Search results for: emergency medical services information system (EMSIS)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30180

Search results for: emergency medical services information system (EMSIS)

27540 The Implementation of Human Resource Information System in the Public Sector: An Exploratory Study of Perceived Benefits and Challenges

Authors: Aneeqa Suhail, Shabana Naveed

Abstract:

The public sector (in both developed and developing countries) has gone through various waves of radical reforms in recent decades. In Pakistan, under the influence of New Public Management(NPM) Reforms; best practices of private sector are introduced in the public sector to modernize public organizations. Human Resource Information System (HRIS) has been popular in the private sector and proven to be a successful system, therefore it is being adopted in the public sector too. However, implementation of private business practices in public organizations us very challenging due to differences in context. This implementation gets further critical in Pakistan due to a centralizing tendency and lack of autonomy in public organizations. Adoption of HRIS by public organizations in Pakistan raises several questions: What challenges are faced by public organizations in implementation of HRIS? Are benefits of HRIS such as efficiency, process integration and cost reduction achieved? How is the previous system improved with this change and what are the impacts? Yet, it is an under-researched topic, especially in public enterprises. This study contributes to the existing body of knowledge by empirically exploring benefits and challenges of implementation of HRIS in public organizations. The research adopts a case study approach and uses qualitative data based on in-depth interviews conducted at various levels in the hierarchy including top management, departmental heads and employees. The unit of analysis is LESCO, the Lahore Electric Supply Company, a state-owned entity that generates, transmits and distributes electricity to 4 big cities in Punjab, Pakistan. The findings of the study show that LESCO has not achieved the benefits of HRIS as established in literature. The implementation process remained quite slow and costly. Various functions of HR are still in isolation and integration is a big challenge for the organization. Although the data is automated, the previous system of manually record maintenance and paperwork is still in work, resulting in the presence of parallel practices. The findings also identified resistance to change from top management and labor workforce, lack of commitment and technical knowledge, and costly vendors as major barriers that affect the effective implementation of HRIS. The paper suggests some potential actions to overcome these barriers and to enhance effective implementation of HR-technology. The findings are explained in light of an institutional logics perspective. HRIS’ new logic of automated and integrated HR system is in sharp contrast with the prevailing logic of process-oriented manual data maintenance, leading to resistance to change and deadlock.

Keywords: human resource information system, technological changes, state-owned enterprise, implementation challenges

Procedia PDF Downloads 151
27539 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 199
27538 Global Evidence on the Seasonality of Enteric Infections, Malnutrition, and Livestock Ownership

Authors: Aishwarya Venkat, Anastasia Marshak, Ryan B. Simpson, Elena N. Naumova

Abstract:

Livestock ownership is simultaneously linked to improved nutritional status through increased availability of animal-source protein, and increased risk of enteric infections through higher exposure to contaminated water sources. Agrarian and agro-pastoral households, especially those with cattle, goats, and sheep, are highly dependent on seasonally various environmental conditions, which directly impact nutrition and health. This study explores global spatiotemporally explicit evidence regarding the relationship between livestock ownership, enteric infections, and malnutrition. Seasonal and cyclical fluctuations, as well as mediating effects, are further examined to elucidate health and nutrition outcomes of individual and communal livestock ownership. The US Agency for International Development’s Demographic and Health Surveys (DHS) and the United Nations International Children's Emergency Fund’s Multi-Indicator Cluster Surveys (MICS) provide valuable sources of household-level information on anthropometry, asset ownership, and disease outcomes. These data are especially important in data-sparse regions, where surveys may only be conducted in the aftermath of emergencies. Child-level disease history, anthropometry, and household-level asset ownership information have been collected since DHS-V (2003-present) and MICS-III (2005-present). This analysis combines over 15 years of survey data from DHS and MICS to study 2,466,257 children under age five from 82 countries. Subnational (administrative level 1) measures of diarrhea prevalence, mean livestock ownership by type, mean and median anthropometric measures (height for age, weight for age, and weight for height) were investigated. Effects of several environmental, market, community, and household-level determinants were studied. Such covariates included precipitation, temperature, vegetation, the market price of staple cereals and animal source proteins, conflict events, livelihood zones, wealth indices and access to water, sanitation, hygiene, and public health services. Children aged 0 – 6 months, 6 months – 2 years, and 2 – 5 years of age were compared separately. All observations were standardized to interview day of year, and administrative units were harmonized for consistent comparisons over time. Geographically weighted regressions were constructed for each outcome and subnational unit. Preliminary results demonstrate the importance of accounting for seasonality in concurrent assessments of malnutrition and enteric infections. Household assets, including livestock, often determine the intensity of these outcomes. In many regions, livestock ownership affects seasonal fluxes in malnutrition and enteric infections, which are also directly affected by environmental and local factors. Regression analysis demonstrates the spatiotemporal variability in nutrition outcomes due to a variety of causal factors. This analysis presents a synthesis of evidence from global survey data on the interrelationship between enteric infections, malnutrition, and livestock. These results provide a starting point for locally appropriate interventions designed to address this nexus in a timely manner and simultaneously improve health, nutrition, and livelihoods.

Keywords: diarrhea, enteric infections, households, livestock, malnutrition, seasonality

Procedia PDF Downloads 130
27537 Hydroinformatics of Smart Cities: Real-Time Water Quality Prediction Model Using a Hybrid Approach

Authors: Elisa Coraggio, Dawei Han, Weiru Liu, Theo Tryfonas

Abstract:

Water is one of the most important resources for human society. The world is currently undergoing a wave of urban growth, and pollution problems are of a great impact. Monitoring water quality is a key task for the future of the environment and human species. In recent times, researchers, using Smart Cities technologies are trying to mitigate the problems generated by the population growth in urban areas. The availability of huge amounts of data collected by a pervasive urban IoT can increase the transparency of decision making. Several services have already been implemented in Smart Cities, but more and more services will be involved in the future. Water quality monitoring can successfully be implemented in the urban IoT. The combination of water quality sensors, cloud computing, smart city infrastructure, and IoT technology can lead to a bright future for environmental monitoring. In the past decades, lots of effort has been put on monitoring and predicting water quality using traditional approaches based on manual collection and laboratory-based analysis, which are slow and laborious. The present study proposes a methodology for implementing a water quality prediction model using artificial intelligence techniques and comparing the results obtained with different algorithms. Furthermore, a 3D numerical model will be created using the software D-Water Quality, and simulation results will be used as a training dataset for the artificial intelligence algorithm. This study derives the methodology and demonstrates its implementation based on information and data collected at the floating harbour in the city of Bristol (UK). The city of Bristol is blessed with the Bristol-Is-Open infrastructure that includes Wi-Fi network and virtual machines. It was also named the UK ’s smartest city in 2017.In recent times, researchers, using Smart Cities technologies are trying to mitigate the problems generated by the population growth in urban areas. The availability of huge amounts of data collected by a pervasive urban IoT can increase the transparency of decision making. Several services have already been implemented in Smart Cities, but more and more services will be involved in the future. Water quality monitoring can successfully be implemented in the urban IoT. The combination of water quality sensors, cloud computing, smart city infrastructure, and IoT technology can lead to a bright future for the environment monitoring. In the past decades, lots of effort has been put on monitoring and predicting water quality using traditional approaches based on manual collection and laboratory-based analysis, which are slow and laborious. The present study proposes a new methodology for implementing a water quality prediction model using artificial intelligence techniques and comparing the results obtained with different algorithms. Furthermore, a 3D numerical model will be created using the software D-Water Quality, and simulation results will be used as a training dataset for the Artificial Intelligence algorithm. This study derives the methodology and demonstrate its implementation based on information and data collected at the floating harbour in the city of Bristol (UK). The city of Bristol is blessed with the Bristol-Is-Open infrastructure that includes Wi-Fi network and virtual machines. It was also named the UK ’s smartest city in 2017.

Keywords: artificial intelligence, hydroinformatics, numerical modelling, smart cities, water quality

Procedia PDF Downloads 193
27536 Improvement of Brige Weigh-In-Motion Technique Considering the Driving Conditions of Vehicles

Authors: Changgil Lee, Jooyoung Park, Seunghee Park

Abstract:

In this study, bridge weigh-in-motion (BWIM) system was simulated under various driving conditions of vehicles to improve the performance of the BWIM system. Two driving conditions were considered. One was the number of the axle of the vehicles. Since the vehicles have different number of axle according to the types of the vehicle, the vehicles were modeled considering the number of the axle. The other was the speed of the vehicles because the speed of the vehicles is not consistent on the bridge. To achieve the goal, the dynamic characteristics of a bridge such as modal parameters were considered in numerical simulation by analyzing precision models. Also, the driving vehicles were modeled as mass-spring-damping systems reflecting the axle information.

Keywords: bridge weigh-in-motion (BWIM) system, driving conditions, precision analysis model, the number of axle, the speed of vehicle

Procedia PDF Downloads 471
27535 Design of Traffic Counting Android Application with Database Management System and Its Comparative Analysis with Traditional Counting Methods

Authors: Muhammad Nouman, Fahad Tiwana, Muhammad Irfan, Mohsin Tiwana

Abstract:

Traffic congestion has been increasing significantly in major metropolitan areas as a result of increased motorization, urbanization, population growth and changes in the urban density. Traffic congestion compromises efficiency of transport infrastructure and causes multiple traffic concerns; including but not limited to increase of travel time, safety hazards, air pollution, and fuel consumption. Traffic management has become a serious challenge for federal and provincial governments, as well as exasperated commuters. Effective, flexible, efficient and user-friendly traffic information/database management systems characterize traffic conditions by making use of traffic counts for storage, processing, and visualization. While, the emerging data collection technologies continue to proliferate, its accuracy can be guaranteed through the comparison of observed data with the manual handheld counters. This paper presents the design of tablet based manual traffic counting application and framework for development of traffic database management system for Pakistan. The database management system comprises of three components including traffic counting android application; establishing online database and its visualization using Google maps. Oracle relational database was chosen to develop the data structure whereas structured query language (SQL) was adopted to program the system architecture. The GIS application links the data from the database and projects it onto a dynamic map for traffic conditions visualization. The traffic counting device and example of a database application in the real-world problem provided a creative outlet to visualize the uses and advantages of a database management system in real time. Also, traffic data counts by means of handheld tablet/ mobile application can be used for transportation planning and forecasting.

Keywords: manual count, emerging data sources, traffic information quality, traffic surveillance, traffic counting device, android; data visualization, traffic management

Procedia PDF Downloads 201
27534 Therapeutic Potential of Cannabis in Cancer: Advances in Clinical Research and Pharmacogenomic Aspects

Authors: Bouchaïb Gazzaz, Hamid El Amri, Hind Dehbi, Abderraouf Hilali

Abstract:

Medical cannabis has been cultivated and used in many countries around the world. The story of the use of cannabis as a therapeutic agent is difficult to trace, in particular, because the laws regulating its production, distribution, possession, and consumption are relatively recent. Nowadays, in countries where it is authorized, medical cannabis is used in a very wide variety of illnesses and pathologies, particularly in cancer cures. Presently, cannabinoid receptor agonists (like nabilone and dronabinol) are used for reducing chemotherapy induced vomiting. This review aims to discuss a recent finding on the use of therapeutic cannabis in patients with cancer. First, this work addresses the progress made in the use of cannabinoids as therapeutic agent and their application in the treatment of different types of cancer. Secondly, a detailed analysis of the pharmacogenetic aspect of cannabis will be discussed.

Keywords: cannabinoids, endocannabinoids system, cancer treatment, cannabinoid receptors, genetic polymorphism, pharmacogenomics

Procedia PDF Downloads 150
27533 A Feasibility Study of Crowdsourcing Data Collection for Facility Maintenance Management

Authors: Mohamed Bin Alhaj, Hexu Liu, Mohammed Sulaiman, Osama Abudayyeh

Abstract:

An effective facility maintenance management (FMM) system plays a crucial role in improving the quality of services and maintaining the facility in good condition. Current FMM heavily relies on the quality of the data collection function of the FMM systems, at times resulting in inefficient FMM decision-making. The new technology-based crowdsourcing provides great potential to improve the current FMM practices, especially in terms of timeliness and quality of data. This research aims to investigate the feasibility of using new technology-driven crowdsourcing for FMM and highlight its opportunities and challenges. A survey was carried out to understand the human, data, system, geospatial, and automation characteristics of crowdsourcing for an educational campus FMM via social networks. The survey results were analyzed to reveal the challenges and recommendations for the implementation of crowdsourcing for FMM. This research contributes to the body of knowledge by synthesizing the challenges and opportunities of using crowdsourcing for facility maintenance and providing a road map for applying crowdsourcing technology in FMM. In future work, a conceptual framework will be proposed to support data-driven FMM using social networks.

Keywords: crowdsourcing, facility maintenance management, social networks

Procedia PDF Downloads 180
27532 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 404
27531 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 314
27530 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 219
27529 Application of IED to Condition Based Maintenance of Medium Voltage GCB/VCB

Authors: Ming-Ta Yang, Jyh-Cherng Gu, Chun-Wei Huang, Jin-Lung Guan

Abstract:

Time base maintenance (TBM) is conventionally applied by the power utilities to maintain circuit breakers (CBs), transformers, bus bars and cables, which may result in under maintenance or over maintenance. As information and communication technology (ICT) industry develops, the maintenance policies of many power utilities have gradually changed from TBM to condition base maintenance (CBM) to improve system operating efficiency, operation cost and power supply reliability. This paper discusses the feasibility of using intelligent electronic devices (IEDs) to construct a CB CBM management platform. CBs in power substations can be monitored using IEDs with additional logic configuration and wire connections. The CB monitoring data can be sent through intranet to a control center and be analyzed and integrated by the Elipse Power Studio software. Finally, a human-machine interface (HMI) of supervisory control and data acquisition (SCADA) system can be designed to construct a CBM management platform to provide maintenance decision information for the maintenance personnel, management personnel and CB manufacturers.

Keywords: circuit breaker, condition base maintenance, intelligent electronic device, time base maintenance, SCADA

Procedia PDF Downloads 332
27528 Closed-Loop Supply Chain: A Study of Bullwhip Effect Using Simulation

Authors: Siddhartha Paul, Debabrata Das

Abstract:

Closed-loop supply chain (CLSC) management focuses on integrating forward and reverse flow of material as well as information to maximize value creation over the entire life-cycle of a product. Bullwhip effect in supply chain management refers to the phenomenon where a small variation in customers’ demand results in larger variation of orders at the upstream levels of supply chain. Since the quality and quantity of products returned to the collection centers (as a part of reverse logistics process) are uncertain, bullwhip effect is inevitable in CLSC. Therefore, in the present study, first, through an extensive literature survey, we identify all the important factors related to forward as well as reverse supply chain which causes bullwhip effect in CLSC. Second, we develop a system dynamics model to study the interrelationship among the factors and their effect on the performance of overall CLSC. Finally, the results of the simulation study suggest that demand forecasting, lead times, information sharing, inventory and work in progress adjustment rate, supply shortages, batch ordering, price variations, erratic human behavior, parameter correcting, delivery time delays, return rate of used products, manufacturing and remanufacturing capacity constraints are the important factors which have a significant influence on system’s performance, specifically on bullwhip effect in a CLSC.

Keywords: bullwhip effect, closed-loop supply chain, system dynamics, variance ratio

Procedia PDF Downloads 165
27527 The Various Forms of a Soft Set and Its Extension in Medical Diagnosis

Authors: Biplab Singha, Mausumi Sen, Nidul Sinha

Abstract:

In order to deal with the impreciseness and uncertainty of a system, D. Molodtsov has introduced the concept of ‘Soft Set’ in the year 1999. Since then, a number of related definitions have been conceptualized. This paper includes a study on various forms of Soft Sets with examples. The paper contains the concepts of domain and co-domain of a soft set, conversion to one-one and onto function, matrix representation of a soft set and its relation with one-one function, upper and lower triangular matrix, transpose and Kernel of a soft set. This paper also gives the idea of the extension of soft sets in medical diagnosis. Here, two soft sets related to disease and symptoms are considered and using AND operation and OR operation, diagnosis of the disease is calculated through appropriate examples.

Keywords: kernel of a soft set, soft set, transpose of a soft set, upper and lower triangular matrix of a soft set

Procedia PDF Downloads 348
27526 The Role of Pharmacist in The Community: A Study of Methanol Toxicity Disaster in Tripoli Libya During March 2013

Authors: Abdurrauf M. Gusbi, Mahmud H. Arhima, Abdurrahim A. Elouzi, Ebtisam A. Benomran, Salsabeela Elmezwghi, Aram Elhatan, Nafesa Elgusbi

Abstract:

Mass poisonings with methanol are rare but occur regularly both in developed and in non-developing countries. As a result of the tragedy that happened in the city of Tripoli Libya in March during year 2013 a number of patients were admitted to Tripoli Medical Center and Tripoli Central Hospital suffering from poisoning following ingestion of methanol by mistake. Our aims have been formulated to collect Information about those cases as much as we can from the archiving departments from the two hospitals including the number of cases that had been admitted, recovered patients and died victims. This retrospective study was planned to find out the reasons which allow those patients to drink methanol in our Muslim community and also the role of pharmacist to prevent such a disaster that claimed the lives of many people. During this tragedy 291 ospitalized patients their ages between 16-32 years old were admitted to both hospitals, total number of died 189 (121 at Tripoli medical center) and (68 at Tripoli central hospital), demographic data also shows that most of them are male (97%) and (3% female), about 4% of the patients foreigners and 96% were Libyans. There were a lot of obstacles and poor facilities at the time of patient admission as recognized in many cases including lack of first line of treatment. The morbidity was high due to the lack of antidote and availability of dialysis machines at this two main hospitals in Tripoli also according to survey done to the medical staff and also a random number of medical students shows about 28% have no idea about the first aid procedure used for methanol poisoning cases and this due to the absence of continuing education for all medical staff through the establishment of training courses on first aid, rapid diagnosis of poisoning and follow the written procedures to dealing with such cases.

Keywords: ethanol, fomepizole, methanol, poisoning

Procedia PDF Downloads 365
27525 Clinical Profile and Outcome of Type I Diabetes Mellitus at a Tertiary Care-Centre in Eastern Nepal

Authors: Gauri Shankar Shah

Abstract:

Objectives: The Type I diabetes mellitus in children is frequently a missed diagnosis and children presents in emergency with diabetic ketoacidosis having significant morbidity and mortality. The present study was done to find out the clinical presentation and outcome at a tertiary-care centre. Methods: This was retrospective analysis of data of Type I diabetes mellitus reporting to our centre during last one year (2012-2013). Results: There were 12 patients (8 males) and the age group was 4-14 years (mean ± 3.7). The presenting symptoms were fever, vomiting, altered sensorium and fast breathing in 8 (66.6%), 6 (50%), 4 (33.3%), and 4 (33.3%) cases, respectively. The classical triad of polyuria, polydypsia, and polyphagia were present only in two patients (33.2%). Seizures and epigastric pain were found in two cases each (33.2%). The four cases (33.3%) presented with diabetic ketoacidosis due to discontinuation of insulin doses, while 2 had hyperglycemia alone. The hemogram revealed mean hemoglobin of 12.1± 1.6 g/dL and total leukocyte count was 22,883.3 ± 10,345.9 per mm3, with polymorphs percentage of 73.1 ± 9.0%. The mean blood sugar at presentation was 740 ± 277 mg/ dl (544–1240). HbA1c ranged between 7.1-8.8 with mean of 8.1±0.6 %. The mean sodium, potassium, blood ph, pCO2, pO2 and bicarbonate were 140.8 ± 6.9 mEq/L, 4.4 ± 1.8mEq/L, 7.0 ± 0.2, 20.2 ± 10.8 mmHg, 112.6 ± 46.5 mmHg and 9.2 ± 8.8 mEq/L, respectively. All the patients were managed in pediatric intensive care unit as per our protocol, recovered and discharged on intermediate insulin given twice daily. Conclusions: Thus, it shows that these patients have uncontrolled hyperglycemia and often presents in emergency with ketoacidosis and deranged biochemical profile. The regular administration of insulin, frequent monitoring of blood sugar and health education are required to have better metabolic control and good quality of life.

Keywords: type I diabetes mellitus, hyperglycemia, outcome, glycemic control

Procedia PDF Downloads 257
27524 Value Relevance of Accounting Information: Empirical Evidence from China

Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li

Abstract:

This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.

Keywords: accounting information, response time, value relevance, stock price

Procedia PDF Downloads 100
27523 Distribution of Cytochrome P450 Gene in Patients Taking Medical Cannabis

Authors: Naso Isaiah Thanavisuth

Abstract:

Introduction: Medical cannabis can be used for treatment, including anorexia, pain, inflammation, multiple sclerosis, Parkinson's disease, epilepsy, cancer, and metabolic syndrome-related disorders. However, medical cannabis leads to adverse effects (AEs), which is delta-9-tetrahydrocannabinol (THC). In previous studies, the major of THC metabolism enzymes are CYP2C9. Especially, the variation of CYP2C9 gene consist of CYP2C9*2 on exon 3 (C430T) (Arg144Cys) and CYP2C9*3 on exon 7 (A1075C) (Ile359Leu) to decrease enzyme activity. Notwithstanding, there is no data describing whether the variant of CYP2C9 genes are a pharmacogenetics marker for prediction of THC-induced AEs in Thai patients. Objective: We want to investigate the association between CYP2C9 gene and THC-induced AEs in Thai patients. Method: We enrolled 39 Thai patients with medical cannabis treatment consisting of men and women who were classified by clinical data. The quality of DNA extraction was assessed by using NanoDrop ND-1000. The CYP2C9*2 and *3 genotyping were conducted using the TaqMan real time PCR assay (ABI, Foster City, CA, USA). Results: All Thai patients who received the medical cannabis consist of twenty four (61.54%) patients who were female and fifteen (38.46%) were male, with age range 27- 87 years. Moreover, the most AEs in Thai patients who were treated with medical cannabis between cases and controls were tachycardia, arrhythmia, dry mouth, and nausea. Particularly, thirteen (72.22%) medical cannabis-induced AEs were female and age range 33 – 69 years. In this study, none of the medical cannabis groups carried CYP2C9*2 variants in Thai patients. The CYP2C9*3 variants (*1/*3, intermediate metabolizer, IM) and (*3/*3, poor metabolizer, PM) were found, three of thirty nine (7.69%) and one of thirty nine (2.56%) , respectively. Conclusion: This is the first study to confirm the genetic polymorphism of CYP2C9 and medical cannabis-induced AEs in the Thai population. Although, our results indicates that there is no found the CYP2C9*2. However, the variation of CYP2C9 allele might serve as a pharmacogenetics marker for screening before initiating the therapy with medical cannabis for prevention of medical cannabis-induced AEs.

Keywords: CYP2C9, medical cannabis, adverse effects, THC, P450

Procedia PDF Downloads 110
27522 A Method of Representing Knowledge of Toolkits in a Pervasive Toolroom Maintenance System

Authors: A. Mohamed Mydeen, Pallapa Venkataram

Abstract:

The learning process needs to be so pervasive to impart the quality in acquiring the knowledge about a subject by making use of the advancement in the field of information and communication systems. However, pervasive learning paradigms designed so far are system automation types and they lack in factual pervasive realm. Providing factual pervasive realm requires subtle ways of teaching and learning with system intelligence. Augmentation of intelligence with pervasive learning necessitates the most efficient way of representing knowledge for the system in order to give the right learning material to the learner. This paper presents a method of representing knowledge for Pervasive Toolroom Maintenance System (PTMS) in which a learner acquires sublime knowledge about the various kinds of tools kept in the toolroom and also helps for effective maintenance of the toolroom. First, we explicate the generic model of knowledge representation for PTMS. Second, we expound the knowledge representation for specific cases of toolkits in PTMS. We have also presented the conceptual view of knowledge representation using ontology for both generic and specific cases. Third, we have devised the relations for pervasive knowledge in PTMS. Finally, events are identified in PTMS which are then linked with pervasive data of toolkits based on relation formulated. The experimental environment and case studies show the accuracy and efficient knowledge representation of toolkits in PTMS.

Keywords: knowledge representation, pervasive computing, agent technology, ECA rules

Procedia PDF Downloads 342
27521 Building a Model for Information Literacy Education in School Settings

Authors: Tibor Koltay

Abstract:

Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.

Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory

Procedia PDF Downloads 153
27520 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 85
27519 Role of Water Supply in the Functioning of the MLDB Systems

Authors: Ramanpreet Kaur, Upasana Sharma

Abstract:

The purpose of this paper is to address the challenges faced by MLDB system at the piston foundry plant due to interruption in supply of water. For the MLDB system to work in Model, two sub-units must be connected to the robotic main unit. The system cannot function without robotics and water supply by the fan (WSF). Insufficient water supply is the cause of system failure. The system operates at top performance using two sub-units. If one sub-unit fails, the system capacity is reduced. Priority of repair is given to the main unit i.e. Robotic and WSF. To solve the problem, semi-Markov process and regenerative point technique are used. Relevant graphs are also included to particular case.

Keywords: MLDB system, robotic, semi-Markov process, regenerative point technique

Procedia PDF Downloads 82
27518 Speech Perception by Video Hosting Services Actors: Urban Planning Conflicts

Authors: M. Pilgun

Abstract:

The report presents the results of a study of the specifics of speech perception by actors of video hosting services on the material of urban planning conflicts. To analyze the content, the multimodal approach using neural network technologies is employed. Analysis of word associations and associative networks of relevant stimulus revealed the evaluative reactions of the actors. Analysis of the data identified key topics that generated negative and positive perceptions from the participants. The calculation of social stress and social well-being indices based on user-generated content made it possible to build a rating of road transport construction objects according to the degree of negative and positive perception by actors.

Keywords: social media, speech perception, video hosting, networks

Procedia PDF Downloads 152
27517 Using a Train-the-Trainer Model to Deliver Post-Partum Haemorrhage Simulation in Rural Uganda

Authors: Michael Campbell, Malaz Elsaddig, Kevin Jones

Abstract:

Background: Despite encouraging progress, global maternal mortality has remained stubbornly high since the declaration of the Millennium development goals. Sub-Saharan Africa accounts for well over half of maternal deaths with Post-Partum Haemorrhage (PPH) being the lead cause. ‘In house’ simulation training delivered by local doctors may be a sustainable approach for improving emergency obstetric care. The aim of this study was to evaluate the use of a Train-the-Trainer (TtT) model in a rural Ugandan hospital to ascertain whether it can feasibly improve practitioners’ management of PPH. Methods: Three Ugandan doctors underwent a training course to enable them to design and deliver simulation training. These doctors used MamaNatalie® models to simulate PPH scenarios for midwives, nurses and medical students. The main outcome was improvement in participants’ knowledge and confidence, assessed using self-reported scores on a 10-point scale. Results: The TtT model produced significant improvements in the confidence and knowledge scores of the ten participants. The mean confidence score rose significantly (p=0.0005) from 6.4 to 8.6 following the simulation training. There was also a significant increase in the mean knowledge score from 7.2 to 9.0 (p=0.04). Medical students demonstrated the greatest overall increase in confidence scores whilst increases in knowledge scores were largest amongst nurses. Conclusions: This study demonstrates that a TtT model can be used in a low resource setting to improve healthcare professionals’ confidence and knowledge in managing obstetric emergencies. This Train-the-Trainer model represents a sustainable approach to addressing skill deficits in low resource settings. We believe that its expansion across healthcare institutions in Sub-Saharan Africa will help to reduce the region’s high maternal mortality rate and step closer to achieving the ambitions of the Millennium development goals.

Keywords: low resource setting, post-partum haemorrhage, simulation training, train the trainer

Procedia PDF Downloads 180
27516 The Differences and Similarities between the Ship Waste Tracking Regulations of Turkey and Particular European Union Member Countries

Authors: Kaan Koyuncu, Umut Celen Arican, Sevilay Can

Abstract:

In the maritime industry, there have been regulations to prevent pollution, and the first attempt to offer a legal basis was Marpol Convention which was held in 1973 in order to provide a framework for the disposal of ship wastes. Based on this convention, ports are obliged to build waste receiving facilities. European Union regulations make several member countries to follow these directions, In Turkey, under Blue Card System, the quantity and types of wastes, the delivery time, the capacity of the receiving facilities, and other required information can be monitored online. Therefore, yachts and other boats with the bilge, sewage, and waste which illegally discharge into the sea, can be blocked. This system is an outcome of the law adopted from European Union regulations. In this study, the present systems in Turkey which occurred in 2010 after the integration of the system, which has been put in the force in 2000 in Europe will be analyzed and interpreted to provide a useful comparison, a practical guide, and a roadmap for potential improvements.

Keywords: Europe-Turkey, blue card, marine environment, ship waste tracking system

Procedia PDF Downloads 497
27515 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists

Authors: Miral Sabry AlAshry

Abstract:

The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.

Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution

Procedia PDF Downloads 379
27514 A Case of Survival with Self-Draining Haemopericardium Secondary to Stabbing

Authors: Balakrishna Valluru, Ruth Suckling

Abstract:

A 16 year old male was found collapsed on the road following stab injuries to the chest and abdomen and was transported to the emergency department by ambulance. On arrival in the emergency department the patient was breathless and appeared pale. He was maintaining his airway with spontaneous breathing and had a heart rate of 122 beats per minute with a blood pressure of 83/63 mmHg. He was resuscitated initially with three units of packed red cells. Clinical examination identified three incisional wounds each measuring 2 cm. These were in the left para-sternal region, right infra-scapular region and left upper quadrant of the abdomen. The chest wound over the left parasternal area at the level of 4tth intercostal space was bleeding intermittently on leaning forwards and was relieving his breathlessness intermittently. CT imaging was performed to characterize his injuries and determine his management. CT scan of chest and abdomen showed moderate size haemopericardium with left sided haemopneumothorax. The patient underwent urgent surgical repair of the left ventricle and left anterior descending artery. He recovered without complications and was discharged from the hospital. This case highlights the fact that the potential to develop a life threatening cardiac tamponade was mitigated by the left parasternal stab wound. This injury fortuitously provided a pericardial window through which the bleeding from the injured left ventricle and left anterior descending artery could drain into the left hemithorax providing an opportunity for timely surgical intervention to repair the cardiac injuries.

Keywords: stab, incisional, haemo-pericardium, haemo-pneumothorax

Procedia PDF Downloads 205
27513 Portable System for the Acquisition and Processing of Electrocardiographic Signals to Obtain Different Metrics of Heart Rate Variability

Authors: Daniel F. Bohorquez, Luis M. Agudelo, Henry H. León

Abstract:

Heart rate variability (HRV) is defined as the temporary variation between heartbeats or RR intervals (distance between R waves in an electrocardiographic signal). This distance is currently a recognized biomarker. With the analysis of the distance, it is possible to assess the sympathetic and parasympathetic nervous systems. These systems are responsible for the regulation of the cardiac muscle. The analysis allows health specialists and researchers to diagnose various pathologies based on this variation. For the acquisition and analysis of HRV taken from a cardiac electrical signal, electronic equipment and analysis software that work independently are currently used. This complicates and delays the process of interpretation and diagnosis. With this delay, the health condition of patients can be put at greater risk. This can lead to an untimely treatment. This document presents a single portable device capable of acquiring electrocardiographic signals and calculating a total of 19 HRV metrics. This reduces the time required, resulting in a timelier intervention. The device has an electrocardiographic signal acquisition card attached to a microcontroller capable of transmitting the cardiac signal wirelessly to a mobile device. In addition, a mobile application was designed to analyze the cardiac waveform. The device calculates the RR and different metrics. The application allows a user to visualize in real-time the cardiac signal and the 19 metrics. The information is exported to a cloud database for remote analysis. The study was performed under controlled conditions in the simulated hospital of the Universidad de la Sabana, Colombia. A total of 60 signals were acquired and analyzed. The device was compared against two reference systems. The results show a strong level of correlation (r > 0.95, p < 0.05) between the 19 metrics compared. Therefore, the use of the portable system evaluated in clinical scenarios controlled by medical specialists and researchers is recommended for the evaluation of the condition of the cardiac system.

Keywords: biological signal análisis, heart rate variability (HRV), HRV metrics, mobile app, portable device.

Procedia PDF Downloads 187
27512 Knowledge, Attitude and Practice of Anemia among Females Attending Bolan Medical Complex Quetta, Balochistan

Authors: A. Abdullah, N. ul Haq, A. Nasim

Abstract:

Objectives: This study was aimed to assess the knowledge, attitude, and practice of anemia among females attending Bolan Medical Complex Quetta, Balochistan. Methods: A quantitative cross-sectional study by adopting a questionnaire containing 3 dimensions knowledge (15 questions), Attitude (5 questions), and Practice (4 questions) for the assessment of knowledge, attitude and practice of anemia among females was conducted. All females attending Bolan Medical Complex Quetta, Balochistan were approached for the study. Descriptive statistics were used to describe demographic and KAP related characteristics of the females regarding anemia.All data were analyzed by using SPSS (Statistical Package of Social Sciences) software program version 20.0. Results: Data was collected from six hundred and thirteen (613) participants. Majority of the respondents (n=180, 29.4%) were categorized in the age group of 29-33 years. Participants had knowledge regarding anemia was (n= 564, 91.9%), and attitude was (n= 516, 84.0%) whereas practice was (n=437, 71.3%). Multitative analysis revealed the negative correlation between Attitude-practice (P= -0.040) and a significant figure (0.001) was present between knowledge-attitude. Occupation and reason of diagnosis were not predictive of better KAP. Conclusions: Knowledge, attitude, and practice of Anemia shows a satisfactory response in this study. Furthermore, study finding implicates the need for health promotion among females. Improving nutritional knowledge and information related Anemia can result in better control and management.

Keywords: anemia, knowledge attitude and practice, females, college

Procedia PDF Downloads 196
27511 Information Exchange Process Analysis between Authoring Design Tools and Lighting Simulation Tools

Authors: Rudan Xue, Annika Moscati, Rehel Zeleke Kebede, Peter Johansson

Abstract:

Successful buildings’ simulation and analysis inevitably require information exchange between multiple building information modeling (BIM) software. The BIM infor-mation exchange based on IFC is widely used. However, Industry Foundation Classifi-cation (IFC) files are not always reliable and information can get lost when using dif-ferent software for modeling and simulations. In this research, interviews with lighting simulation experts and a case study provided by a company producing lighting devices have been the research methods used to identify the necessary steps and data for suc-cessful information exchange between lighting simulation tools and authoring design tools. Model creation, information exchange, and model simulation have been identi-fied as key aspects for the success of information exchange. The paper concludes with recommendations for improved information exchange and more reliable simulations that take all the needed parameters into consideration.

Keywords: BIM, data exchange, interoperability issues, lighting simulations

Procedia PDF Downloads 250