Search results for: internet usage
617 Design and Development of a Safety Equipment and Accessory for Bicycle Users
Authors: Francine Siy, Stephen Buñi
Abstract:
Safety plays a significant role in everyone’s life on a day-to-day basis. We wish ourselves and our loved ones their safety as we all venture out on our daily commute. The road is undeniably dangerous and unpredictable, with abundant traffic collisions and pedestrians experiencing various injuries. For bicycle users, the risk of accidents is even more exacerbated, and injuries may be severe. Even when cyclists try their best to be safe and protected, the possibility of encountering danger is always there. Despite being equipped with protective gear, safety is never guaranteed. Cyclists often settle for helmets and standard reflector vests to establish a presence on the road. There are different types of vests available, depending on the profession. However, traditional reflector vests, mostly seen on construction workers and traffic enforcers, were not designed for riders and their protection from injuries. With insufficient protection for riders, they need access to ergonomically designed equipment and accessories that suit the riders and cater to their needs. This research aimed to offer a protective vest with safety features for riders that is comfortable, effective, durable, and intuitive. This sheds light and addresses the safety of the biker population, which continuously grows through the years. The product was designed and developed by gathering data and using the cognitive mapping method to ensure that all qualitative and quantitative data were considered in this study to improve other existing products that do not have the proper design considerations. It is known that available equipment for cyclists is often sold separately or lacks the safety features for cyclists traversing open roads. Each safety feature like the headlights, reflectors, signal or rear lights, zipper pouch, body camera attachment, and wireless remote control all play a particular role in helping cyclists embark on their daily commute. These features aid in illumination, visibility, easy maneuvering, convenience, and security, allowing cyclists to go for a safer ride that is of use throughout the day. The product is designed and produced effectively and inexpensively without sacrificing the quality and purpose of its usage.Keywords: bicycle accessory, protective gear, safety, transport, visibility
Procedia PDF Downloads 83616 Metamorphosis of Teaching-Learning During COVID-19 Crisis and Challenges of Education in India
Authors: Saroj Pandey
Abstract:
COVID-19, declared by the World Health Organization a pandemic (WHO,2020), has created an unprecedented crisis world over endangering the human survival itself. Corona induced lockdowns forced approximately 140 million students of 190 countries at various levels of education from preprimary to higher education to remain confined to their homes. In India, approximately 360 million students were affected by the forced shut down of schools due to the countrywide lockdown in March 2020 and resultant disruption of education. After the initial shock and anxiety the Indian polity and education system bounced back with a number of initiatives, and online education came as a major rescuer for the education system of the country. The distance and online mode of learning that was treated as the poor cousin of conventional mode and often criticized for its quality became the major crusader overnight changing the entire ecosystem of traditional teaching -leaning towards the virtual mode. Teachers who were averse to technology were forced to remodel their educational pedagogies and reorient themselves overnight to use various online platforms such as Zoom, Google meet, and other such platforms to reach the learners. This metamorphosis through ensured students was meaningfully engaged in their studies during the lockdown period but it has its own set of challenges. This paper deals with the government initiatives, and teachers' self-efforts to keep the channel of teaching learning on providing academic and socio emotional support to students during the most difficult period of their life as well as the digital divide between the rich and poor, rural and urban, and boys and girls in India and resultant challenges. It also provides an overview of few significant self-initiatives of teachers to reach their students during the crisis period, who did not have internet and smartphone facilities as well as the initiatives being taken at the government level to address the learning needs and mitigate the learning gaps of learners, bridge the digital divide, strategic planning and upskilling of teachers to overcome the effect of COVID-19 crisis.Keywords: COVID-19, online education, initiatives, challenges
Procedia PDF Downloads 114615 The Impact of Public Finance Management on Economic Growth and Development in South Africa
Authors: Zintle Sikhunyana
Abstract:
Management of public finance in many countries such as South Africa is affected by political decisions and by policies around fiscal decentralization amongst the government spheres. Economic success is said to be determined by efficient management of public finance and by the policies or strategies that are implemented to support efficient public finance management. Policymakers focus on pay attention to how economic policies have been implemented and how they are directed into ensuring stable development. This will allow policymakers to address economic challenges through the usage of fiscal policy parameters that are linked to the achieved rate of economic growth and development. Efficient public finance management reduces the likelihood of corruption and corruption is said to have negative effects on economic growth and development. Corruption in public finance refers to an act of using funds for personal benefits. To achieve macroeconomic objectives, governments make use of government expenditure and government expenditure is financed through tax revenue. The main aim of this paper is to investigate the potential impact of public finance management on economic growth and development in South Africa. The secondary data obtained from the South African Reserve Bank (SARB) and World Bank for 1980- 2020 has been utilized to achieve the research objectives. To test the impact of public finance management on economic growth and development, the study will use Seeming Unrelated Regression Equation (SURE) Modelling that allows researchers to model multiple equations with interdependent variables. The advantages of using SUR are that it efficiently allows estimation of relationships between variables by combining information on different equations and SUR test restrictions that involve parameters in different equations. The findings have shown that there is a positive relationship between efficient public finance management and economic growth/development. The findings also show that efficient public finance management has an indirect positive impact on economic growth and development. Corruption has a negative impact on economic growth and development. It results in an efficient allocation of government resources and thereby improves economic growth and development. The study recommends that governments who aim to stimulate economic growth and development should target and strengthen public finance management policies or strategies.Keywords: corruption, economic growth, economic development, public finance management, fiscal decentralization
Procedia PDF Downloads 201614 The Effect of General Data Protection Regulation on South Asian Data Protection Laws
Authors: Sumedha Ganjoo, Santosh Goswami
Abstract:
The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.Keywords: data privacy, GDPR, Asia, data protection laws
Procedia PDF Downloads 82613 Low-Income African-American Fathers' Gendered Relationships with Their Children: A Study Examining the Impact of Child Gender on Father-Child Interactions
Authors: M. Lim Haslip
Abstract:
This quantitative study explores the correlation between child gender and father-child interactions. The author analyzes data from videotaped interactions between African-American fathers and their boy or girl toddler to explain how African-American fathers and toddlers interact with each other and whether these interactions differ by child gender. The purpose of this study is to investigate the research question: 'How, if at all, do fathers’ speech and gestures differ when interacting with their two-year-old sons versus daughters during free play?' The objectives of this study are to describe how child gender impacts African-American fathers’ verbal communication, examine how fathers gesture and speak to their toddler by gender, and to guide interventions for low-income African-American families and their children in early language development. This study involves a sample of 41 low-income African-American fathers and their 24-month-old toddlers. The videotape data will be used to observe 10-minute father-child interactions during free play. This study uses the already transcribed and coded data provided by Dr. Meredith Rowe, who did her study on the impact of African-American fathers’ verbal input on their children’s language development. The Child Language Data Exchange System (CHILDES program), created to study conversational interactions, was used for transcription and coding of the videotape data. The findings focus on the quantity of speech, diversity of speech, complexity of speech, and the quantity of gesture to inform the vocabulary usage, number of spoken words, length of speech, and the number of object pointings observed during father-toddler interactions in a free play setting. This study will help intervention and prevention scientists understand early language development in the African-American population. It will contribute to knowledge of the role of African-American fathers’ interactions on their children’s language development. It will guide interventions for the early language development of African-American children.Keywords: parental engagement, early language development, African-American families, quantity of speech, diversity of speech, complexity of speech and the quantity of gesture
Procedia PDF Downloads 105612 Impact of Information and Communication Technology on Academic Performance of Senior Secondary Schools Students in Gwagwalada Area Council of Federal Capital Territory, Abuja
Authors: Suleiman Garba, Haruna Ishaku
Abstract:
Information and communication technology (ICT) includes any communication device encompassing: radio, television, cellular phones, computer, satellite systems and so on, as well as the various services and applications associated with them. The significance of ICT cannot be over-emphasized in education. The teaching and learning processes have integrated with the application of ICTs for effectiveness and enhancement of academic performance among the students. Today, as the educational sector is faced with series of changes and reforms, it was noted that the problem of information technology illiteracy was a serious one among the schools’ teachers in the country as it cuts across primary, secondary schools and tertiary institutions. This study investigated the impact of ICT on the academic performance of senior secondary schools students in Gwagwalada Area Council of Federal Capital Territory (FCT), Abuja. A sample of 120 SSS III students was involved in the study. They were selected by using simple random sampling technique. A questionnaire was developed and validated through expert judgement and reliability co-efficient of 0.81 was obtained. It was used to gather relevant data from the respondents. Findings revealed that there was positive impact of ICT on academic performance of senior secondary schools students. The findings indicated the causes of poor academic performance among the students as lack of qualified teachers to teach in schools, peer group influence, and bullying. Significantly, the findings revealed that ICT had a positive impact on students’ academic performance. The null hypotheses were tested using t-test at 0.05 level of significance. It was discovered that there was significant difference between male and female secondary schools’ students' impact of ICT on academic performance in Gwagawalada Area Council of FCT-Abuja. Based on these findings, some recommendations were made which include: adequate funds should be provided towards procurement of ICT resources, relevant textbooks to enhance students’ active participation in learning processes and students should be provided with internet accessibility at inexpensive rate so as to create a platform for accessing useful information in the pursuit of academic excellence.Keywords: academic performance, impact, information communication technology, schools, students
Procedia PDF Downloads 219611 Information and Communication Technology Learning between Parents and High School Students
Authors: Yu-Mei Tseng, Chih-Chun Wu
Abstract:
As information and communication technology (ICT) has become a part of people’s lives, most teenagers born after the 1980s and grew up in internet generation are called digital natives. Meanwhile, those teenagers’ parents are called digital immigrants. They need to keep learning new skills of ICT. This study investigated that high school students helped their parents set up social network services (SNS) and taught them how to use ICT. This study applied paper and pencil anonymous questionnaires that asked the ICT learning and ICT products using in high school students’ parents. The sample size was 2,621 high school students, including 1,360 (51.9%) males and 1,261 (48.1%) females. The sample was from 12 high school and vocational high school in central Taiwan. Results from paired sample t-tests demonstrated regardless genders, both male and female high school students help mothers set up Facebook and LINE more often than fathers. In addition, both male and female high school students taught mothers to use ICT more often than fathers. Meanwhile, both male and female high school students teach mothers to use SNS more often than fathers. The results showed that intergenerational ICT teaching occurred more often between mothers and her children than fathers. It could imply that mothers play a more important role in family ICT learning than fathers, or it could be that mothers need more help regarding ICT than fathers. As for gender differences, results from the independent t-tests showed that female high school students were more likely than male ones to help their parents setup Facebook and LINE. In addition, compared to male high school students, female ones were more likely to teach their parents to use smartphone, Facebook and LINE. However, no gender differences were detected in teaching mothers. The gender differences results suggested that female teenagers offer more helps to their parents regarding ICT learning than their male counterparts. As for area differences, results from the independent t-tests showed that the high school in remote area students were more likely than metropolitan ones to teach parents to use computer, search engine and download files of audio and video. The area differences results might indicate that remote area students were more likely to teach their parents how to use ICT. The results from this study encourage children to help and teach their parents with ICT products.Keywords: adult ICT learning, family ICT learning, ICT learning, urban-rural gap
Procedia PDF Downloads 177610 Factors Affecting Expectations and Intentions of University Students’ Mobile Phone Use in Educational Contexts
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance- Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling(SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: education, mobile behavior, mobile learning, technology, Turkey
Procedia PDF Downloads 421609 Factors Affecting Expectations and Intentions of University Students in Educational Context
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: learning technology, instructional technology, mobile learning, technology
Procedia PDF Downloads 451608 Physicochemical and Microbiological Assessment of Source and Stored Domestic Water from Three Local Governments in Ile-Ife, Nigeria
Authors: Mary A. Bisi-Johnson, Kehinde A. Adediran, Saheed A. Akinola, Hamzat A. Oyelade
Abstract:
Some of the main problems man contends with are the quantity (source and amount) and quality of water in Nigeria. Scarcity leads to water being obtained from various sources and microbiological contaminations of the water may thus occur between the collection point and the point of usage. Thus, this study aims to assess the general and microbiological quality of domestic water sources and household stored water used within selected areas in Ile-Ife, South-Western part of Nigeria for microbial contaminants. Physicochemical and microbiological examination were carried out on 45 source and stored water samples collected from well and spring in three different local government areas i.e. Ife east, Ife-south, and Ife-north. Physicochemical analysis included pH value, temperature, total dissolved solid, dissolved oxygen, and biochemical oxygen demand. Microbiology involved most probable number analysis, total coliform, heterotrophic plate, faecal coliform, and streptococcus count. The result of the physicochemical analysis of samples showed anomalies compared to acceptable standards with the pH value of 7.20-8.60 for stored and 6.50-7.80 for source samples as the total dissolved solids (TDS of stored 20-70mg/L, source 352-691mg/L), dissolved oxygen (DO of stored 1.60-9.60mg/L, source 1.60-4.80mg/L), biochemical oxygen demand (BOD stored 0.80-3.60mg/L, source 0.60-5.40mg/L). General microbiological quality indicated that both stored and source samples with the exception of a sample were not within acceptable range as indicated by analysis of the MPN/100ml which ranges (stored 290-1100mg/L, source 9-1100mg/L). Apart from high counts, most samples did not meet the World Health Organization standard for drinking water with the presence of some pathogenic bacteria and fungi such as Salmonella and Aspergillus spp. To annul these constraints, standard treatment methods should be adopted to make water free from contaminants. This will help identify common and likely water related infection origin within the communities and thus help guide in terms of interventions required to prevent the general populace from such infections.Keywords: domestic, microbiology, physicochemical, quality, water
Procedia PDF Downloads 360607 The Practice of Low Flow Anesthesia to Reduce Carbon Footprints Sustainability Project
Authors: Ahmed Eid, Amita Gupta
Abstract:
Abstract: Background: Background Medical gases are estimated to contribute to 5% of the carbon footprints produced by hospitals, Desflurane has the largest impact, but all increase significantly when used with N2O admixture. Climate Change Act 2008, we must reduce our carbon emission by 80% of the 1990 baseline by 2050.NHS carbon emissions have reduced by 18.5% (2007-2017). The NHS Long Term Plan has outlined measures to achieve this objective, including a 2% reduction by transforming anaesthetic practices. FGF is an important variable that determines the utilization of inhalational agents and can be tightly controlled by the anaesthetist. Aims and Objectives Environmental safety, Identification of areas of high N20 and different anaesthetic agents used across the St Helier operating theatres and consider improvising on the current practice. Methods: Data was collected from St Helier operating theatres and retrieved daily from Care Station 650 anaesthetic machines. 60 cases were included in the sample. Collected data (average flow rate, amount and type of agent used, duration of surgery, type of surgery, duration, and the total amount of Air, O2 and N2O used. AAGBI impact anaesthesia calculator was used to identify the amount of CO2 produced and also the cost per hour for every pt. Communication via reminder emails to staff emphasized the significance of low-flow anaesthesia and departmental meeting presentations aimed at heightening awareness of LFA, Distribution of AAGBI calculator QR codes in all theatres enables the calculation of volatile anaesthetic consumption and CO2e post each case, facilitating informed environmental impact assessment. Results: A significant reduction in the flow rate use in the 2nd sample was observed, flow rate usage between 0-1L was 60% which means a great reduction of the consumption of volatile anaesthetics and also Co2e. By using LFA we can save money but most importantly we can make our lives much greener and save the planet.Keywords: low flow anesthesia, sustainability project, N₂0, Co2e
Procedia PDF Downloads 68606 A Corpus Study of English Verbs in Chinese EFL Learners’ Academic Writing Abstracts
Authors: Shuaili Ji
Abstract:
The correct use of verbs is an important element of high-quality research articles, and thus for Chinese EFL learners, it is significant to master characteristics of verbs and to precisely use verbs. However, some researches have shown that there are differences in using verbs between learners and native speakers and learners have difficulty in using English verbs. This corpus-based quantitative research can enhance learners’ knowledge of English verbs and promote the quality of research article abstracts even of the whole academic writing. The aim of this study is to find the differences between learners’ and native speakers’ use of verbs and to study the factors that contribute to those differences. To this end, the research question is as follows: What are the differences between most frequently used verbs by learners and those by native speakers? The research question is answered through a study that uses corpus-based data-driven approach to analyze the verbs used by learners in their abstract writings in terms of collocation, colligation and semantic prosody. The results show that: (1) EFL learners obviously overused ‘be, can, find, make’ and underused ‘investigate, examine, may’. As to modal verbs, learners obviously overused ‘can’ while underused ‘may’. (2) Learners obviously overused ‘we find + object clauses’ while underused ‘nouns (results, findings, data) + suggest/indicate/reveal + object clauses’ when expressing research results. (3) Learners tended to transfer the collocation, colligation and semantic prosody of shǐ and zuò to make. (4) Learners obviously overused ‘BE+V-ed’ and used BE as the main verb. They also obviously overused the basic forms of BE such as be, is, are, while obviously underused its inflections (was, were). These results manifested learners’ lack of accuracy and idiomatic property in verb usage. Due to the influence of the concept transfer of Chinese, the verbs in learners’ abstracts showed obvious transfer of mother language. In addition, learners have not fully mastered the use of verbs, avoiding using complex colligations to prevent errors. Based on these findings, the present study has implications for English teaching, seeking to have implications for English academic abstract writing in China. Further research could be undertaken to study the use of verbs in the whole dissertation to find out whether the characteristic of the verbs in abstracts can apply in the whole dissertation or not.Keywords: academic writing abstracts, Chinese EFL learners, corpus-based, data-driven, verbs
Procedia PDF Downloads 335605 Minority Language Policy and Planning in Manchester, Britain
Authors: Mohamed F. Othman
Abstract:
Manchester, Britain has become the destination of immigrants from different parts of the world. As a result, it is currently home to over 150 different ethnic languages. The present study investigates minority language policy and planning at the micro-level of the city. In order to get an in-depth investigation of such a policy, it was decided to cover it from two angles: the first is the policy making process. This was aimed at getting insights on how decisions regarding the provision of government services in minority languages are taken and what criteria are employed. The second angle is the service provider; i.e. the different departments in Manchester City Council (MCC), the NHS, the courts, and police, etc., to obtain information on the actual provisions of services. Data was collected through semi-structured interviews with different personnel representing different departments in MCC, solicitors, interpreters, etc.; through the internet, e.g. the websites of MCC, NHS, courts, and police, etc.; and via personal observation of provisions of community languages in government services. The results show that Manchester’s language policy is formulated around two concepts that work simultaneously: one is concerned with providing services in community languages in order to help minorities manage their life until they acquire English, and the other with helping the integration of minorities through encouraging them to learn English. In this regard, different government services are provided in community languages, though to varying degrees, depending on the numerical strength of each individual language. Thus, it is concluded that there is awareness in MCC and other government agencies working in Manchester of the linguistic diversity of the city and there are serious attempts to meet this diversity in their services. It is worth mentioning here that providing such services in minority languages are not meant to support linguistic diversity, but rather to maintain the legal right to equal opportunities among the residents of Manchester and to avoid any misunderstanding that may result due to the language barrier, especially in such areas as hospitals, courts, and police. There is actually no explicitly-mentioned language policy regarding minorities in Manchester; rather, there is an implied or covert policy resulting from factors that are not explicitly documented. That is, there are guidelines from the central government, which emphasize the principle of equal opportunities; then the implementation of such guidelines requires providing services in the different ethnic languages.Keywords: community language, covert language policy, micro-language policy and planning, minority language
Procedia PDF Downloads 267604 Life-Cycle Cost and Life-Cycle Assessment of Photovoltaic/Thermal Systems (PV/T) in Swedish Single-Family Houses
Authors: Arefeh Hesaraki
Abstract:
The application of photovoltaic-thermal hybrids (PVT), which delivers both electricity and heat simultaneously from the same system, has become more popular during the past few years. This study addresses techno-economic and environmental impacts assessment of photovoltaic/thermal systems combined with a ground-source heat pump (GSHP) for three single-family houses located in Stockholm, Sweden. Three case studies were: (1) A renovated building built in 1936, (2) A renovated building built in 1973, and (3) A new building built-in 2013. Two simulation programs of SimaPro 9.1 and IDA Indoor Climate and Energy 4.8 (IDA ICE) were applied to analyze environmental impacts and energy usage, respectively. The cost-effectiveness of the system was evaluated using net present value (NPV), internal rate of return (IRR), and discounted payback time (DPBT) methods. In addition to cost payback time, the studied PVT system was evaluated using the energy payback time (EPBT) method. EPBT presents the time that is needed for the installed system to generate the same amount of energy which was utilized during the whole lifecycle (fabrication, installation, transportation, and end-of-life) of the system itself. Energy calculation by IDA ICE showed that a 5 m² PVT was sufficient to create a balance between the maximum heat production and the domestic hot water consumption during the summer months for all three case studies. The techno-economic analysis revealed that combining a 5 m² PVT with GSHP in the second case study possess the smallest DPBT and the highest NPV and IRR among the three case studies. It means that DPBTs (IRR) were 10.8 years (6%), 12.6 years (4%), and 13.8 years (3%) for the second, first, and the third case study, respectively. Moreover, environmental assessment of embodied energy during cradle- to- grave life cycle of the studied PVT, including fabrication, delivery of energy and raw materials, manufacture process, installation, transportation, operation phase, and end of life, revealed approximately two years of EPBT in all cases.Keywords: life-cycle cost, life-cycle assessment, photovoltaic/thermal, IDA ICE, net present value
Procedia PDF Downloads 115603 Highly Efficient in Vitro Regeneration of Swertia chirayita (Roxb. ex Fleming) Karsten: A Critically Endangered Medicinal Plant
Authors: Mahendran Ganesan, Sanjeet Kumar Verma, Zafar Iqbal, Ashish Chandran, Zakir Husain, Shama Afroz, Sana Shahid, Laiq Ur Rahman
Abstract:
Highly efficient in vitro regeneration system has been developed for Swertia chirayita (Roxb. ex Fleming) H. Karst, a high prized traditional medicinal plant to treat numerous ailments such as liver disorders, malaria and diabetes and are reported to have a wide spectrum of pharmacological properties. Its medicinal usage is well-documented in Indian pharmaceutical codex, the British and the American pharmacopeias, and in different traditional medicine such as the Ayurveda, Unani and Siddha medical systems. Nodal explants were cultured on MS medium supplemented with various phytohormones for multiple shoot induction. The nodal segments failed to respond in growth regulator free medium. All the concentrations of BAP, Kin and TDZ facilitated shoot bud break and multiple shoot induction. Among the various cytokinins tested, BAP was found to be more effective with respect to initiation and subsequent development of shoots. Of the various concentrations BAP tested, BAP at 4.0 mg/L showed the higher average number of shoot regeneration (10.80 shoots per explant). Kin at 4 mg/L and TDZ at 4 mg/L induced 5.70 and 04.5+0 shoots per explant, respectively. Further increase in concentration did not favour an increase in the number of shoots. However, these shoots failed to elongate further. Hence, addition of GA₃ (1 mg/L) was added to the above medium. This treatment resulted in the elongation of shoots (2.50 cm) and a further increase in the number of microshoots (34.20 shoots/explant). Roots were also induced in the same medium containing BAP (4 mg/L) + GA₃ (1 mg/L) + NAA (0.5 mg/L). In vitro derived plantlets with well-developed roots were transferred to the potting media containing garden soil: sand: vermicompost (2:1:1). Plantlets were covered with a polyethylene bag and irrigated with water. The pots were maintained at 25 ± 2ºC, and then the polyethylene cover was gradually loosened, thus dropping the humidity (65–70%). This procedure subsequently resulted in in vitro hardening of the plantlet.Keywords: micropropagation, nodal explant, plant growth regulators, Swertia chirayita
Procedia PDF Downloads 120602 Targeting Glucocorticoid Receptor Eliminate Dormant Chemoresistant Cancer Stem Cells in Glioblastoma
Authors: Aoxue Yang, Weili Tian, Yonghe Wu, Haikun Liu
Abstract:
Brain tumor stem cells (BTSCs) are resistant to therapy and give rise to recurrent tumors. These rare and elusive cells are likely to disseminate during cancer progression, and some may enter dormancy, remaining viable but not increasing. The identification of dormant BTSCs is thus necessary to design effective therapies for glioblastoma (GBM) patients. Little progress has been made in therapeutic treatment of glioblastoma in the last decade despite rapid progress in molecular understanding of brain tumors1. Here we show that the stress hormone glucocorticoid is essential for the maintenance of brain tumor stem cells (BTSCs), which are resistant to conventional therapy. The glucocorticoid receptor (GR) regulates metabolic plasticity and chemoresistance of the dormant BTSC via controlling expression of GPD1 (glycerol-3-phosphate dehydrogenase 1), which is an essential regulator of lipid metabolism in BTSCs. Genomic, lipidomic and cellular analysis confirm that GR/GPD1 regulation is essential for BTSCs metabolic plasticity and survival. We further demonstrate that the GR agonist dexamethasone (DEXA), which is commonly used to control edema in glioblastoma, abolishes the effect of chemotherapy drug temozolomide (TMZ) by upregulating GPD1 and thus promoting tumor cell dormancy in vivo, this provides a mechanistic explanation and thus settle the long-standing debate of usage of steroid in brain tumor patient edema control. Pharmacological inhibition of GR/GPD1 pathway disrupts metabolic plasticity of BTSCs and prolong animal survival, which is superior to standard chemotherapy. Patient case study shows that GR antagonist mifepristone blocks tumor progression and leads to symptomatic improvement. This study identifies an important mechanism regulating cancer stem cell dormancy and provides a new opportunity for glioblastoma treatment.Keywords: cancer stem cell, dormancy, glioblastoma, glycerol-3-phosphate dehydrogenase 1, glucocorticoid receptor, dexamethasone, RNA-sequencing, phosphoglycerides.
Procedia PDF Downloads 84601 Rainwater Management in Smart City: Focus in Gomti Nagar Region, Lucknow, Uttar Pradesh, India
Authors: Priyanka Yadav, Rajkumar Ghosh, Alok Saini
Abstract:
Human civilization cannot exist and thrive in the absence of adequate water. As a result, even in smart cities, water plays an important role in human existence. The key causes of this catastrophic water scarcity crisis are lifestyle changes, over-exploitation of groundwater, water over usage, rapid urbanization, and uncontrolled population growth. Furthermore, salty water seeps into deeper aquifers, causing land subsidence. The purpose of this study on artificial groundwater recharge is to address the water shortage in Gomti Nagar, Lucknow. Submersibles are the most common methods of collecting freshwater from groundwater in Gomti Nagar neighbourhood of Lucknow. Gomti Nagar area has a groundwater depletion rate of 1968 m3/day/km2 and is categorized as Zone-A (very high levels) based on the existing groundwater abstraction pattern - A to D. Harvesting rainwater using roof top rainwater harvesting systems (RTRWHs) is an effective method for reducing aquifer depletion in a sustainable water management system. Rainwater collecting using roof top rainwater harvesting systems (RTRWHs) is an effective method for reducing aquifer depletion in a sustainable water conservation system. Due to a water imbalance of 24519 ML/yr, the Gomti Nagar region is facing severe groundwater depletion. According to the Lucknow Development Authority (LDA), the impact of installed RTRWHs (plot area 300 sq. m.) is 0.04 percent of rainfall collected through RTRWHs in Gomti Nagar region of Lucknow. When RTRWHs are deployed in all buildings, their influence will be greater. Bye-laws in India have mandated the installation of RTRWHs on plots greater than 300 sq.m. A better India without any water problem is a pipe dream that may be realized by installing residential and commercial rooftop rainwater collecting systems in every structure. According to the current study, RTRWHs should be used as an alternate source of water to bridge the gap between groundwater recharge and extraction in smart city viz. Gomti Nagar, Lucknow, India.Keywords: groundwater recharge, RTRWHs, harvested rainwater, rainfall, water extraction
Procedia PDF Downloads 106600 Comparison of Methods for the Detection of Biofilm Formation in Yeast and Lactic Acid Bacteria Species Isolated from Dairy Products
Authors: Goksen Arik, Mihriban Korukluoglu
Abstract:
Lactic acid bacteria (LAB) and some yeast species are common microorganisms found in dairy products and most of them are responsible for the fermentation of foods. Such cultures are isolated and used as a starter culture in the food industry because of providing standardisation of the final product during the food processing. Choice of starter culture is the most important step for the production of fermented food. Isolated LAB and yeast cultures which have the ability to create a biofilm layer can be preferred as a starter in the food industry. The biofilm formation could be beneficial to extend the period of usage time of microorganisms as a starter. On the other hand, it is an undesirable property in pathogens, since biofilm structure allows a microorganism become more resistant to stress conditions such as antibiotic presence. It is thought that the resistance mechanism could be turned into an advantage by promoting the effective microorganisms which are used in the food industry as starter culture and also which have potential to stimulate the gastrointestinal system. Development of the biofilm layer is observed in some LAB and yeast strains. The resistance could make LAB and yeast strains dominant microflora in the human gastrointestinal system; thus, competition against pathogen microorganisms can be provided more easily. Based on this circumstance, in the study, 10 LAB and 10 yeast strains were isolated from various dairy products, such as cheese, yoghurt, kefir, and cream. Samples were obtained from farmer markets and bazaars in Bursa, Turkey. As a part of this research, all isolated strains were identified and their ability of biofilm formation was detected with two different methods and compared with each other. The first goal of this research was to determine whether isolates have the potential for biofilm production, and the second was to compare the validity of two different methods, which are known as “Tube method” and “96-well plate-based method”. This study may offer an insight into developing a point of view about biofilm formation and its beneficial properties in LAB and yeast cultures used as a starter in the food industry.Keywords: biofilm, dairy products, lactic acid bacteria, yeast
Procedia PDF Downloads 263599 Exploring the Unintended Consequences of Loyalty programs in the Gambling Sector
Authors: Violet Justine Mtonga, Cecilia Diaz
Abstract:
this paper explores the prevalence of loyalty programs in the UK gambling industry and their association with unintended consequences and harm amongst program members. The use of loyalty programs within the UK gambling industry has risen significantly with over 40 million cards in circulation. Some research suggests that as of 2013-2014, nearly 95% of UK consumers have at least one loyalty card with 78% being members of two or more programs, and the average household possesses ‘22 loyalty programs’, nearly half of which tend to be used actively. The core design of loyalty programs is to create a relational ‘win-win’ approach where value is jointly created between the parties involved through repetitive engagement. However, main concern about the diffusion of gambling organisations’ loyalty programs amongst consumers, might be the use by the organisations within the gambling industry to over influence customer engagement and potentially cause unintended harm. To help understand the complex phenomena of the diffusions and adaptation of the use of loyalty programs in the gambling industry, and the potential unintended outcomes, this study is theoretically underpinned by the social exchange theory of relationships entrenched in the processes of social exchanges of resources, rewards, and costs for long-term interactions and mutual benefits. Qualitative data were collected via in-depth interviews from 14 customers and 12 employees within the UK land-based gambling firms. Data were analysed using a combination of thematic and clustering analysis to help reveal and discover the emerging themes regarding the use of loyalty cards for gambling companies and exploration of subgroups within the sample. The study’s results indicate that there are different unintended consequences and harm of loyalty program engagement and usage such as maladaptive gambling behaviours, risk of compulsiveness, and loyalty programs promoting gambling from home. Furthermore, there is a strong indication of a rite of passage among loyalty program members. There is also strong evidence to support other unfavorable behaviors such as amplified gambling habits and risk-taking practices. Additionally, in pursuit of rewards, loyalty program incentives effectuate overconsumption and heighten expenditure. Overall, the primary findings of this study show that loyalty programs in the gambling industry should be designed with an ethical perspective and practice.Keywords: gambling, loyalty programs, social exchange theory, unintended harm
Procedia PDF Downloads 89598 Management of Acute Appendicitis with Preference on Delayed Primary Suturing of Surgical Incision
Authors: N. A. D. P. Niwunhella, W. G. R. C. K. Sirisena
Abstract:
Appendicitis is one of the most encountered abdominal emergencies worldwide. Proper clinical diagnosis and appendicectomy with minimal post operative complications are therefore priorities. Aim of this study was to ascertain the overall management of acute appendicitis in Sri Lanka in special preference to delayed primary suturing of the surgical site, comparing other local and international treatment outcomes. Data were collected prospectively from 155 patients who underwent appendicectomy following clinical and radiological diagnosis with ultrasonography. Histological assessment was done for all the specimens. All perforated appendices were managed with delayed primary closure. Patients were followed up for 28 days to assess complications. Mean age of patient presentation was 27 years; mean pre-operative waiting time following admission was 24 hours; average hospital stay was 72 hours; accuracy of clinical diagnosis of appendicitis as confirmed by histology was 87.1%; post operative wound infection rate was 8.3%, and among them 5% had perforated appendices; 4 patients had post operative complications managed without re-opening. There was no fistula formation or mortality reported. Current study was compared with previously published data: a comparison on management of acute appendicitis in Sri Lanka vs. United Kingdom (UK). The diagnosis of current study was equally accurate, but post operative complications were significantly reduced - (current study-9.6%, compared Sri Lankan study-16.4%; compared UK study-14.1%). During the recent years, there has been an exponential rise in the use of Computerised Tomography (CT) imaging in the assessment of patients with acute appendicitis. Even though, the diagnostic accuracy without using CT, and treatment outcome of acute appendicitis in this study match other local studies as well as with data compared to UK. Therefore CT usage has not increased the diagnostic accuracy of acute appendicitis significantly. Especially, delayed primary closure may have reduced post operative wound infection rate for ruptured appendices, therefore suggest this approach for further evaluation as a safer and an effective practice in other hospitals worldwide as well.Keywords: acute appendicitis, computerised tomography, diagnostic accuracy, delayed primary closure
Procedia PDF Downloads 166597 Fly Ash Based Geopolymer Concrete as Curbs, Pavement Bricks, and Wall Bricks
Authors: Marthin Dody Josias Sumajouw, Bryan Wijaya, Servie O. Dapas, Ronny E. Pandaleke, Banu Handono, Fabian J. Manoppo
Abstract:
Ordinary Portland Cement (OPC) takes a big role as a concrete binder in infrastructure construction purposes, nevertheless, it produces CO2 emissions abundantly. To reduce the CO2 emissions produced by OPC concrete, nowadays, geopolymer material become one of the solutions due to it being a binder made from waste with pozzolan material. In concrete industries, geopolymer concrete has evolved as a more environmentally friendly material than OPC concrete. The geopolymer concrete was created without the usage of OPC known as cementless concrete materials. Geopolymer concrete obtains silicon and aluminum from industrial by-products such as fly ash, ground granulated blast furnace slag, and kaolinite. A highly alkaline solution chemically activates Si and Al, forming a matrix that holds together the loose aggregates as well as additional unreacted components in the mixture. They are then dissolved in alkaline activating solutions, where they polymerize into molecular chains, resulting in rigid binders. This research aims to get an eco-friendly material that can reduce the use of OPC as a binder and be used for infrastructure development end-products such as Curbs, Pavement Bricks, and Wall Bricks. This research was conducted as applied research to develop new products of environmentally friendly materials by utilizing fly ash and employed for infrastructure development, particularly for the production of end products such as Curbs, Pavement Bricks, and Wall Bricks. Three types of end products with various dimensions and mix designs have been made and tested in the laboratory, resulting in quantitative datasets to be used for identifying patterns and relationships among density, compressive strength, flexural strength, and water absorption. The result found that geopolymer binders can be used for the production of curbs, pavement bricks, and wall bricks. Geopolymer curbs have an average compressive strength of 19,36 MPa, which can be determined as K-233 concrete. Geopolymer pavement bricks have an average compressive strength of 20,79 MPa. It can be used in parking areas and determined as the grade B of pavement bricks according to SNI 03-0691-1996. Geopolymer wall bricks have an average compressive strength of 11,24 MPa, which can be determined as the grade I of Wall Bricks according to SNI 03-0349-1989.Keywords: absorption, compressive strength, curbs, end products, geopolymer, pavement bricks, wall bricks
Procedia PDF Downloads 30596 A Comparative Study of Mechanisms across Different Online Social Learning Types
Authors: Xinyu Wang
Abstract:
In the context of the rapid development of Internet technology and the increasing prevalence of online social media, this study investigates the impact of digital communication on social learning. Through three behavioral experiments, we explore both affective and cognitive social learning in online environments. Experiment 1 manipulates the content of experimental materials and two forms of feedback, emotional valence, sociability, and repetition, to verify whether individuals can achieve online emotional social learning through reinforcement using two social learning strategies. Results reveal that both social learning strategies can assist individuals in affective, social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 2 similarly manipulates the content of experimental materials and two forms of feedback to verify whether individuals can achieve online knowledge social learning through reinforcement using two social learning strategies. Results show that similar to online affective social learning, individuals adopt both social learning strategies to achieve cognitive social learning through reinforcement, with feedback-based learning strategies outperforming frequency-dependent strategies. Experiment 3 simultaneously observes online affective and cognitive social learning by manipulating the content of experimental materials and feedback at different levels of social pressure. Results indicate that online affective social learning exhibits different learning effects under different levels of social pressure, whereas online cognitive social learning remains unaffected by social pressure, demonstrating more stable learning effects. Additionally, to explore the sustained effects of online social learning and differences in duration among different types of online social learning, all three experiments incorporate two test time points. Results reveal significant differences in pre-post-test scores for online social learning in Experiments 2 and 3, whereas differences are less apparent in Experiment 1. To accurately measure the sustained effects of online social learning, the researchers conducted a mini-meta-analysis of all effect sizes of online social learning duration. Results indicate that although the overall effect size is small, the effect of online social learning weakens over time.Keywords: online social learning, affective social learning, cognitive social learning, social learning strategies, social reinforcement, social pressure, duration
Procedia PDF Downloads 46595 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay
Abstract:
With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey
Procedia PDF Downloads 121594 Omalizumab Therapy Experience for Asthma, at Zayed Military Hospital (ZMH) in United Arab Emirates
Authors: Shanza Akram, Samir Salah, Imran Saleem, Ashraf Alzaabi, Jassim Abdou
Abstract:
Introduction: 300 million people worldwide are affected by asthma .In UAE, prevalence is around 10% (900,000 people).Patients with persistent symptoms despite using high dose ICS plus a second controller +/- OCS are considered to have severe asthma. Omalizumab (Xolaire) an IgE monoclonal antibody is approved as add on therapy for severe allergic asthma. Objective: To determine the efficacy of omalizumab based on clinical outcomes in our cohort of patient pre and post 52 weeks of treatment to assess safety and tolerability of treatment. Methods: Medical records of patients receiving omalizumab therapy for asthma at ZMH ,Abu Dhabi were retrospectively analyzed.Patients fulfilling the criteria of severe allergic asthma as per GINA guidelines were included. Asthma control over 12 months prior to and 12 months after commencement of omalizumab therapy was analysed by taking into account the number of exacerbations and hospitalizations in addition to maintenance of medication dosages, need for rescue reliever therapy and pulmonary function testing. Results: Total cohort of 21 patient (5 females), average age 41 years and av length of therapy 22 months were included. Seven patients (total 11/52%) managed to stop steroids on treatment while four were able to decrease the dosage. Mean exacerbation rate decreased from five/ year pre treatment to 1.36 while on treatment. Number of hospitalizations decreased from mean of two per year to 0.9 per year. Rescue reliever inhaler usage decreased from mean of 40 puffs to 15 puffs per week. 2 patients discontinued therapy, 1 due to lack of benefit (2 doses) and 2nd due to severe persistent side effects including local irritation, severe limb and joint pains after 6 months. Conclusion: Treatment with omalizumab showed effect in terms of reduced number of exacerbations, maintenance therapy and reliever medications. However, no improvement was seen in PFTs.There is room for improved documentation in terms of symptom recording and use of rescue medicationas as well as for better patient education and counselling in order to improve compliance.Keywords: asthma, omalizumab, severe allergic asthma, UAE
Procedia PDF Downloads 292593 Biodiversity Conservation Practices Among Indigenous Peoples in Caraga Region, Mindanao, Philippines
Authors: Milagros S. Salibad, Levita B. Grana
Abstract:
The presence and role of Indigenous Peoples residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga Region hold immense significance. This study aimed to determine the level of biodiversity conservation practices among the Mamanwas, Manobos, and Higaonons, and identify facilitating or hindering factors. Employing a mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources were done. The three groups have demonstrated a high level of biodiversity conservation practices manifesting their commitment to conserving their natural resources and ecosystems. Evidently, selecting and cutting only mature trees for shelter and tribal usage, and preservation of large trees that harbor ancestors’ spirits and worship through rituals (Mambabaja). Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, customary knowledge, and access to information. The Mamanwa practiced traditional hunting and gathering by using traps while Manobo practiced shifting cultivation to maintain soil fertility and biodiversity, and Higaonon managed forest resources through traditional forest management (establishment of sacred forests and conservation areas). Various facilitating and hindering factors influenced their conservation efforts. Their traditional knowledge and practices, partnership and collaboration, legal recognition and support, access to information, and biodiversity monitoring system facilitate practices. Insufficient government assistance, political and social issues, scarce financial support, inadequate policy enforcement, lack of livelihood opportunities, and land use conflicts hinder them. Monitoring the sustainability of IPs' local biodiversity conservation practices is essential as they contribute to conservation endeavors.Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge
Procedia PDF Downloads 77592 Neural Networks Models for Measuring Hotel Users Satisfaction
Authors: Asma Ameur, Dhafer Malouche
Abstract:
Nowadays, user comments on the Internet have an important impact on hotel bookings. This confirms that the e-reputation issue can influence the likelihood of customer loyalty to a hotel. In this way, e-reputation has become a real differentiator between hotels. For this reason, we have a unique opportunity in the opinion mining field to analyze the comments. In fact, this field provides the possibility of extracting information related to the polarity of user reviews. This sentimental study (Opinion Mining) represents a new line of research for analyzing the unstructured textual data. Knowing the score of e-reputation helps the hotelier to better manage his marketing strategy. The score we then obtain is translated into the image of hotels to differentiate between them. Therefore, this present research highlights the importance of hotel satisfaction ‘scoring. To calculate the satisfaction score, the sentimental analysis can be manipulated by several techniques of machine learning. In fact, this study treats the extracted textual data by using the Artificial Neural Networks Approach (ANNs). In this context, we adopt the aforementioned technique to extract information from the comments available in the ‘Trip Advisor’ website. This actual paper details the description and the modeling of the ANNs approach for the scoring of online hotel reviews. In summary, the validation of this used method provides a significant model for hotel sentiment analysis. So, it provides the possibility to determine precisely the polarity of the hotel users reviews. The empirical results show that the ANNs are an accurate approach for sentiment analysis. The obtained results show also that this proposed approach serves to the dimensionality reduction for textual data’ clustering. Thus, this study provides researchers with a useful exploration of this technique. Finally, we outline guidelines for future research in the hotel e-reputation field as comparing the ANNs with other technique.Keywords: clustering, consumer behavior, data mining, e-reputation, machine learning, neural network, online hotel ‘reviews, opinion mining, scoring
Procedia PDF Downloads 136591 A Comparative Study on the Hypoglycemic Effects of Hydroalcoholic Extracts from Silybum marianum, Camellia sinensis (Green Tea), and Urtica dioica Plants in Diabetic Rats
Authors: Sogand Moshfeghi, Alireza Biglari
Abstract:
Diabetes is an endocrine disorder that is commonly treated with insulin. However, long-term usage of insulin and hypoglycemic chemical drugs can result in various side effects. Therefore, it is crucial to explore effective compounds with minimal side effects for diabetes treatment. This study aimed to compare the hypoglycemic effects of hydroalcoholic extracts derived from Silybum marianum, Camellia sinensis (green tea), and Urtica dioica plants. Male Wistar rats were allocated to 5 groups. Group 1 received normal Salin. Other groups were diabetic (induced by Streptozotocin 65 mg/kg Ip), group 2 received normal Salin (Ip, qod. 21 days). Group 3 received Silybum Marianum L, hydroalcoholic extract (100 mg/kg, ip.qod, 21 days). Group 4 received Camellia sinesis L, hydroalcoholic extract (100mg/kg,ip,qod,21 days), and group 5 received Urtica dioica L. hydroalcoholic extract (100mg/kg, ip,qod,21 days). Blood samples were collected at 14 and 21 days after the initial injection to evaluate the blood glucose levels. On the fourteenth day, the blood glucose levels for the diabetic groups were as follows: Group 2: 424.7±34.5, Group 3: 390.7±10.5, Group 4: 350.4±16.9, and Group 5: 340±20.5. On the 21st day, the respective blood glucose levels were: Group 2: 432±5.0, Group 3: 410.16±5.0, Group 4: 264.3±17.5, and Group 5: 270.7±24.5. Statistical analysis using the Tukey Anova test indicated that on the fourteenth day, both the green tea and Urtica groups exhibited significant hypoglycemic effects. Furthermore, on the 21st day, Urtica dioica extract demonstrated comparable effects to Camellia Sinensis extract, while Silybum Marianum extract did not significantly lower blood glucose levels compared to the diabetic group. In conclusion, the hydroalcoholic extracts from Camellia sinensis and Urtica dioica plants exhibited promising hypoglycemic effects in diabetic rats. These findings provide valuable insights into the potential use of natural plant extracts as alternative or complementary treatments for diabetes, warranting further investigation to harness their therapeutic benefit effectively.Keywords: Camellia sinesis, glucose, Silybum marianum, Urtica dioica
Procedia PDF Downloads 72590 Designing of Induction Motor Efficiency Monitoring System
Authors: Ali Mamizadeh, Ires Iskender, Saeid Aghaei
Abstract:
Energy is one of the important issues with high priority property in the world. Energy demand is rapidly increasing depending on the growing population and industry. The useable energy sources in the world will be insufficient to meet the need for energy. Therefore, the efficient and economical usage of energy sources is getting more importance. In a survey conducted among electric consuming machines, the electrical machines are consuming about 40% of the total electrical energy consumed by electrical devices and 96% of this consumption belongs to induction motors. Induction motors are the workhorses of industry and have very large application areas in industry and urban systems like water pumping and distribution systems, steel and paper industries and etc. Monitoring and the control of the motors have an important effect on the operating performance of the motor, driver selection and replacement strategy management of electrical machines. The sensorless monitoring system for monitoring and calculating efficiency of induction motors are studied in this study. The equivalent circuit of IEEE is used in the design of this study. The terminal current and voltage of induction motor are used in this motor to measure the efficiency of induction motor. The motor nameplate information and the measured current and voltage are used in this system to calculate accurately the losses of induction motor to calculate its input and output power. The efficiency of the induction motor is monitored online in the proposed method without disconnecting the motor from the driver and without adding any additional connection at the motor terminal box. The proposed monitoring system measure accurately the efficiency by including all losses without using torque meter and speed sensor. The monitoring system uses embedded architecture and does not need to connect to a computer to measure and log measured data. The conclusion regarding the efficiency, the accuracy and technical and economical benefits of the proposed method are presented. The experimental verification has been obtained on a 3 phase 1.1 kW, 2-pole induction motor. The proposed method can be used for optimal control of induction motors, efficiency monitoring and motor replacement strategy.Keywords: induction motor, efficiency, power losses, monitoring, embedded design
Procedia PDF Downloads 348589 Forecasting Future Society to Explore Promising Security Technologies
Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim
Abstract:
Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.Keywords: future society, information and communication technology, security technology, technology forecasting
Procedia PDF Downloads 468588 Impact of the Non-Energy Sectors Diversification on the Energy Dependency Mitigation: Visualization by the “IntelSymb” Software Application
Authors: Ilaha Rzayeva, Emin Alasgarov, Orkhan Karim-Zada
Abstract:
This study attempts to consider the linkage between management and computer sciences in order to develop the software named “IntelSymb” as a demo application to prove data analysis of non-energy* fields’ diversification, which will positively influence on energy dependency mitigation of countries. Afterward, we analyzed 18 years of economic fields of development (5 sectors) of 13 countries by identifying which patterns mostly prevailed and which can be dominant in the near future. To make our analysis solid and plausible, as a future work, we suggest developing a gateway or interface, which will be connected to all available on-line data bases (WB, UN, OECD, U.S. EIA) for countries’ analysis by fields. Sample data consists of energy (TPES and energy import indicators) and non-energy industries’ (Main Science and Technology Indicator, Internet user index, and Sales and Production indicators) statistics from 13 OECD countries over 18 years (1995-2012). Our results show that the diversification of non-energy industries can have a positive effect on energy sector dependency (energy consumption and import dependence on crude oil) deceleration. These results can provide empirical and practical support for energy and non-energy industries diversification’ policies, such as the promoting of Information and Communication Technologies (ICTs), services and innovative technologies efficiency and management, in other OECD and non-OECD member states with similar energy utilization patterns and policies. Industries, including the ICT sector, generate around 4 percent of total GHG, but this is much higher — around 14 percent — if indirect energy use is included. The ICT sector itself (excluding the broadcasting sector) contributes approximately 2 percent of global GHG emissions, at just under 1 gigatonne of carbon dioxide equivalent (GtCO2eq). Ergo, this can be a good example and lesson for countries which are dependent and independent on energy, and mainly emerging oil-based economies, as well as to motivate non-energy industries diversification in order to be ready to energy crisis and to be able to face any economic crisis as well.Keywords: energy policy, energy diversification, “IntelSymb” software, renewable energy
Procedia PDF Downloads 224