Search results for: case citation network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15614

Search results for: case citation network

12914 A Case Study to Observe How Students’ Perception of the Possibility of Success Impacts Their Performance in Summative Exams

Authors: Rochelle Elva

Abstract:

Faculty in Higher Education today are faced with the challenge of convincing their students of the importance of learning and mastery of skills. This is because most students often have a single motivation -to get high grades. If it appears that this goal will not be met, they lose their motivation, and their academic efforts wane. This is true even for students in the competitive fields of STEM, including Computer Science majors. As educators, we have to understand our students and leverage what motivates them to achieve our learning outcomes. This paper presents a case study that utilizes cognitive psychology’s Expectancy Value Theory and Motivation Theory to investigate the effect of sustained expectancy for success on students’ learning outcomes. In our case study, we explore how students’ motivation and persistence in their academic efforts are impacted by providing them with an unexpected possible path to success that continues to the end of the semester. The approach was tested in an undergraduate computer science course with n = 56. The results of the study indicate that when presented with the real possibility of success, despite existing low grades, both low and high-scoring students persisted in their efforts to improve their performance. Their final grades were, on average, one place higher on the +/-letter grade scale, with some students scoring as high as three places above their predicted grade.

Keywords: expectancy for success and persistence, motivation and performance, computer science education, motivation and performance in computer science

Procedia PDF Downloads 81
12913 Melt Conditioned-Twin Roll Casting of Magnesium Alloy

Authors: Sanjeev Das

Abstract:

In the present investigation, magnesium strips were produced by twin roll casting (TRC) and melt conditioned twin roll casting (MC-TRC) processes. The microstructures showed uniform fine equiaxed grain morphology in the case of MC-TRC cast samples. In the case of TRC samples elongated grains with centerline segregation was observed. Further investigation showed both the process has different solidification mechanism. Tensile tests were performed at 250–400ºC for both TRC and MCTRC samples. At 250ºC, MC-TRC sample showed significant improvement in strength and ductility. However, at higher temperatures the tensile properties were almost comparable, despite of TRC samples having larger grains compared to MC-TRC samples. It was observed that homogenized MC-TRC samples were easily hot stamped compared to TRC samples.

Keywords: MC-TRC, magnesium alloy, solidification, nucleation

Procedia PDF Downloads 188
12912 Strengthening Evaluation of Steel Girder Bridge under Load Rating Analysis: Case Study

Authors: Qudama Albu-Jasim, Majdi Kanaan

Abstract:

A case study about the load rating and strengthening evaluation of the six-span of steel girders bridge in Colton city of State of California is investigated. To simulate the load rating strengthening assessment for the Colton Overhead bridge, a three-dimensional finite element model built in the CSiBridge program is simulated. Three-dimensional finite-element models of the bridge are established considering the nonlinear behavior of critical bridge components to determine the feasibility and strengthening capacity under load rating analysis. The bridge was evaluated according to Caltrans Bridge Load Rating Manual 1st edition for rating the superstructure using the Load and Resistance Factor Rating (LRFR) method. The analysis for the bridge was based on load rating to determine the largest loads that can be safely placed on existing I-girder steel members and permitted to pass over the bridge. Through extensive numerical simulations, the bridge is identified to be deficient in flexural and shear capacities, and therefore strengthening for reducing the risk is needed. An in-depth parametric study is considered to evaluate the sensitivity of the bridge’s load rating response to variations in its structural parameters. The parametric analysis has exhibited that uncertainties associated with the steel’s yield strength, the superstructure’s weight, and the diaphragm configurations should be considered during the fragility analysis of the bridge system.

Keywords: load rating, CSIBridge, strengthening, uncertainties, case study

Procedia PDF Downloads 211
12911 Armed Groups and Intra State Conflict: A Study on the Egyptian Case

Authors: Ghzlan Mahmoud Abdel Aziz

Abstract:

This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfaced to the top as a reaction to these armed groups in an effort to set up a new world order. Moreover, the intra state conflicts became increasingly treacherous than the interstate conflicts, particularly when nation state systems deal with armed groups which try to influence the state. The unexpected upraising of the Arab Spring during 2011 in parts of the Middle East and North Africa formed various patterns of conflicts. The events of the Arab Spring resulted in current and long term change across the region. Significant modifications in the level, strength and period of armed conflict around the world have been made. Egypt was in the center of these events. It has fought back the armed groups under the name of terrorism and spread common disorder and violence among civilians. On this note, this study focuses on the problem of the transformation in the methods of organized violence within one state rather than between two state or more and analyzes the objectives, strategies, and internal composition of armed groups and the environments that foster them, with a focus on the Egyptian case.

Keywords: armed groups, conflicts, Egyptian armed forces, intrastate conflicts

Procedia PDF Downloads 459
12910 Impact of Climate Change on Sea Level Rise along the Coastline of Mumbai City, India

Authors: Chakraborty Sudipta, A. R. Kambekar, Sarma Arnab

Abstract:

Sea-level rise being one of the most important impacts of anthropogenic induced climate change resulting from global warming and melting of icebergs at Arctic and Antarctic, the investigations done by various researchers both on Indian Coast and elsewhere during the last decade has been reviewed in this paper. The paper aims to ascertain the propensity of consistency of different suggested methods to predict the near-accurate future sea level rise along the coast of Mumbai. Case studies at East Coast, Southern Tip and West and South West coast of India have been reviewed. Coastal Vulnerability Index of several important international places has been compared, which matched with Intergovernmental Panel on Climate Change forecasts. The application of Geographic Information System mapping, use of remote sensing technology, both Multi Spectral Scanner and Thematic Mapping data from Landsat classified through Iterative Self-Organizing Data Analysis Technique for arriving at high, moderate and low Coastal Vulnerability Index at various important coastal cities have been observed. Instead of data driven, hindcast based forecast for Significant Wave Height, additional impact of sea level rise has been suggested. Efficacy and limitations of numerical methods vis-à-vis Artificial Neural Network has been assessed, importance of Root Mean Square error on numerical results is mentioned. Comparing between various computerized methods on forecast results obtained from MIKE 21 has been opined to be more reliable than Delft 3D model.

Keywords: climate change, Coastal Vulnerability Index, global warming, sea level rise

Procedia PDF Downloads 132
12909 Young Female’s Heart Was Bitten by Unknown Ghost (Isolated Cardiac Sarcoidosis): A Case Report

Authors: Heru Al Amin

Abstract:

Sarcoidosis is a granulomatous inflammatory disorder of unclear etiology that can affect multiple different organ systems. Isolated cardiac sarcoidosis is a very rare condition that causes lethal arrhythmia and heart failure. A definite diagnosis of cardiac sarcoidosis remains challenging. The use of multimodality imaging plays a pivotal role in the diagnosis of this entity. Case summary: In this report, we discuss a case of a 50-year-old woman who presented with recurrent palpitation, dizziness, vertigo and presyncope. Electrocardiogram revealed variable heart blocks, including first-degree AV block, second-degree AV block, high-degree AV block, complete AV block, trifascicular block and sometimes supraventricular arrhythmia. Twenty-four hours of Holter monitoring show atrial bigeminy, first-degree AV block and trifascicular block. Transthoracic echocardiography showed Thinning of basal anteroseptal and inferred septum with LV dilatation with reduction of Global Longitudinal Strain. A dual-chamber pacemaker was implanted. CT Coronary angiogram showed no coronary artery disease. Cardiac magnetic resonance revealed basal anteroseptal and inferior septum thinning with focal edema with LGE suggestive of sarcoidosis. Computed tomography of the chest showed no lymphadenopathy or pulmonary infiltration. 18F-fluorodeoxyglucose positron emission tomography (FDG-PET) of the whole body showed. We started steroids and followed up with the patient. Conclusion: This case serves to highlight the challenges in identifying and managing isolated CS in a young patient with recurrent syncope with variable heart block. Early, even late initiation of steroids can improve arrhythmia as well as left ventricular function.

Keywords: cardiac sarcoidosis, conduction abnormality, syncope, cardiac MRI

Procedia PDF Downloads 91
12908 Allergy to Animal Hair in the Algerian Population

Authors: Meriche Hacene, Gadiri Sabiha

Abstract:

Introduction: Allergy to animal hair is hypersensitivity to animal appendages to look for in front of any rhinoconjunctivitis or asthma. An anamnesis associated with the prick-tests makes it possible to guide the diagnosis, which will be supplemented in case of doubt by specific immunoglobulin E (IgE) assays. The objective of our study is to study the characteristics of patients sensitized to animal hair. Patients and methods: Retrospective study conducted on 105 adult patients and 69 children over a period of 3 years, including patients who received a specific IgE assay (respiratory panel and pediatric panel) by immunodot method. Result: 105 adult patients, including 74 women and 31 men, with an average age of 41 years, of which 8.5% had sensitization to animal hair (5 men and 4 women), namely: cat (5%), horse (4.7%) and dog (3.8%). For the 69 children, a slight female predominance was noted (56%), with an average age of 7.5 years, of which (13%) are sensitized to animal hair (5 girls and 4 boys): cat (10%), while awareness of dog and horse hair was less frequent with an identical prevalence of (4.34%). The dominant symptoms are rhinorrhea and sneezing for both categories, respectively (40% and 26.6% in adults and 23% for both symptoms in children). Cross-sensitization was observed in the 2 series: 1 single cat-dog and cat-horse case and 2 dog-horse cases in adults. In children 100% of patients with sensitization to dog hair had cross-sensitization to cat hair, only 1 case was observed for cat-horse cross-reactivity. Conclusion: This work shows that allergy to animal hair is common. Studies on more representative samples are recommended.

Keywords: children, allegy to animals, specific Ig E, hypersensitivity

Procedia PDF Downloads 69
12907 Case Report and Literature Review of Opalski Syndrome: A Rare Brainstem Stroke

Authors: Ramuel Spirituel Mattathiah A. San Juan, Neil Ambasing

Abstract:

Background: In lateral medullary strokes, hemiparesis doesn't typically manifest due to the distinct vascular supply to the corticospinal tract located within the medulla's tegmentum. Hemiparesis resulting from a medullary infarct would likely be attributable to a medial medullary stroke characterized by contralateral hemiparesis since the corticospinal tract fibers at this level have yet to cross over. This paper reports a unique case of a lateral medullary stroke variant that presented with ipsilateral hemiparesis. Objective: There have only been 23 other cases of reported Opalski syndrome, making this only the 24th and 25th case reported worldwide. Case Presentation: A 53-year-old male was admitted with slurring of speech with gait instability, numbness on the right face, Horner’s syndrome, and 4/5 motor strength on the right extremities. Hyperreflexia was noted on the right, together with a Babinski’s sign. Cranial magnetic resonance imaging (MRI) showed an infarct on the right dorsolateral medulla. A 48-year-old male was admitted complaining of dizziness, ataxic gait, veering to the left during ambulation, left facial numbness, left hemiplegia, crossed sensory disturbance, and right limb ataxia. MRI revealed an acute left lateral medullary infarction. Conclusion: A rare type of lateral medullary infarction, the Opalski Syndrome, is a weakness ipsilateral to the lesion of the infarct. The lesion involves the ipsilateral corticospinal tract below the pyramidal decussation. The considerable diversity in the posterior brain circulation serves as a contributing factor to the clinical observation of incomplete textbook syndromes, underscoring the significance of the neurological clinical approach and a solid foundation in neuroanatomy.

Keywords: Opalski syndrome, rare stroke, stroke, Wallenberg's syndrome

Procedia PDF Downloads 76
12906 Diagnosis of the Heart Rhythm Disorders by Using Hybrid Classifiers

Authors: Sule Yucelbas, Gulay Tezel, Cuneyt Yucelbas, Seral Ozsen

Abstract:

In this study, it was tried to identify some heart rhythm disorders by electrocardiography (ECG) data that is taken from MIT-BIH arrhythmia database by subtracting the required features, presenting to artificial neural networks (ANN), artificial immune systems (AIS), artificial neural network based on artificial immune system (AIS-ANN) and particle swarm optimization based artificial neural network (PSO-NN) classifier systems. The main purpose of this study is to evaluate the performance of hybrid AIS-ANN and PSO-ANN classifiers with regard to the ANN and AIS. For this purpose, the normal sinus rhythm (NSR), atrial premature contraction (APC), sinus arrhythmia (SA), ventricular trigeminy (VTI), ventricular tachycardia (VTK) and atrial fibrillation (AF) data for each of the RR intervals were found. Then these data in the form of pairs (NSR-APC, NSR-SA, NSR-VTI, NSR-VTK and NSR-AF) is created by combining discrete wavelet transform which is applied to each of these two groups of data and two different data sets with 9 and 27 features were obtained from each of them after data reduction. Afterwards, the data randomly was firstly mixed within themselves, and then 4-fold cross validation method was applied to create the training and testing data. The training and testing accuracy rates and training time are compared with each other. As a result, performances of the hybrid classification systems, AIS-ANN and PSO-ANN were seen to be close to the performance of the ANN system. Also, the results of the hybrid systems were much better than AIS, too. However, ANN had much shorter period of training time than other systems. In terms of training times, ANN was followed by PSO-ANN, AIS-ANN and AIS systems respectively. Also, the features that extracted from the data affected the classification results significantly.

Keywords: AIS, ANN, ECG, hybrid classifiers, PSO

Procedia PDF Downloads 442
12905 Reduction of the Number of Traffic Accidents by Function of Driver's Anger Detection

Authors: Masahiro Miyaji

Abstract:

When a driver happens to be involved in some traffic congestion or after traffic incidents, the driver may fall in a state of anger. State of anger may encounter decisive risk resulting in severer traffic accidents. Preventive safety function using driver’s psychosomatic state with regard to anger may be one of solutions which would avoid that kind of risks. Identifying driver’s anger state is important to create countermeasures to prevent the risk of traffic accidents. As a first step, this research figured out root cause of traffic incidents by means of using Internet survey. From statistical analysis of the survey, dominant psychosomatic states immediately before traffic incidents were haste, distraction, drowsiness and anger. Then, we replicated anger state of a driver while driving, and then, replicated it by means of using driving simulator on bench test basis. Six types of facial expressions including anger were introduced as alternative characteristics. Kohonen neural network was adopted to classify anger state. Then, we created a methodology to detect anger state of a driver in high accuracy. We presented a driving support safety function. The function adapts driver’s anger state in cooperation with an autonomous driving unit to reduce the number of traffic accidents. Consequently, e evaluated reduction rate of driver’s anger in the traffic accident. To validate the estimation results, we referred the reduction rate of Advanced Safety Vehicle (ASV) as well as Intelligent Transportation Systems (ITS).

Keywords: Kohonen neural network, driver’s anger state, reduction of traffic accidents, driver’s state adaptive driving support safety

Procedia PDF Downloads 359
12904 Flood Planning Based on Risk Optimization: A Case Study in Phan-Calo River Basin in Vinh Phuc Province, Vietnam

Authors: Nguyen Quang Kim, Nguyen Thu Hien, Nguyen Thien Dung

Abstract:

Flood disasters are increasing worldwide in both frequency and magnitude. Every year in Vietnam, flood causes great damage to people, property, and environmental degradation. The flood risk management policy in Vietnam is currently updated. The planning of flood mitigation strategies is reviewed to make a decision how to reach sustainable flood risk reduction. This paper discusses the basic approach where the measures of flood protection are chosen based on minimizing the present value of expected monetary expenses, total residual risk and costs of flood control measures. This approach will be proposed and demonstrated in a case study for flood risk management in Vinh Phuc province of Vietnam. Research also proposed the framework to find a solution of optimal protection level and optimal measures of the flood. It provides an explicit economic basis for flood risk management plans and interactive effects of options for flood damage reduction. The results of the case study are demonstrated and discussed which would provide the processing of actions helped decision makers to choose flood risk reduction investment options.

Keywords: drainage plan, flood planning, flood risk, residual risk, risk optimization

Procedia PDF Downloads 243
12903 A Case Study on the Guidelines for Application of Project Management Methods in Infrastructure Projects

Authors: Fernanda Varella Borges, Silvio Burrattino Melhado

Abstract:

Motivated by the importance of public infrastructure projects in the civil construction chain, this research shows the study of project management methods and the infrastructure projects’ characteristics. The research aims at the objective of improving management efficiency by proposing guidelines for the application of project management methods in infrastructure projects. Through literature review and case studies, the research analyses two major infrastructure projects underway in Brazil, identifying the critical points for achieving its success. As a result, the proposed guidelines indicate that special attention should be given to the management of stakeholders, focusing on their knowledge and experience, their different interests, the efficient management of their communication, and their behavior in the day-by-day project management process.

Keywords: construction, infrastructure, project management, public projects

Procedia PDF Downloads 494
12902 Voices of Fear: A Case Study Of Tobephobia Experienced by Female Teachers

Authors: Prakash Singh

Abstract:

In this exploratory qualitative case study, the voices of female teachers are captured that describe their fear of failure in coping with their daily anxieties, stresses, and tensions in their classrooms. When teachers are usually appointed, the curriculum forms the heart of all their professional obligations. The policy of quality and equality of education for all learners is a must as part of these deliberations, otherwise it would spell the inevitable failure for teachers. Yet, how often have teachers been asked whether they are happy during their professional tenure. Research affirms that this question is not a priority, seeing that the happiness of learners and the educational administrators enjoy precedence. Teachers are often subject to undue pressures and tensions because of environmental factors that extends beyond the curriculum. School violence, bullying, drug abuse, and gangsters are not uncommon to the school milieu, no matter where such schools can be located. In this case study, the voices of female teachers find space concerning their experiences of tobephobia (TBP). The questions that inevitably arise are: Are the educational authorities aware of the effects of TBP in education? What can be done to arrest and eliminate the debilitating effects of TBP? This exploratory study contributes to the growing concerns of TBP in education. It is therefore imperative that the effects of TBP on human resources in education must be accentuated so that meaningful solutions can be found to address challenging educational issues such as school violence, bullying, and drug abuse amongst learners.

Keywords: curriculum, female teachers, school violence, tobephobia

Procedia PDF Downloads 404
12901 Case Report: Ocular Helminth - In Unusual Site (Lens)

Authors: Chandra Shekhar Majumder, Md. Shamsul Haque, Khondaker Anower Hossain, Md. Rafiqul Islam

Abstract:

Introduction: Ocular helminths are parasites that infect the eye or its adnexa. They can be either motile worms or sessile worms that form cysts. These parasites require two hosts for their life cycle, a definite host (usually a human) and an intermediate host (usually an insect). While there have been reports of ocular helminths infecting various structures of the eye, including the anterior chamber and subconjunctival space, there is no previous record of such a case involving the lens. Research Aim: The aim of this case report is to present a rare case of ocular helminth infection in the lens and to contribute to the understanding of this unusual site of infection. Methodology: This study is a case report, presenting the details and findings of an 80-year-old retired policeman who presented with severe pain, redness, and vision loss in the left eye. The patient had a history of diabetes mellitus and hypertension. The examination revealed the presence of a thread-like helminth in the lens. The patient underwent treatment and follow-up, and the helminth specimen was sent for identification to the department of Parasitology. Case report: An 80-year-old retired policeman attended the OPD, Faridpur Medical College Hospital with the complaints of severe pain, redness and gross dimness of vision of the left eye for 5 days. He had a history of diabetes mellitus and hypertension for 3 years. On examination, L/E visual acuity was PL only, moderate ciliary congestion, KP 2+, cells 2+ and posterior synechia from 5 to 7 O’clock position was found. Lens was opaque. A thread like helminth was found under the anterior of the lens. The worm was moving and changing its position during examination. On examination of R/E, visual acuity was 6/36 unaided, 6/18 with pinhole. There was lental opacity. Slit-lamp and fundus examination were within normal limit. Patient was admitted in Faridpur Medical College Hospital. Diabetes mellitus was controlled with insulin. ICCE with PI was done on the same day of admission under depomedrol coverage. The helminth was recovered from the lens. It was thread like, about 5 to 6 mm in length, 1 mm in width and pinkish in colour. The patient followed up after 7 days, VA was HM, mild ciliary congestion, few KPs and cells were present. Media was hazy due to vitreous opacity. The worm was sent to the department of Parasitology, NIPSOM, Dhaka for identification. Findings: The findings of this case report highlight the presence of a helminth in the lens, which has not been previously reported. The helminth was successfully removed from the lens, but the patient experienced complications such as anterior uveitis and vitreous opacity. The exact mechanism by which the helminth enters the lens remains unclear. Theoretical Importance: This case report contributes to the existing literature on ocular helminth infections by reporting a unique case involving the lens. It highlights the need for further research to understand the pathogenesis and mechanism of entry of helminths in the lens. Data Collection and Analysis Procedures: The data for this case report were collected through clinical examination and medical records of the patient. The findings were described and presented in a descriptive manner. No statistical analysis was conducted. Question Addressed: This case report addresses the question of whether ocular helminth infections can occur in the lens, which has not been previously reported. Conclusion: To the best of our knowledge, this is the first reported case of ocular helminth infection in the lens. The presence of the helminth in the lens raises interesting questions regarding its pathogenesis and entry mechanism. Further study and research are needed to explore these aspects. Ophthalmologists and parasitologists should be aware of the possibility of ocular helminth infections in unusual sites like the lens.

Keywords: ocular, helminth, unsual site, lens

Procedia PDF Downloads 66
12900 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 660
12899 Anti-Fire Group 'Peduli Api': Case Study of Mitigating the Fire Hazard Impact and Climate Policy Enhancement on Riau Province Indonesia

Authors: Bayu Rizky Pratama, Hardiansyah Nur Sahaya

Abstract:

Riau Province is the worst emitter for forest burning which causes the huge scale of externality such as declining of forest habitat, health disease, and climate change impact. Indonesia forum of budget transparency for Riau Province (FITRA) reported the length of forest burning reached about 186.069 hectares which is 7,13% of total national forest burning disaster, consisted of 107.000 hectares of peatland and the rest 79.069 hectares of mineral land. Anti-fire group, a voluntary group next to the forest, to help in protecting the forest burning and heavily smoke residual has been established but unfortunately the implementation still far from expectation. This research will emphasize on (1) how the anti-fire group contribute to fire hazard tackling; (2) the identification of SWOT analysis to enhance the group benefit; and (3) government policy implication to maximize the role of Anti-fire group and reduce the case of forest burning as well as heavily smoke which can raise climate change impact. As the observation found some weakness from SWOT identification such as (1) lack of education and training; (2) facility in extinguishing the fire damage; (3) law for economic incentive; (4) communication and field experience; (5) also the reporting the fire case.

Keywords: anti-fire group, forest burning impact, SWOT, climate change mitigation

Procedia PDF Downloads 388
12898 Modelling Biological Treatment of Dye Wastewater in SBR Systems Inoculated with Bacteria by Artificial Neural Network

Authors: Yasaman Sanayei, Alireza Bahiraie

Abstract:

This paper presents a systematic methodology based on the application of artificial neural networks for sequencing batch reactor (SBR). The SBR is a fill-and-draw biological wastewater technology, which is specially suited for nutrient removal. Employing reactive dye by Sphingomonas paucimobilis bacteria at sequence batch reactor is a novel approach of dye removal. The influent COD, MLVSS, and reaction time were selected as the process inputs and the effluent COD and BOD as the process outputs. The best possible result for the discrete pole parameter was a= 0.44. In orderto adjust the parameters of ANN, the Levenberg-Marquardt (LM) algorithm was employed. The results predicted by the model were compared to the experimental data and showed a high correlation with R2> 0.99 and a low mean absolute error (MAE). The results from this study reveal that the developed model is accurate and efficacious in predicting COD and BOD parameters of the dye-containing wastewater treated by SBR. The proposed modeling approach can be applied to other industrial wastewater treatment systems to predict effluent characteristics. Note that SBR are normally operated with constant predefined duration of the stages, thus, resulting in low efficient operation. Data obtained from the on-line electronic sensors installed in the SBR and from the control quality laboratory analysis have been used to develop the optimal architecture of two different ANN. The results have shown that the developed models can be used as efficient and cost-effective predictive tools for the system analysed.

Keywords: artificial neural network, COD removal, SBR, Sphingomonas paucimobilis

Procedia PDF Downloads 413
12897 Prevention of Ragging and Sexual Gender Based Violence (SGBV) in Higher Education Institutions in Sri Lanka

Authors: Anusha Edirisinghe

Abstract:

Sexual Gender based violence is a most common social phenomenon in higher education institutions. It has become a hidden crime of the Universities. Masculinities norms and attitudes are more influential and serve as key drivers and risk for ragging and SGBV. This research will reveal that in Sri Lankan universities, SGBV takes from the violence and murder of women students, assault and battery coerced sex, sexual harassment including harassment via information technology. This study focus is to prevention of ragging and SGBV in University system. Main objective of this paper describes and critically analyses of plight of ragging and SGBV in higher education institutions and legal and national level policy implementation to prevent these crimes in society. This paper is with special reference to ragging case from University of Kelaniya 2016. University Grant commission introduced an Act for the prevention of Ragging and gender standing committee established in Sri Lanka in 2016. And each university has been involved in the prevention of SGBV and ragging in higher education institutions. Case study from first year female student, reported sexual harassment was reported to the police station in May in 2016. After this case, the university has been implementing emergency action plan, short term and long term action plan. Ragging and SGBV task force was established and online complaint center opened to all students and academic and non- academics. Under these circumstances student complained to SGBV and other harassment to the university. University security system was strong support with police and marshals, and vigilant committees including lecturers. After this case all universities start to several programmes to stop violence in university

Keywords: higher Education, ragging, sexual gender-based violence, Sri Lanka

Procedia PDF Downloads 380
12896 A Method for Multimedia User Interface Design for Mobile Learning

Authors: Shimaa Nagro, Russell Campion

Abstract:

Mobile devices are becoming ever more widely available, with growing functionality, and are increasingly used as an enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material user interfaces for mobile devices is beset by many unresolved research issues such as those arising from emphasising the information concepts then mapping this information to appropriate media (modelling information then mapping media effectively). This report describes a multimedia user interface design method for mobile learning. The method covers specification of user requirements and information architecture, media selection to represent the information content, design for directing attention to important information, and interaction design to enhance user engagement based on Human-Computer Interaction design strategies (HCI). The method will be evaluated by three different case studies to prove the method is suitable for application to different areas / applications, these are; an application to teach about major computer networking concepts, an application to deliver a history-based topic; (after these case studies have been completed, the method will be revised to remove deficiencies and then used to develop a third case study), an application to teach mathematical principles. At this point, the method will again be revised into its final format. A usability evaluation will be carried out to measure the usefulness and effectiveness of the method. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the MDMLM method. The researcher has successfully produced the method at this point which is now under validation and testing procedures. From this point forward in the report, the researcher will refer to the method using the MDMLM abbreviation which means Multimedia Design Mobile Learning Method.

Keywords: human-computer interaction, interface design, mobile learning, education

Procedia PDF Downloads 246
12895 Reverse Supply Chain Analysis of Lithium-Ion Batteries Considering Economic and Environmental Aspects

Authors: Aravind G., Arshinder Kaur, Pushpavanam S.

Abstract:

There is a strong emphasis on shifting to electric vehicles (EVs) throughout the globe for reducing the impact on global warming following the Paris climate accord. Lithium-ion batteries (LIBs) are predominantly used in EVs, and these can be a significant threat to the environment if not disposed of safely. Lithium is also a valuable resource not widely available. There are several research groups working on developing an efficient recycling process for LIBs. Two routes - pyrometallurgical and hydrometallurgical processes have been proposed for recycling LIBs. In this paper, we focus on life cycle assessment (LCA) as a tool to quantify the environmental impact of these recycling processes. We have defined the boundary of the LCA to include only the recycling phase of the end-of-life (EoL) of the battery life cycle. The analysis is done assuming ideal conditions for the hydrometallurgical and a combined hydrometallurgical and pyrometallurgical process in the inventory analysis. CML-IA method is used for quantifying the impact assessment across eleven indicators. Our results show that cathode, anode, and foil contribute significantly to the impact. The environmental impacts of both hydrometallurgical and combined recycling processes are similar across all the indicators. Further, the results of LCA are used in developing a multi-objective optimization model for the design of lithium-ion battery recycling network. Greenhouse gas emissions and cost are the two parameters minimized for the optimization study.

Keywords: life cycle assessment, lithium-ion battery recycling, multi-objective optimization, network design, reverse supply chain

Procedia PDF Downloads 157
12894 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 101
12893 African Women in Power: An Analysis of the Representation of Nigerian Business Women in Television

Authors: Ifeanyichukwu Valerie Oguafor

Abstract:

Women generally have been categorized and placed under the chain of business industry, sometimes highly regarded and other times merely. The social construction of womanhood does not in all sense support a woman going into business, let alone succeed in it because it is believed that it a man’s world. In a typical patriarchal setting, a woman is expected to know nothing more domestic roles. For some women, this is not the case as they have been able to break these barriers to excel in business amidst these social setting and stereotypes. This study examines media representation of Nigerians business women, using content analysis of TV interviews as media text, framing analysis as an approach in qualitative methodology, The study further aims to analyse media frames of two Nigerian business women: FolorunshoAlakija, a business woman in the petroleum industry with current net worth 1.1 billion U.S dollars, emerging as the richest black women in the world 2014. MosunmolaAbudu, a media magnate in Nigeria who launched the first Africa’s global black entertainment and lifestyle network in 2013. This study used six predefined frames: the business woman, the myth of business women, the non-traditional woman, women in leading roles, the family woman, the religious woman, and the philanthropist woman to analyse the representation of Nigerian business women in the media. The analysis of the aforementioned frames on TV interviews with these women reveals that the media perpetually reproduces existing gender stereotype and do not challenge patriarchy. Women face challenges in trying to succeed in business while trying to keep their homes stable. This study concludes that the media represent and reproduce gender stereotypes in spite of the expectation of empowering women. The media reduces these women’s success insignificant rather than a role model for women in society.

Keywords: representation of business women in the media, business women in Nigeria, framing in the media, patriarchy, women's subordination

Procedia PDF Downloads 161
12892 Cyclone Driven Variation of Chlorophyll-a Concentration in Bay of Bengal

Authors: Nowshin Nabila Siddique, S. M. Mustafizur Rahman

Abstract:

There is evidence of cyclonic events in Bay of Bengal (BoB) throughout the year. These cyclones cause a variety of fluctuations along its track including the is the influence in Chlorophyll-a (chl-a) concentration. The main purpose of this paper is to justify this variation pattern. Six Tropical Cyclones (TC) are studied using observational method. The result suggests that there is a noticeable change in productivity after a cyclone passes, when the pre cyclonic and post cyclonic condition is observed. In case of Cyclone Amphan, it shows 1.79 mg/m3 of chlorophyll-a concentration increase after a week of cyclonic occurrence. This change is affected by several attributes such as translation speed, intensity and Ocean Pre-condition, specifically Mixed Layer Depth (MLD). Translation Speed and MLD shows a strong negative correlation with the induced chlorophyll concentration. Whereas the effect of the intensity on a cyclone is not that prominent. It is also found that the period of starting an induction is not same for all cyclone such as in case of Cyclone Amphan, the changes started to occur after one day however for Cyclone Sidr and Cyclone Mora it started after three days. Furthermore, a slightly increase in overall productivity is also observed after a cyclone. In the case of Cyclone Amphan, Hudhud, Phailin it shows a rise up to 0.12 mg/m3 in productivity which decreases gradually taking around the period of two months. On a whole this paper signifies the changes in chlorophyll concentration caused by numerous cyclones and its different characteristics that regulates these changes.

Keywords: tropical cyclone, chlorophyll-a concentration, mixed layer depth, translation speed

Procedia PDF Downloads 88
12891 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 252
12890 Defining of the Shape of the Spine Using Moiré Method in Case of Patients with Scheuermann Disease

Authors: Petra Balla, Gabor Manhertz, Akos Antal

Abstract:

Nowadays spinal deformities are very frequent problems among teenagers. Scheuermann disease is a one dimensional deformity of the spine, but it has prevalence over 11% of the children. A traditional technology, the moiré method was used by us for screening and diagnosing this type of spinal deformity. A LabVIEW program has been developed to evaluate the moiré pictures of patients with Scheuermann disease. Two different solutions were tested in this computer program, the extreme and the inflexion point calculation methods. Effects using these methods were compared and according to the results both solutions seemed to be appropriate. Statistical results showed better efficiency in case of the extreme search method where the average difference was only 6,09⁰.

Keywords: spinal deformity, picture evaluation, Moiré method, Scheuermann disease, curve detection, Moiré topography

Procedia PDF Downloads 352
12889 Network Based Speed Synchronization Control for Multi-Motor via Consensus Theory

Authors: Liqin Zhang, Liang Yan

Abstract:

This paper addresses the speed synchronization control problem for a network-based multi-motor system from the perspective of cluster consensus theory. Each motor is considered as a single agent connected through fixed and undirected network. This paper presents an improved control protocol from three aspects. First, for the purpose of improving both tracking and synchronization performance, this paper presents a distributed leader-following method. The improved control protocol takes the importance of each motor’s speed into consideration, and all motors are divided into different groups according to speed weights. Specifically, by using control parameters optimization, the synchronization error and tracking error can be regulated and decoupled to some extent. The simulation results demonstrate the effectiveness and superiority of the proposed strategy. In practical engineering, the simplified models are unrealistic, such as single-integrator and double-integrator. And previous algorithms require the acceleration information of the leader available to all followers if the leader has a varying velocity, which is also difficult to realize. Therefore, the method focuses on an observer-based variable structure algorithm for consensus tracking, which gets rid of the leader acceleration. The presented scheme optimizes synchronization performance, as well as provides satisfactory robustness. What’s more, the existing algorithms can obtain a stable synchronous system; however, the obtained stable system may encounter some disturbances that may destroy the synchronization. Focus on this challenging technological problem, a state-dependent-switching approach is introduced. In the presence of unmeasured angular speed and unknown failures, this paper investigates a distributed fault-tolerant consensus tracking algorithm for a group non-identical motors. The failures are modeled by nonlinear functions, and the sliding mode observer is designed to estimate the angular speed and nonlinear failures. The convergence and stability of the given multi-motor system are proved. Simulation results have shown that all followers asymptotically converge to a consistent state when one follower fails to follow the virtual leader during a large enough disturbance, which illustrates the good performance of synchronization control accuracy.

Keywords: consensus control, distributed follow, fault-tolerant control, multi-motor system, speed synchronization

Procedia PDF Downloads 125
12888 The Preventive Effect of Metformin on Paclitaxel-Induced Peripheral Neuropathy

Authors: AliAkbar Hafezi, Jamshid Abedi, Jalal Taherian, Behnam Kadkhodaei, Mahsa Elahi

Abstract:

Background. Peripheral neuropathy is a common side effect of the administration of neurotoxic chemotherapy agents. This adverse effect is a major dose-limiting factor of many commonly used chemotherapy drugs. Currently, there are no Food and Drug Administration (FDA) approved medications for the prevention or treatment of chemotherapy-induced peripheral neuropathy. Therefore, this study was performed to investigate the efficacy and safety of metformin on paclitaxel-induced peripheral neuropathy (PIPN). Methods. In this randomized clinical trial, cancer patients who were candidates for chemotherapy with paclitaxel referred to the radiation oncology departments in Iran from 2022 to 2023 were studied. Patients were randomly divided into two groups; 1- Case group (n = 30) received metformin 500 mg orally twice a day after meals during chemotherapy with paclitaxel, and 2- Control group (30 people) received chemotherapy without metformin or any additional medication. Patients were visited in terms of numbness or other neurological symptoms two weeks before chemotherapy, 1-2 days before and weekly during chemotherapy, and at the end of the study. They were assessed by nerve conduction study (NCS) before intervention and one week after the end of chemotherapy. The primary outcome was the efficacy in reducing PIPN and the secondary outcome was adverse effects. Eventually, the outcomes were compared between the two groups of patients. Results. A total of 60 female cancer patients receiving chemotherapy with paclitaxel were evaluated in two groups. The groups were matched in terms of age, body mass index, fasting blood sugar, smoking, pathologic stage, and creatinine levels. The results showed that 18 patients (60.0 %) in the case group and 23 patients (76.6 %) in the control group had PIPN clinically (P = 0.267), and NCS showed 11 patients (36.6 %) in the case group and 15 patients (50.0 %) in the control group suffered from PIPN which no significant difference was observed between the two groups (P = 0.435). Diarrhea (n = 3; 10.0 %) and nausea (n = 3; 10.0 %) were the most common side effects of metformin in the case group and no serious side effects (lactic acidosis and anemia) were found in these patients. Conclusion. This study indicated that metformin did not significantly prevent PIPN in cancer patients receiving chemotherapy, although the frequency of peripheral neuropathy in the case group was lower than in the control group. The use of metformin in the patients had acceptable safety and no serious side effects were reported.

Keywords: peripheral neuropathy, chemotherapy, paclitaxel, metformin

Procedia PDF Downloads 43
12887 Towards Developing Social Assessment Tool for Siwan Ecolodge Case Study: Babenshal Ecolodge

Authors: Amr Ali Bayoumi, Ola Ali Bayoumi

Abstract:

The aim of this research is enhancing one of the main aspects (Social Aspect) for developing an eco-lodge in Siwa oasis in Egyptian Western Desert. According to credible weightings built in this research through formal and informal questionnaires, the researcher detected one of the highest credible aspects, 'Social Aspect': through which it carries the maximum priorities among the total environmental and economic categories. From here, the researcher suggested the usage of ethnographic design approach and Space Syntax as observational and computational methods for developing future Eco-lodge in Siwa Oasis. These methods are used to study social spaces of Babenshal eco-lodge as a case study. This hybrid method is considered as a beginning of building Social Assessment Tool (SAT) for ecological tourism buildings located in Siwa as a case of Egyptian Western desert community. Towards livable social spaces, the proposed SAT was planned to be the optimum measurable weightings for social aspect's priorities of future Siwan eco-lodge(s). Finally, recommendations are proposed for enhancing SAT to be more correlated with sensitive desert biome (Siwa Oasis) to be adapted with the continuous social and environmental changes of the oasis.

Keywords: ecolodge, social aspect, space syntax, Siwa Oasis

Procedia PDF Downloads 128
12886 Analyzing the Commentator Network Within the French YouTube Environment

Authors: Kurt Maxwell Kusterer, Sylvain Mignot, Annick Vignes

Abstract:

To our best knowledge YouTube is the largest video hosting platform in the world. A high number of creators, viewers, subscribers and commentators act in this specific eco-system which generates huge sums of money. Views, subscribers, and comments help to increase the popularity of content creators. The most popular creators are sponsored by brands and participate in marketing campaigns. For a few of them, this becomes a financially rewarding profession. This is made possible through the YouTube Partner Program, which shares revenue among creators based on their popularity. We believe that the role of comments in increasing the popularity is to be emphasized. In what follows, YouTube is considered as a bilateral network between the videos and the commentators. Analyzing a detailed data set focused on French YouTubers, we consider each comment as a link between a commentator and a video. Our research question asks what are the predominant features of a video which give it the highest probability to be commented on. Following on from this question, how can we use these features to predict the action of the agent in commenting one video instead of another, considering the characteristics of the commentators, videos, topics, channels, and recommendations. We expect to see that the videos of more popular channels generate higher viewer engagement and thus are more frequently commented. The interest lies in discovering features which have not classically been considered as markers for popularity on the platform. A quick view of our data set shows that 96% of the commentators comment only once on a certain video. Thus, we study a non-weighted bipartite network between commentators and videos built on the sub-sample of 96% of unique comments. A link exists between two nodes when a commentator makes a comment on a video. We run an Exponential Random Graph Model (ERGM) approach to evaluate which characteristics influence the probability of commenting a video. The creation of a link will be explained in terms of common video features, such as duration, quality, number of likes, number of views, etc. Our data is relevant for the period of 2020-2021 and focuses on the French YouTube environment. From this set of 391 588 videos, we extract the channels which can be monetized according to YouTube regulations (channels with at least 1000 subscribers and more than 4000 hours of viewing time during the last twelve months).In the end, we have a data set of 128 462 videos which consist of 4093 channels. Based on these videos, we have a data set of 1 032 771 unique commentators, with a mean of 2 comments per a commentator, a minimum of 1 comment each, and a maximum of 584 comments.

Keywords: YouTube, social networks, economics, consumer behaviour

Procedia PDF Downloads 68
12885 Structural Properties of RC Beam with Progression of Corrosion Induced Delamination Cracking

Authors: Anupam Saxena, Achin Agrawal, Rishabh Shukla, S. Mandal

Abstract:

It is quite important that the properties of structural elements do not change significantly before and after cracking, and if they do, it adversely affects the structure. Corrosion in rebars causes cracking in concrete which can lead to the change in properties of beam. In the present study, two RC beams with same flexural strength but with different reinforcement arrangements are considered and modelling of cracks of RC beams has been done at different degrees of corrosion in the case of delamination using boundary conditions of Three Point Bending Test. Finite Element Analysis (FEA) has been done at different degree of corrosion to observe the variation of different parameters like modal frequency, Elasticity and Flexural strength in case of delamination. Also, the comparison between two different RC arrangements is made to conclude which one of them is more suitable.

Keywords: delamination, elasticity, FEA, flexural strength, modal frequency, RC beam

Procedia PDF Downloads 426