Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4289

Search results for: security safe

1649 Evaluating the Effectiveness of Methods That Increase the Knowledge of Youths about the Sexually Transmitted Diseases

Authors: Gonul Kurt, Semra Aciksoz

Abstract:

All types of interventions that increase the knowledge and awareness of youths about Sexually Transmitted Diseases (STD) are considered to be important for safe sex life and sexual health. The aim of this study was to determine the knowledge levels of nursing students about STD and evaluate the effectiveness of peer education and brochure methods to increase the knowledge and awareness about STD. This interventional study was carried out by participation of nursing students attending the first and second grade in a school of nursing on February–May 2015. The study participants were 200 undergraduate nursing student volunteers. The students were given education by peer trainers and brochure methods. First-grade students were divided into five groups with block randomization method and each group were given education by five peer trainers. Second-grade students were given education with brochure by the researchers. The knowledge level of study groups was evaluated before and after educational intervention. The data were collected using the “Data Collection Form” and “Sexually Transmitted Diseases Information Form”. The questionnaire forms developed by the researchers after the literature review. The SPSS 15.0 package software was used for the evaluation of the data obtained from the study. Data were analyzed by Mann-Whitney-U-Test, Wilcoxon Signed Ranks Test and Mc Nemar Test. A p value of <0.05 was regarded as statistically significant. All of participants in the study were female nursing students. The mean age of students was 18.99±0.32 years old in the peer education group and 20.04±0.37 in the brochure education group. There was no statistically significant difference between knowledge levels of the students in both groups before the education (p>0.05). It was determined that an increase in knowledge levels of the students in both groups after the education. This increase was statistically significant (p<0.05). It was determined that knowledge level of the students about STD in brochure group was higher than the peer education group (p<0.001). The results of this study indicate that brochure education method was more effective than the peer education method in both increasing knowledge and awareness about STD.

Keywords: education method, knowledge, nursing students, sexually transmitted diseases

Procedia PDF Downloads 280
1648 Images Selection and Best Descriptor Combination for Multi-Shot Person Re-Identification

Authors: Yousra Hadj Hassen, Walid Ayedi, Tarek Ouni, Mohamed Jallouli

Abstract:

To re-identify a person is to check if he/she has been already seen over a cameras network. Recently, re-identifying people over large public cameras networks has become a crucial task of great importance to ensure public security. The vision community has deeply investigated this area of research. Most existing researches rely only on the spatial appearance information from either one or multiple person images. Actually, the real person re-id framework is a multi-shot scenario. However, to efficiently model a person’s appearance and to choose the best samples to remain a challenging problem. In this work, an extensive comparison of descriptors of state of the art associated with the proposed frame selection method is studied. Specifically, we evaluate the samples selection approach using multiple proposed descriptors. We show the effectiveness and advantages of the proposed method by extensive comparisons with related state-of-the-art approaches using two standard datasets PRID2011 and iLIDS-VID.

Keywords: camera network, descriptor, model, multi-shot, person re-identification, selection

Procedia PDF Downloads 264
1647 Spatial-Temporal Awareness Approach for Extensive Re-Identification

Authors: Tyng-Rong Roan, Fuji Foo, Wenwey Hseush

Abstract:

Recent development of AI and edge computing plays a critical role to capture meaningful events such as detection of an unattended bag. One of the core problems is re-identification across multiple CCTVs. Immediately following the detection of a meaningful event is to track and trace the objects related to the event. In an extensive environment, the challenge becomes severe when the number of CCTVs increases substantially, imposing difficulties in achieving high accuracy while maintaining real-time performance. The algorithm that re-identifies cross-boundary objects for extensive tracking is referred to Extensive Re-Identification, which emphasizes the issues related to the complexity behind a great number of CCTVs. The Spatial-Temporal Awareness approach challenges the conventional thinking and concept of operations which is labor intensive and time consuming. The ability to perform Extensive Re-Identification through a multi-sensory network provides the next-level insights – creating value beyond traditional risk management.

Keywords: long-short-term memory, re-identification, security critical application, spatial-temporal awareness

Procedia PDF Downloads 101
1646 The Effect of Artificial Intelligence on Human Rights Resources and Development

Authors: Tharwat Girgis Farag Girgis

Abstract:

The link between development and human rights has long been the subject of scholarly debate. As a result, a number of principles have been adopted, from the right to development to the human rights-based development approach, to understand the dynamics between the two concepts. Despite the initiatives taken, the exact relationship between development and human rights remains unclear. However, the rapprochement between the two concepts and the need for development efforts regarding human rights have increased in recent years. On the other hand, the emergence of sustainable development as an acceptable method in development goals and policies makes this consensus even more unstable. The place of sustainable development in the legal debate on human rights and its role in promoting sustainable development programs require further research. Therefore, this article attempts to map the relationship between development and human rights, with particular emphasis on the place given to sustainable development principles in international human rights law. It will continue to investigate whether it recognizes sustainable development rights. The article will therefore give a positive answer to question mentioned here. The jurisprudence and interpretive guidelines of human rights institutions travel to confirm this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 34
1645 Analyzing Current Transformer’s Transient and Steady State Behavior for Different Burden’s Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, D. Sharma

Abstract:

Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices. This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.

Keywords: accuracy, accuracy limiting factor, burden, current transformer, instrument security factor

Procedia PDF Downloads 334
1644 Development of Educational Institutions in Afghanistan and Especially in the Region of “Herat” Opportunities and Challenges

Authors: Sayed Jamal Ud Din Heravi

Abstract:

The development of educational institutions has an important role in the progress and advancement of the state, in the stability and security of the state and its exposure, in the flourishing of minds, in devoting the role of science, developing society, and meeting people’s desires and needs. Afghanistan is a Muslim country located in Central Asia on the borders of Pakistan, Iran, Tajikistan, and Uzbekistan, and it also borders China's Xing yang. Unfortunately, these oppressed people have been living in wars that have been going on for four decades, in which educational institutions, schools and institutes have not developed. Rather, the war destroyed the infrastructure of this country, and no city or village remained in it but tasted the bloody wars. Now with the new government, we see that many government educational institutions are closed in this country, even if the state promises that it will open them quickly. As for universities and private institutions, they work in Afghanistan diligently and diligently, and among them, there is sharp competition in the use of professors and taking advantage of the available means for the sake of knowledge. It laid the building blocks for a bright dawn in which it seeks to keep pace with the procession of development and prosperity in the world.

Keywords: Afghanistan, higher education, Herat province, opportunities, challenges

Procedia PDF Downloads 100
1643 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 58
1642 Factors Associated with Contraceptive Use and Nonuse, among Currently Married Young (15-24 Years) Women in Nepal

Authors: Bishnu Prasad Dulal, Sushil Chandra Baral, Radheshyam Bhattarai, Meera Tandan

Abstract:

Background: Non-use of contraceptives is a leading cause of unintended pregnancy. This study was done to explore the potential predictors of contraceptive used by young women, and the findings can inform policy makers to design the program to reduce unintended pregnancy for younger women who have a longer time of fecundity. Methodology: A nationally representative cross-sectional household survey was conducted by Health Research and Social Development Forum in 2012. Total 2259 currently married young women (15-24 years) were selected for the analysis out of 8578 women of reproductive age interviewed from the total 10260 households using systematic sampling. Binary logistic regression was used to identify factors associated with the use of modern contraceptive methods. Findings: The prevalence of modern contraceptive methods among young women was 25.2 %. Use of contraceptives was significantly associated with age at first marriage <15 year of age (OR:1.95) and ever delivered (OR: 1.8). Muslim women were significantly less likely to use contraceptives. Development region, wealth quintile, and awareness of abortion site were also statistically associated factors to use of contraceptives. Conclusion: The prevalence of contraceptives uses among young married women (25.2%) was lower than national prevalence (43%) of contraceptives use among married women of reproductive age. Our analysis focused on examining the association between women’s characteristics-related factors and use and nonuse of modern contraceptives. Awareness of safe abortion site is significantly associated while level of education was not. It is an interesting finding but difficult to interpret which needs further analysis on the basis of education. Maybe due to the underlying socio-religious practice of Muslim people, they had lower use of contraceptives. Programmers and policy makers could better help young women by increasing intervention activities to have a regular use of contraceptive-covering poor, Dalit and Muslim, and low aged women in order to reduce unintended pregnancy.

Keywords: unintended pregnancy, contraceptive, young women, Nepal

Procedia PDF Downloads 441
1641 Building Information Modelling: A Review to Indian Scenario

Authors: P. Agnivesh, P. V. Ponambala Moorthi

Abstract:

Evolution of information modelling leads to the visualisation of well-organized built environment. Building Information Modelling (BIM) is considered as evolution in the off-site construction which essentially enhances and controls the present scenario of on-site construction paradigms. Promptness, sustainability and security are considered as the important characteristics of the building information modelling. Projects that uses BIM are tied firmly by technology but distributed organizationally. This allows different team members in the project to associate and integrate the works and work flows. This will in turn improve the efficiency of work breakdown structure. Internationally BIM had been accepted as modern computer aided way of information sharing by construction industry for efficient way of manipulation in order to avoid the on-site misperceptions. Even though, in developing countries like India BIM is in the phase of start and requires lot of mandates and policies to be brought about by the government for its widespread implementations. This paper reviews the current scenario of BIM worldwide and in India and suggests for the improved implementation of building modelling for Indian policy condition.

Keywords: building information modelling, Indian polity, information modelling, information sharing, mandates and policies, sustainability.

Procedia PDF Downloads 363
1640 IoT Based Information Processing and Computing

Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed

Abstract:

The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.

Keywords: IoT, computing, information processing, Iot computing

Procedia PDF Downloads 167
1639 Assessing Water Bottle Consumption on College Campus in Abu Dhabi: Towards a Sustainable Future

Authors: Ludmilla Wikkeling-Scott, Amira Karim

Abstract:

Background: In a rapidly developing environment, concerns for pollution and depletion of natural resources are challenges facing global communities. A major source of waste on university campuses is the use of plastic bottles, while cost of production and processing is high. Consumer demand stimulates popularity of plastic bottle production, but researchers agree this is not a sustainable solution. This pilot study assesses plastic water bottle used and attitude towards alternatives among Emirati college students. Methods: This study was conducted in December 2016, using an anonymous self-administered survey of 17 questions. The survey included personal characteristics, plastic water bottle used, attitude towards alternative replacement and sustainability. For statistical analysis, STATA 14C was used to determine significance of association. Results: A total of 500 Emirati students (94.6% female) completed the survey. Of the students, 82.6% preferred bottled water over tap water, and 44.6% reported disposable bottled water use in their household, 42.6% purchased disposable bottled water more than twice a week, and 44.2% purchased bottled water at least once, while on campus. Students were willing to consider switching to alternative water bottle use if it was more convenient (22.54%), cost less (55.13%) or improved the taste (22.54%), while only 7.85% students would not consider any alternatives. There was a significant difference in attitude towards alternatives to water bottle use by area of study (p < 0.005). Conclusion: The UAE strives to be at the forefront of sustainable development and protecting biodiversity. However, a major challenge is the increasing amount of waste, exacerbated by the increasing consumer demand for convenience as seen in this billion-dollar industry. Plastic bottles, for all purposes, pose a serious threat to the environment and sustainable campus initiatives can help reduce the ecological footprint, improve awareness of safe alternatives and benefits to the environment.

Keywords: ecological foot print, emirati students, plastic bottle consumption, sustainable campus

Procedia PDF Downloads 149
1638 Identification of Analogues to EGCG for the Inhibition of HPV E7: A Fundamental Insights through Structural Dynamics Study

Authors: Murali Aarthy, Sanjeev Kumar Singh

Abstract:

High risk human papillomaviruses are highly associated with the carcinoma of the cervix and the other genital tumors. Cervical cancer develops through the multistep process in which increasingly severe premalignant dysplastic lesions called cervical intraepithelial neoplastic progress to invasive cancer. The oncoprotein E7 of human papillomavirus expressed in the lower epithelial layers drives the cells into S-phase creating an environment conducive for viral genome replication and cell proliferation. The replication of the virus occurs in the terminally differentiating epithelium and requires the activation of cellular DNA replication proteins. To date, no suitable drug molecule is available to treat HPV infection whereas identification of potential drug targets and development of novel anti-HPV chemotherapies with unique mode of actions are expected. Hence, our present study aimed to identify the potential inhibitors analogous to EGCG, a green tea molecule which is considered to be safe to use for mammalian systems. A 3D similarity search on the natural small molecule library from natural product database using EGCG identified 11 potential hits based on their similarity score. The structure based docking strategies were implemented in the potential hits and the key interacting residues of protein with compounds were identified through simulation studies and binding free energy calculations. The conformational changes between the apoprotein and the complex were analyzed with the simulation and the results demonstrated that the dynamical and structural effects observed in the protein were induced by the compounds and indicated the dominance to the oncoprotein. Overall, our study provides the basis for the structural insights of the identified potential hits and EGCG and hence, the analogous compounds identified can be potent inhibitors against the HPV 16 E7 oncoprotein.

Keywords: EGCG, oncoprotein, molecular dynamics simulation, analogues

Procedia PDF Downloads 116
1637 Can Urbanisation Be the Cause for Increasing Urban Poverty: An Exploratory Analysis for India

Authors: Sarmistha Singh

Abstract:

An analysis of trend of urbanization and urban poverty in recent decades is showing that a distinctly reducing rural poverty and increasing in urban areas. It can be argued that the higher the urbanization fuelled by the urban migration to city, which is picking up people from less skilled, education so they faced obstacle to enter into the mainstream economy of city. The share of workforce in economy is higher; in contrast it remains as negligence. At the same time, less wages, absence of social security, social dialogue make them insecure. The vulnerability in their livelihood found. So the paper explores the relation of urbanization and urban poverty in the city, in other words how the urbanization process affecting the urban space in creating the number of poor people in the city. The central focus is the mobility of people with less education and skilled with motive of job search and better livelihood. In many studies found the higher the urbanization and higher the urban poverty in city. In other words, poverty is the impact of urbanization. The strategy of urban inequality through ‘dispersal of concentration’ by the World Bank and others, need to be examined.

Keywords: urbanization, mobility, urban poverty, informal settlements, informal worker

Procedia PDF Downloads 402
1636 Design and Development of Data Mining Application for Medical Centers in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: data mining, medical record system, systems programming, computing

Procedia PDF Downloads 193
1635 DFT and SCAPS Analysis of an Efficient Lead-Free Inorganic CsSnI₃ Based Perovskite Solar Cell by Modification of Hole Transporting Layer

Authors: Seyedeh Mozhgan Seyed Talebi, Chih -Hao Lee

Abstract:

With an abrupt rise in the power conservation efficiency (PCE) of perovskite solar cells (PSCs) within a short span of time, the toxicity of lead was raised as a major hurdle in the path toward their commercialization. In the present research, a systematic investigation of the electrical and optical characteristics of the all-inorganic CsSnI₃ perovskite absorber layer was performed with the Vienna Ab Initio Simulation Package (VASP) using the projector-augmented wave method. The presence of inorganic halide perovskite offers the advantages of enhancing the degradation resistance of the device, reducing the cost of cells, and minimizing the recombination of generated carriers. The simulated standard device using a 1D simulator like solar cell capacitance simulator (SCAPS) version 3308 involves FTO/n-TiO₂/CsSnI₃ Perovskite absorber/Spiro OmeTAD HTL/Au contact layer. The variation in the device design key parameters such as the thickness and defect density of perovskite absorber, hole transport layer and electron transport layer and interfacial defects are examined with their impact on the photovoltaic characteristic parameters. The effect of an increase in operating temperature from 300 K to 400 K on the performance of CsSnI3-based perovskite devices is also investigated. The optimized standard device at room temperature shows the highest PCE of 25.18 % with FF of 75.71 %, Voc of 0.96 V, and Jsc of 34.67 mA/cm². The outcomes and interpretation of different inorganic Cu-based HTLs presence, such as CuSCN, Cu₂O, CuO, CuI, SrCu₂O₂, and CuSbS₂, here represent a critical avenue for the possibility of fabricating high PCE perovskite devices made of stable, low-cost, efficient, safe, and eco-friendly all-inorganic materials like CsSnI₃ perovskite light absorber.

Keywords: CsSnI₃, hole transporting layer (HTL), lead-free perovskite solar cell, SCAPS-1D software

Procedia PDF Downloads 69
1634 The Impact of Simulation-based Learning on the Clinical Self-efficacy and Adherence to Infection Control Practices of Nursing Students

Authors: Raeed Alanazi

Abstract:

Introduction: Nursing students have a crucial role to play in the inhibition of infectious diseases and, therefore, must be trained in infection control and prevention modules prior to entering clinical settings. Simulations have been found to have a positive impact on infection control skills and the use of standard precautions. Aim: The purpose of this study was to use the four sources of self-efficacy in explaining the level of clinical self-efficacy and adherence to infection control practices in Saudi nursing students during simulation practice. Method: A cross-sectional design with convenience sampling was used. This study was conducted in all Saudi nursing schools, with a total number of 197 students participated in this study. Three scales were used simulation self- efficacy Scale (SSES), the four sources of self-efficacy scale (SSES), and Compliance with Standard Precautions Scale (CSPS). Multiple linear regression was used to test the use of the four sources of self-efficacy (SSES) in explaining level of clinical self-efficacy and adherence to infection control in nursing students. Results: The vicarious experience subscale (p =.044) was statistically significant. The regression model indicated that for every one unit increase in vicarious experience (observation and reflection in simulation), the participants’ adherence to infection control increased by .13 units (β =.22, t = 2.03, p =.044). In addition, the regression model indicated that for every one unit increase in education level, the participants’ adherence to infection control increased by 1.82 units (beta=.34= 3.64, p <.001). Also, the mastery experience subscale (p <.001) and vicarious experience subscale (p = .020) were shared significant associations with clinical self-efficacy. Conclusion: The findings of this research support the idea that simulation-based learning can be a valuable teaching-learning method to help nursing students develop clinical competence, which is essential in providing quality and safe nursing care.

Keywords: simulation-based learning, clinical self-efficacy, infection control, nursing students

Procedia PDF Downloads 62
1633 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 637
1632 Digital Platform of Crops for Smart Agriculture

Authors: Pascal François Faye, Baye Mor Sall, Bineta Dembele, Jeanne Ana Awa Faye

Abstract:

In agriculture, estimating crop yields is key to improving productivity and decision-making processes such as financial market forecasting and addressing food security issues. The main objective of this paper is to have tools to predict and improve the accuracy of crop yield forecasts using machine learning (ML) algorithms such as CART , KNN and SVM . We developed a mobile app and a web app that uses these algorithms for practical use by farmers. The tests show that our system (collection and deployment architecture, web application and mobile application) is operational and validates empirical knowledge on agro-climatic parameters in addition to proactive decision-making support. The experimental results obtained on the agricultural data, the performance of the ML algorithms are compared using cross-validation in order to identify the most effective ones following the agricultural data. The proposed applications demonstrate that the proposed approach is effective in predicting crop yields and provides timely and accurate responses to farmers for decision support.

Keywords: prediction, machine learning, artificial intelligence, digital agriculture

Procedia PDF Downloads 67
1631 Sanction Influences and Reconstruction Strategies for Iran Oil Market in Post-Sanctions

Authors: Mehrdad HassanZadeh Dugoori, Iman Mohammadali Tajrishi

Abstract:

Since Iran's nuclear program became public in 2002, the International Atomic Energy Agency (IAEA) has been unable to confirm Tehran's assertions that its nuclear activities are exclusively for peaceful purposes and that it has not sought to develop nuclear weapons. The United Nations Security Council has adopted six resolutions since 2006 requiring Iran to stop enriching uranium - which can be used for civilian purposes, but also to build nuclear bombs, which Iran never follow this strategy- and co-operate with the IAEA. Four resolutions have included progressively expansive sanctions to persuade Tehran to comply. The US and EU have imposed additional sanctions on Iranian oil exports and banks since 2012. In this article we reassess the sanction dimensions of Iran and the influences. Then according to the last agreement between P5+1 and Iran in 15 July 2015, we mention reconstruction strategies for oil export markets of Iran and the operational program for one million barrel of crude oil sales per day. These strategies are the conclusion of focus group and brain storming with Iran's oil and gas managers during content analysis.

Keywords: post-sanction, oil market, reconstruction, marketing, strategy

Procedia PDF Downloads 440
1630 Multi-Functional Metal Oxides as Gas Sensors, Photo-Catalysts and Bactericides

Authors: Koyar Rane

Abstract:

Nano- to submicron size particles of narrow particle size distribution of semi-conducting TiO₂, ZnO, NiO, CuO, Fe₂O₃ have been synthesized by novel hydrazine method and tested for their gas sensing, photocatalytic and bactericidal activities and the behavior found to be enhanced when the oxides in the thin film forms, that obtained in a specially built spray pyrolysis reactor. Hydrazine method is novel in the sense, say, the UV absorption edge of the white pigment grade wide band gap (~3.2eV) TiO₂ and ZnO shifted to the visible region turning into yellowish particles, indicating modification occurring the band structure. The absorption in the visible region makes these oxides visible light sensitive photocatalysis in degrading pollutants, especially the organic dyes which otherwise increase the chemical oxygen demand of the drinking water, enabling the process feasible not under the harsh energetic UV radiation regime. The electromagnetic radiations on irradiation produce electron-hole pairs Semiconductor + hν → e⁻ + h⁺ The electron-hole pairs thus produced form Reactive Oxygen Species, ROS, on the surface of the semiconductors, O₂(adsorbed)+e⁻ → O₂• - superoxide ion OH-(surface)+h⁺ →•OH - Hydroxyl radical The ROS attack the organic material and micro-organisms. Our antibacterial studies indicate the metal oxides control the Biological Oxygen Demand (BOD) of drinking water which had beyond the safe level normally found in the municipal supply. Metal oxides in the thin film form show overall enhanced properties and the films are reusable. The results of the photodegradation and antibactericidal studies are discussed. Gas sensing studies too have been done to find the versatility of the multifunctional metal oxides.

Keywords: hydrazine method, visible light sensitive, photo-degradation of dyes, water/airborne pollutant

Procedia PDF Downloads 154
1629 The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia

Authors: Husnul Isa Harahap

Abstract:

On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values.

Keywords: Islamic values, social movement, peaceful group, sensitive issue

Procedia PDF Downloads 308
1628 Time to Pancreatic Surgery after Preoperative Biliary Drainage in Periampullary Cancers: A Systematic Review and Meta‑Analysis

Authors: Maatouk Mohamed, Nouira Mariem, Hamdi Kbir Gh, Mahjoubi M. F., Ben Moussa M.

Abstract:

Background and aim: Preoperative biliary drainage (PBD) has been introduced to lower bilirubin levels and to control the negative effects of obstructive jaundice in patients with malignant obstructive jaundice undergoing pancreaticoduodenectomy (PD). The optimal time interval between PBD and PD is still not clear. Delaying surgery by 4 to 6 weeks is the commonly accepted practice. However, delayed PD has been shown to decrease the rate of resection and adversely affect the tumor grading and prognosis. Thus, the purpose of our systematic review and meta-analysis was to evaluate the optimal period for PBD prior to PD: short or prolonged in terms of postoperative morbidity and survival outcomes. Methods: Trials were searched in PubMed, Science Direct, Google Scholar, and Cochrane Library until November 2022. Studies using PBD in patients with malignant obstructive jaundice that compared short duration group (SDG) (surgery performed within 3-4 weeks) with prolonged duration group (PDG) (at least 3-4 weeks after PBD) were included in this study. The risk of bias was assessed using the Rob v2 and Robins-I tools. The priori protocol was published in PROSPERO (ID: CRD42022381405). Results: Seven studies comprising 1625 patients (SDG 870, PDG 882) were included. All studies were non-randomized, and only one was prospective. No significant differences were observed between the SDG and PDG in mortality (OR= 0.59; 95% CI [0.30, 1.17], p=0.13), major morbidity (Chi² = 30.28, p <0.00001; I² = 87%), pancreatic fistula (Chi² = 6.61, p = 0.25); I² = 24%), post pancreatectomy haemorrhage (OR= 1.16; 95% CI [0.67, 2.01], p=0.59), positive drainage culture (OR= 0.36; 95% CI [0.10, 1.32], p=0.12), septic complications (OR= 0.78; 95% CI [0.23, 2.72], p=0.70), wound infection (OR= 0.08, p=0.07), operative time (MD= 0.21; p=0.21). Conclusion: Early surgery within 3 or 4 weeks after biliary drainage is both safe and effective. Thus, it is reasonable to suggest early surgery following PBD for patients having resectable periampullary cancers.

Keywords: preoperative biliary drainage, pancreatic cancer, pancreatic surgery, complication

Procedia PDF Downloads 56
1627 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 71
1626 Understanding Walkability in the Libyan Urban Space: Policies, Perceptions and Smart Design for Sustainable Tripoli

Authors: A. Abdulla Khairi Mohamed, Mohamed Gamal Abdelmonem, Gehan Selim

Abstract:

Walkability in civic and public spaces in Libyan cities is challenging due to the lack of accessibility design, informal merging into car traffic, and the general absence of adequate urban and space planning. The lack of accessible and pedestrian-friendly public spaces in Libyan cities has emerged as a major concern for the government if it is to develop smart and sustainable spaces for the 21st century. A walkable urban space has become a driver for urban development and redistribution of land use to ensure pedestrian and walkable routes between sites of living and workplaces. The characteristics of urban open space in the city centre play a main role in attracting people to walk when attending their daily needs, recreation and daily sports. There is significant gap in the understanding of perceptions, feasibility and capabilities of Libyan urban space to accommodate enhance or support the smart design of a walkable pedestrian-friendly environment that is safe and accessible to everyone. The paper aims to undertake observations of walkability and walkable space in the city of Tripoli as a benchmark for Libyan cities; assess the validity and consistency of the seven principal aspects of smart design, safety, accessibility and 51 factors that affect the walkability in open urban space in Tripoli, through the analysis of 10 local urban spaces experts (town planner, architect, transport engineer and urban designer); and explore user groups’ perceptions of accessibility in walkable spaces in Libyan cities through questionnaires. The study sampled 200 respondents in 2015-16. The results of this study are useful for urban planning, to classify the walkable urban space elements which affect to improve the level of walkability in the Libyan cities and create sustainable and liveable urban spaces.

Keywords: walkability, sustainability, liveability, accessibility

Procedia PDF Downloads 422
1625 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 160
1624 Quality of Life among Female Sex Workers of Selected Organization of Pokhara: A Methodological Triangulation

Authors: Sharmila Dahal Paudel

Abstract:

Background: There are around twenty-four thousand to twenty-eight thousand Female Sex Workers in Nepal. FSWs are the vulnerable groups for sexually transmitted infections (STIs) and human immunodeficiency virus (HIV) infections which directly and indirectly ease to reduce the quality of life of such groups. Due to their highly marginalized status, FSWs in Nepal have limited access to information about reproductive health and safe sex practices. The objectives of the study are to assess the quality of life of female sex workers and the factors affecting them. Materials and Methods: A descriptive cross-sectional study with methodological triangulation was conducted among 108 FSWs on the basis of service record of selected organization of Pokhara valley. The complete enumerative sampling was used to select FSWs. Structured interview schedule, WHOQOL-BREF and in-depth questionnaire were used to collect the data. The descriptive and inferential statistics were used to interpret the result. Results: The mean age of participants were 23.44 years and the mean quality of life score was 174.06 ranging from 56.54 to 370.78. Among the domain scores, the mean score is highest in social domain (55.89) followed by physical (45.42), psychological (39.27) and the environmental (34.23). Regarding the association of QOL with socio-demographic, occupation and health-related variables, the multi-linear regression suggests that the satisfaction with occupation was highly significant with the total QOL score (B=-50.50, SE=10.46; p= <0.001) and there is negative relation between QOL and feeling of exploitation and facing STI problems. This means those who feels exploited have significantly less QOL comparing with those who did not feel the same. In correlation analysis, all the domains are positively co-related with each domain which is found to be significant at 1% level of significance. Conclusion: The highest mean score was in social domain, and the lowest is in environmental domain which suggests that the items included in environmental domains could not be utilized or hindrance were there.

Keywords: FSWs, HIV, QOL, WHOQOL-BREF

Procedia PDF Downloads 161
1623 Information Technology Governance Implementation and Its Determinants in the Egyptian Market

Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb

Abstract:

Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.

Keywords: effective IT governance, Egyptian market, information security, risk controls

Procedia PDF Downloads 147
1622 Infringement of Patent Rights with Doctrine of Equivalent for Turkey

Authors: Duru Helin Ozaner

Abstract:

Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.

Keywords: patent, infringement, intellectual property, the doctrine of equivalent

Procedia PDF Downloads 201
1621 Stroke Rehabilitation via Electroencephalogram Sensors and an Articulated Robot

Authors: Winncy Du, Jeremy Nguyen, Harpinder Dhillon, Reinardus Justin Halim, Clayton Haske, Trent Hughes, Marissa Ortiz, Rozy Saini

Abstract:

Stroke often causes death or cerebro-vascular (CV) brain damage. Most patients with CV brain damage lost their motor control on their limbs. This paper focuses on developing a reliable, safe, and non-invasive EEG-based robot-assistant stroke rehabilitation system to help stroke survivors to rapidly restore their motor control functions for their limbs. An electroencephalogram (EEG) recording device (EPOC Headset) and was used to detect a patient’s brain activities. The EEG signals were then processed, classified, and interpreted to the motion intentions, and then converted to a series of robot motion commands. A six-axis articulated robot (AdeptSix 300) was employed to provide the intended motions based on these commends. To ensure the EEG device, the computer, and the robot can communicate to each other, an Arduino microcontroller is used to physically execute the programming codes to a series output pins’ status (HIGH or LOW). Then these “hardware” commends were sent to a 24 V relay to trigger the robot’s motion. A lookup table for various motion intensions and the associated EEG signal patterns were created (through training) and installed in the microcontroller. Thus, the motion intention can be direct determined by comparing the EEG patterns obtaibed from the patient with the look-up table’s EEG patterns; and the corresponding motion commends are sent to the robot to provide the intended motion without going through feature extraction and interpretation each time (a time-consuming process). For safety sake, an extender was designed and attached to the robot’s end effector to ensure the patient is beyond the robot’s workspace. The gripper is also designed to hold the patient’s limb. The test results of this rehabilitation system show that it can accurately interpret the patient’s motion intension and move the patient’s arm to the intended position.

Keywords: brain waves, EEG sensor, motion control, robot-assistant stroke rehabilitation

Procedia PDF Downloads 369
1620 A Comparison of Outcomes of Endoscopic Retrograde Cholangiopancreatography vs. Percutaneous Transhepatic Biliary Drainage in the Management of Obstructive Jaundice from Hepatobiliary Tuberculosis: The Philippine General Hospital Experience

Authors: Margaret Elaine J. Villamayor, Lobert A. Padua, Neil S. Bacaltos, Virgilio P. Bañez

Abstract:

Significance: This study aimed to determine the prevalence of Hepatobiliary Tuberculosis (HBTB) with biliary obstruction and to compare the outcomes of ERCP versus PTBD in these patients. Methodology: This is a cross-sectional study involving patients from PGH who underwent biliary drainage from HBTB from January 2009 to June 2014. HBTB was defined as having evidence of TB (culture, smear, PCR, histology) or clinical diagnosis with the triad of jaundice, fever, and calcifications on imaging with other causes of jaundice excluded. The primary outcome was successful drainage and secondary outcomes were mean hospital stay and complications. Simple logistic regression was used to identify factors associated with success of drainage, z-test for two proportions to compare outcomes of ERCP versus PTBD and t-test to compare mean hospital stay post-procedure. Results: There were 441 patients who underwent ERCP and PTBD, 19 fulfilled the inclusion criteria. 11 underwent ERCP while 8 had PTBD. There were more successful cases in PTBD versus ERCP but this was not statistically significant (p-value 0.3615). Factors such as age, gender, location and nature of obstruction, vices, coexisting pulmonary or other extrapulmonary TB and presence of portal hypertension did not affect success rates in these patients. The PTBD group had longer mean hospital stay but this was not significant (p-value 0.1880). There were no complications reported in both groups. Conclusion: HBTB comprises 4.3% of the patients undergoing biliary drainage in PGH. Both ERCP and PTBD are equally safe and effective in the management of biliary obstruction from HBTB.

Keywords: cross-sectional, hepatobiliary tuberculosis, obstructive jaundice, endoscopic retrograde cholangiopancreatography, percutaneous transhepatic biliary drainage

Procedia PDF Downloads 434