Search results for: Node Smith
434 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication
Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader
Abstract:
This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.Keywords: control area network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE
Procedia PDF Downloads 482433 Clinical Value of 18F-FDG-PET Compared with CT Scan in the Detection of Nodal and Distant Metastasis in Urothelial Carcinoma or Bladder Cancer
Authors: Mohammed Al-Zubaidi, Katherine Ong, Pravin Viswambaram, Steve McCombie, Oliver Oey, Jeremy Ong, Richard Gauci, Ronny Low, Dickon Hayne
Abstract:
Objective: Lymph node involvement along with distant metastasis in a patient with invasive bladder cancer determines the disease survival, therefeor, it is an essential determinant of the therapeutic management and outcome. This retrospective study aims to determine the accuracy of FDG PET scan in detecting lymphatic involvement and distant metastatic urothelial cancer compared to conventional CT staging. Method: A retrospective review of 76 patients with UC or BC who underwent surgery or confirmatory biopsy that was staged with both CT and 18F-FDG-PET (up to 8 weeks apart) between 2015 and 2020. Fifty-sevenpatients (75%) had formal pelvic LN dissection or biopsy of suspicious metastasis. 18F-FDG-PET reports for positive sites were qualitative depending on SUV Max. On the other hand, enlarged LN by RECIST criteria 1.1 (>10 mm) and other qualitative findings suggesting metastasis were considered positive in CT scan. Histopathological findings from surgical specimens or image-guided biopsies were considered the gold standard in comparison to imaging reports. 18F-FDG-avid or enlarged pelvic LNs with surgically proven nodal metastasis were considered true positives. Performance characteristics of 18F-FDG-PET and CT, including sensitivity, specificity, positive predictive value (PPV), and negative predictive value (PPV), were calculated. Results: Pelvic LN involvement was confirmed histologically in 10/57 (17.5%) patients. Sensitivity, specificity, PPV and NPV of CT for detecting pelvic LN metastases were 41.17% (95% CI:18-67%), 100% (95% CI:90-100%) 100% (95% CI:59-100%) and 78.26% (95% CI:64-89%) respectively. Sensitivity, specificity, PPV and NPV of 18F-FDG-PET for detecting pelvic LN metastases were 62.5% (95% CI:35-85%), 83.78% (95% CI:68-94%), 62.5% (95% CI:35-85%), and 83.78% (95% CI:68-94%) respectively. Pre-operative staging with 18F-FDG-PET identified the distant metastatic disease in 9/76 (11.8%) patients who were occult on CT. This retrospective study suggested that 18F-FDG-PET may be more sensitive than CT for detecting pelvic LN metastases. 7/76 (9.2%) patients avoided cystectomy due to 18F-FDG-PET diagnosed metastases that were not reported on CT. Conclusion: 18F-FDG-PET is more sensitive than CT for pelvic LN metastases, which can be used as the standard modality of bladder cancer staging, as it may change the treatment by detecting lymph node metastasis that was occult in CT. Further research involving randomised controlled trials comparing the diagnostic yield of 18F-FDG-PET and CT in detecting nodal and distant metastasis in UC or BC is warranted to confirm our findings.Keywords: FDG PET, CT scan, urothelial cancer, bladder cancer
Procedia PDF Downloads 120432 Handshake Algorithm for Minimum Spanning Tree Construction
Authors: Nassiri Khalid, El Hibaoui Abdelaaziz et Hajar Moha
Abstract:
In this paper, we introduce and analyse a probabilistic distributed algorithm for a construction of a minimum spanning tree on network. This algorithm is based on the handshake concept. Firstly, each network node is considered as a sub-spanning tree. And at each round of the execution of our algorithm, a sub-spanning trees are merged. The execution continues until all sub-spanning trees are merged into one. We analyze this algorithm by a stochastic process.Keywords: Spanning tree, Distributed Algorithm, Handshake Algorithm, Matching, Probabilistic Analysis
Procedia PDF Downloads 656431 Grisotti Flap as Treatment for Central Tumors of the Breast
Authors: R. Pardo, P. Menendez, MA Gil-Olarte, S. Sanchez, E. García, R. Quintana, J. Martín
Abstract:
Introduction : Within oncoplastic breast techniques there is increased interest in immediate partial breast reconstruction. The volume resected is greater than that of conventional conservative techniques. Central tumours of the breast have classically been treated with a mastectomy with regard to oncological safety and cosmetic secondary effects after wide central resection of the nipple and breast tissue beneath. Oncological results for central quadrantectomy have a recurrence level, disease- free period and survival identical to mastectomy. Grissoti flap is an oncoplastic surgical technique that allows the surgeon to perform a safe central quadrantectomy with excellent cosmetic results. Material and methods: The Grissoti flap is a glandular cutaneous advancement rotation flap that can fill the defect in the central portion of the excised breast. If the inferior border is affected by tumour and further surgery is decided upon at the Multidisciplinary Team Meeting, it will be necessary to perform a mastectomy. All patients with a Grisotti flap undergoing surgery since 2009 were reviewed obtaining the following data: age, hystopathological diagnosis, size, operating time, volume of tissue resected, postoperative admission time, re-excisions due to positive margins affected by tumour, wound dehiscence, complications and recurrence. Analysis and results of sentinel node biopsy were also obtained. Results: 12 patients underwent surgery between 2009-2015. The mean age was 54 years (34-67) . All had a preoperative diagnosis of ductal infiltrative carcinoma of less than 2 cm,. Diagnosis was made with Ultrasound, Mamography or both . Magnetic resonance was used in 5 cases. No patients had preoperative positive axilla after ultrasound exploration. Mean operating time was 104 minutes (84-130). Postoperative stay was 24 hours. Mean volume resected was 159 cc (70-286). In one patient the surgical border was affected by tumour and a further procedure with resection of the affected border was performed as ambulatory surgery. The sentinel node biopsy was positive for micrometastasis in only two cases. In one case lymphadenectomy was performed in 2009. In the other, treated in 2015, no lymphadenectomy was performed as the patient had a favourable histopathological prognosis and the multidisciplinary team meeting agreed that lymphadenectomy was not required. No recurrence has been diagnosed in any of the patients who underwent surgery and they are all disease free at present. Conclusions: Conservative surgery for retroareolar central tumours of the breast results in good local control of the disease with free surgical borders, including resection of the nipple areola complex and pectoral major muscle fascia. Reconstructive surgery with the inferior Grissoti flap adequately fills the defect after central quadrantectomy with creation of a new cutaneous disc where a new nipple areola complex is reconstructed with a local flap or micropigmentation. This avoids the need for contralateral symmetrization. Sentinel Node biopsy can be performed without added morbidity. When feasible, the Grissoti flap will avoid skin-sparing mastectomy for central breast tumours that will require the use of an expander, prosthesis or myocutaneous flap, with all the complications of a more complex operation.Keywords: Grisotti flap, oncoplastic surgery, central tumours, breast
Procedia PDF Downloads 339430 Functional Specifications of Diesel Electric Locomotives
Authors: Rohan Sarker, Cory Smith
Abstract:
ROMIC Group UK is a leading provider of diesel electric locomotives, specializing in innovative and efficient solutions for rail transportation. With a strong focus on sustainability and performance, ROMIC's diesel electric locomotives are engineered to reduce fuel consumption while maximizing operational efficiency. The company's locomotives incorporate advanced technologies such as regenerative braking systems and precision control software, which enhance fuel economy and minimize environmental impact. ROMIC's extensive experience in the rail sector enables it to deliver reliable and powerful locomotives that meet the demands of both freight and passenger services. These locomotives are designed for heavy-duty applications, offering superior traction and load-carrying capacity across various terrains. The company's commitment to cutting-edge engineering and customer satisfaction ensures that its locomotives are a trusted choice for rail operators looking for high performance and low operational costs. ROMIC Group UK continues to drive innovation in the rail industry with its sustainable locomotive solutions.Keywords: diesel, electric, engines, locomotives
Procedia PDF Downloads 16429 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails
Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith
Abstract:
Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.Keywords: cybersecurity, human-centric, phishing, psychology
Procedia PDF Downloads 81428 The Influence of E-Health Education on Professional Practice: A Qualitative Study
Authors: Sisira Edirippulige, Anthony C. Smith, Sumudu Wickramasinghe, Nigel R. Armfield
Abstract:
Background: E-Health is steadily integrating into modern health services, making significant changes in the way health services are traditionally delivered. To work in this new environment, healthcare workers are required to have new knowledge, skills, and competencies specific to e-Health. The aim of this study was to understand the self-reported perceptions of graduates regarding the influence of an e-Health postgraduate program on their professional careers. Methods: All graduates from 2005 to 2015 were surveyed using an online questionnaire that consisted of a mixture of closed and open-ended questions. Results: The number of participants in the study was 32. Response rate was 62%. Graduates thought that the postgraduate e-Health program had an influence on their professional practice. The majority of the participants mentioned that they had worked in the e-Health field since their graduation. Their professional roles mainly involved implementation of e-Health in health service settings and the use of e-Health in clinical practice. Conclusions: While e-Health may be steadily integrating into modern health services, e-Health specific job opportunities are still relatively limited. E-Health workforce development must be given priority.Keywords: e-health, postgraduate education, clinical practice, curriculum
Procedia PDF Downloads 160427 Using Digitally Reconstructed Radiographs from Magnetic Resonance Images to Localize Pelvic Lymph Nodes on 2D X-Ray Simulator-Based Brachytherapy Treatment Planning
Authors: Mohammad Ali Oghabian, Reza Reiazi, Esmaeel Parsai, Mehdi Aghili, Ramin Jaberi
Abstract:
In this project a new procedure has been introduced for utilizing digitally reconstructed radiograph from MRI images in Brachytherapy treatment planning. This procedure enables us to localize the tumor volume and delineate the extent of critical structures in vicinity of tumor volume. The aim of this project was to improve the accuracy of dose delivered to targets of interest in 2D treatment planning system.Keywords: brachytherapy, cervix, digitally reconstructed radiographs, lymph node
Procedia PDF Downloads 529426 Nonlinear Finite Element Analysis of Concrete Filled Steel I-Girder Bridge
Authors: Waheed Ahmad Safi, Shunichi Nakamura
Abstract:
Concrete filled steel I-girder (CFIG) bridge was proposed and the bending and shear strength was confirmed by experiments. The area surrounded by the upper and lower flanges and the web is filled with concrete in CFIG, which is used to the intermediate support of a continuous girder. Three-dimensional finite element models were established to simulate the bending and shear behaviors of CFIG and to clarify the load transfer mechanism. Steel plates and filled concrete were modeled as a three-dimensional 8-node solid element and steel reinforcement bars as a three-dimensional 2-node truss element. The elements were mostly divided into the 50 x 50 mm mesh size. The non-linear stress-strain relation is assumed for concrete in compression including the softening effect after the peak, and the stress increases linearly for concrete in tension until concrete cracking but then decreases due to tension stiffening effect. The stress-strain relation for steel plates was tri-linear and that for reinforcements was bi-linear. The concrete and the steel plates were rigidly connected. The developed FEM model was applied to simulate and analysis the bending behaviors of the CFIG specimens. The vertical displacements and the strains of steel plates and the filled concrete obtained by FEM agreed very well with the test results until the yield load. The specimens collapsed when the upper flange buckled or the concrete spalled off. These phenomena cannot be properly analyzed by FEM, which produces a small discrepancy at the ultimate states. The FEM model was also applied to simulate and analysis the shear tests of the CFIG specimens. The vertical displacements and strains of steel and concrete calculated by FEM model agreed well with the test results. A truss action was confirmed by the FEM and the experiment, clarifying that shear forces were mainly resisted by the tension strut of the steel plate and the compression strut of the filled concrete acting in the diagonal direction. A trail design with the CFIG was carried out for a four-span continuous highway bridge and the design method was established. Construction cost was estimated about 12% lower than that of a conventional steel I-section girder.Keywords: concrete filled steel I-girder, bending strength, FEM, limit states design, steel I-girder, shear strength
Procedia PDF Downloads 217425 Cluster-Based Multi-Path Routing Algorithm in Wireless Sensor Networks
Authors: Si-Gwan Kim
Abstract:
Small-size and low-power sensors with sensing, signal processing and wireless communication capabilities is suitable for the wireless sensor networks. Due to the limited resources and battery constraints, complex routing algorithms used for the ad-hoc networks cannot be employed in sensor networks. In this paper, we propose node-disjoint multi-path hexagon-based routing algorithms in wireless sensor networks. We suggest the details of the algorithm and compare it with other works. Simulation results show that the proposed scheme achieves better performance in terms of efficiency and message delivery ratio.Keywords: clustering, multi-path, routing protocol, sensor network
Procedia PDF Downloads 402424 Running the Athena Vortex Lattice Code in JAVA through the Java Native Interface
Authors: Paul Okonkwo, Howard Smith
Abstract:
This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.Keywords: aerodynamics, automation, optimisation, AVL, JNI
Procedia PDF Downloads 564423 Influence of Javascript Programming on the Developement of Web and Mobile Application
Authors: Abdul Basit Kiani
Abstract:
Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.Keywords: java script, react, nodejs, htmlcsss
Procedia PDF Downloads 121422 The Spirit of Midwood: The Vitagraph Company of America and Its Special Relationship with the Borough of Brooklyn, 1897-1925
Authors: David Morton
Abstract:
This work discusses the relationship between the Vitagraph Company of America (VCA) and the neighborhood of Midwood, Brooklyn, where the company’s largest production studio was located. The relationship between VCA and the Borough of Brooklyn was unique from other production companies in that despite the nationwide popularity of Vitagraph’s films, the content of the films produced by Vitagraph were directly influenced by the cinematic preferences of one specific urban center. In contrast to the national aspirations of the leading production companies of the period such as Twentieth Century Fox, Paramount, and Universal, who set out to attract the broadest audience possible, VCA’s films were aimed to appeal to specific a niche group that embodied Brooklyn’s conservative principles. As a result of the VCA’s alliance with theater owners and movie spectators in Brooklyn, the Vitagraph studio in Midwood became one of the Borough’s most recognizable cultural institutions, and through the production of Vitagraph’s quality films Brooklynites had a significant means of sharing their unique cultural identity with the rest of the United States.Keywords: Vitagraph Company of America, Midwood, Brooklyn, Vitagrapheville, New York Motion Picture History, silent era, J. Stuart Blackton, Albert Smith
Procedia PDF Downloads 414421 Afghan Refugees as Perpetui Inimici: Revisiting an Early Modern Debate on Enemy Aliens
Authors: Brian Smith
Abstract:
This paper seeks to contrast the contemporary anti-immigration rhetoric since the US pullout of Afghanistan with the debate about enemy aliens in the early modern period. In the seventeenth century, Sir Edward Coke declared that “infidels” should be seen as perpetui inimici (perpetual enemies) since their values were inimical to those of Christian states. As such, they could be perpetually excluded and denied legal standing. Even at that time, these anti-“infidel” arguments clashed with the natural law tradition of hospitality, which assumed that states had a moral responsibility to admit and care for strangers. In particular, this paper looks at the conflict between Hugo Grotius, Samuel Pufendorf, and John Locke. Grotius argues that states have a duty to admit foreigners. He goes out of his way to plan for the admittance of Jewish immigrants. In contrast, Pufendorf claimed that sovereigns had a duty exclude foreigners who would alter the constitutional character of the state. Much like Grotius, Locke argued that non-Christian peoples should be treated as friends and admitted without reservation.Keywords: enemy aliens, perpetual enemies, hospitality, refugees
Procedia PDF Downloads 106420 A Near-Optimal Domain Independent Approach for Detecting Approximate Duplicates
Authors: Abdelaziz Fellah, Allaoua Maamir
Abstract:
We propose a domain-independent merging-cluster filter approach complemented with a set of algorithms for identifying approximate duplicate entities efficiently and accurately within a single and across multiple data sources. The near-optimal merging-cluster filter (MCF) approach is based on the Monge-Elkan well-tuned algorithm and extended with an affine variant of the Smith-Waterman similarity measure. Then we present constant, variable, and function threshold algorithms that work conceptually in a divide-merge filtering fashion for detecting near duplicates as hierarchical clusters along with their corresponding representatives. The algorithms take recursive refinement approaches in the spirit of filtering, merging, and updating, cluster representatives to detect approximate duplicates at each level of the cluster tree. Experiments show a high effectiveness and accuracy of the MCF approach in detecting approximate duplicates by outperforming the seminal Monge-Elkan’s algorithm on several real-world benchmarks and generated datasets.Keywords: data mining, data cleaning, approximate duplicates, near-duplicates detection, data mining applications and discovery
Procedia PDF Downloads 385419 Bystander Perceived Severity on Traditional versus Cyber Bullying
Authors: C. Smith, T. Goga, T. Hancock
Abstract:
Bullying has been an increasingly prevalent problem among society for decades. Approximately one out of every four students report being bullied at least once during the school year. Additionally, these instances of bullying are often witnessed but not reported by the bystanders, which could be dependent on the type of bullying situation. Thus, the present study aims to investigate any possible perceptual differences which may exist between traditional bullying (i.e., face to face) and cyberbullying from the bystander’s point of view. Undergraduate students were given a bullying scenario to read from either the traditional condition or the cyber condition. They were then asked to rate how severe they perceived this behavior on a Likert based scale. Participants were also asked if they would intervene (yes or no) and what their individual response would be to the witnessed behavior (report/ignore/confront/other). Results indicated that, while there was no significant difference in perceived severity between the two bullying conditions, there was a significant difference in whether or not participants would intervene between the two types of scenarios. A significant effect was also found between the scenarios for response type. Together, these findings suggest that even though individuals may not be aware of how severe they perceive certain bullying behaviors, the responses they exhibit might suggest otherwise.Keywords: bullying, bystander, cyber, severity, traditional
Procedia PDF Downloads 135418 Using Photo-Elicitation to Explore the Cosmology of Personal Training
Authors: John Gray, Andy Smith, Hazel James
Abstract:
With the introduction of projects such as GP referral and other medical exercise schemes, there has been a shift in the cosmology underpinning exercise leadership. That is, the knowledge base of exercise leaders, specifically personal trainers, has moved from a cosmology based on aesthetic and physical fitness demands to one requiring interaction with the dominant biomedical model underpinning contemporary medicine. In line with this shift research has demonstrated that personal trainer education has aligned itself to a biotechnological model. However, whilst there is a need to examine exercise as medicine, and consider the role of personal trainers as prescribers of these interventions, the possible issues surrounding the growing medicalization of the exercise cosmology have not been explored. Using a phenomenological methodology, and the novel approach of photo-elicitation, this research examined the practices of successful personal trainers. The findings highlight that a growing focus on an iatro-biological based scientific process of exercise prescription may prove problematical. Through the development of a model of practitioner-based knowledge, it is argued there is a possible growing disconnection between the theoretical basis of exercise science and the working cosmology of exercise practitioners.Keywords: biomedicine, cosmology, personal training, photo-elicitation
Procedia PDF Downloads 379417 Integrating the Athena Vortex Lattice Code into a Multivariate Design Synthesis Optimisation Platform in JAVA
Authors: Paul Okonkwo, Howard Smith
Abstract:
This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.Keywords: aerodynamics, automation, optimisation, AVL, JNI
Procedia PDF Downloads 581416 Study on the Work-Life Balance of Selected Working Single Mothers in the Coastal Community of La Huerta, Paranaque
Authors: Idette Sheirina Biyo, Rhodora Lynn C. Lintag
Abstract:
This paper explores how the work-life balance of selected working single mothers situated in a coastal community is affecting their well-being. Working single mothers carry the responsibility of earning for their family while simultaneously exercising their motherhood. This study utilized a purposeful qualitative research through semi-structured interviews among ten working single mothers living in the coastal community of La Huerta, Parañaque in order to identify the following: a) experiences of the working single mothers, b) problems usually encountered, and c) how these problems are affecting their well-being. Dorothy Smith’s Feminist Standpoint theory is used as a theoretical lens in order to explain their work-life balance. Results have shown that despite their dual roles as the main income earners and heads of the households, they are not neglecting to care for their well-being. They consider getting sufficient rest, eating well, and going to church as forms of caring for their well-being. Other factors that affect their work-life balance include living arrangements, work hours, type of work, and income.Keywords: coastal community, well-being, work-life balance, Working single mother
Procedia PDF Downloads 204415 Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems
Authors: Isabelle Snyder, Travis Smith
Abstract:
Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR).Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection
Procedia PDF Downloads 94414 The Making of a Community: Perception versus Reality of Neighborhood Resources
Authors: Kirstie Smith
Abstract:
This paper elucidates the value of neighborhood perception as it contributes to the advancement of well-being for individuals and families within a neighborhood. Through in-depth interviews with city residents, this paper examines the degree to which key stakeholders’ (residents) evaluate their neighborhood and perception of resources and identify, access, and utilize local assets existing in the community. Additionally, the research objective included conducting a community inventory that qualified the community assets and resources of lower-income neighborhoods of a medium-sized industrial city. Analysis of the community’s assets was compared with the interview results to allow for a better understanding of the community’s condition. Community mapping revealed the key informants’ reflections of assets were somewhat validated. In each neighborhood, there were more assets mapped than reported in the interviews. Another chief supposition drawn from this study was the identification of key development partners and social networks that offer the potential to facilitate locally-driven community development. Overall, the participants provided invaluable local knowledge of the perception of neighborhood assets, the well-being of residents, the condition of the community, and suggestions for responding to the challenges of the entire community in order to mobilize the present assets and networks.Keywords: community mapping, family, resource allocation, social networks
Procedia PDF Downloads 351413 Looking At Labor Trafficking In Poland
Authors: Ashlyn Smith, Chloe Zampelli, Vincent Manna, Vernon Murray
Abstract:
According to Polaris (a UN affiliate), there are currently 44 million human trafficking victims globally. Using a sample of 137 labor trafficking victims in Poland, we found that all were Ukrainian citizens. We categorized victims according to the “Victim Intervention Marketing” (Murray) social marketing framework. The largest victim type consisted of “Willing Assimilators” (57%). This means they entered their particular trafficking situations without coercion and were left at will. Such victims are typically driven by financial desperation. Twenty percent (20%) of Willing Assimilators were men, and 80% were women. Victims who were not Willing Assimilators were forced as either “Enlightened Apostates” (37%) or “Tricked and Trapped” (7%). All of the forced victims were women. Crosstabs with Chi-square test (Pearson Chi-Square test significance = .002) results indicated that the male victims were all between 30 and 38 years old, while female victim ages ranged from 24 to 47. Accordingly, labor trafficking victim interventions in Poland should be age-sensitive and focus on three areas: 1) economic development for the Willing Assimilators, 2) training to identify fraudulent job postings, etc. for the Tricked and Trapped segment, and 3) training to equip potential victims to distrust certain close “loved ones” for the Enlightened Apostates.Keywords: Poland, labor trafficking, social marketing, victim intervention marketing
Procedia PDF Downloads 185412 Generation Y Leaders in Radiology Nursing - Changing the Culture by Understanding the Challenges of a Multi-Generational Workforce
Authors: Amie Smith, Jodi-Lyn Benjamin
Abstract:
In 2020, there are currently four generations in the nursing workforce: The Veterans, Boomers, Generation X and Generation Y (Gen Y). Understanding each generation and their growing needs will equip the workforce for when the Boomers prepare for retirement, with majority of nursing leadership positions to be potentially replaced with Gen Y nurses. In SA Medical Imaging(SAMI), at Flinders Medical Centre (FMC), it has been proven that despite challenges in succession planning, Gen Y nurse leaders are able to overcome these obstacles and provide the leadership necessary to meet the changing needs in healthcare and across organisations. Changing the culture in radiology nursing has been seen as an obstacle due to the historical nursing practices and resistance to adapt to current/future practice. As radiology advances so does the role of the nurse in imaging, this has required resilience and strong support through leadership as we change and develop the culture to keep up with the evolution of technology and standard of patient care. As a result of supporting Gen Y nurses in leadership roles, SAMI, FMC has seen a positive change in culture by creating a healthy work environment which has allowed Gen Y nurses to make long lasting contributions to the nursing profession.Keywords: changing culture, Generation Y, radiology, nursing, leadership
Procedia PDF Downloads 136411 CERD: Cost Effective Route Discovery in Mobile Ad Hoc Networks
Authors: Anuradha Banerjee
Abstract:
A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence, we require energy efficient route discovery technique to enhance their lifetime and network performance. In this paper, we propose an energy-efficient route discovery technique CERD that greatly reduces the number of route requests flooded into the network and also gives priority to the route request packets sent from the routers that has communicated with the destination very recently, in single or multi-hop paths. This does not only enhance the lifetime of nodes but also decreases the delay in tracking the destination.Keywords: ad hoc network, energy efficiency, flooding, node lifetime, route discovery
Procedia PDF Downloads 346410 Study of the Thermomechanical Behavior of a Concrete Element
Authors: Douhi Reda Bouabdellah, Khalafi Hamid, Belamri Samir
Abstract:
The desire to improve the safety of nuclear reactor containment has revealed the need for data on the thermo mechanical behavior of concrete in case of accident during which the concrete is exposed to high temperatures. The aim of the present work is to study the influence of high temperature on the behavior of ordinary concrete specimens loaded by an effort of compression. A thermal model is developed by discretization volume elements (CASTEM). The results of different simulations, combined with other findings help to bring a physical phenomenon explanation Thermo mechanical concrete structures, which allowed to obtain the variation of the stresses anywhere in point or node and each subsequent temperature different directions X, Y and Z.Keywords: concrete, thermic-gradient, fire resistant, simulation by CASTEM, mechanical strength
Procedia PDF Downloads 305409 SFO-ECRSEP: Sensor Field Optimızation Based Ecrsep For Heterogeneous WSNS
Authors: Gagandeep Singh
Abstract:
The sensor field optimization is a serious issue in WSNs and has been ignored by many researchers. As in numerous real-time sensing fields the sensor nodes on the corners i.e. on the segment boundaries will become lifeless early because no extraordinary safety is presented for them. Accordingly, in this research work the central objective is on the segment based optimization by separating the sensor field between advance and normal segments. The inspiration at the back this sensor field optimization is to extend the time spam when the first sensor node dies. For the reason that in normal sensor nodes which were exist on the borders may become lifeless early because the space among them and the base station is more so they consume more power so at last will become lifeless soon.Keywords: WSNs, ECRSEP, SEP, field optimization, energy
Procedia PDF Downloads 298408 A Theoretical Framework on International Voluntary Health Networks
Authors: Benet Reid, Nina Laurie, Matt Baillie-Smith
Abstract:
Trans-national and tropical medicine, historically associated with colonial power and missionary activity, is now central to discourses of global health and development, thrust into mainstream media by events like the 2014 Ebola crisis and enshrined in the Sustainable Development Goals. Research in this area remains primarily the province of health professional disciplines, and tends to be framed within a simple North-to-South model of development. The continued role of voluntary work in this field is bound up with a rhetoric of partnering and partnership. We propose, instead, the idea of International Voluntary Health Networks (IVHNs) as a means to de-centre global-North institutions in these debates. Drawing on our empirical work with IVHNs in countries both North and South, we explore geographical and sociological theories for mapping the multiple spatial and conceptual dynamics of power manifested in these phenomena. We make a radical break from conventional views of health as a de-politicised symptom or corollary of social development. In studying health work as it crosses between cultures and contexts, we demonstrate the inextricably political nature of health and health work everywhere.Keywords: development, global health, power, volunteering
Procedia PDF Downloads 322407 Energy Consumption in China’s Urban Water Supply System
Authors: Kate Smith, Shuming Liu, Yi Liu, Dragan Savic, Gustaf Olsson, Tian Chang, Xue Wu
Abstract:
In a water supply system, a great deal of care goes into sourcing, treating and delivering water to consumers, but less thought is given to the energy consumed during these processes. This study uses 2011 data to quantify energy use for urban water supply in China and investigates population density as a possible influencing factor. The objective is to provide information that can be used to develop energy-conscious water infrastructure policy, calculate the energy co-benefits of water conservation and compare energy use between China and other countries. The average electrical energy intensity and per capita electrical energy consumption for urban water supply in China in 2011 were 0.29 kWh/m3 and 33.2 kWh/cap•yr, respectively. Comparison between provinces revealed a direct correlation between energy intensity of urban water supply and population served per unit length of pipe. This could imply energy intensity is lower when more densely populated areas are supplied by relatively dense networks of pipes. This study also found that whereas the percentage of energy used for urban water supply tends to increase with the percentage of population served this increase is slower where water supply is more energy efficient and where a larger percentage of population is already supplied.Keywords: china, electrical energy use, water-energy nexus, water supply
Procedia PDF Downloads 494406 Associations between Autistic and ADHD Traits and the Wellbeing and Mental Health of Secondary School Students with a Focus on Anxiety and Depression
Authors: Japnoor Garcha, Andrew P. Smith, A. James
Abstract:
There has been a significant increase in the prevalence and estimates of neurodevelopmental disorders, especially autism spectrum disorders, in the last decade. The literature has seen increasing research on understanding wellbeing and mental health. To understand the association and interaction of wellbeing and mental health with autism and ADHD, a survey was given to 560 secondary school students. The survey used the wellbeing process questionnaire, the autism spectrum quotient, the ADHD self-report scale, and the strengths and difficulties questionnaire. The analysis conducted using SPSS showed that there was a significant correlation between anxiety, depression, A.Q., and ADHD. Anxiety and depression were also significantly correlated with all wellbeing and SDQ variables. The regression analysis showed that anxiety was significantly associated with positive wellbeing, negative wellbeing, emotional problems, and prosocial behaviour, whereas depression was significantly associated with positive wellbeing, negative wellbeing, physical health, flourishing, conduct problems, emotional problems and peer problems.Keywords: ADHD traits, anxiety, autistic traits, depression
Procedia PDF Downloads 58405 Modification of the Athena Vortex Lattice Code for the Multivariate Design Synthesis Optimisation of the Blended Wing Body Aircraft
Authors: Paul Okonkwo, Howard Smith
Abstract:
This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.Keywords: aerodynamics, automation, optimisation, AVL
Procedia PDF Downloads 655