Search results for: food safety information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16359

Search results for: food safety information

13419 Distributed Leadership and Emergency Response: A Study on Seafarers

Authors: Delna Shroff

Abstract:

Merchant shipping is an occupation with a high rate of fatal injuries caused by organizational accidents and maritime disasters. In most accident investigations, the leader’s actions are under scrutiny and point out the necessity to investigate the leader’s decisions in critical conditions. While several leadership studies have been carried out in the past, there is a tendency for most research to focus on holders of formal positions. The unit of analysis in most studies has been the ‘individual.’ A need is, therefore, felt to adopt a practice-based perspective of leadership, understand how leadership emerges to affect maritime safety. This paper explores the phenomenon of distributed leadership among seafarers more holistically. It further examines the role of one form of distributed leadership, that is, planfully aligned leadership in the emergency response of the team. A mixed design will be applied. In the first phase, the data gathered by way of semi-structured interviews will be used to explore the seafarer’s implicit understanding of leadership. The data will be used to develop a conceptual framework of distributed leadership, specific to the maritime context. This framework will be used to develop a simulation. Experimental design will be used to examine the relationship between planfully aligned leadership and emergency response of the team members during navigation. Findings show that planfully aligned leadership significantly and positively predicts the emergency response of team members. Planfully aligned leadership leads to a better emergency response of the team members as compared to authoritarian leadership. In the third qualitative phase, additional data will be gathered through semi-structured interviews to further validate the findings to gain a more complete understanding of distributed leadership and its relation to emergency response. Above are the predictive results; the study expects to be a cornerstone of safety leadership research and has important implications for leadership development and training within the maritime industry.

Keywords: authoritarian leadership, distributed leadership, emergency response , planfully aligned leadership

Procedia PDF Downloads 166
13418 Finding the Association Rule between Nursing Interventions and Early Evaluation Results of In-Hospital Cardiac Arrest to Improve Patient Safety

Authors: Wei-Chih Huang, Pei-Lung Chung, Ching-Heng Lin, Hsuan-Chia Yang, Der-Ming Liou

Abstract:

Background: In-Hospital Cardiac Arrest (IHCA) threaten life of the inpatients, cause serious effect to patient safety, quality of inpatients care and hospital service. Health providers must identify the signs of IHCA early to avoid the occurrence of IHCA. This study will consider the potential association between early signs of IHCA and the essence of patient care provided by nurses and other professionals before an IHCA occurs. The aim of this study is to identify significant associations between nursing interventions and abnormal early evaluation results of IHCA that can assist health care providers in monitoring inpatients at risk of IHCA to increase opportunities of IHCA early detection and prevention. Materials and Methods: This study used one of the data mining techniques called association rules mining to compute associations between nursing interventions and abnormal early evaluation results of IHCA. The nursing interventions and abnormal early evaluation results of IHCA were considered to be co-occurring if nursing interventions were provided within 24 hours of last being observed in abnormal early evaluation results of IHCA. The rule based methods were utilized 23.6 million electronic medical records (EMR) from a medical center in Taipei, Taiwan. This dataset includes 733 concepts of nursing interventions that coded by clinical care classification (CCC) codes and 13 early evaluation results of IHCA with binary codes. The values of interestingness and lift were computed as Q values to measure the co-occurrence and associations’ strength between all in-hospital patient care measures and abnormal early evaluation results of IHCA. The associations were evaluated by comparing the results of Q values and verified by medical experts. Results and Conclusions: The results show that there are 4195 pairs of associations between nursing interventions and abnormal early evaluation results of IHCA with their Q values. The indication of positive association is 203 pairs with Q values greater than 5. Inpatients with high blood sugar level (hyperglycemia) have positive association with having heart rate lower than 50 beats per minute or higher than 120 beats per minute, Q value is 6.636. Inpatients with temporary pacemaker (TPM) have significant association with high risk of IHCA, Q value is 47.403. There is significant positive correlation between inpatients with hypovolemia and happened abnormal heart rhythms (arrhythmias), Q value is 127.49. The results of this study can help to prevent IHCA from occurring by making health care providers early recognition of inpatients at risk of IHCA, assist with monitoring patients for providing quality of care to patients, improve IHCA surveillance and quality of in-hospital care.

Keywords: in-hospital cardiac arrest, patient safety, nursing intervention, association rule mining

Procedia PDF Downloads 267
13417 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 91
13416 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 323
13415 Pregnancy Nutritional Status in Ethiopia: A Case Study of Pregnant Women in Shashemene District, Southern Oromia Region

Authors: Yoseph Gela Ali

Abstract:

Inadequate quality and quantity diet is one of the major reasons for high levels of malnutrition in pregnant women. Across-sectional survey was conducted in Shashemene District, Southern Oromia Region. A two-stage cluster sampling technique was used to select a representative sample of 15190 pregnant women aged 20-50 years from four rural villages Energy and nutrient intakes from foods were calculated from one-day weighed food records on a sub-sample (n = 83). The result of the study showed that the intakes of most nutrients were lower than the recommended intake. The energy intake of the study participants both in 2nd and 3rd trimesters of pregnancy were 2,308 kcal and 1,420.5 kcal compared to the recommended 2,340 kcal and 2,452 kcal, respectively. Except iron, almost all micronutrient intakes were lower than the recommended intake. Vitamin A intake was 3 µg compared with the recommended 800 µg, while protein intake of the study respondents in 2nd and 3rd trimester of pregnancy was 45.9 g and 31.5 g, respectively, compared with the recommended 71 g. Risk factors for under nutrition were multiple pregnancy and no consumption of cereal-based foods. This study revealed that the energy and nutrient intake of the pregnant women in the study area was below the recommended intakes. Furthermore, the situation might be aggravated by the high phytate content food consumption reported. Nutritional status of pregnant women in the study area was not adequate to support the increased energy and nutrient requirement of the participants.

Keywords: nutrition, pregnancy, protein, vitamin, energy

Procedia PDF Downloads 133
13414 Implementing a Hospitalist Co-Management Service in Orthopaedic Surgery

Authors: Diane Ghanem, Whitney Kagabo, Rebecca Engels, Uma Srikumaran, Babar Shafiq

Abstract:

Hospitalist co-management of orthopaedic surgery patients is a growing trend across the country. It was created as a collaborative effort to provide overarching care to patients with the goal of improving their postoperative care and decreasing in-hospital medical complications. The aim of this project is to provide a guide for implementing and optimizing a hospitalist co-management service in orthopaedic surgery. Key leaders from the hospitalist team, orthopaedic team and quality, safety and service team were identified. Multiple meetings were convened to discuss the comanagement service and determine the necessary building blocks behind an efficient and well-designed co-management framework. After meticulous deliberation, a consensus was reached on the final service agreement and a written guide was drafted. Fundamental features of the service include the identification of service stakeholders and leaders, frequent consensus meetings, a well-defined framework, with goals, program metrics and unified commands, and a regular satisfaction assessment to update and improve the program. Identified pearls for co-managing orthopaedic surgery patients are standardization, timing, adequate patient selection, and two-way feedback between hospitalists and orthopaedic surgeons to optimize the protocols. Developing a service agreement is a constant work in progress, with meetings, discussions, revisions, and multiple piloting attempts before implementation. It is a partnership created to provide hospitals with a streamlined admission process where at-risk patients are identified early, and patient care is optimized regardless of the number or nature of medical comorbidities. A wellestablished hospitalist co-management service can increase patient care quality and safety, as well as health care value.

Keywords: co-management, hospitalist co-management, implementation, orthopaedic surgery, quality improvement

Procedia PDF Downloads 84
13413 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice

Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese

Abstract:

Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.

Keywords: documentation, knowledge, patient care, patient’s information, training

Procedia PDF Downloads 183
13412 Benzenepropanamine Analogues as Non-detergent Microbicidal Spermicide for Effective Pre-exposure Prophylaxis

Authors: Veenu Bala, Yashpal S. Chhonker, Bhavana Kushwaha, Rabi S. Bhatta, Gopal Gupta, Vishnu L. Sharma

Abstract:

According to UNAIDS 2013 estimate nearly 52% of all individuals living with HIV are now women of reproductive age (15–44 years). Seventy-five percent cases of HIV acquisition are through heterosexual contacts and sexually transmitted infections (STIs), attributable to unsafe sexual behaviour. Each year, an estimated 500 million people acquire atleast one of four STIs: chlamydia, gonorrhoea, syphilis and trichomoniasis. Trichomonas vaginalis (TV) is exclusively sexually transmitted in adults, accounting for 30% of STI cases and associated with pelvic inflammatory disease (PID), vaginitis and pregnancy complications in women. TV infection resulted in impaired vaginal milieu, eventually favoring HIV transmission. In the absence of an effective prophylactic HIV vaccine, prevention of new infections has become a priority. It was thought worthwhile to integrate HIV prevention and reproductive health services including unintended pregnancy protection for women as both are related with unprotected sex. Initially, nonoxynol-9 (N-9) had been proposed as a spermicidal agent with microbicidal activity but on the contrary it increased HIV susceptibility due to surfactant action. Thus, to accomplish an urgent need of novel woman controlled non-detergent microbicidal spermicides benzenepropanamine analogues have been synthesized. At first, five benzenepropanamine-dithiocarbamate hybrids have been synthesized and evaluated for their spermicidal, anti-Trichomonas and anti-fungal activities along with safety profiling to cervicovaginal cells. In order to further enhance the scope of above study benzenepropanamine was hybridized with thiourea as to introduce anti-HIV potential. The synthesized hybrid molecules were evaluated for their reverse transcriptase (RT) inhibition, spermicidal, anti-Trichomonas and antimicrobial activities as well as their safety against vaginal flora and cervical cells. simulated vaginal fluid (SVF) stability and pharmacokinetics of most potent compound versus N-9 was examined in female Newzealand (NZ) rabbits to observe its absorption into systemic circulation and subsequent exposure in blood plasma through vaginal wall. The study resulted in the most promising compound N-butyl-4-(3-oxo-3-phenylpropyl) piperazin-1-carbothioamide (29) exhibiting better activity profile than N-9 as it showed RT inhibition (72.30 %), anti-Trichomonas (MIC, 46.72 µM against MTZ susceptible and MIC, 187.68 µM against resistant strain), spermicidal (MEC, 0.01%) and antifungal activity (MIC, 3.12–50 µg/mL) against four fungal strains. The high safety against vaginal epithelium (HeLa cells) and compatibility with vaginal flora (lactobacillus), SVF stability and least vaginal absorption supported its suitability for topical vaginal application. Docking study was performed to gain an insight into the binding mode and interactions of the most promising compound, N-butyl-4-(3-oxo-3-phenylpropyl) piperazin-1-carbothioamide (29) with HIV-1 Reverse Transcriptase. The docking study has revealed that compound (29) interacted with HIV-1 RT similar to standard drug Nevirapine. It may be concluded that hybridization of benzenepropanamine and thiourea moiety resulted into novel lead with multiple activities including RT inhibition. A further lead optimization may result into effective vaginal microbicides having spermicidal, anti-Trichomonas, antifungal and anti-HIV potential altogether with enhanced safety to cervico-vaginal cells in comparison to Nonoxynol-9.

Keywords: microbicidal, nonoxynol-9, reverse transcriptase, spermicide

Procedia PDF Downloads 341
13411 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 390
13410 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 123
13409 Comprehensive Risk Analysis of Decommissioning Activities with Multifaceted Hazard Factors

Authors: Hyeon-Kyo Lim, Hyunjung Kim, Kune-Woo Lee

Abstract:

Decommissioning process of nuclear facilities can be said to consist of a sequence of problem solving activities, partly because there may exist working environments contaminated by radiological exposure, and partly because there may also exist industrial hazards such as fire, explosions, toxic materials, and electrical and physical hazards. As for an individual hazard factor, risk assessment techniques are getting known to industrial workers with advance of safety technology, but the way how to integrate those results is not. Furthermore, there are few workers who experienced decommissioning operations a lot in the past. Therefore, not a few countries in the world have been trying to develop appropriate counter techniques in order to guarantee safety and efficiency of the process. In spite of that, there still exists neither domestic nor international standard since nuclear facilities are too diverse and unique. In the consequence, it is quite inevitable to imagine and assess the whole risk in the situation anticipated one by one. This paper aimed to find out an appropriate technique to integrate individual risk assessment results from the viewpoint of experts. Thus, on one hand the whole risk assessment activity for decommissioning operations was modeled as a sequence of individual risk assessment steps, and on the other, a hierarchical risk structure was developed. Then, risk assessment procedure that can elicit individual hazard factors one by one were introduced with reference to the standard operation procedure (SOP) and hierarchical task analysis (HTA). With an assumption of quantification and normalization of individual risks, a technique to estimate relative weight factors was tried by using the conventional Analytic Hierarchical Process (AHP) and its result was reviewed with reference to judgment of experts. Besides, taking the ambiguity of human judgment into consideration, debates based upon fuzzy inference was added with a mathematical case study.

Keywords: decommissioning, risk assessment, analytic hierarchical process (AHP), fuzzy inference

Procedia PDF Downloads 422
13408 Development of Value Added Product Based on Millets and Hemp Seed (cannabis sativa L.)

Authors: Khushi Kashyap, Pratibha Singh

Abstract:

In the recent years increasing interest in vegetarian diets has been observed, a major problem in this type of diet is to provide the appropriate amount of protein .Value addition of food is current most talked topic because of increasing nutritional awareness among consumers today. An investigation was conducted to develop protein rich multi-millet hemp seed khakhra. The seeds of cannabis sativa L. have been a significant source of food for thousand of year. In recent years, hemp has not been thoroughly explored for its nutritional potential due to the mistaken belief regarding the cannabis plants. Methodology- two variations was prepared referencing standard recipe. Variation 1 was prepared using 25g ragi, 25g bajra,40g whole wheat flour with 10g hemp seed powder, variation 2(RF-25g,BF25g,WWF-35g,HS-15g). The product was subjected to sensory evolution by semi trained panel members using 9 point hedonic on 50 panelists. Result- result of the sensory evaluation revealed that the product incorporated with 15g of hemp seed were similar to control I texture, taste and overall quality and was more acceptable by the panelist and was selected as final product seed. On estimation of the nutrient content 30g of khakhra provides 107kcal of energy,12g protein,75g carbohydrate, and 9.6g of fats with shelf life of 3 months. Conclusion- khakhras can be eaten as a snack at any time of the day. hemp seed powder incorporated in it enhances its nutritive value and makes it more nutritious. It is suitable for consumption of all the age group.

Keywords: cannabis sativa, hemp, protein, seed

Procedia PDF Downloads 79
13407 Comparison of Nutritional Status of Asthmatic vs Non-Asthmatic Adults

Authors: Ayesha Mushtaq

Abstract:

Asthma is a pulmonary disease in which blockade of the airway takes place due to inflammation as a response to certain allergens. Breathing troubles, cough, and dyspnea are one of the few symptoms. Several studies have indicated a significant effect on asthma due to changes in dietary routines. Certain food items, such as oily foods and other materials, are known to cause an increase in the symptoms of asthma. Low dietary intake of fruits and vegetables may be important in relation to asthma prevalence. The objective of this study is to assess and compare the nutritional status of asthmatic and non-asthmatic patients. The significance of this study lies in the factor that it will help nutritionists to arrange a feasible dietary routine for asthmatic patients. This research was conducted at the Pulmonology Department of the Pakistan Institute of Medical Science Islamabad. About thirty hundred thirty-four million people are affected by asthma worldwide. Pakistan is on the verge of being an uplifted urban population and asthma cases are increasingly high these days. Several studies suggest an increase in the Asthmatic patient population due to improper diet. This is a cross-sectional study aimed at assessing the nutritious standing of Asthmatic and non-asthmatic patients. This research took place at the Pakistan Institute of Medical Sciences (PIMS), Islamabad, Pakistan. The research included asthmatic and non-asthmatic patients coming to the pulmonology department clinic at the Pakistan Institute of Medical Sciences (PIMS). These patients were aged between 20-60 years. A questionnaire was developed for these patients to estimate their dietary plans in these patients. The methodology included four sections. The first section was the Socio-Demographic profile, which included age, gender, monthly income and occupation. The next section was anthropometric measurements which included the weight, height and body mass index (BMI) of an individual. The next section, section three, was about the biochemical attributes, such as for biochemical profiling, pulmonary function testing (PFT) was performed. In the next section, Dietary habits were assessed by a food frequency questionnaire (FFQ) through food habits and consumption pattern was assessed. The next section life style data, in which the person's level of physical activity, sleep and smoking habits were assessed. The next section was statistical analysis. All the data obtained from the study were statistically analyzed and assessed. Most of the asthma Patients were females, with weight more than normal or even obese. Body Mass Index (BMI) was higher in asthma Patients than those in non-Asthmatic ones. When the nutritional Values were assessed, we came to know that these patients were low on certain nutrients and their diet included more junk and oily food than healthy vegetables and fruits. Beverages intake was also included in the same assessment. It is evident from this study that nutritional status has a contributory effect on asthma. So, patients on the verge of developing asthma or those who have developed asthma should focus on their diet, maintain good eating habits and take healthy diets, including fruits and vegetables rather than oily foods. Proper sleep may also contribute to the control of asthma.

Keywords: BMI, nutrition, PAL, diet

Procedia PDF Downloads 72
13406 Development of a Technology Assessment Model by Patents and Customers' Review Data

Authors: Kisik Song, Sungjoo Lee

Abstract:

Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.

Keywords: technology assessment, patents, citation information, opinion mining

Procedia PDF Downloads 459
13405 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 374
13404 Multiresolution Mesh Blending for Surface Detail Reconstruction

Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal

Abstract:

In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.

Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending

Procedia PDF Downloads 136
13403 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 235
13402 Mutual Information Based Image Registration of Satellite Images Using PSO-GA Hybrid Algorithm

Authors: Dipti Patra, Guguloth Uma, Smita Pradhan

Abstract:

Registration is a fundamental task in image processing. It is used to transform different sets of data into one coordinate system, where data are acquired from different times, different viewing angles, and/or different sensors. The registration geometrically aligns two images (the reference and target images). Registration techniques are used in satellite images and it is important in order to be able to compare or integrate the data obtained from these different measurements. In this work, mutual information is considered as a similarity metric for registration of satellite images. The transformation is assumed to be a rigid transformation. An attempt has been made here to optimize the transformation function. The proposed image registration technique hybrid PSO-GA incorporates the notion of Particle Swarm Optimization and Genetic Algorithm and is used for finding the best optimum values of transformation parameters. The performance comparision obtained with the experiments on satellite images found that the proposed hybrid PSO-GA algorithm outperforms the other algorithms in terms of mutual information and registration accuracy.

Keywords: image registration, genetic algorithm, particle swarm optimization, hybrid PSO-GA algorithm and mutual information

Procedia PDF Downloads 404
13401 Women Entrepreneurial Skills in Maize Processing and Value Addition in Ogun State, Nigeria

Authors: Wasiu Oyeleke Oyediran

Abstract:

Maize is a common staple food for human consumption and livestock feeds. It provides employment and means of livelihood for women in both rural areas and urban centres in Nigeria. However, the entrepreneurial skills of women engaged in its processing and value addition has not been fully enhanced. This study was therefore carried out to investigate rural women entrepreneurial skills in maize processing and value addition in Ogun State, Nigeria. Snow ball sampling technique was used in the selection of 70 respondents for this study. Data were analyzed with descriptive statistics and chi-square. Results revealed that majority (50.0%) of the respondents were 31 - 40 years of age and 60% of the respondents had spent 6 – 10 years in maize processing. The respondents have great entrepreneurial skills in popcorn (85.7%), corn cake (80.0%), corn balls (64.3%) and kokoro (52.9%) making. The majority of the respondents accessed information and entrepreneurial skills through fellow processors (88.6%) and friends and neighbours (62.9%). Major constraints to maize processing and value addition were scarcity of raw materials during off season periods (95.7%), ineffective preservation methods (88.6%), lack of modern processing equipment (82.9%), and high cost of processing machines (72.9%). Result of chi-square showed that there is significant association between personal characteristics of the respondents and entrepreneurial skills of the women at p < 0.05. It is hereby recommended that subsidized processing equipment should be made available to the maize processors in the study area by the government and NGOs.

Keywords: women, entreprenuerial skills, maize prcessing, value addition

Procedia PDF Downloads 214
13400 Risk Analysis in Off-Site Construction Manufacturing in Small to Medium-Sized Projects

Authors: Atousa Khodadadyan, Ali Rostami

Abstract:

The objective of off-site construction manufacturing is to utilise the workforce and machinery in a controlled environment without external interference for higher productivity and quality. The usage of prefabricated components can save up to 14% of the total energy consumption in comparison with the equivalent number of cast-in-place ones. Despite the benefits of prefabrication construction, its current project practices encompass technical and managerial issues. Building design, precast components’ production, logistics, and prefabrication installation processes are still mostly discontinued and fragmented. Furthermore, collaboration among prefabrication manufacturers, transportation parties, and on-site assemblers rely on real-time information such as the status of precast components, delivery progress, and the location of components. From the technical point of view, in this industry, geometric variability is still prevalent, which can be caused during the transportation or production of components. These issues indicate that there are still many aspects of prefabricated construction that can be developed using disruptive technologies. Practical real-time risk analysis can be used to address these issues as well as the management of safety, quality, and construction environment issues. On the other hand, the lack of research about risk assessment and the absence of standards and tools hinder risk management modeling in prefabricated construction. It is essential to note that no risk management standard has been established explicitly for prefabricated construction projects, and most software packages do not provide tailor-made functions for this type of projects.

Keywords: project risk management, risk analysis, risk modelling, prefabricated construction projects

Procedia PDF Downloads 167
13399 Access to Natural Resources in the Cameroonian Part of the Logone Basin: A Driver and Mitigation Tool to Ethnical Conflicts

Authors: Bonguen Onouck Rolande Carole, Ndongo Barthelemy

Abstract:

The climate change effects on the Lake Chad, coupled with population growth, have pushed large masses of people of various origins towards the lower part of the lower Logonewatershed in search of the benefits of environmental services, causing pressure on the environment and its resources. Economic services are therefore threatened, and the decrease in resources contributes to the deterioration of the social wellbeing resulting to conflicts among/between local communities, immigrants, displaced people, and foreigners. This paper is an information contribution on ethnical conflicts drivers in the area and the provided local management mechanisms such can help mitigate present or future conflicts in similar areas. It also prints out the necessity to alleviate water access deficit and encourage good practices for the population wellbeing. In order to meet the objective, in 2018, through the interface of the World Bank-Cameroon project-PULCI, data were collected on the field directly by discussing with the population and visiting infrastructures, indirectly by a questionnaire survey. Two administrative divisions were chosen (Logoneet Chari, Mayo-Danay) in which targeted localities were Zina, Mazera, Lahai, Andirni near the Waza Park and Yagoua, Tekele, Pouss, respectively. Due to some sociocultural and religious reasons, some information were acquired through the traditional chiefs. A desk study analysis based on resources access and availability conflicts history, and management mechanism was done. As results, roots drivers of ethnical conflicts are struggles over natural resources access, and the possibility of conflicts increases as the scarcity and vulnerabilities persist, creating more sociocultural gaps and tensions. The mitigation mechanisms though fruitful, are limited. There is poor documentation on the topic, the resources management policies of this basin are unsuitable and ineffective for some. Therefore, the restoration of environmental and ecosystems, the mitigation of climate change effects, and food insecurity are the challenges that must be met to alleviate conflicts in these localities.

Keywords: ethnic, communities, conflicts, mitigation mechanisms, natural resources, logone basin

Procedia PDF Downloads 102
13398 Assessment of Seeding and Weeding Field Robot Performance

Authors: Victor Bloch, Eerikki Kaila, Reetta Palva

Abstract:

Field robots are an important tool for enhancing efficiency and decreasing the climatic impact of food production. There exists a number of commercial field robots; however, since this technology is still new, the robot advantages and limitations, as well as methods for optimal using of robots, are still unclear. In this study, the performance of a commercial field robot for seeding and weeding was assessed. A research 2-ha sugar beet field with 0.5m row width was used for testing, which included robotic sowing of sugar beet and weeding five times during the first two months of the growing. About three and five percent of the field were used as untreated and chemically weeded control areas, respectively. The plant detection was based on the exact plant location without image processing. The robot was equipped with six seeding and weeding tools, including passive between-rows harrow hoes and active hoes cutting inside rows between the plants, and it moved with a maximal speed of 0.9 km/h. The robot's performance was assessed by image processing. The field images were collected by an action camera with a height of 2 m and a resolution 27M pixels installed on the robot and by a drone with a 16M pixel camera flying at 4 m height. To detect plants and weeds, the YOLO model was trained with transfer learning from two available datasets. A preliminary analysis of the entire field showed that in the areas treated by the robot, the weed average density varied across the field from 6.8 to 9.1 weeds/m² (compared with 0.8 in the chemically treated area and 24.3 in the untreated area), the weed average density inside rows was 2.0-2.9 weeds / m (compared with 0 on the chemically treated area), and the emergence rate was 90-95%. The information about the robot's performance has high importance for the application of robotics for field tasks. With the help of the developed method, the performance can be assessed several times during the growth according to the robotic weeding frequency. When it’s used by farmers, they can know the field condition and efficiency of the robotic treatment all over the field. Farmers and researchers could develop optimal strategies for using the robot, such as seeding and weeding timing, robot settings, and plant and field parameters and geometry. The robot producers can have quantitative information from an actual working environment and improve the robots accordingly.

Keywords: agricultural robot, field robot, plant detection, robot performance

Procedia PDF Downloads 72
13397 AINA: Disney Animation Information as Educational Resources

Authors: Piedad Garrido, Fernando Repulles, Andy Bloor, Julio A. Sanguesa, Jesus Gallardo, Vicente Torres, Jesus Tramullas

Abstract:

With the emergence and development of Information and Communications Technologies (ICTs), Higher Education is experiencing rapid changes, not only in its teaching strategies but also in student’s learning skills. However, we have noticed that students often have difficulty when seeking innovative, useful, and interesting learning resources for their work. This is due to the lack of supervision in the selection of good query tools. This paper presents AINA, an Information Retrieval (IR) computer system aimed at providing motivating and stimulating content to both students and teachers working on different areas and at different educational levels. In particular, our proposal consists of an open virtual resource environment oriented to the vast universe of Disney comics and cartoons. Our test suite includes Disney’s long and shorts films, and we have performed some activities based on the Just In Time Teaching (JiTT) methodology. More specifically, it has been tested by groups of university and secondary school students.

Keywords: information retrieval, animation, educational resources, JiTT

Procedia PDF Downloads 339
13396 Design & Development of a Static-Thrust Test-Bench for Aviation/UAV Based Piston Engines

Authors: Syed Muhammad Basit Ali, Usama Saleem, Irtiza Ali

Abstract:

Internal combustion engines have been pioneers in the aviation industry, use of piston engines for aircraft propulsion, from propeller-driven bi-planes to turbo-prop, commercial, and cargo airliners. To provide an adequate amount of thrust piston engine rotates the propeller at a specific rpm, allowing enough mass airflow. Thrust is the only forward-acting force of an aircraft that helps heavier than air bodies to fly, depending on the mathematical model and variables included in that with the correct measurement. Test-benches have been a bench-mark in the aerospace industry to analyse the results before a flight, having paramount significance in reliability and safety engineering, depending on the mathematical model and variables included in that with the correct measurement. Calculation of thrust from a piston engine also depends on environmental changes, the diameter of the propeller, and the density of air. The project would be centered on piston engines used in the aviation industry for light aircraft and UAVs. A static thrust test bench involves various units, each performing a designed purpose to monitor and display. Static thrust tests are performed on the ground, and safety concerns hold paramount importance. The execution of this study involves research, design, manufacturing, and results based on reverse engineering initiating from virtual design, analytical analysis, and simulations. The final evaluation of results gathered from various methods such as co-relation between conventional mass-spring and digital loadcell. On average, we received 17.5kg of thrust (25+ engine run-ups – around 40 hours of engine run), only 10% deviation from analytically calculated thrust –providing 90% accuracy.

Keywords: aviation, aeronautics, static thrust, test bench, aircraft maintenance

Procedia PDF Downloads 399
13395 Antiplatelet Activity of Nitrated Fatty Acids from Different Food Sources

Authors: Lyanne Rodriguez, Eduardo Fuentes, Andrés Trostchansky, Felipe Lagos

Abstract:

Nutrition is a crucial strategy to combat cardiovascular diseases (CVD), which remain a leading global cause of mortality. Various studies have demonstrated the antiplatelet properties of commonly consumed fruit and vegetable extracts, particularly tomato and bean extracts. Previous research has indicated potent antiplatelet activity in tomato and common bean pomace, attributed to their high fatty acid content (>30%). Notably, fatty acids can undergo nitration during digestion, catalyzed by the reaction of nitrogen dioxide with unsaturated fatty acids. Understanding the mechanisms underlying the formation of nitrated fatty acids from dietary sources is essential to comprehending their antiplatelet action. This research aims to evaluate the formation of nitrated fatty acids (NO₂-FA) from different foods (tomato pulp and common beans). Specifically, tomato pomace and nitrated bean extracts exhibited concentration-dependent antiplatelet effects when platelets were stimulated with TRAP-6 and collagen (1.18±0.04 and 0.7±0.02 mg/mL, respectively). Furthermore, the antiplatelet potential was associated with the modulation of platelet activation markers, as both nitrated extracts suppressed p-selectin expression, CD63 secretion, and fibrinogen modulation. Additionally, a synergistic effect was observed between both nitrated extracts. Our results suggest that NO₂-FA obtained from different food sources has a promising antiplatelet effect for preventing and treating blood clots. This study adds value to these foods in terms of reducing cardiovascular events.

Keywords: foods, nitrated fatty acids, nitration, platelets

Procedia PDF Downloads 34
13394 Evaluation and Strategic Development of IT in Accounting in Turkey

Authors: Eda Kocakaya, Sebahat Seker, Dogan Argun

Abstract:

The aim of this study is to determine the process of information technologies and the connections between concepts in accounting management services in Turkey. The objective of this study is to determine the adaptation and evaluation process of information technologies and the connections between concepts and differences in accounting management services in Turkey. The situation and determination of the IT applications of Accounting Management were studied. The applications of • Billing • Order Processing • Accounts Receivable/Payable Management • Contract Management • Bank Account Management Were discussed in this study. The IT applications were demonstrated and realized in actual accounting services. The sectoral representative's companies were selected, and the IT application was searched by bibliometric analysis.

Keywords: management, accounting, information technologies, adaptation

Procedia PDF Downloads 304
13393 Potassium Fertilization Improves Rice Yield in Aerobic Production System by Decreasing Panicle Sterility

Authors: Abdul Wakeel, Hafeez Ur Rehman, Muhammad Umair Mubarak

Abstract:

Rice is the second most important staple food in Pakistan after wheat. It is not only a healthy food for the people of all age groups but also a source of foreign exchange for Pakistan. Instead of bright history for Basmati rice production, we are suffering from multiple problems reducing yield and quality as well. Rice lodging and water shortage for an-aerobic rice production system is among major glitches of it. Due to water shortage an-aerobic rice production system has to be supplemented or replaced by aerobic rice system. Aerobic rice system has been adopted for production of non-basmati rice in many parts of the world. Also for basmati rice, significant efforts have been made for aerobic rice production, however still has to be improved for effective recommendations. Among two major issues for aerobic rice, weed elimination has been solved to great extent by introducing suitable herbicides, however, low yield production due weak grains and panicle sterility is still elusive. It has been reported that potassium (K) has significant role to decrease panicle sterility in cereals. Potassium deficiency is obvious for rice under aerobic rice production system due to lack of K gradient coming with irrigation water and lowered indigenous K release from soils. Therefore it was hypothesized that K application under aerobic rice production system may improve the rice yield by decreasing panicle sterility. Results from pot and field experiments confirm that application of K fertilizer significantly increased the rice grain yield due to decreased panicle sterility and improving grain health. The quality of rice was also improved by K fertilization.

Keywords: DSR, Basmati rice, aerobic, potassium

Procedia PDF Downloads 384
13392 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 54
13391 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 278
13390 Remediation Activities in Bagnoli Superfund Site: An Italian Case of Study

Authors: S. Bellagamba, S. Malinconico, P. De Simone, F. Paglietti

Abstract:

Until the 1990s, Italy was among the world’s leading producers of raw asbestos fibres and Asbestos Containing Materials (ACM) and one of the most contaminated Countries in Europe. To reduce asbestos-related health effects, Italy has adopted many laws and regulations regarding exposure thresholds, limits, and remediation tools. The Italian Environmental Ministry (MASE) has identified 42 Italian Superfund sites, 11 of which are mainly contaminated by Asbestos. The highest levels of exposure occur during remediation activities in the 42 superfund-sites and during the management of asbestos containing waste in landfills, which requires specific procedures. INAIL-DIT play a role as MASE scientific consultant on issues concerning pollution, remediation, and Asbestos Containing Waste (ACW) management. The aim is to identify the best Emergency Safety Measures, to suggest specific best pratics for remediation through occupational on site monitorings and laboratory analysis. Moreover, the aim of INAIL research is testing the available technologies for working activities and analytical methodologies. This paper describes the remediation of Bagnoli industrial facility (Naples), an Eternit factory which produced asbestos cement products. The remediation has been analyzed, considering a first phase focused on the demolition of structures and plants and a second phase regarding the characterization, screening, removal, and disposal of polluted soils. The project planned the complete removal of all the asbestos dispersed in the soil and subsoil and the recovery of the clean fraction. This work highlights the remediation techniques used and the prevention measures provide for workers and daily life areas protection. This study, considering the high number of asbestos cement factories in the world, can to serve as an important reference for similar situation at European or international scale.

Keywords: safety, asbestos, workers, contaminated sites, hazardous waste

Procedia PDF Downloads 84