Search results for: concern
1832 Implementation of a Preventive Maintenance Plan to Improve the Availability of the “DRUM” Line at SAMHA (Brandt) Setif, Algeria
Authors: Fahem Belkacemi, Lyes Ouali
Abstract:
Maintenance strategies and assessments continue to be a major concern for companies today. The socio-economic bets of their competitiveness are closely linked to the activities and quality of maintenance. This work deals with a study of a preventive maintenance plan to improve the availability of the production line within SAMSUNG HOME APPLIANCE “SAMHA”, Setif, Algeria. First, we applied the method of analysis of failure modes, their impact, and criticality to reduce downtime and identification of the most critical elements. Finally, to improve the availability of the production line, we carried out a study of the current preventive maintenance plan in the production line workshop at the company level and according to the history sheet of machine failures. We proposed a preventive maintenance plan to improve the availability of the production line.Keywords: preventive maintenance, DRUM line, AMDEC, availability
Procedia PDF Downloads 711831 A Comparison of Neural Network and DOE-Regression Analysis for Predicting Resource Consumption of Manufacturing Processes
Authors: Frank Kuebler, Rolf Steinhilper
Abstract:
Artificial neural networks (ANN) as well as Design of Experiments (DOE) based regression analysis (RA) are mainly used for modeling of complex systems. Both methodologies are commonly applied in process and quality control of manufacturing processes. Due to the fact that resource efficiency has become a critical concern for manufacturing companies, these models needs to be extended to predict resource-consumption of manufacturing processes. This paper describes an approach to use neural networks as well as DOE based regression analysis for predicting resource consumption of manufacturing processes and gives a comparison of the achievable results based on an industrial case study of a turning process.Keywords: artificial neural network, design of experiments, regression analysis, resource efficiency, manufacturing process
Procedia PDF Downloads 5241830 Electrification Strategy of Hybrid Electric Vehicle as a Solution to Decrease CO2 Emission in Cities
Authors: M. Mourad, K. Mahmoud
Abstract:
Recently hybrid vehicles have become a major concern as one alternative vehicles. This type of hybrid vehicle contributes greatly to reducing pollution. Therefore, this work studies the influence of electrification phase of hybrid electric vehicle on emission of vehicle at different road conditions. To accomplish this investigation, a simulation model was used to evaluate the external characteristics of the hybrid electric vehicle according to variant conditions of road resistances. Therefore, this paper reports a methodology to decrease the vehicle emission especially greenhouse gas emission inside cities. The results show the effect of electrification on vehicle performance characteristics. The results show that CO2 emission of vehicle decreases up to 50.6% according to an urban driving cycle due to applying the electrification strategy for hybrid electric vehicle.Keywords: electrification strategy, hybrid electric vehicle, driving cycle, CO2 emission
Procedia PDF Downloads 4421829 Introducing a Proper Total Quality Management Model for Libraries
Authors: Alireza Shahraki, Kaveh Keshmiry Zadeh
Abstract:
Total quality management in libraries is of particular importance because high-quality libraries can facilitate the sustained development process in countries. This study has been conducted to examine the feasibility of implementation of total quality management in libraries of Sistan and Baluchestan and to provide an appropriate model for this concern. All of the officials and employees of Sistan and Baluchestan libraries (23 individuals) constitute the population of the study. Data gathering tool is a questionnaire that is designated based on ISO9000. The data extracted from questionnaires were analyzed using SPSS software. Results indicate that the highest degree of conformance to the 8 principles of ISO9000 is attributed to the principle of 'users' (69.9%) and the lowest degree is associated with 'decision making based on facts' (39.1%). Moreover, a significant relationship was observed among the items (1 and 3), (2 and 5), (2 and 7), (3 and 5), (4 and 5), (4 and 7), (4 and 8), (5 and 7), and (7 and 8). According to the research findings, it can generally be said that it is not eligible now to utilize TQM in libraries of Sistan and Baluchestan.Keywords: quality management, total quality, university libraries, libraries management
Procedia PDF Downloads 3401828 Multi-Level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment
Authors: Anju Bala, Inderveer Chana
Abstract:
Task scheduling is the key concern for the execution of performance-driven workflow applications. As efficient scheduling can have major impact on the performance of the system, task scheduling is often chosen for assigning the request to resources in an efficient way based on cloud resource characteristics. In this paper, priority based task scheduling algorithm has been proposed that prioritizes the tasks based on the length of the instructions. The proposed scheduling approach prioritize the tasks of Cloud applications according to the limits set by six sigma control charts based on dynamic threshold values. Further, the proposed algorithm has been validated through the CloudSim toolkit. The experimental results demonstrate that the proposed algorithm is effective for handling multiple task lists from workflows and in considerably reducing Makespan and Execution time.Keywords: cloud computing, priority based scheduling, task scheduling, VM allocation
Procedia PDF Downloads 5171827 Evaluation of Toxic Elements in Thai Rice Samples
Authors: W. Srinuttrakul, V. Permnamtip
Abstract:
Toxic elements in rice samples are great concern in Thailand because rice (Oryza sativa) is a staple food for Thai people. Furthermore, rice is an economic crop of Thailand for export. In this study, the concentrations of arsenic (As), cadmium (Cd) and lead (Pb) in rice samples collected from the paddy fields in the northern, northeastern and southern regions of Thailand were determined by inductively coupled plasma mass spectrometry. The mean concentrations of As, Cd and Pb in 55 rice samples were 0.112±0.056, 0.029±0.037 and 0.031±0.033 mg kg-1, respectively. All rice samples showed As, Cd and Pb lower than the limit data of Codex. The estimated daily intakes (EDIs) of As, Cd, and Pb from rice consumption were 0.026±0.013, 0.007±0.009 and 0.007±0.008 mg day-1, respectively. The percentage contribution to Provisional Tolerable Weekly Intake (PTWI) values of As, Cd and Pb for Thai male (body weight of 69 kg) was 17.6%, 9.7%, and 2.9%, respectively, and for Thai female (body weight of 57 kg) was 21.3%, 11.7% and 3.5%, respectively. The findings indicated that all studied rice samples are safe for consumption.Keywords: arsenic, cadmium, ICP-MS, lead, rice
Procedia PDF Downloads 2611826 Outcomes-Based Qualification Design and Vocational Subject Literacies: How Compositional Fallacy Short-Changes School-Leavers’ Literacy Development
Authors: Rose Veitch
Abstract:
Learning outcomes-based qualifications have been heralded as the means to raise vocational education and training (VET) standards, meet the needs of the changing workforce, and establish equivalence with existing academic qualifications. Characterized by explicit, measurable performance statements and atomistically specified assessment criteria, the outcomes model has been adopted by many VET systems worldwide since its inception in the United Kingdom in the 1980s. Debate to date centers on how the outcomes model treats knowledge. Flaws have been identified in terms of the overemphasis of end-points, neglect of process and a failure to treat curricula coherently. However, much of this censure has evaluated the outcomes model from a theoretical perspective; to date, there has been scant empirical research to support these criticisms. Various issues therefore remain unaddressed. This study investigates how the outcomes model impacts the teaching of subject literacies. This is of particular concern for subjects on the academic-vocational boundary such as Business Studies, since many of these students progress to higher education in the United Kingdom. This study also explores the extent to which the outcomes model is compatible with borderline vocational subjects. To fully understand if this qualification model is fit for purpose in the 16-18 year-old phase, it is necessary to investigate how teachers interpret their qualification specifications in terms of curriculum, pedagogy and assessment. Of particular concern is the nature of the interaction between the outcomes model and teachers’ understandings of their subject-procedural knowledge, and how this affects their capacity to embed literacy into their teaching. This present study is part of a broader doctoral research project which seeks to understand if and how content-area, disciplinary literacy and genre approaches can be adapted to outcomes-based VET qualifications. This qualitative research investigates the ‘what’ and ‘how’ of literacy embedding from the perspective of in-service teacher development in the 16-18 phase of education. Using ethnographic approaches, it is based on fieldwork carried out in one Further Education college in the United Kingdom. Emergent findings suggest that the outcomes model is not fit for purpose in the context of borderline vocational subjects. It is argued that the outcomes model produces inferior qualifications due to compositional fallacy; the sum of a subject’s components do not add up to the whole. Findings indicate that procedural knowledge, largely unspecified by some outcomes-based qualifications, is where subject-literacies are situated, and that this often gets lost in ‘delivery’. It seems that the outcomes model provokes an atomistic treatment of knowledge amongst teachers, along with the privileging of propositional knowledge over procedural knowledge. In other words, outcomes-based VET is a hostile environment for subject-literacy embedding. It is hoped that this research will produce useful suggestions for how this problem can be ameliorated, and will provide an empirical basis for the potential reforms required to address these issues in vocational education.Keywords: literacy, outcomes-based, qualification design, vocational education
Procedia PDF Downloads 121825 An Evolutionary Algorithm for Optimal Fuel-Type Configurations in Car Lines
Authors: Charalampos Saridakis, Stelios Tsafarakis
Abstract:
Although environmental concern is on the rise across Europe, current market data indicate that adoption rates of environmentally friendly vehicles remain extremely low. Against this background, the aim of this paper is to a) assess preferences of European consumers for clean-fuel cars and their characteristics and b) design car lines that optimize the combination of fuel types among models in the line-up. In this direction, the authors introduce a new evolutionary mechanism and implement it to stated-preference data derived from a large-scale choice-based conjoint experiment that measures consumer preferences for various factors affecting clean-fuel vehicle (CFV) adoption. The proposed two-step methodology provides interesting insights into how new and existing fuel-types can be combined in a car line that maximizes customer satisfaction.Keywords: clean-fuel vehicles, product line design, conjoint analysis, choice experiment, differential evolution
Procedia PDF Downloads 2791824 Modelling and Simulation of Biomass Pyrolysis
Authors: P. Ahuja, K. S. S. Sai Krishna
Abstract:
There is a concern over the energy shortage in the modern societies as it is one of the primary necessities. Renewable energy, mainly biomass, is found to be one feasible solution as it is inexhaustible and clean energy source all over the world. Out of various methods, thermo chemical conversion is considered to be the most common and convenient method to extract energy from biomass. The thermo-chemical methods that are employed are gasification, liquefaction and combustion. On gasification biomass yields biogas, on liquefaction biomass yields bio-oil and on combustion biomass yields bio-char. Any attempt to biomass gasification, liquefaction or combustion calls for a good understanding of biomass pyrolysis. So, Irrespective of the method used the first step towards the thermo-chemical treatment of biomass is pyrolysis. Pyrolysis mainly converts the solid mass into liquid with gas and residual char as the byproducts. Liquid is used for the production of heat, power and many other chemicals whereas the gas and char can be used as fuels to generate heat.Keywords: biomass, fluidisation, pyrolysis, simulation
Procedia PDF Downloads 3421823 Targeting Glucocorticoid Receptor Eliminate Dormant Chemoresistant Cancer Stem Cells in Glioblastoma
Authors: Aoxue Yang, Weili Tian, Haikun Liu
Abstract:
Brain tumor stem cells (BTSCs) are resistant to therapy and give rise to recurrent tumors. These rare and elusive cells are likely to disseminate during cancer progression, and some may enter dormancy, remaining viable but not increasing. The identification of dormant BTSCs is thus necessary to design effective therapies for glioblastoma (GBM) patients. Glucocorticoids (GCs) are used to treat GBM-associated edema. However, glucocorticoids participate in the physiological response to psychosocial stress, linked to poor cancer prognosis. This raises concern that glucocorticoids affect the tumor and BTSCs. Identifying markers specifically expressed by brain tumor stem cells (BTSCs) may enable specific therapies that spare their regular tissue-resident counterparts. By ribosome profiling analysis, we have identified that glycerol-3-phosphate dehydrogenase 1 (GPD1) is expressed by dormant BTSCs but not by NSCs. Through different stress-induced experiments in vitro, we found that only dexamethasone (DEXA) can significantly increase the expression of GPD1 in NSCs. Adversely, mifepristone (MIFE) which is classified as glucocorticoid receptors antagonists, could decrease GPD1 protein level and weaken the proliferation and stemness in BTSCs. Furthermore, DEXA can induce GPD1 expression in tumor-bearing mice brains and shorten animal survival, whereas MIFE has a distinct adverse effect that prolonged mice lifespan. Knocking out GR in NSC can block the upregulation of GPD1 inducing by DEXA, and we find the specific sequences on GPD1 promotor combined with GR, thus improving the efficiency of GPD1 transcription from CHIP-Seq. Moreover, GR and GPD1 are highly co-stained on GBM sections obtained from patients and mice. All these findings confirmed that GR could regulate GPD1 and loss of GPD1 Impairs Multiple Pathways Important for BTSCs Maintenance GPD1 is also a critical enzyme regulating glycolysis and lipid synthesis. We observed that DEXA and MIFE could change the metabolic profiles of BTSCs by regulating GPD1 to shift the transition of cell dormancy. Our transcriptome and lipidomics analysis demonstrated that cell cycle signaling and phosphoglycerides synthesis pathways contributed a lot to the inhibition of GPD1 caused by MIFE. In conclusion, our findings raise concern that treatment of GBM with GCs may compromise the efficacy of chemotherapy and contribute to BTSC dormancy. Inhibition of GR can dramatically reduce GPD1 and extend the survival duration of GBM-bearing mice. The molecular link between GPD1 and GR may give us an attractive therapeutic target for glioblastoma.Keywords: cancer stem cell, dormancy, glioblastoma, glycerol-3-phosphate dehydrogenase 1, glucocorticoid receptor, dexamethasone, RNA-sequencing, phosphoglycerides
Procedia PDF Downloads 1321822 Efficient Position Based Operation Code Authentication
Authors: Hashim Ali, Sheheryar Khan
Abstract:
Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication
Procedia PDF Downloads 2721821 Encouraging Girl-Child Education for Better Reproductive Health in Nigeria
Authors: Alikeju F. Maji
Abstract:
The role of girl child education on reproductive health of any nation cannot be over emphasized. Today this has become a global concern because of the awareness that girl child education has direct proven impact on reproductive health and sustainable development of a national. Thus, this paper attempts to re-emphasize and re-awaken the mind of humanity on the undisputable importance of girl-child education as a tool for improving reproductive health in Nigeria. The paper further examine that despite government’s effort in attaining education for all by the year 2015, the numbers of girls attending schools remain abysmally low in Nigeria. The paper noted that if the trend persists, personal health of women and their contribution to national development will reduce. The paper recommends that women in Nigeria should be availed with good educational opportunities to enhance their improved reproductive health, and greater participating in national development.Keywords: girl-child education, reproductive health, sustainable development, personal health
Procedia PDF Downloads 3601820 Software Evolution Based Activity Diagrams
Authors: Zine-Eddine Bouras, Abdelouaheb Talai
Abstract:
During the last two decades, the software evolution community has intensively tackled the software merging issue whose main objective is to merge in a consistent way different versions of software in order to obtain a new version. Well-established approaches, mainly based on the dependence analysis techniques, have been used to bring suitable solutions. These approaches concern the source code or software architectures. However, these solutions are more expensive due to the complexity and size. In this paper, we overcome this problem by operating at a high level of abstraction. The objective of this paper is to investigate the software merging at the level of UML activity diagrams, which is a new interesting issue. Its purpose is to merge activity diagrams instead of source code. The proposed approach, based on dependence analysis techniques, is illustrated through an appropriate case study.Keywords: activity diagram, activity diagram slicing, dependency analysis, software merging
Procedia PDF Downloads 3271819 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks
Authors: Rossouw De Bruin, Sebastiaan H. Von Solms
Abstract:
The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model
Procedia PDF Downloads 2671818 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System
Authors: Cara Williams
Abstract:
In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.Keywords: disability, employment, social security, welfare
Procedia PDF Downloads 1681817 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU
Authors: Nicole Christiansen, Hanne Marie Motzfeldt
Abstract:
In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.Keywords: AI, cyber vetting, data protection, job recruitment, online privacy
Procedia PDF Downloads 861816 Photovoltaic Water Pumping System Application
Authors: Sarah Abdourraziq
Abstract:
Photovoltaic (PV) water pumping system is one of the most used and important applications in the field of solar energy. However, the cost and the efficiency are still a concern, especially with continued change of solar radiation and temperature. Then, the improvement of the efficiency of the system components is a good solution to reducing the cost. The use of maximum power point tracking (MPPT) algorithms to track the output maximum power point (MPP) of the PV panel is very important to improve the efficiency of the whole system. In this paper, we will present a definition of the functioning of MPPT technique, and a detailed model of each component of PV pumping system with Matlab-Simulink, the results shows the influence of the changing of solar radiation and temperature in the output characteristics of PV panel, which influence in the efficiency of the system. Our system consists of a PV generator, a boost converter, a motor-pump set, and storage tank.Keywords: PV panel, boost converter, MPPT, MPP, PV pumping system
Procedia PDF Downloads 3981815 Auditing Hindi Celluloid as a Catalyst of Transition: The Eventual Delineation of LGBTQ+
Authors: Chinmayee Nanda
Abstract:
In this modern era, India is still chained up with the idea of ‘Heteronormativity’. As a result, homonormativity, transgressions, preconceived notions, and bigotry add to many raised eyebrows, the majority being the norm and overpowering the voices of the minority. In this country an undeniable space is the need of the hour to identify those unheard voices. Media can be considered as the most powerful space for the same. This paper aims to examine the representation as well as transition (if any) of the varied figments of the imagination and alternative facts relating to the LGBTQ+ community in celluloid in Hindi. This paper will also explore the visibility of the queer aspirations through this media. The portrayal of the LGBTQ community as the ‘other’ and ‘not normal’ is a matter of concern about any individual’s sexuality. The years 2014 and 2018 turned out to be remarkable in the Indian Legal System pertaining to the recognition of the ‘Third Gender’ and ‘Decriminalization of Homosexuality,’ respectively. In relation to that, this paper will also explore the impression of these dynamics on the subsequent depiction.Keywords: sexuality, hindi cinema, gender fluidity, legal framework
Procedia PDF Downloads 261814 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 5041813 Innovation Knowledge Management for Public Sector in the Thailand
Authors: Supattra Kanchanopast
Abstract:
This article presents the process of change for innovation in the Thai public sector in order to create higher client satisfaction. Change management should concern the potentiality of the change agent or leader, the long-term vision or policy (political side) of the organization, the communication within the organization, suitable organizational culture and structure, preparedness of the personnel, and the fitness of the reward system. Sustaining innovation creation is not sophisticated, as traditionally believed. A basic management principle of identifying clarified and motivating goals needs to be followed by creating support systems after implementation and by ensuring the stakeholders’ benefit, derived from the innovation projects. Finally, creating an amiable atmosphere among the practitioners, including effective evaluation and reward schemes, will support the innovation. However, none of these will ever take place unless support is gained from the leaders of those organizations, and from the staff and clients involved also as well.Keywords: change management, client satisfaction, innovation management, Thai public sector
Procedia PDF Downloads 2521812 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 2901811 Enhancing Fall Detection Accuracy with a Transfer Learning-Aided Transformer Model Using Computer Vision
Authors: Sheldon McCall, Miao Yu, Liyun Gong, Shigang Yue, Stefanos Kollias
Abstract:
Falls are a significant health concern for older adults globally, and prompt identification is critical to providing necessary healthcare support. Our study proposes a new fall detection method using computer vision based on modern deep learning techniques. Our approach involves training a trans- former model on a large 2D pose dataset for general action recognition, followed by transfer learning. Specifically, we freeze the first few layers of the trained transformer model and train only the last two layers for fall detection. Our experimental results demonstrate that our proposed method outperforms both classical machine learning and deep learning approaches in fall/non-fall classification. Overall, our study suggests that our proposed methodology could be a valuable tool for identifying falls.Keywords: healthcare, fall detection, transformer, transfer learning
Procedia PDF Downloads 1461810 Electronic-Word of Mouth(e-WoM): Preliminary Study of Malaysian Undergrad Students Smartphone Online Review
Authors: Norshakirah Ab.Aziz, Nurul Atiqah Jamaluddin
Abstract:
Consequently, electronic word-of-mouth (e-WoM) becomes one of the resources in the decision making process and considered a valuable marketing channel for consumers and organizations. Admittedly, there is increasing concern on the accuracy and genuine of e-WoM content because consumers prefer to look out product or service information available online. Thus, the focus of this study is to propose a model and guidelines how to select trusted online review content according to domain chosen –undergrad students smartphone online review. Undeniable, mobile devices like smartphone has now become a necessity in today are daily life to complete our daily chores. The model and guideline focused on product competency review and the message integrity. In other words, this study aims to enable consumers to identify trusted online review content, which helps them in buying decisions.Keywords: electronic word of mouth, e-WoM, WoM, online review
Procedia PDF Downloads 3281809 Raising Intercultural Awareness in Colombia Classrooms: A Descriptive Review
Authors: Angela Yicely Castro Garces
Abstract:
Aware of the relevance that intercultural education has gained in foreign language learning and teaching, and acknowledging the need to make it part of our classroom practices, this literature review explores studies that have been published in the Colombian context from the years 2012 to 2019. The inquiry was done in six national peer-reviewed journals, in order to examine the population benefited, types of studies and most recurrent topics of concern for educators. The findings present a promising panorama as teacher educators from public universities are leading the way in conducting research projects aimed at fostering intercultural awareness and building a critical intercultural discourse. Nonetheless, more studies that involve the different stakeholders and contexts need to be developed, in order to make intercultural education more visible in Colombian elementary and high school classrooms.Keywords: Colombian scholarship, foreign language learning, foreign language teaching, intercultural awareness
Procedia PDF Downloads 1421808 Spatial and Temporal Analysis of Violent Crime in Washington, DC
Authors: Pallavi Roe
Abstract:
Violent crime is a significant public safety concern in urban areas across the United States, and Washington, DC, is no exception. This research discusses the prevalence and types of crime, particularly violent crime, in Washington, DC, along with the factors contributing to the high rate of violent crime in the city, including poverty, inequality, access to guns, and racial disparities. The organizations working towards ensuring safety in neighborhoods are also listed. The proposal to perform spatial and temporal analysis on violent crime and the use of guns in crime analysis is presented to identify patterns and trends to inform evidence-based interventions to reduce violent crime and improve public safety in Washington, DC. The stakeholders for crime analysis are also discussed, including law enforcement agencies, prosecutors, judges, policymakers, and the public. The anticipated result of the spatial and temporal analysis is to provide stakeholders with valuable information to make informed decisions about preventing and responding to violent crimes.Keywords: crime analysis, spatial analysis, temporal analysis, violent crime
Procedia PDF Downloads 3201807 Microstructure of AlCrFeNiMn High Entropy Alloy and Its Corrosion Behavior in Supercritical CO₂ Environment
Authors: Yang Wanhuan, Zou Jichun, LI Shen, Zhong Weihua, Yang Wen
Abstract:
High entropy alloys (HEAs) have aroused significant concern in high-temperature supercritical carbon dioxide (S-CO2) environments due to their unique microstructures and outstanding properties. However, the anti-corrosion ability and mechanism of these HEAs in the S-CO₂ remain unclear. Herein, we developed a new AlCrFeNiMn (AM)-HEA with double phases by vacuum arc melting furnace. The corrosion behavior of AM-HEA in the S-CO₂ at 500 ℃ under 25 MPa for 400 hours was deciphered by multiple characterization techniques. The results show that the discrepancy of corrosion between the matrix and boundary was accounted for by their microstructure and components. The role and mechanism of Mn contents for their oxide scales in boundary zones were emphasized. More importantly, the nano-precipitated second phase and numerous boundaries for the outstanding anti-corrosion ability of the matrix were proposed.Keywords: high entropy alloy, microstructure, corrosion, supercritical carbon oxide, AlCrFeNiMn
Procedia PDF Downloads 1461806 The Covid-19 Pandemic: Transmission, Misinformation, and Implications on Public Health
Authors: Jonathan De Rothewelle
Abstract:
A pandemic, such as that of COVID-19, can be a time of panic and stress; concerns about health supersede others such as work and leisure. With such concern comes the seeking of crucial information— information that, during a global health crisis, could mean the difference between life and death. Whether newspapers, cable news, or radio, media plays an important role in the transmission of medical information to the general public. Moreover, the news media in particular must uphold its obligation to the public to only disseminate factual, useful information. The circulation of misinformation, whether explicit or implicit, may profoundly impact global health. Using a discursive analytic framework founded in linguistics, the images and headlines of top coverage of COVID-19 from the most influential media outlets will be examined. Micro-analyses reveal what may be interpreted as evidence of sensationalism, which may be argued to a form of misinformation, and ultimately a departure from ethical media. Withdrawal from responsible reporting and publishing, expressly in times of epidemic, may cause further confusion and panic.Keywords: public health, pandemic, public education, media
Procedia PDF Downloads 1511805 Numerical and Experimental Assessment of a PCM Integrated Solar Chimney
Authors: J. Carlos Frutos Dordelly, M. Coillot, M. El Mankibi, R. Enríquez Miranda, M. José Jimenez, J. Arce Landa
Abstract:
Natural ventilation systems have increasingly been the subject of research due to rising energetic consumption within the building sector and increased environmental awareness. In the last two decades, the mounting concern of greenhouse gas emissions and the need for an efficient passive ventilation system have driven the development of new alternative passive technologies such as ventilated facades, trombe walls or solar chimneys. The objective of the study is the assessment of PCM panels in an in situ solar chimney for the establishment of a numerical model. The PCM integrated solar chimney shows slight performance improvement in terms of mass flow rate and external temperature and outlet temperature difference. An increase of 11.3659 m3/h can be observed during low wind speed periods. Additionally, the surface temperature across the chimney goes beyond 45 °C and allows the activation of PCM panels.Keywords: energy storage, natural ventilation, phase changing materials, solar chimney, solar energy
Procedia PDF Downloads 3671804 Geographic Differences in Access to HIV Prevention Services and Care among Sexual Minority Men in Puerto Rico
Authors: William Coburn, Dylan Hauchard, Amel Naouali
Abstract:
Background: The nature of the HIV epidemic in Puerto Rico (PR) is less understood than in the continental U.S. There is evidence to suggest that there are differences in health care access based on geographical location, such that rural areas are less underserved and have less immediate access to HIV prevention resources. Methods: The current study consists of a cross-sectional online survey of self-reporting HIV-negative sexual minority men (SMM) residing in PR. Results: In this sample, there were no differences between urban and rural-based services for SMM. However, more than half of the sample reported that they have never disclosed their gender identity and sexual practices to a physician. Conclusion: HIV is a significant public health concern affecting Latinos/Hispanics in the U.S. Findings in this paper can have implications for HIV prevention services in PR specifically, as few studies have directly focused on the impact of HIV and health care services in PR outside of the continental U.S.Keywords: HIV, Puerto Rico, infectious diseases , public health
Procedia PDF Downloads 2311803 Urban Vegetation as a Mitigation Strategy for Urban Heat Island Effect a Case of Kerala
Authors: Athul T.
Abstract:
Kerala cities in India are grappling with an alarming rise in temperatures fueled by the Urban Heat Island (UHI) effect. This phenomenon, exacerbated by rapid urbanization and climate change, poses a significant threat to public health and environmental well-being. In response to this growing concern, this study investigates the potential of urban vegetation as a powerful mitigation strategy against UHI. The study delves into the intricate relationship between micro-climate changes, UHI intensity, and the strategic placement of greenery in alleviating these effects. Utilizing advanced simulation software, the most effective vegetation types and configurations for maximizing UHI reduction will be identified. By analyzing the current state of Kozhikode's urban vegetation and its influence on microclimates, this study aims to tailor actionable strategies for Kerala cities, potentially paving the way for a more sustainable and thermally comfortable urban future.Keywords: urban heat island, climate change, micro climate, urban vegetation
Procedia PDF Downloads 63