the ATÖLYE in January 2018 because they heard design thinking in different markets and how it transformed the way of working. The transformation process had 3 phases which were basic training of teams while getting coaching from ATÖLYE’s employees, coaching training with graduates of basic training, facilitator training. Employees built new skills while solving the banking company’s strategic problems. ATÖLYE offered experiential learning which helped employees’ making sense of new skills and knowledge. One day workshops were organized to create awareness about the practice of design thinking. In addition to these, a community of practice was built to create an environment to make reflections and discuss good practice. Not only graduates from the training program but also other employees from the company participated in the community gatherings. ATÖLYE did not train some employees in the company. Rather than that, its aim was to build a contemporary organization for the company. This provided a sustainable system in terms of human resources and motivation. At the beginning of 2020, employees from the first cohort in the basic training who took coaching training and facilitator training have started to design training for different groups in the company. They have considered what could be better in their training experience and designed new ones according to that, so they have been using design thinking to design the design training. This is one of the outcomes which shows the impact of all process clearly.

Keywords: design thinking, learning community, professional development, training, organizational transformation

Procedia PDF Downloads 108
8429 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 265
8428 Association of Vulnerability and Behavioural Outcomes of FSWs Linked with TI Prevention HIV Program: An Evidence from Cross-Sectional Behavioural Study in Thane District of Maharashtra

Authors: Jayanta Bora, Sukhvinder Kaur, Ashok Agarwal, Sangeeta Kaul

Abstract:

Background: It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility and literacy for effective human immunodeficiency virus (HIV) prevention. This paper examines the association between vulnerability and behavioural outcomes among FSWs in Thane district, Maharashtra under USAID PHFI-PIPPSE project. Methods: Data were used from the Behavioural Tracking Survey, a cross-sectional behavioural study conducted in 2015 with 503 FSWs randomly selected from 12 TI-NGOs which were functioning and providing services to FSWs in Thane district prior to April 2014 in Thane district of Maharashtra. We have created the “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt), and aspects of sex work (mobility and duration in sex work) as a dependent variable. The key independent measures used were program exposure to intervention, service uptake, self-confidence, and self-identity. Bi-variate and multivariate logistic regressions were used to examine the study objectives. Results: A higher proportion of FSWs who were in the age-group 18–25 years from brothel/street /home/ lodge-based were categorized as highly vulnerable to HIV risk as compared to bar-based sex worker (74.1% versus 59.8%, P,0.002); regression analysis highlighted lower odds of vulnerability among FSWs who were aware of services and visited NGO clinic for medical check-up and counselling for STI [AOR= 0.092, 95% CI 0.018-0.460; P,0.004], However, lower odds of vulnerability on confident in supporting fellow sex worker in crisis [AOR= 0.601, 95% CI 0.476-0.758; P, 0.000] and were able to turn away clients when they refused to use a condom during sex [AOR= 0.524, 95% CI 0.342-0.802; P, 0.003]. Conclusion: The results highlight that FSWs associated with TIs and getting services are less vulnerable and highly empowered. As a result of behavioural change communication and other services provided by TIs, FSWs were able to successfully negotiate about condom use with their clients and manage solidarity in the crisis situation for fellow FSWs. Therefore, it is evident from study paper that TI prevention programs may transform the lives of masses considerably and may open a window of opportunity to infuse the information and awareness about HIV risk.

Keywords: female sex worker, HIV prevention, HIV service uptake, vulnerability

Procedia PDF Downloads 251
8427 Automatic Generating CNC-Code for Milling Machine

Authors: Chalakorn Chitsaart, Suchada Rianmora, Mann Rattana-Areeyagon, Wutichai Namjaiprasert

Abstract:

G-code is the main factor in computer numerical control (CNC) machine for controlling the tool-paths and generating the profile of the object’s features. For obtaining high surface accuracy of the surface finish, non-stop operation is required for CNC machine. Recently, to design a new product, the strategy that concerns about a change that has low impact on business and does not consume lot of resources has been introduced. Cost and time for designing minor changes can be reduced since the traditional geometric details of the existing models are applied. In order to support this strategy as the alternative channel for machining operation, this research proposes the automatic generating codes for CNC milling operation. Using this technique can assist the manufacturer to easily change the size and the geometric shape of the product during the operation where the time spent for setting up or processing the machine are reduced. The algorithm implemented on MATLAB platform is developed by analyzing and evaluating the geometric information of the part. Codes are created rapidly to control the operations of the machine. Comparing to the codes obtained from CAM, this developed algorithm can shortly generate and simulate the cutting profile of the part.

Keywords: geometric shapes, milling operation, minor changes, CNC Machine, G-code, cutting parameters

Procedia PDF Downloads 347
8426 An Optimized Association Rule Mining Algorithm

Authors: Archana Singh, Jyoti Agarwal, Ajay Rana

Abstract:

Data Mining is an efficient technology to discover patterns in large databases. Association Rule Mining techniques are used to find the correlation between the various item sets in a database, and this co-relation between various item sets are used in decision making and pattern analysis. In recent years, the problem of finding association rules from large datasets has been proposed by many researchers. Various research papers on association rule mining (ARM) are studied and analyzed first to understand the existing algorithms. Apriori algorithm is the basic ARM algorithm, but it requires so many database scans. In DIC algorithm, less amount of database scan is needed but complex data structure lattice is used. The main focus of this paper is to propose a new optimized algorithm (Friendly Algorithm) and compare its performance with the existing algorithms A data set is used to find out frequent itemsets and association rules with the help of existing and proposed (Friendly Algorithm) and it has been observed that the proposed algorithm also finds all the frequent itemsets and essential association rules from databases as compared to existing algorithms in less amount of database scan. In the proposed algorithm, an optimized data structure is used i.e. Graph and Adjacency Matrix.

Keywords: association rules, data mining, dynamic item set counting, FP-growth, friendly algorithm, graph

Procedia PDF Downloads 416
8425 Adoption of International Financial Reporting Standards and Earnings Quality in Listed Deposit Money Banks in Nigeria

Authors: Shehu Usman Hassan

Abstract:

Published accounting information in financial statements are required to provide various users - shareholders, employees, suppliers, creditors, financial analysts, stockbrokers and government agencies – with timely and reliable information useful for making prudent, effective and efficient decisions. The widespread failure in the financial information quality has created the need to improve the financial information quality and to strengthen the control of managers by setting up good firms structures. This paper investigates firm attributes from perspective of structure, monitoring, performance elements of listed deposit money banks in Nigeria. The study adopted correlational research design with balanced panel data of 14 banks as sample of the study using multiple regression as a tool of analysis. The result reveals that firms attributes (leverage, profitability, liquidity, bank size and bank growth) has as significant influence on earnings quality of listed deposit money banks in Nigeria after the adoption of IFRS, while the pre period shows that the selected firm attributes has no significant impact on earnings quality. It is therefore concluded that the adoption of IFRS is right and timely.

Keywords: earnings quality, firm attributes, listed deposit money bank, Nigeria

Procedia PDF Downloads 508
8424 Small Community’s Proactive Thinking to Move from Zero to 100 Percent Water Reuse

Authors: Raj Chavan

Abstract:

The City of Jal serves a population of approximately 3,500 people, including 2,100 permanent inhabitants and 1,400 oil and gas sector workers and RV park occupants. Over the past three years, Jal's population has increased by about 70 percent, mostly due to the oil and gas industry. The City anticipates that the population will exceed 4,200 by 2020, necessitating the construction of a new wastewater treatment plant (WWTP) because the old plant (aerated lagoon system) cannot accommodate such rapid population expansion without major renovations or replacement. Adhering to discharge permit restrictions has been challenging due to aging infrastructure and equipment replacement needs, as well as increasing nutrient loading to the wastewater collecting system from the additional oil and gas residents' recreational vehicles. The WWTP has not been able to maintain permit discharge standards for total nitrogen of less than 20 mg N/L and other characteristics in recent years. Based on discussions with the state's environmental department, it is likely that the future permit renewal would impose stricter conditions. Given its location in the dry, western part of the country, the City must rely on its meager groundwater supplies and scant annual precipitation. The city's groundwater supplies will be depleted sooner than predicted due to rising demand from the growing population for drinking, leisure, and other industrial uses (fracking). The sole type of reuse the city was engaging in (recreational reuse for a golf course) had to be put on hold because of an effluent water compliance issue. As of right now, all treated effluent is evaporated. The city's long-term goal is to become a zero-waste community that sends all of its treated wastewater effluent either to the golf course, Jal Lake, or the oil and gas industry for reuse. Hydraulic fracturing uses a lot of water, but if the oil and gas industry can use recycled water, it can reduce its impact on freshwater supplies. The City's goal of 100% reuse has been delayed by the difficulties of meeting the constraints of the regular discharge permit due to the large rise in influent loads and the aging infrastructure. The City of Jal plans to build a new WWTP that can keep up with the city's rapid population increase due to the oil and gas industry. Several treatment methods were considered in light of the City's needs and its long-term goals, but MBR was ultimately chosen recommended since it meets all of the permit's requirements while also providing 100 percent beneficial reuse. This talk will lay out the plan for the city to reach its goal of 100 percent reuse, as well as the various avenues for funding the small community that have been considered.

Keywords: membrane bioreactor, nitrogent, reuse, small community

Procedia PDF Downloads 84
8423 Using an Epidemiological Model to Study the Spread of Misinformation during the Black Lives Matter Movement

Authors: Maryam Maleki, Esther Mead, Mohammad Arani, Nitin Agarwal

Abstract:

The proliferation of social media platforms like Twitter has heightened the consequences of the spread of misinformation. To understand and model the spread of misinformation, in this paper, we leveraged the SEIZ (Susceptible, Exposed, Infected, Skeptics) epidemiological model to describe the underlying process that delineates the spread of misinformation on Twitter. Compared to the other epidemiological models, this model produces broader results because it includes the additional Skeptics (Z) compartment, wherein a user may be Exposed to an item of misinformation but not engage in any reaction to it, and the additional Exposed (E) compartment, wherein the user may need some time before deciding to spread a misinformation item. We analyzed misinformation regarding the unrest in Washington, D.C. in the month of March 2020, which was propagated by the use of the #DCblackout hashtag by different users across the U.S. on Twitter. Our analysis shows that misinformation can be modeled using the concept of epidemiology. To the best of our knowledge, this research is the first to attempt to apply the SEIZ epidemiological model to the spread of a specific item of misinformation, which is a category distinct from that of rumor and hoax on online social media platforms. Applying a mathematical model can help to understand the trends and dynamics of the spread of misinformation on Twitter and ultimately help to develop techniques to quickly identify and control it.

Keywords: Black Lives Matter, epidemiological model, mathematical modeling, misinformation, SEIZ model, Twitter

Procedia PDF Downloads 161
8422 Entrepreneurship Education as a Pre-Requisite for Graduate Entrepreneurship: A Study of Graduate Entrepreneurs in Yenagoa City

Authors: Kurotimi M. Fems, Francis D. W. Poazi, Helen Opigo

Abstract:

The concepts of entrepreneurship education together with graduate entrepreneurship have taken centre stage in many countries as a 21st century strategy for economic growth and development. Entrepreneurship education has been viewed as a pre-requisite tool for a more effective and successful business operation. This paper seeks to verify if entrepreneurship education is pre-requisite to graduate entrepreneurship, and to ascertain if such other factors as the need for achievement, competence and experience etc. also play a foundational role in the choice of a graduate becoming an entrepreneur. The scope of the research study is entrepreneurs within Yenagoa metropolis in Bayelsa state, Nigeria. The sample target is graduates engaged in entrepreneurship activities (graduates who own and run businesses). Stratified sampling technique was used and 101 responses were obtained from a total of 300 questionnaires issued. Bar chart, tables and percentages were used to analyze the collected data. The findings revealed that personality traits, situational circumstance, need for achievement and experience/competence were the foundational factors stimulating graduate entrepreneurs to engage in entrepreneurial pursuits. Of all, personality trait showed the highest score with 73 (73%) out of 101 entrepreneurs agreeing. Experience/Competence and situational circumstances followed behind with 66 (65%) and 63 (62.4%), respectively. Entrepreneurship education revealed the least score with 33 (32.3%) out of 101 participating entrepreneurs. All hope, however, is not lost, as this shows that something can be done to increase the impact of entrepreneurship education on graduate entrepreneurship.

Keywords: Creative destruction, entrepreneurs, entrepreneurship education, graduate entrepreneurship, pre-requisite

Procedia PDF Downloads 303
8421 Lightweight Concrete Fracture Energy Derived by Inverse Analysis

Authors: Minho Kwon, Seonghyeok Lee, Wooyoung Jung

Abstract:

In recent years, with increase of construction of skyscraper structures, the study of concrete materials to improve their weight and performance has been emerging as a key of research area. Typically, the concrete structures has disadvantage of increasing the weight due to its mass in comparison to the strength of the materials. Therefore, in order to improve such problems, the light-weight aggregate concrete and high strength concrete materials have been studied during the past decades. On the other hand, the study of light-weight aggregate concrete materials has lack of data in comparison to the concrete structure using high strength materials, relatively. Consequently, this study presents the performance characteristics of light-weight aggregate concrete materials due to the material properties and strength. Also, this study conducted the experimental tests with respect to normal and lightweight aggregate materials, in order to indentify the tensile crack failure of the concrete structures. As a result, the Crack Mouth Opening Displacement (CMOD) from the experimental tests was constructed and the fracture energy using inverse problem analysis was developed from the force-CMOD relationship in this study, respectively.

Keywords: lightweight aggregate concrete, crack mouth opening displacement, inverse analysis, fracture energy

Procedia PDF Downloads 351
8420 ECG Based Reliable User Identification Using Deep Learning

Authors: R. N. Begum, Ambalika Sharma, G. K. Singh

Abstract:

Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.

Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio

Procedia PDF Downloads 159
8419 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 264
8418 Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach

Authors: Syahidah N. Zulkifli, Herlina A. Rahim, Nurul A. M. Subha

Abstract:

Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol.

Keywords: microbial contaminants, water quality, water monitoring, Raman spectroscopy

Procedia PDF Downloads 103
8417 Interpersonal Emotion Regulation in Adolescence: An Enhanced Critical Incident Study

Authors: Setareh Shayanfar

Abstract:

Given the increasing importance of peer relationships during adolescence, the present study aimed to examine peer interactions that facilitate or hinder adolescents’ regulation of negative emotions. Using the Enhanced Critical Incident Technique, 1-hour semi-structured interviews were conducted with 16 junior high school adolescents. Participants were asked to recall situations when they experienced strong negative emotions during the past school year, indicate the peer interactions that helped or hindered their emotion regulation, and identify prospective interactions with the potential to help regulate their emotions. Data analysis extracted 182 critical incidents, including 109 helping incidents, 45 hindering incidents, and 28 wish list items, which generated 10 categories nested within four overarching themes: Positive Personal Support included (a) supportive presence, (b) expressing concern, (c) empathizing, and (d) encouraging and cheering up; while Strategy Transmission included (e) sharing perspective, and (f) giving advice; Activated Support included (g) taking action, and (h) distracting; while Negative Personal Interactions included (i) withdrawing and (j) punishing. Implications for mental health and service providers, as well as recommendations for future research, are presented.

Keywords: adolescence, emotion regulation, enhanced critical incident technique, peers

Procedia PDF Downloads 140
8416 Energy Efficiency Retrofitting of Residential Buildings Case Study: Multi-Family Apartment Building in Tripoli, Lebanon

Authors: Yathreb Sabsaby

Abstract:

Energy efficiency retrofitting of existing buildings was long ignored by public authorities who favored energy efficiency policies in new buildings, which are easier to implement. Indeed, retrofitting is more complex and difficult to organize because of the extreme diversity in existing buildings, administrative situations and occupation. Energy efficiency retrofitting of existing buildings has now become indispensable in all economies—even emerging countries—given the constraints imposed by energy security and climate change, and because it represents considerable potential energy savings. Addressing energy efficiency in the existing building stock has been acknowledged as one of the most critical yet challenging aspects of reducing our environmental footprint on the ecosystem. Tripoli, Lebanon chosen as case study area is a typical Mediterranean metropolis in the North Lebanon, where multifamily residential buildings are all around the city. This generally implies that the density of energy demand is extremely high, even the renewable energy facilities are involved, they can just play as a minor energy provider at the current technology level in the single family house. It seems only the low energy design for buildings can be made possible, not the zero energy certainly in developing country. This study reviews the latest research and experience and provides recommendations for deep energy retrofits that aim to save more than 50% of the energy used in a typical Tripoli apartment building.

Keywords: energy-efficiency, existing building, multifamily residential building, retrofit

Procedia PDF Downloads 452
8415 Predicting the Diagnosis of Alzheimer’s Disease: Development and Validation of Machine Learning Models

Authors: Jay L. Fu

Abstract:

Patients with Alzheimer's disease progressively lose their memory and thinking skills and, eventually, the ability to carry out simple daily tasks. The disease is irreversible, but early detection and treatment can slow down the disease progression. In this research, publicly available MRI data and demographic data from 373 MRI imaging sessions were utilized to build models to predict dementia. Various machine learning models, including logistic regression, k-nearest neighbor, support vector machine, random forest, and neural network, were developed. Data were divided into training and testing sets, where training sets were used to build the predictive model, and testing sets were used to assess the accuracy of prediction. Key risk factors were identified, and various models were compared to come forward with the best prediction model. Among these models, the random forest model appeared to be the best model with an accuracy of 90.34%. MMSE, nWBV, and gender were the three most important contributing factors to the detection of Alzheimer’s. Among all the models used, the percent in which at least 4 of the 5 models shared the same diagnosis for a testing input was 90.42%. These machine learning models allow early detection of Alzheimer’s with good accuracy, which ultimately leads to early treatment of these patients.

Keywords: Alzheimer's disease, clinical diagnosis, magnetic resonance imaging, machine learning prediction

Procedia PDF Downloads 141
8414 Preferred Left-Handed Conformation of Glycyls at Pathogenic Sites

Authors: Purva Mishra, Rajesh Potlia, Kuljeet Singh Sandhu

Abstract:

The role of glycyl residues in the protein structure has lingered within the research community for the last several decades. Glycyl residue is the only amino acid that is achiral due to the lack of a side chain and can, therefore, exhibit Ramachandran conformations that are disallowed for L-amino acids. The structural and functional significance of glycyl residues with L-disallowed conformation, however, remains obscure. Through statistical analysis of various datasets, we found that the glycyls with L-disallowed conformations are over-represented at disease-associated sites and tend to be evolutionarily conserved. The mutations of L-disallowed glycyls tend to destabilize the native conformation, reduce protein solubility, and promote inter-molecular aggregations. We uncovered a structural motif referred to as “β-crescent” formed around the L-disallowed glycyl, which prevents β-sheet aggregation by disrupting the alternating pattern of β-pleats. The L-disallowed conformation of glycyls also holds predictive power to infer the pathogenic missense variants. Altogether, our observations highlight that the L-disallowed conformation of glycyls is selected to facilitate native folding and prevent inter-molecular aggregations. The findings may also have implications for designing more stable proteins and prioritizing the genetic lesions implicated in diseases.

Keywords: Ramachandran plot, β-sheet, protein stability, protein aggregation

Procedia PDF Downloads 69
8413 The History Of Mental Health In The Middle East: Analytical Literature Review

Authors: Mohamad Musa

Abstract:

The history of mental health practices and services in the Middle East region has been deeply intertwined with its rich cultural, religious, and societal context. Tracing back to ancient times, mental health approaches were heavily influenced by the traditions of major monotheistic religions, with a strong emphasis on spiritual and traditional healing methods. As psychiatric institutions and Western medicine gradually gained a foothold in the region during the 20th century, a notable shift occurred. However, the integration of Western psychiatric practices faced significant challenges due to cultural barriers and deeply rooted beliefs. Families and communities often turned to traditional healers and religious practices as their initial recourse for mental health concerns, viewing Western interventions with skepticism and hesitation. Historically, mental health services in the Middle East have been overshadowed by a focus on physical health and the biomedical model. Mental illness carried substantial stigma, with individuals and families often reluctant to disclose mental health struggles due to fears of societal ostracization and discrimination. This stigma posed a significant barrier to accessing and accepting formal mental health support. Later in the 20th century, governments in the Middle East began recognizing the need for modernizing mental health services and integrating them into the broader healthcare system. However, this process was hindered by several factors, including limited resources, inadequate training for healthcare professionals, and ongoing conflicts and instability in certain regions, which disrupted the delivery of mental health services. As the 21st century progressed, several Middle Eastern nations, particularly those in the Arabian Gulf region, began implementing national mental health strategies and legislative reforms to address the growing need for comprehensive mental health care. These efforts aimed to destigmatize mental illness, protect the rights of individuals with mental health conditions, and promote public awareness and education. Despite these positive developments, the historical legacy of stigma, cultural barriers, and limited resources continues to pose challenges in the provision of accessible and culturally responsive mental health services across the diverse populations of the Middle East.

Keywords: mental health, history, middle east, literature review

Procedia PDF Downloads 29
8412 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology

Authors: Christo Nicholls

Abstract:

The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.

Keywords: AI, AMI, demand response, multi-agent

Procedia PDF Downloads 108
8411 Investigation of the Historical Background of Monumental Mosques in Kocaeli, Turkey by IRT Techniques

Authors: Emre Kishalı, Neslihan TürkmenoğLu Bayraktar

Abstract:

Historical buildings may face various impacts throughout their life cycle. There have been environmental, structural, public works actions on old monuments influencing sustainability and maintenance issues. As a result, ancient monuments can have been undergone various changes in the context of restoration and repair. Currently, these buildings face integrated conditions including city planning macro solutions, old intervention methods, modifications in building envelope and artefacts in terms of conservation. Moreover, documentation of phases is an essential for assessing the historical building, yet it can result in highly complicated and interwoven issues. Herein, two monuments constructed in the 16th century are selected as case studies in Kocaeli, Turkey which are located in different micro climatic conditions and/or exposed to different interventions and which are important for the city as cultural property. Pertev Paşa Mosque (also known as Yenicuma Mosque) -constructed by Architect Sinan-; Gebze Çoban Mustafa Paşa Mosque -constructed in 1523 and known as the work of Architect Sinan but various names asserted as the architect of building according to resources. Active water infiltration and damages, recent material interventions, hidden niches, and foundation techniques of the mosque are investigated via Infrared Thermography under the project of 114K284, “Non-Destructive Test Applications, in the Context of Planned Conservation, through Historical Mosques of Kocaeli: Coban Mustafa Pasa Mosque, Fevziye Mosque and Pertev Pasa Mosque” funded by TUBITAK. It is aimed to reveal active deteriorations on building elements generated by unwanted effects of structural and climatic conditions, historical interventions, and modifications by monitoring the variation of surface temperature and humidity by IRT visualization method which is an important non- destructive process for investigation of monuments in the conservation field in the context of planned conservation. It is also concluded that in-situ monitoring process via IRT through different climatic conditions give substantial information on the behaviour of the envelope to the physical environmental conditions by observation of thermal performance, degradations. However, it is obvious that monitoring of historical buildings cannot be pursued by implementing a single non-destructive technique to have complete data of the structure.

Keywords: IRT, non-destructive test, planned conservation, mosque

Procedia PDF Downloads 345
8410 The Role of Trust in International Relations– Examining India’s Gujaral Doctrine and South Asian Politics

Authors: Bhavana Mahajan

Abstract:

International Relations is a discipline of paradoxes. The State is the dominant political institution, yet little attention has been accorded to why individual countries behave the way they do with the theoretical analysis dismissing the State as a reactionary monolith – thus States either play to “quest for power” or to “systemic” forces. However, States do behave as and are influenced by agents when interacting with international structures as well as with other states. While questions on “competitive power politics” and “trust” have been examined and developed to a fair extent by International Relations theorists in the post 1990s period, their application to the domain of South Asian politics is limited and little research, if any, examines the conduct of foreign policy beyond rational choice. This paper is an initial attempt to marry these theoretical insights with the foreign policy exercised by India especially the case of the “Gujral Doctrine, as one of “non-reciprocal accommodation”. Ignoring the view that such a policy move can be viewed as political “feinting” or deception, it is noteworthy that India even made the first move in terms of defining its role as one who “trusts” rather than one who “seeks” to trust, given the country’s geo-strategic context and threat perceptions.

Keywords: India’s foreign policy, South Asia, social constructivism, English school, trusting relationships, Gujral Doctrine, rationality

Procedia PDF Downloads 339
8409 Injury Characteristics and Outcome of Road Traffic Accident among Victims at Adult Emergency Department of Tikur Anbesa Specialized Hospital, Addis Ababa, Ethiopia

Authors: Mohammed Seid, Aklilu Azazh, Fikre Enquselassie, Engida Yisma

Abstract:

Background: Road traffic injuries are the eighth leading cause of death globally, and the leading cause of death for young people. More than a million people die each year on the world’s roads, and the risk of dying as a result of a road traffic injury is highest in the Africa. Methods: A prospective hospital-based study was undertaken to assess injury characteristics and outcome of road traffic accident among victims at Adult Emergency Department of Tikur Anbesa specialized hospital, Addis Ababa, Ethiopia. A structured pre-tested questionnaire was used to gather the required data. The collected data were analyzed using SPSS version 16.0. Results: A total of 230 road traffic accident victims were studied. The majority of the study subjects were men 165 (71.7%) and the male/female ratio was 2.6:1. The victims’ ages ranged from 14 to 80 years with the mean and standard deviations of 32.15 and ± 14.38 years respectively. Daily laborers (95 (41.3%)) and students (28 (12.2%)) were the majority of road traffic accident victims. Long-distance travelling Minibus (16.5%) was responsible for the majority of road traffic crash followed by followed by Taxi (14.8%) and pedestrians (62.6%) accounted for the majority of road traffic accident. Head (50.4%) and musculoskeletal (extremities) (47.0%) were the most common body region injured. Fractures (78.0%) and open wounds (56.5%) were the most common type of injuries sustained. Treatment of fracture was the most common procedure performed in 57.7 % of the victims. The overall length of hospital stay (LOS) ranged from 1 day to 61 days with mean (± standard deviation) of 7.12 ± 10.5 days and the mortality rate was 7.4 %. A significant higher proportion of victims aged 14-55 years were had less likelihood of death compared to those victims aged more than 55 years of age [Adjusted OR = 0.1 (95% CI: 0.01, 0.82)]. Conclusions: This study showed diverse injury characteristics and high morbidity and mortality among the victims attending Adult Emergency Department of Tikur Anbesa specialized hospital, Addis Ababa, Ethiopia. The findings reflect that road traffic accident is a major public health problem. Urgent road traffic accident preventive measures and prompt treatment of the victims are warranted in order to reduce morbidity and mortality among the victims.

Keywords: road traffic accident, injury characteristics, outcome, Tikur Anbesa specialized hospital, Addis Ababa, Ethiopia

Procedia PDF Downloads 379
8408 Determinants of Infrastructure Provision in Ghana

Authors: Clifford Kwakwa Amoah, De-Graft Owusu-Manu, Prince Antwi-Afari

Abstract:

Infrastructure is the lifeline for economic development of any country. Hence, obtaining infrastructure quality cannot be overemphasized. Nevertheless, challenges of infrastructure quality persist, and it is worse in developing countries despite the diverse study on the subject matter. Therefore, this study was formulated to identify the prevalent determinants of infrastructure quality using synthesis of extant literature (to identify key variables), and analysis of survey questionnaire of data collected by means of the inductive methodology approach, mean score ranking and descriptive statistics. The variables “partner with the private sector, growth stimulation and poverty reduction, and adherence to procurement core principles” were the most significant challenges that the government faces. Moreover, it would be of utmost concern to adopt some stringent measures to help improve and accelerate on the growth and development of the nation, thereby achieving the best quality required. This study is novel conducted to provide insight into some of the punitive measures, considered in ensuring that quality infrastructure is obtained in both developing (specifically) and developed economies. The research findings therefore provide some guidance for overcoming the accumulative challenges. Application of the stated findings will help bridge the gap of infrastructure challenges; this is because the study found strong empirical evidence that infrastructure plays a pivotal role in the productivity enhancement.

Keywords: challenges, development, economic growth, government, infrastructure quality

Procedia PDF Downloads 140
8407 ‘Obuntu Bulamu’: Parental Peer to Peer Support for Inclusion of Children with Disabilities in Central Uganda

Authors: Ruth Nalugya, Claire Nimusiima, Elizabeth Kawesa, Harriet Nambejja, Geert van Hove, Janet Seeley, Femke Bannink Mbazzi

Abstract:

Background: ‘Obuntu bulamu’, an intervention for children, parents, and teachers to improve the participation and inclusion of children with disabilities (CwD) through peer-to-peer support, was developed and tested in central Uganda between 2017 and 2019. The intervention consisted of children, parents, and teachers' training sessions and peer to peer support activities directed at disability inclusion using an African disability framework. In this paper, we discuss parent participation in and parent evaluation of the ‘Obuntu bulamu’ intervention. Methods: This qualitative Afrocentric intervention study was implemented in 10 communities in the Wakiso district in Central Uganda. We purposely selected children aged 8 to 14 years with different impairments, their peers, and parents, with different levels of household income and familial support, who were enrolled in primary schools in the ten communities with on average three children with disabilities per community. Sixty four parents (33 parents of CwDs and 31 peers) participating in the ‘Obuntu bulamu’ study were interviewed at baseline and endline. Two focus group discussions were held with parents at the midline. Parents also participated in a consultative meeting about the intervention design at baseline, and two evaluation workshops held at midline and endline. Thematic data analysis of the interview and focus group data was conducted. Results: Findings showed parents found the group-based activities inspiring and said they built hope and confidence. Parents felt the intervention was acceptable, culturally appropriate, and supportive as it built on values and practices from their own traditions. Parents reported the intervention enhanced a sense of togetherness and belonging through the group meetings and follow-up activities. Parents also mentioned that the training helped them develop more positive attitudes towards CwD and disability inclusion. Parents felt that the invention increased a child’s participation and inclusion at home, school, and in communities. Conclusion: The Obuntu bulamu peer to peer support intervention is an acceptable, culturally appropriate intervention that has the potential to improve the inclusion of CwD. A larger randomized control trial is needed to evaluate the impact of the intervention model.

Keywords: inclusion, participation, inclusive education, peer support, belonging, Ubuntu, ‘Obuntu bulamu’

Procedia PDF Downloads 101
8406 Reducing Greenhouse Gass Emissions by Recyclable Material Bank Project of Universities in Central Region of Thailand

Authors: Ronbanchob Apiratikul

Abstract:

This research studied recycled waste by the Recyclable Material Bank Project of 4 universities in the central region of Thailand for the evaluation of reducing greenhouse gas emissions compared with landfilling activity during July 2012 to June 2013. The results showed that the projects collected total amount of recyclable wastes of about 911,984.80 kilograms. Office paper had the largest amount among these recycled wastes (50.68% of total recycled waste). Groups of recycled waste can be prioritized from high to low according to their amount as paper, plastic, glass, mixed recyclables, and metal, respectively. The project reduced greenhouse gas emissions equivalent to about 2814.969 metric tons of carbon dioxide. The most significant recycled waste that affects the reduction of greenhouse gas emissions is office paper which is 70.16% of total reduced greenhouse gasses emission. According to amount of reduced greenhouse gasses emission, groups of recycled waste can be prioritized from high to low significances as paper, plastic, metals, mixed recyclables, and glass, respectively.

Keywords: recycling, garbage bank, waste management, recyclable wastes, greenhouse gases

Procedia PDF Downloads 422
8405 Examining the Challenges Faced by Passengers Using Arik Air for International and Domestic Travel

Authors: Mahmud Hafsat Hussaini, Eldah Ephraim Eldah, Bata Zoakah Amina

Abstract:

This research work was aimed at examining the challenges faced by passengers using Arik air for domestic and international travels. Passengers do complain of delay flights, theft and rude behavior by Arik staff while on transit or in the process of travelling using the aircraft. Being the national carrier in Nigeria these behaviors have tarnished the image of the airline and makes travel experience to be challenging. Hundred survey questionnaires were administered to travellers who have used the airline for domestic and international flights. Findings show that the staff of the airline do lack customer care skills and are sometimes rude to customers. The airline does have different agents that book for international flights who delays confirming bookings even after payment. The website of the airline is mostly down and makes bookings difficult. Other findings related to the study are a delay of domestic flights within Nigeria. Passengers are sometimes kept for 8 hours in the airport due to delay of flights. The study, therefore, recommends that flight schedule should be adhered to and staff should be trained to meet of with passengers demand. The security of guest luggage at the airport should be put in place to avoid theft. An effective booking platform should be accessible to passengers for easy booking.

Keywords: examining, challenges, domestic, international, travels

Procedia PDF Downloads 213