Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4289

Search results for: security safe

1499 Investigation of Oscillation Mechanism of a Large-scale Solar Photovoltaic and Wind Hybrid Power Plant

Authors: Ting Kai Chia, Ruifeng Yan, Feifei Bai, Tapan Saha

Abstract:

This research presents a real-world power system oscillation incident in 2022 originated by a hybrid solar photovoltaic (PV) and wind renewable energy farm with a rated capacity of approximately 300MW in Australia. The voltage and reactive power outputs recorded at the point of common coupling (PCC) oscillated at a sub-synchronous frequency region, which sustained for approximately five hours in the network. The reactive power oscillation gradually increased over time and reached a recorded maximum of approximately 250MVar peak-to-peak (from inductive to capacitive). The network service provider was not able to quickly identify the location of the oscillation source because the issue was widespread across the network. After the incident, the original equipment manufacturer (OEM) concluded that the oscillation problem was caused by the incorrect setting recovery of the hybrid power plant controller (HPPC) in the voltage and reactive power control loop after a loss of communication event. The voltage controller normally outputs a reactive (Q) reference value to the Q controller which controls the Q dispatch setpoint of PV and wind plants in the hybrid farm. Meanwhile, a feed-forward (FF) configuration is used to bypass the Q controller in case there is a loss of communication. Further study found that the FF control mode was still engaged when communication was re-established, which ultimately resulted in the oscillation event. However, there was no detailed explanation of why the FF control mode can cause instability in the hybrid farm. Also, there was no duplication of the event in the simulation to analyze the root cause of the oscillation. Therefore, this research aims to model and replicate the oscillation event in a simulation environment and investigate the underlying behavior of the HPPC and the consequent oscillation mechanism during the incident. The outcome of this research will provide significant benefits to the safe operation of large-scale renewable energy generators and power networks.

Keywords: PV, oscillation, modelling, wind

Procedia PDF Downloads 18
1498 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition

Authors: Arūnas Burinskas

Abstract:

Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.

Keywords: Bertrand and Cournot Competition, competition model, industry 4.0, industrial organisation, monopolistic competition

Procedia PDF Downloads 127
1497 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing

Authors: G. Rajeshwari, V. D. M. Jabez Daniel

Abstract:

Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.

Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag

Procedia PDF Downloads 290
1496 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 85
1495 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream

Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang

Abstract:

Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.

Keywords: H.264, video bitstream, video object tracking, sports training

Procedia PDF Downloads 420
1494 Infestation of Aphid on Wheat Triticum aestivum L. (Poaceae) and Its Possible Management with Naturally Existing Beneficial Fauna

Authors: Ghulam Abbas, Ikramul Haq, Ghulam Ghouse

Abstract:

Bread wheat Triticum aestivum L. (Poaceae) is the major source of the staple food for a number of countries of the world including Pakistan. Since it is the staple food of the country, it has been desired, and efforts have been made, that it does not undergo application of pesticides to ensure the food safety. Luckily, wheat does not face a serious threat of insect pests, in ecological conditions of Pakistan, except aphids and armyworm which infest the wheat prior to maturity. It has been observed that almost 5 species of aphid have been reported to attack wheat ie. Ropalosiphum maidi, R. Padi, Schizaphis graminum, Diuraphis noxia, and Sitibion miscanthi but due to natural rise in temperature in terminal season of wheat, the population of aphid gradually decreases and wheat has a safe escape from its infestation. In case, mild temperatures 15ºC to 30ºC prolong, the infestation of aphids also prolongs and it can severely damage wheat in patches, and it has potential to substantially reduce the yield of wheat in infested patch. In years 2013, 2014, and 2015 the studies were undertaken to determine the potential of damage caused by aphid complex in 10 fields in infested patches. The damage caused by aphid complex was calculated on the basis of 1000 grain weight of wheat grains taken from the infested patch and were compared with 1000 grain weight of the healthy plants of the same fields. It was observed that there was 26 to 42% decrease in the weight of grain in infested patches. This patch also escaped from general harvesting by combine harvester and enhanced the loss 13 to 46%. The quality of the wheat straw was also reduced and its acceptance to the animals was also affected up to 50 to 100%. Moreover, the population of naturally existing beneficial fauna was recorded and factors promoting establishment and manipulation of beneficial fauna were studied and analysed.

Keywords: Triticum aestivum, wheat, Pakistan, beneficial fauna, aphid complex

Procedia PDF Downloads 267
1493 An Experience on Urban Regeneration: A Case Study of Isfahan, Iran

Authors: Sedigheh Kalantari, Yaping Huang

Abstract:

The historic area of cities has experienced different phases of transformation. The beginning of the twentieth century, modernism, and modern development changed the integrated pattern of change and the historic urban quarter were regarded as subject comprehensive redevelopment. In this respect, historic area of Iranian cities have not been safe from these changes and affected by widespread evolutions; in particular after Islamic Revolution eras (1978) cities have traveled through an evolution in conservation and development policies and practices. Moreover, moving toward a specific approach and specific attention paid to the regeneration of the historical urban centers in Iran has started since the 1990s. This reveals the great importance attached to the historical centers of cities. This paper is an approach to examine an experience on urban regeneration in Iran through a case study. The study relies on multiple source of evidence. The use of multiple sources of evidence can help substantially improve the validity and reliability of the research. The empirical core of this research, therefore, rests in the process of urban revitalization of the old square in Isfahan. Isfahan is one of the oldest city of Persia. The historic area of city encompasses a large number of valuable buildings and monuments. One of the cultural and historical region of Isfahan is Atiq Square (Old Square). It has been the backbone node of the city that in course of time has being ignored more and more and transformed negatively. The complex had suffered from insufficiencies especially with respect to social and spatial aspects. Therefore, reorganization of that complex as the main and most important urban center of Isfahan became an inevitable issue; So this paper except from reminding the value of such historic-cultural heritage and review of its transformation, focused on an experience of urban revitalization project in this heritage site. The outcome of this research shows that situated in different socio-economic political and historical contexts and in face of different urban regeneration issues, Iran have displayed significant differences in the way of urban regeneration.

Keywords: historic area, Iran, urban regeneration, revitalization

Procedia PDF Downloads 232
1492 Understanding Natural Resources Governance in Canada: The Role of Institutions, Interests, and Ideas in Alberta's Oil Sands Policy

Authors: Justine Salam

Abstract:

As a federal state, Canada’s constitutional arrangements regarding the management of natural resources is unique because it gives complete ownership and control of natural resources to the provinces (subnational level). However, the province of Alberta—home to the third largest oil reserves in the world—lags behind comparable jurisdictions in levying royalties on oil corporations, especially oil sands royalties. While Albertans own the oil sands, scholars have argued that natural resource exploitation in Alberta benefits corporations and industry more than it does Albertans. This study provides a systematic understanding of the causal factors affecting royalties in Alberta to map dynamics of power and how they manifest themselves during policy-making. Mounting domestic and global public pressure led Alberta to review its oil sands royalties twice in less than a decade through public-commissioned Royalty Review Panels, first in 2007 and again in 2015. The Panels’ task was to research best practices and to provide policy recommendations to the Government through public consultations with Albertans, industry, non-governmental organizations, and First Nations peoples. Both times, the Panels recommended a relative increase to oil sands royalties. However, irrespective of the Reviews’ recommendations, neither the right-wing 2007 Progressive Conservative Party (PC) nor the left-wing 2015 New Democratic Party (NDP) government—both committed to increase oil sands royalties—increased royalty intake. Why did two consecutive political parties at opposite ends of the political spectrum fail to account for the recommendations put forward by the Panel? Through a qualitative case-study analysis, this study assesses domestic and global causal factors for Alberta’s inability to raise oil sands royalties significantly after the two Reviews through an institutions, interests, and ideas framework. Indeed, causal factors can be global (e.g. market and price fluctuation) or domestic (e.g. oil companies’ influence on the Alberta government). The institutions, interests, and ideas framework is at the intersection of public policy, comparative studies, and political economy literatures, and therefore draws multi-faceted insights into the analysis. To account for institutions, the study proposes to review international trade agreements documents such as the North American Free Trade Agreement (NAFTA) because they have embedded Alberta’s oil sands into American energy security policy and tied Canadian and Albertan oil policy in legal international nods. To account for interests, such as how the oil lobby or the environment lobby can penetrate governmental decision-making spheres, the study draws on the Oil Sands Oral History project, a database of interviews from government officials and oil industry leaders at a pivotal time in Alberta’s oil industry, 2011-2013. Finally, to account for ideas, such as how narratives of Canada as a global ‘energy superpower’ and the importance of ‘energy security’ have dominated and polarized public discourse, the study relies on content analysis of Alberta-based pro-industry newspapers to trace the prevalence of these narratives. By mapping systematically the nods and dynamics of power at play in Alberta, the study sheds light on the factors that influence royalty policy-making in one of the largest industries in Canada.

Keywords: Alberta Canada, natural resources governance, oil sands, political economy

Procedia PDF Downloads 119
1491 Screening for Enterotoxigenic Staphylococcus spp. Strains Isolated From Raw Milk and Dairy Products in R. N. Macedonia

Authors: Marija Ratkova Manovska, Mirko Prodanov, Dean Jankuloski, Katerina Blagoevska

Abstract:

Staphylococci, which are widely found in the environment, animals, humans, and food products, include Staphylococcus aureus (S. aureus), the most significant pathogenic species in this genus. The virulence and toxicity of S. aureus are primarily attributed to the presence of specific genes responsible for producing toxins, biofilms, invasive components, and antibiotic resistance. Staphylococcal food poisoning, caused by the production of staphylococcal enterotoxins (SEs) by these strains in food, is a common occurrence. Globally, S. aureus food intoxications are typically ranked as the third or fourth most prevalent foodborne intoxications. For this study, a total of 333 milk samples and 1160 dairy product samples were analyzed between 2016 and 2020. The strains were isolated and confirmed using the ISO 6888-1:1999 "Horizontal method for enumeration of coagulase-positive staphylococci." Molecular analysis of the isolates, conducted using conventional PCR, involved detecting the 23s gene of S. aureus, the nuc gene, the mecA gene, and 11 genes responsible for producing enterotoxins (sea, seb, sec, sed, see, seg, seh, sei, ser, sej, and sep). The 23s gene was found in 93 (75.6%) out of 123 isolates of Staphylococcus spp. obtained from milk. Among the 76 isolates from dairy products, either S. aureus or the 23s gene was detected in 49 (64.5%) of them. The mecA gene was identified in three isolates from raw milk and five isolates from cheese samples. The nuc gene was present in 98.9% of S. aureus strains from milk and 97.9% from dairy products. Other Staphylococcus strains carried the nuc gene in 26.7% of milk strains and 14.8% of dairy product strains. Genes associated with SEs production were detected in 85 (69.1%) strains from milk and 38 (50%) strains from dairy products. In this study, 10 out of the 11 SEs genes were found, with no isolates carrying the see gene. The most prevalent genes detected were seg and sei, with some isolates containing up to five different SEs genes. These findings indicate the presence of enterotoxigenic staphylococci strains in the tested samples, emphasizing the importance of implementing proper sanitation and hygienic practices, utilizing safe raw materials, and ensuring adequate handling of finished products. Continued monitoring for the presence of SEs is necessary to ensure food safety and prevent intoxication.

Keywords: dairy products, milk, Staphylococci, enterotoxins, SE genes

Procedia PDF Downloads 52
1490 Evaluation of the Use of Proseal LMA in Patients Undergoing Elective Lower Segment Caesarean Section under General Anaesthesia: A Prospective Randomised Controlled Study

Authors: Shalini Saini, Sharmila Ahuja

Abstract:

Anaesthesia for caesarean section poses challenges unique to the obstetric patient due to changes in the airway and respiratory system. The choice of anaesthesia for caesarean section depends on various factors however general anaesthesia (GA) is necessary for certain situations. Supraglottic airway devices are an emerging method to secure airway, especially in difficult situations. Of these devices, proseal –LMA (PLMA) is designed to provide better protection of the airway. The use of PLMA has been reported successfully as a rescue device in difficult intubation situations and in patients undergoing elective caesarean section without any complications. The study was prospective and randomised and was designed to compare PLMA in patients undergoing elective lower segment caesarean section (LSCS) with the endotracheal tube (ETT). Patients undergoing LSCS under GA belonging to ASA grade 1 and 2 were included. Patients with the history of fewer than 6 hrs of fasting, known/predicted difficult airway, obesity, gastroesophageal reflux disease, hypertensive disorder were excluded. A standard anaesthesia protocol was followed. All patients received aspiration prophylaxis. The airway was secured with either PLMA or ETT. Parameters noted were- ease of insertion, adequacy of ventilation, hemodynamic changes at insertion and removal of device, incidence of regurgitation and aspiration. Data was analysed by unpaired t- test, Chi-square /Fisher’s test. The findings of our study indicated that PLMA was easy to insert (20.67±6.835 sec) with comparable insertion time to TT (18.33 ± 4.971, p 0.136) and adequate ventilation was achieved with very minimal hemodynamic changes seen with PLMA as compared to ETT at insertion and removal of devices (p 0.01). There was no incidence of regurgitation with the use of PLMA. The incidence of a postoperative sore throat was minimal (6.7%) with PLMA (p<0.05). PLMA appears to be a safe alternative to ETT for selected obstetric patients undergoing elective LSCS. Further study with a larger group of patients is required to establish the safety of PLMA in obstetric patients.

Keywords: caesarean section, general anaesthesia, proseal LMA, endotracheal tube

Procedia PDF Downloads 359
1489 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 48
1488 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 113
1487 Climate Change and Food Security: Effects of Ozone on Crops in North-West Pakistan

Authors: Muhammad Nauman Ahmad, Patrick Büker, Sofia Khalid, Leon Van Den Berg, Hamid Ullah Shah, Abdul Wahid, Lisa Emberson, Sally A. Power, Mike Ashmore

Abstract:

Although ozone is well-documented to affect crop yields in the densely populated Indo-Gangetic Plain, there is little knowledge of its effects around cities in more remote areas of South Asia. We surveyed crops around the city of Peshawar, Pakistan for visible injury, linking this to passive measurements of ozone concentrations. Foliar injury was found in the field on potato, onion and cotton when the mean monthly ozone concentration reached 35-55ppb. The symptoms on onion were reproduced in ozone fumigation experiments, which also showed that daytime ozone concentrations of 60ppb and above significantly reduce the growth of Pakistani varieties of both spinach (Beta vulgaris) and onion. Aphid infestation on spinach was also reduced at these elevated ozone concentrations. The ozone concentrations in Peshawar are comparable to those through many parts of northern south Asia, where ozone may therefore be a significant threat to sensitive vegetable crops in peri-urban regions.

Keywords: ozone, air pollution, vegetable crops, peshawar, south asia

Procedia PDF Downloads 724
1486 Soil Composition in Different Agricultural Crops under Application of Swine Wastewater

Authors: Ana Paula Almeida Castaldelli Maciel, Gabriela Medeiros, Amanda de Souza Machado, Maria Clara Pilatti, Ralpho Rinaldo dos Reis, Silvio Cesar Sampaio

Abstract:

Sustainable agricultural systems are crucial to ensuring global food security and the long-term production of nutritious food. Comprehensive soil and water management practices, including nutrient management, balanced fertilizer use, and appropriate waste management, are essential for sustainable agriculture. Swine wastewater (SWW) treatment has become a significant focus due to environmental concerns related to heavy metals, antibiotics, resistant pathogens, and nutrients. In South America, small farms use soil to dispose of animal waste, a practice that is expected to increase with global pork production. The potential of SWW as a nutrient source is promising, contributing to global food security, nutrient cycling, and mineral fertilizer reduction. Short- and long-term studies evaluated the effects of SWW on soil and plant parameters, such as nutrients, heavy metals, organic matter (OM), cation exchange capacity (CEC), and pH. Although promising results have been observed in short- and medium-term applications, long-term applications require more attention due to heavy metal concentrations. Organic soil amendment strategies, due to their economic and ecological benefits, are commonly used to reduce the bioavailability of heavy metals. However, the rate of degradation and initial levels of OM must be monitored to avoid changes in soil pH and release of metals. The study aimed to evaluate the long-term effects of SWW application on soil fertility parameters, focusing on calcium (Ca), magnesium (Mg), and potassium (K), in addition to CEC and OM. Experiments were conducted at the Universidade Estadual do Oeste do Paraná, Brazil, using 24 drainage lysimeters for nine years, with different application rates of SWW and mineral fertilization. Principal Component Analysis (PCA) was then conducted to summarize the composite variables, known as principal components (PC), and limit the dimensionality to be evaluated. The retained PCs were then correlated with the original variables to identify the level of association between each variable and each PC. Data were interpreted using Analysis of Variance - ANOVA for general linear models (GLM). As OM was not measured in the 2007 soybean experiment, it was assessed separately from PCA to avoid loss of information. PCA and ANOVA indicated that crop type, SWW, and mineral fertilization significantly influenced soil nutrient levels. Soybeans presented higher concentrations of Ca, Mg, and CEC. The application of SWW influenced K levels, with higher concentrations observed in SWW from biodigesters and higher doses of swine manure. Variability in nutrient concentrations in SWW due to factors such as animal age and feed composition makes standard recommendations challenging. OM levels increased in SWW-treated soils, improving soil fertility and structure. In conclusion, the application of SWW can increase soil fertility and crop productivity, reducing environmental risks. However, careful management and long-term monitoring are essential to optimize benefits and minimize adverse effects.

Keywords: contamination, water research, biodigester, nutrients

Procedia PDF Downloads 38
1485 Youth Voices on Experiences of (Dis)Advantage: A Case Study at a South African University

Authors: Oliver T. Gore

Abstract:

Social inequalities and inequity of outcomes in higher education (HE) persist in South Africa despite the government introducing policy that seeks to address social injustices brought about by previous apartheid policies. In addressing these social injustices, HE policy conceptualises inequalities under the concept of historical ‘disadvantage’ which is understood to be primarily race-based. The study adds on to the existing knowledge on inequalities through developing the dimensions of (dis)advantage, which have the potential to inform the South African HE policy on providing equal opportunities amongst diverse students to participate and succeed in their studies. Drawing from the capabilities approach, this study argues that (dis)advantage can be richly understood in terms of students’ capabilities, functionings and agency as opposed to a sole focus on race. The study argues that limited freedoms, lack of effective opportunities, and reduced agency for students to turn university resources into real achievements such as personal development, economic skills and social responsibility amounts to disadvantage, while the converse is also true. The study draws from qualitative interview data with honours students, university staff and Student Representative Council members from five different university departments at one South African university. This presentation uses results from 20 students and reveals what their university experiences tell us regarding students’ unfreedoms in relation to: the inability to make decisions, poor schooling backgrounds, inadequate finances, emotional stress, lack of social support, inability to understand the language of instruction, lack of safe transport and accommodation issues. Despite these unfreedoms, the data shows that the students aspired and persevered with their studies. Using theory and empirical data in conversation, the paper shows that there is a need to nuance the definition of (dis)advantage, particularly by focusing on how different forms of disadvantage intersect with each other.

Keywords: capabilities approach, (dis)advantage, higher education, social justice

Procedia PDF Downloads 132
1484 Identifying Game Variables from Students’ Surveys for Prototyping Games for Learning

Authors: N. Ismail, O. Thammajinda, U. Thongpanya

Abstract:

Games-based learning (GBL) has become increasingly important in teaching and learning. This paper explains the first two phases (analysis and design) of a GBL development project, ending up with a prototype design based on students’ and teachers’ perceptions. The two phases are part of a full cycle GBL project aiming to help secondary school students in Thailand in their study of Comprehensive Sex Education (CSE). In the course of the study, we invited 1,152 students to complete questionnaires and interviewed 12 secondary school teachers in focus groups. This paper found that GBL can serve students in their learning about CSE, enabling them to gain understanding of their sexuality, develop skills, including critical thinking skills and interact with others (peers, teachers, etc.) in a safe environment. The objectives of this paper are to outline the development of GBL variables from the research question(s) into the developers’ flow chart, to be responsive to the GBL beneficiaries’ preferences and expectations, and to help in answering the research questions. This paper details the steps applied to generate GBL variables that can feed into a game flow chart to develop a GBL prototype. In our approach, we detailed two models: (1) Game Elements Model (GEM) and (2) Game Object Model (GOM). There are three outcomes of this research – first, to achieve the objectives and benefits of GBL in learning, game design has to start with the research question(s) and the challenges to be resolved as research outcomes. Second, aligning the educational aims with engaging GBL end users (students) within the data collection phase to inform the game prototype with the game variables is essential to address the answer/solution to the research question(s). Third, for efficient GBL to bridge the gap between pedagogy and technology and in order to answer the research questions via technology (i.e. GBL) and to minimise the isolation between the pedagogists “P” and technologist “T”, several meetings and discussions need to take place within the team.

Keywords: games-based learning, engagement, pedagogy, preferences, prototype

Procedia PDF Downloads 158
1483 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 246
1482 Resveratrol-Phospholipid Complex for Sustained Delivery of Resveratrol via the Skin for the Treatment of Inflammatory Diseases

Authors: Malay K. Das, Bhupen Kalita

Abstract:

The poor oral bioavailability of resveratrol (RSV) due to presystemic metabolism can be avoided via dermal route of administration. The hydrophilic-lipophilic nature of resveratrol-phospholipid complex (RSVPs) favors the delivery of resveratrol via the skin. The RSVPs embedded polymeric patch with moderate adhesiveness was developed for dermal application for sustained anti-inflammatory effect. The prepared patches were evaluated for various physicochemical properties, surface morphology by SEM, TEM, and compatibility of patch components by FT-IR and DSC studies. The dermal flux of the optimized patch formulation was found to be at 4.28 ± 0.48 mg/cm2/24 h. The analysis of skin extract after permeation study revealed the presence of resveratrol, which confirmed the localization of RSVPs in the skin. The stability of RSVPs in the polymeric patch and the physiologic environment was confirmed by FE-SEM studies on the patches after drug release and skin permeation studies. The RSVPs particles released from the polymer matrix maintaining the structural integrity and permeate the keratinized horney layer of skin. The optimized patch formulation showed sustained anti-inflammatory effect (84.10% inhibition of inflammation at 24 h) in carrageenan-induced rat paw edema model compared to marketed diclofenac sodium gel (39.58% inhibition of inflammation at 24 h). The CLSM study confirmed the localization of RSVPs for a longer period, thus enabling drug targeting to the dermis for sustained anti-inflammatory effect. Histological studies with phase contrast trinocular microscope suggested no alteration of skin integrity and no evidence of the presence of inflammatory cells after exposure to the permeants. The patch was found to be safe for skin application as evaluated by Draize method for skin irritation scoring in a rabbit model. These results suggest the therapeutic efficacy of the developed patch in both acute and chronic inflammatory diseases.

Keywords: resveratrol-phospholipid complex, skin delivery, sustained anti-inflammatory effect, inflammatory diseases, dermal patch

Procedia PDF Downloads 222
1481 Promoting Affordable Housing Public-Private Partnerships (PPPs) in Nigeria: Addressing Ethical Concerns in Construction and Exploring Solutions

Authors: Shem Ikoojo Ayegba, Ye Qi

Abstract:

Public-private partnerships (PPPs) can potentially be a transformative mechanism for advancing affordable housing in Nigeria., considering the current housing deficit between 17 – 24 million. Nevertheless, their effectiveness is marred by persistent unethical practices such as corruption and the utilization of subpar materials. Through a comprehensive mixed-methods approach, this study delves into the ethical quandaries within Nigerian housing construction and their cascading effects on the success of PPPs. Semi-structured interviews encompassing seasoned construction professionals and an in-depth content analysis of ongoing housing policies and projects in Nigeria reveal a culture of corruption across the value chain. This malaise is exacerbated by glaring deficiencies in oversight and a lack of transparent practices. A robust statistical survey involving diverse professionals, including engineers, architects, and project managers, echoes these findings, emphasizing that a frail institutional framework facilitates the persistence of substandard material use, professional negligence, and rampant bribery. Such compromised construction standards place residents in potential jeopardy and impede the achievement of broader sustainability objectives. This study propounds a suite of policy interventions to pave the way for thriving affordable housing PPPs: initiating transparent bidding processes, establishing non-negotiable quality benchmarks for construction materials, and incorporating independent third-party audits throughout the building phase. Furthermore, cultivating a culture of professional integrity through targeted ethics training for all construction personnel is imperative. This research furnishes pragmatic strategies that can radically enhance the potency of housing PPPs, thereby ensuring safe, durable, and affordable housing solutions for Nigeria's underserved populace.

Keywords: public-private partnerships, affordable housing, unethical practicies, housing policies, construction ethics

Procedia PDF Downloads 60
1480 Research on Adaptable Development Strategy of Medical Architecture Based on the Background of Current Era

Authors: Jiani Gao, Qingping Luo, Xinlei Fang

Abstract:

In order to try to achieve better rights and interests for both doctors and patients in the new medical environment, the paper will focus on the renewal and development of medical buildings. In today's highly developed society, many factors have a profound guiding significance for the development of medical buildings. By doing social research, the paper has found that these factors come from all aspects. These factors include the optimization of traditional medical model, rapid alternation of medical technology and equipment, the reform of the social, medical security system, changes in the age structure of the population, the birth of intelligent medical care under the Internet, and the deepening of the concept of green sustainable building development, etc. The purpose of this paper is to capture sensitively these various factors that may affect the evolution of medical buildings in the context of the current era, and to put forward, by using an adaptable development strategy, some feasible suggestions on the design of medical buildings when facing these changes and challenges. Specifically speaking, the adaptable development strategy includes some basic principles and methods, such as using modular design, adopting scalable streamline, selecting a long-span structural system and using replaceable materials and components, etc.

Keywords: medical architecture, adaptable development, medical model, space design

Procedia PDF Downloads 146
1479 The Eathquake Discourse as a Strategy of an Urban Renewal: A Case Study into the Karapınar Valley Regeneration Project in Eskişehir, Turkey

Authors: Cansu Civelek

Abstract:

The flexible and uneven character of neoliberalism has provided adaptation of urban strategies into the constantly changing circumstances in order to renew and reproduce the neoliberal accumulation model. Instrumentalization of catastrophic events to this end has been one of those global urban strategies. Regarding Turkey, exploitation of natural disasters has been the latest tactic of the Justice and Development Party (JDP) government to achieve radical economic goals. ‘Unhealthy’ and ‘risky’ structures of squatter settlements have often been articulated while the regenerations, expropriations, and exclusions have been sugarcoated through the discourses of ‘reintegrating the shanty zones into the cities’, ‘supplying healthy housing’, and ‘win-win’ character of the projects. Being the first regeneration project of Eskişehir, the Karapınar Regeneration Project has been initiated in 2011 by the partnership of the Odunpazarı Municipality of the JDP and the Mass Housing Organization. Discourses around the forthcoming disasters, ‘risky structures’ of the squatters, and the importance of the ‘security of life and property’ have been utilized, even though the zone is situated on a geotechnically stable area. Yet, many of the locals are worried about the payments while some have already decided to move elsewhere at the outskirts of the city.

Keywords: neoliberal urbanism, urban regeneration, illegal settlements, discourses

Procedia PDF Downloads 428
1478 Spatial Distribution of Natural Radionuclides in Soil, Sediment and Waters in Oil Producing Areas in Niger Delta Region of Nigeria

Authors: G. O. Avwiri, E. O. Agbalagba, C. P. Ononugbo

Abstract:

Activity concentrations of natural radionuclides (226Ra, 232Th and 40K) in the soil, sediment and water of oil producing communities in Delta and Rivers States were determined using γ-ray spectrometry. The mean soil/sediment activity concentration of 226Ra, 232Th and 40K in onshore west in Delta state is 40.2±5.1Bqkg-1, 29.9±4.2Bqkg-1 and 361.5±20.0Bqkg-1 respectively, the corresponding values obtained in onshore east1 of Rivers state is 20.9±2.8Bqkg-1, 19.4±2.5Bqkg-1and 260.0±14.1Bqkg-1 respectively. While the mean activity concentration of 226Ra, 232Th and 40K in onshore east2 of Rivers state is 29.3±3.5Bqkg-1, 21.6±2.6Bqkg-1 and 262.1±14.6Bqkg-1 respectively. These values obtained show enhanced NORMs but are well within the world range. All the radiation hazard indices examined in soil have mean values lower than their maximum permissible limits. In drinking water, the obtained average values of226Ra, 228Ra and 40K is 8.4±0.9, 7.3±0.7 and 29.9±2.2Bql-1 respectively for well water, 4.5±0.6, 5.1±0.4 and 20.9±2.0Bql-1 respectively for borehole water and 11.3±1.2, 8.5±0.7 and 32.4±3.7Bql-1 respectively for river water in onshore west. For onshore east1, average activity concentration of 226Ra, 228Ra and 40K is 8.3±1.0, 8.6±1.1 and 39.6±3.3Bql-1 respectively for well water, 3.8±0.8, 4.9±0.6 and 35.7±4.1Bql-1 respectively for borehole water and 5.5±0.8, 5.4±0.7 and 36.9±3.8Bql-1 respectively for river water. While in onshore east2 average value of 226Ra, 228Ra and 40K is 10.1±1.1, 8.3±1.0 and 50.0±3.9Bql-1 respectively for well water, 4.7±0.9, 4.0±0.4 and 28.8±3.0Bql-1 respectively for borehole water and 7.7±0.9, 6.1±0.8 and 27.1±2.9Bql-1 respectively for river water and the average activity concentrations in the produced water226Ra, 228Ra and 40K is 5.182.14Bql-1, 6.042.48Bql-1 and 48.7813.67Bql-1 respectively. These values obtained are well above world average values of 1.0, 0.1 and 10Bql-1 for 226Ra, 228Ra and 40K respectively, those of the control site values and most reported values around the world. Though the hazard indices (Raeq, Hex, Hin) examined in water is still within the tolerable level, the committed effective dose estimated are above ICPR 0.1 mSvy-1 permissible limits. The overall results show that soil and sediment in the area are safe radiologically, but the result indicates some level of water pollution in the studied area.

Keywords: radioactivity, soil, sediment and water, Niger Delta, gamma detector

Procedia PDF Downloads 275
1477 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 430
1476 Refugee Job Seeking Opportunities: It's Not What You Know, It's Who You Know

Authors: Kimberley Kershaw, Denis Hyams-Ssekasi

Abstract:

Although there is a wealth of information about refugees and Asylum seekers, Refugee job opportunities continue to be one of the most hotly contested areas and less researched within the social sciences. Refugees are a vital asset in the society due to their experiences, skills, and competences. However, society perceives them differently, and as such, their prior lived experiences are often underutilised. This research study gleans from the work conducted during the Refugee Employment Support Clinic delivered for 12 weeks within a University setting in the North West of England. The study is conducted using three perspectives, refugees, students, and researchers, allowing for identification of the challenges encountered by the refugees concerning job opportunities. Through the utilisation of the qualitative research method, the study has found that refugees experience a wide range of issues unrelated to their skills, prior experience, and education but rather due to the red tapes connected to their legal identity labelling. Refugees struggle to build reliable employment networks that appreciate and acknowledge their capabilities and talents, impacting their ability to navigate the labour market and classism. Notably, refugees are misunderstood within their new societies, and little care is taken to understand the unique struggles they face with respect to securing paid work in their industry or field of work due to their lack of experience in the UK. Unlike other European countries, it is evident that the UK has no strategic approach to enhancing the chances of paid or voluntary work for refugees. A clinic like this provided lenses for comprehending how refugees can be better supported with employment related opportunities. By creating a safe and conducive platform for honest and open discussion about employment and through collaborative approaches with local community agencies, doors were opened for social and professional networks to be built. The study concluded that there is a need for local communities and education establishments to be more aware of the prevailing challenges and in a position to support at all stages of their asylum claim in order for the perceptions of distrust and uncertainty around refugees to be minimised.

Keywords: refugees, employment, community, classism, education

Procedia PDF Downloads 85
1475 Domestic Violence in Haryana: A Grassroot Picture of Justice System

Authors: Vandana Dave, Neelam Kumari

Abstract:

India, a fast growing global power, is climbing the ladder of success very swiftly and has been attracting the world’s attention in recent decades. But unfortunately in the modern society, women who constitute half the population of our country have been the victims of violence in different fields of life both physically, socially, mentally and economically. Women face a lot of societal pressure, gender based violence – including rape, domestic violence, dowry death, murder and sexual abuse. But none the less, it is not considered as a problem of serious concern. Among the issues related to women, domestic violence is one of the major issue in our society which is occurring within the safe confines of home at the hands of close family members and cuts across line of race, nationality, language, culture, economics, sexual orientation, physical ability and religion to affect women from all walks of life. It is not to be perceived as a law and order problem alone but it is a socio- cultural problem and it is directly affecting the family life, health of women and life of children. Structural imbalance of power, systematic gender based discrimination; inequality between women and men and other kind of subordination are the context and cause of violence against women. Understanding it as a major problem of our society, the present study was conducted to assess the status of women of Rohtak, district of Haryana. The present study is based on primary and secondary data, adopting feminist research methodology. Case study method was incorporated during the research. It was observed that violence varied according to different age groups of women, marital status, education status, economic status and sociodemography factors. The case studies depicted the inadequate justice system for the victims of domestic violence. The study also revealed that the victims failed to understand the judiciary system and considered themselves helpless and hopeless. The study indicates the need of women friendly justice system for the upliftment of the society.

Keywords: domestic violence, women, victim, justice

Procedia PDF Downloads 376
1474 Inhalable Lipid-Coated-Chitosan Nano-Embedded Microdroplets of an Antifungal Drug for Deep Lung Delivery

Authors: Ranjot Kaur, Om P. Katare, Anupama Sharma, Sarah R. Dennison, Kamalinder K. Singh, Bhupinder Singh

Abstract:

Respiratory microbial infections being among the top leading cause of death worldwide are difficult to treat as the microbes reside deep inside the airways, where only a small fraction of drug can access after traditional oral or parenteral routes. As a result, high doses of drugs are required to maintain drug levels above minimum inhibitory concentrations (MIC) at the infection site, unfortunately leading to severe systemic side-effects. Therefore, delivering antimicrobials directly to the respiratory tract provides an attractive way out in such situations. In this context, current study embarks on the systematic development of lung lia pid-modified chitosan nanoparticles for inhalation of voriconazole. Following the principles of quality by design, the chitosan nanoparticles were prepared by ionic gelation method and further coated with major lung lipid by precipitation method. The factor screening studies were performed by fractional factorial design, followed by optimization of the nanoparticles by Box-Behnken Design. The optimized formulation has a particle size range of 170-180nm, PDI 0.3-0.4, zeta potential 14-17, entrapment efficiency 45-50% and drug loading of 3-5%. The presence of a lipid coating was confirmed by FESEM, FTIR, and X-RD. Furthermore, the nanoparticles were found to be safe upto 40µg/ml on A549 and Calu-3 cell lines. The quantitative and qualitative uptake studies also revealed the uptake of nanoparticles in lung epithelial cells. Moreover, the data from Spraytec and next-generation impactor studies confirmed the deposition of nanoparticles in lower airways. Also, the interaction of nanoparticles with DPPC monolayers signifies its biocompatibility with lungs. Overall, the study describes the methodology and potential of lipid-coated chitosan nanoparticles in futuristic inhalation nanomedicine for the management of pulmonary aspergillosis.

Keywords: dipalmitoylphosphatidylcholine, nebulization, DPPC monolayers, quality-by-design

Procedia PDF Downloads 130
1473 Assessing Trainee Radiation Exposure in Fluoroscopy-Guided Procedures: An Analysis of Hp(3)

Authors: Ava Zarif Sanayei, Sedigheh Sina

Abstract:

During fluoroscopically guided procedures, healthcare workers, especially radiology trainees, are at risk of exposure to elevated radiation exposure. It is vital to prioritize their safety in such settings. However, there is limited data on their monthly or annual doses. This study aimed to evaluate the equivalent dose to the eyes of the student trainee, utilizing LiF: Mg, Ti (TLD-100) chips at the radiology department of a hospital in Shiraz, Iran. Initially, the dosimeters underwent calibration procedures with the assistance of ISO-PTW calibrated phantoms. Following this, a set of dosimeters was prepared To determine HP(3) value for a trainee involved in the main operation room and controlled area utilized for two months. Three TLD chips were placed in a holder and attached to her eyeglasses. Upon completion of the duration, the TLDs were read out using a Harshaw TLD reader. Results revealed that Hp(3) value was 0.31±0.04 mSv. Based on international recommendations, students in radiology training above 18 have an annual dose limit of 0.6 rem (6 mSv). Assuming a 12-month workload, staff radiation exposure stayed below the annual limit. However, the Trainee workload may vary due to different deeds. This study's findings indicate the need for consistent, precise dose monitoring in IR facilities. Students can undertake supervised internships for up to 500 hours, depending on their institution. These internships take place in health-focused environments offering radiology services, such as clinics, diagnostic imaging centers, and hospitals. Failure to do so might result in exceeding occupational radiation dose limits. A 0.5 mm lead apron effectively absorbs 99% of radiation. To ensure safety, technologists and staff need to wear this protective gear whenever they are in the room during procedures. Furthermore, maintaining a safe distance from the primary beam is crucial. In cases where patients need assistance and must be held for imaging, additional protective equipment, including lead goggles, gloves, and thyroid shields, should be utilized for optimal safety.

Keywords: annual dose limits, Hp(3), individual monitoring, radiation protection, TLD-100

Procedia PDF Downloads 55
1472 Motivations, Perceptions, and Aspirations concerning Teaching as a Career for High School Students from Racially/Ethnically Diverse Backgrounds

Authors: Mi Ok Kang

Abstract:

This study explores the factors that motivate urban high school students from racially/ethnically diverse backgrounds to choose teaching as a future career. It draws on in-depth interviews with high school students of color living in an urban downtown located in an intermountain area in the U.S. Using the factors influencing teaching choice (FIT-Choice) model, this study examines the motivations, mobility experiences, and aspirations of participating high school students who self-identified as Latino/a, Tongan, and Chinese. The study identifies influential factors -both challenges and strengthening effects- that high school students of color experience in their career decision making. The study concludes that self-perceptions of teaching abilities, parental support, social connections, job security, and prior work with children during the internship in K-12 classroom motivated them to be a teacher. Limitations such as financial struggles of parents, the low social status of teaching career, and the low salary and benefit packages in the U.S. are among the factors that cause students to waver in or doubt their career choice.

Keywords: career development, diversifying teaching force, FIT-Choice, high school students of color

Procedia PDF Downloads 269
1471 Evaluating and Improving Healthcare Staff Knowledge of the [NG179] NICE Guidelines on Elective Surgical Care during the COVID-19 Pandemic: A Quality Improvement Project

Authors: Stavroula Stavropoulou-Tatla, Danyal Awal, Mohammad Ayaz Hossain

Abstract:

The first wave of the COVID-19 pandemic saw several countries issue guidance postponing all non-urgent diagnostic evaluations and operations, leading to an estimated backlog of 28 million cases worldwide and over 4 million in the UK alone. In an attempt to regulate the resumption of elective surgical activity, the National Institute for Health and Care Excellence (NICE) introduced the ‘COVID-19 rapid guideline [NG179]’. This project aimed to increase healthcare staff knowledge of the aforementioned guideline to a targeted score of 100% in the disseminated questionnaire within 3 months at the Royal Free Hospital. A standardized online questionnaire was used to assess the knowledge of surgical and medical staff at baseline and following each 4-week-long Plan-Study-Do-Act (PDSA) cycle. During PDSA1, the A4 visual summary accompanying the guideline was visibly placed in all relevant clinical areas and the full guideline was distributed to the staff in charge together with a short briefing on the salient points. PDSA2 involved brief small-group teaching sessions. A total of 218 responses was collected. Mean percentage scores increased significantly from 51±19% at baseline to 81±16% after PDSA1 (t=10.32, p<0.0001) and further to 93±8% after PDSA2 (t=4.9, p<0.0001), with 54% of participants achieving a perfect score. In conclusion, the targeted distribution of guideline printouts and visual aids, combined with small-group teaching sessions, were simple and effective ways of educating healthcare staff about the new standards of elective surgical care at the time of COVID-19. This could facilitate the safe restoration of surgical activity, which is critical in order to mitigate the far-reaching consequences of surgical delays on an unprecedented scale during a time of great crisis and uncertainty.

Keywords: COVID-19, elective surgery, NICE guidelines, quality improvement

Procedia PDF Downloads 176
1470 Manufacturing New Insulating Materials: A Study on Thermal Properties of Date Palm Wood

Authors: K. Almi, S. Lakel, A. Benchabane, A. Kriker

Abstract:

The fiber–matrix compatibility can be improved if suitable enforcements are chosen. Whenever the reinforcements have more thermal stability, they can resist to the main processes for wood–thermoplastic composites. Several researches are focused on natural resources for the production of biomaterials intended for technical applications. Date palm wood present one of the world’s most important natural resource. Its use as insulating materials will help to solve the severe environmental and recycling problems which other artificial insulating materials caused. This paper reports the results of an experimental investigation on the thermal proprieties of date palm wood from Algeria. A study of physical, chemical and mechanical properties is also carried out. The goal is to use this natural material in the manufacture of thermal insulation materials for buildings. The local natural resources used in this study are the date palm fibers from Biskra oasis in Algeria. The results have shown that there is no significant difference in the morphological proprieties of the four types of residues. Their chemical composition differed slightly; with the lowest amounts of cellulose and lignin content belong to Petiole. Water absorption study proved that Rachis has a low value of sorption whereas Petiole and Fibrillium have a high value of sorption what influenced their mechanical properties. It is seen that the Rachis and leaflets exhibit a high tensile strength values compared to the other residue. On the other hand the low value of bulk density of Petiole and Fibrillium leads to high value of specific tensile strength and young modulus. It was found that the specific young modulus of Petiole and Fibrillium was higher than that of Rachis and Leaflets and that of other natural fibers or even artificial fibers. Compared to the other materials date palm wood provide a good thermal proprieties thus, date palm wood will be a good candidate for the manufacturing efficient and safe insulating materials.

Keywords: composite materials, date palm fiber, natural fibers, tensile tests, thermal proprieties

Procedia PDF Downloads 633