Search results for: user age profile
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4281

Search results for: user age profile

1341 Deaf Inmates in Canadian Prisons: Addressing Discrimination through Staff Training Videos with Deaf Actors

Authors: Tracey Bone

Abstract:

Deaf inmates, whose first or preferred language is a Signed Language, experience barriers to accessing the necessary two-way communication with correctional staff, and the educational and social programs that will enhance their eligibility for conditional release from the federal prison system in Canada. The development of visual content to enhance the knowledge and skill development of correctional staff is a contemporary strategy intended to significantly improve the correctional experience for deaf inmates. This presentation reports on the development of two distinct training videos created to enhance staff’s understanding of the needs of deaf inmates; one a two-part simulation of an interaction with a deaf inmate, the second an interview with a deaf academic. Part one of video one demonstrates the challenges and misunderstandings inherent in communicating across languages without a qualified sign language interpreter; the second part demonstrates the ease of communication when communication needs are met. Video two incorporates the experiences of a deaf academic to provide the cultural grounding necessary to educate staff in the unique experiences associated with being a visual language user. Lack of staff understanding or awareness of deaf culture and language must not be acceptable reasons for the inadequate treatment of deaf visual language users in federal prisons. This paper demonstrates a contemporary approach to meeting the human rights and needs of this unique and often ignored inmate subpopulation. The deaf community supports this visual approach to enhancing staff understanding of the unique needs of this population. A study of its effectiveness is currently underway.

Keywords: accommodations, American Sign Language (ASL), deaf inmates, sensory deprivation

Procedia PDF Downloads 149
1340 Ethnic Entrepreneurships: Minority Ethnic Students in UiTM Sabah and UMS Perceptions towards Entrepreneurialism Business Interest

Authors: Lizinis Cassendra Frederick Dony, Dewi Binti Tajuddin, Jirom Jeremy Frederick Dony, Andrew Nicholas

Abstract:

Unemployed graduates have become among the world major concerns lately. 70% of Malaysian graduates are jobless. Due to this concerns, this paper aims to identify major factors influencing Sabah minority ethnic favorable in the entrepreneurialism business interest. Hence, extensive introductory entrepreneurship syllabus clusters development beginning from the early childhood, primary, secondary and university students. This may induce interest appeal and to develop focus group of self-employment. The study focus on 7 indicators consist of demographic profiles variable (DP), social norms (SN), attitude (A), self-efficacy (SE) and business management skills (BMS) with reference to university students’ entrepreneurial intention. This study also partially mediates the relationship between product attractiveness (PA) and the minority ethnic entrepreneurialism business interest (MEEBI), by testifying their direct and indirect relationships. Hence, this study provides new perception towards improving the graduates’ characteristic, capabilities to exploit the business opportunities in the market. Furthermore, this paper will assess the relationship with the product attractiveness(PA) as a mediator. The study encompasses on the type of Sabah minority ethnic (ME) and nature of family own business (FOB) background with the 280 samples students in UiTM Sabah and UMS. The descriptive and random sampling method of research which revealed that majority of the respondents agreed that FOB and entrepreneurship education had positively influenced the ethnic students’ involvement in the entrepreneurial process and career development either full-time or part-time basis.

Keywords: Demographic profile (DP), soci, unemployed graduates, Malaysian minority

Procedia PDF Downloads 421
1339 Antibacterial Activity and Kinetic Parameters of the Essential Oils of Drypetes Gossweileri S.Moore, Ocimun Gratissimum L. and Cymbopogon Citratus DC Stapf on 5 Multidrug-Resistant Strains of Shigella

Authors: Elsa Makue Nguuffo, Esther Del Florence Moni Ndedi, Jacky Njiki Bikoï, Jean Paul Assam Assam, Maximilienne Ascension Nyegue

Abstract:

Aims: The present study aims to evaluate the kinetic parameters of essential oils (EOs) and combinations fromDrypetes gossweileri Stem Bark, Ocimum gratissimum leaves, Cymbopogon citratusleaves after evaluation of their antibacterial activityonmultidrug-resistant strains ofShigella. Material and Methods:fiveclinical strains of Shigellaisolated from patients with diarrhoeaincluding Shigella flexneri, and 4 otherstrains of Shigella sppwere selected. Their antibiotic profile was established using agar test diffusion with seven antibiotics belonging to seven classes.EOs were extracted from each plant using hydrodistillation process. The activity of Ciprofloxacin®, OEs, and their combination formulatedinthe followingratios(w/w/w): C1: 1/1/1; C2: 2/1/1; C3: 1/2/1, C4:1/1/2 was evaluated microdilution assay. The various interactions of OEs in the different combinations were determined then the OE and the most active combination were retained to determine their kinetic parameters on S. flexneri. Results: Antibiotic susceptibility tests revealed that most Shigella isolates (n = 4) were resistant to six antibiotics tested. Ciprofloxacin (40%), Nalidixic acid (60%), Tetracycline (80%), Amoxicillin (100%), Cefotaxime (80%), Erythromycin (100%), and Cotrimoxazole (80%) were the profiles found in the different strains of Shigella. About the antibacterial activity of OEs, Drypetes gossweileriOE and C2 combination had shown a higher Shigellicide property with a Minimal Inhibitory Concentration(MIC) respectivelyranging from 0.078 mg/mL to 0.312 mg/mL and 0.012 to 1.562 mg/mL. Combinations of OEs showed various interactions whose synergistic effects were mostly encountered. The best deactivation was obtained by the combination C2 at 16 MIC withb= 1.962. Conclusion: the susceptibility of Shigella to OEs and their combinations justifies their use in traditional medicine in the treatment of shigellosis.

Keywords: shigella, multidrug-resistant, EOs, kinetic

Procedia PDF Downloads 98
1338 Tooth Fractures Following the Placement of Adjacent Dental Implants: A Case Series and a Systematic Review of the Literature

Authors: Eyal Rosen

Abstract:

This study is aimed to report a possible effect of the presence of dental implants on the development of crown or root fractures in adjacent natural teeth. A series of 26 cases of teeth diagnosed with crown or root fractures following the placement of adjacent dental implants is presented. In addition, a comprehensive systematic review of the literature was performed to detect other studies that evaluated this possible complication. The case series analysis revealed that all crown-fractured teeth were non-endodontically treated teeth (n=18), and all root fractured teeth were endodontically treated teeth (n=8). The time from implant loading to the diagnosis of a fracture in an adjacent tooth was longer than 1 year in 78% of cases. The majority of crown or root fractures occurred in female patients, over 50 years of age, with an average age of 59 in the crown fractures group, and 54 in the root fractures group. Most of the patients received 2 or more implants. Nine (50%) of the teeth with crown fracture were molars, 7 (39%) were mandibular premolars, and 2 (11%) were incisor teeth. The majority of teeth with root fracture were premolar or mandibular molar teeth (6 (75%)). The systematic review of the literature did not reveal additional studies that reported on this possible complication. To the best of the author’s knowledge this case series, although limited in its extent, is the first clinical report of a possible serious complication of implants, associated fractures in adjacent endodontically and non-endodontically treated natural teeth. The most common patient profile found in this series was a woman over 50 years of age, having a fractured premolar tooth, which was diagnosed more than 1 year after reconstruction that was based on multiple adjacent implants. Additional clinical studies are required in order to shed light on this potential serious complication.

Keywords: complications, dental implants, endodontics, fractured teeth

Procedia PDF Downloads 138
1337 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model

Authors: Mohammed Nasser Al-Suqri

Abstract:

Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.

Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman

Procedia PDF Downloads 115
1336 Synthesis and Anticancer Evaluation of Substituted 2-(3,4-Dimethoxyphenyl) Benzazoles

Authors: Cigdem Karaaslan, Yalcin Duydu, Aylin Ustundag, Can Ozgur Yalcın, Hakan Goker

Abstract:

Benzazole nucleus is found in the structure of many compounds as anticancer agents. Bendamustine (Alkylating agent), Nocodazole (Mitotic inhibitor), Veliparib (PARP inhibitor), Glasdegib (SMO inhibitor) are clinically used as anticancer therapeutics which bearing benzimidazole moiety. Based on the principle of bioisosterism in the present work, 23 compounds belonging to 2-(3,4-dimethoxy-phenyl) benzazoles and imidazopyridine series were synthesized and evaluated for their anticancer activities. N-(5-Chloro-2-hydroxyphenyl)-3,4-dimethoxybenzamide, was obtained by the amidation of 2-hydroxy-5-chloroaniline with 3,4-dimethoxybenzoic acid by using 1,1'-carbonyldiimidazole. Cyclization of benzamide derivative to benzoxazole, was achieved by p-toluenesulfonic acid. Other 1H-benz (or pyrido) azoles were prepared by the reaction between 2-aminothiophenol, o-phenylenediamine, o-pyridinediamine with sodium metabisulfite adduct of 3,4-dimethoxybenzaldehyde. The NMR assignments of the dimethoxy groups were established by the Nuclear Overhauser Effect Spectroscopy. A compound named, 5(4),7(6)-Dichloro-2-(3,4-dimethoxy) phenyl-1H-benzimidazole, bearing two chlorine atoms at the 5(4) and 7(6) positions of the benzene moiety of benzimidazole was found the most potent analogue, against A549 cells with the GI50 value of 1.5 µg/mL. In addition, 2-(3,4-Dimethoxyphenyl)-5,6-dimethyl-1H-benzimi-dazole showed remarkable cell growth inhibition against MCF-7 and HeLa cells with the GI₅₀ values of 7 and 5.5 µg/mL, respectively. It could be concluded that introduction of di-chloro atoms at the phenyl ring of 2-(3,4-dimethoxyphenyl)-1H-benzimidazoles increase significant cytotoxicity to selected human tumor cell lines in comparison to other all benzazoles synthesized in this study. Unsubstituted 2-(3,4-dimethoxyphenyl) imidazopyridines also gave the good inhibitory profile against A549 and HeLa cells.

Keywords: 3, 4-Dimethoxyphenyl, 1H-benzimidazole, benzazole, imidazopyridine

Procedia PDF Downloads 122
1335 Predictive Analytics of Bike Sharing Rider Parameters

Authors: Bongs Lainjo

Abstract:

The evolution and escalation of bike-sharing programs (BSP) continue unabated. Since the sixties, many countries have introduced different models and strategies of BSP. These include variations ranging from dockless models to electronic real-time monitoring systems. Reasons for using this BSP include recreation, errands, work, etc. And there is all indication that complex, and more innovative rider-friendly systems are yet to be introduced. The objective of this paper is to analyze current variables established by different operators and streamline them identifying the most compelling ones using analytics. Given the contents of available databases, there is a lack of uniformity and common standard on what is required and what is not. Two factors appear to be common: user type (registered and unregistered, and duration of each trip). This article uses historical data provided by one operator based in the greater Washington, District of Columbia, USA area. Several variables including categorical and continuous data types were screened. Eight out of 18 were considered acceptable and significantly contribute to determining a useful and reliable predictive model. Bike-sharing systems have become popular in recent years all around the world. Although this trend has resulted in many studies on public cycling systems, there have been few previous studies on the factors influencing public bicycle travel behavior. A bike-sharing system is a computer-controlled system in which individuals can borrow bikes for a fee or free for a limited period. This study has identified unprecedented useful, and pragmatic parameters required in improving BSP ridership dynamics.

Keywords: sharing program, historical data, parameters, ridership dynamics, trip duration

Procedia PDF Downloads 138
1334 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 475
1333 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 108
1332 Enabling Oral Communication and Accelerating Recovery: The Creation of a Novel Low-Cost Electroencephalography-Based Brain-Computer Interface for the Differently Abled

Authors: Rishabh Ambavanekar

Abstract:

Expressive Aphasia (EA) is an oral disability, common among stroke victims, in which the Broca’s area of the brain is damaged, interfering with verbal communication abilities. EA currently has no technological solutions and its only current viable solutions are inefficient or only available to the affluent. This prompts the need for an affordable, innovative solution to facilitate recovery and assist in speech generation. This project proposes a novel concept: using a wearable low-cost electroencephalography (EEG) device-based brain-computer interface (BCI) to translate a user’s inner dialogue into words. A low-cost EEG device was developed and found to be 10 to 100 times less expensive than any current EEG device on the market. As part of the BCI, a machine learning (ML) model was developed and trained using the EEG data. Two stages of testing were conducted to analyze the effectiveness of the device: a proof-of-concept and a final solution test. The proof-of-concept test demonstrated an average accuracy of above 90% and the final solution test demonstrated an average accuracy of above 75%. These two successful tests were used as a basis to demonstrate the viability of BCI research in developing lower-cost verbal communication devices. Additionally, the device proved to not only enable users to verbally communicate but has the potential to also assist in accelerated recovery from the disorder.

Keywords: neurotechnology, brain-computer interface, neuroscience, human-machine interface, BCI, HMI, aphasia, verbal disability, stroke, low-cost, machine learning, ML, image recognition, EEG, signal analysis

Procedia PDF Downloads 119
1331 Experimental Research on Neck Thinning Dynamics of Droplets in Cross Junction Microchannels

Authors: Yilin Ma, Zhaomiao Liu, Xiang Wang, Yan Pang

Abstract:

Microscale droplets play an increasingly important role in various applications, including medical diagnostics, material synthesis, chemical engineering, and cell research due to features of high surface-to-volume ratio and tiny scale, which can significantly improve reaction rates, enhance heat transfer efficiency, enable high-throughput parallel studies as well as reduce reagent usage. As a mature technique to manipulate small amounts of liquids, droplet microfluidics could achieve the precise control of droplet parameters such as size, uniformity, structure, and thus has been widely adopted in the engineering and scientific research of multiple fields. Necking processes of the droplet in the cross junction microchannels are experimentally and theoretically investigated and dynamic mechanisms of the neck thinning in two different regimes are revealed. According to evolutions of the minimum neck width and the thinning rate, the necking process is further divided into different stages and the main driving force during each stage is confirmed. Effects of the flow rates and the cross-sectional aspect ratio on the necking process as well as the neck profile at different stages are provided in detail. The distinct features of the two regimes in the squeezing stage are well captured by the theoretical estimations of the effective flow rate and the variations of the actual flow rates in different channels are reasonably reflected by the channel width ratio. In the collapsing stage, the quantitative relation between the minimum neck width and the remaining time is constructed to identify the physical mechanism.

Keywords: cross junction, neck thinning, force analysis, inertial mechanism

Procedia PDF Downloads 110
1330 Exploring SL Writing and SL Sensitivity during Writing Tasks: Poor and Advanced Writing in a Context of Second Language other than English

Authors: Sandra Figueiredo, Margarida Alves Martins, Carlos Silva, Cristina Simões

Abstract:

This study integrates a larger research empirical project that examines second language (SL) learners’ profiles and valid procedures to perform complete and diagnostic assessment in schools. 102 learners of Portuguese as a SL aged 7 and 17 years speakers of distinct home languages were assessed in several linguistic tasks. In this article, we focused on writing performance in the specific task of narrative essay composition. The written outputs were measured using the score in six components adapted from an English SL assessment context (Alberta Education): linguistic vocabulary, grammar, syntax, strategy, socio-linguistic, and discourse. The writing processes and strategies in Portuguese language used by different immigrant students were analysed to determine features and diversity of deficits on authentic texts performed by SL writers. Differentiated performance was based on the diversity of the following variables: grades, previous schooling, home language, instruction in first language, and exposure to Portuguese as Second Language. Indo-Aryan languages speakers showed low writing scores compared to their peers and the type of language and respective cognitive mapping (such as Mandarin and Arabic) was the predictor, not linguistic distance. Home language instruction should also be prominently considered in further research to understand specificities of cognitive academic profile in a Romance languages learning context. Additionally, this study also examined the teachers representations that will be here addressed to understand educational implications of second language teaching in psychological distress of different minorities in schools of specific host countries.

Keywords: home language, immigrant students, Portuguese language, second language, writing assessment

Procedia PDF Downloads 462
1329 A Trail of Decoding a Classical Riddle: An Analysis of Russian Military Strategy

Authors: Karin Megheșan, Alexandra Popescu, Teodora Dobre

Abstract:

In the past few years, the Russian Federation has become a central point on the security agenda of the most important international actors, due to its reloaded aggressiveness of foreign policy. Vladimir Putin, the actual president of the Russian Federation, has proven that Russia can and has the willingness to become the powerful actor that used to be during the Cold War. Russia’s new behavior on the international scene showed that Russia has not only expansionist (where expansionist is not only in terms of territory but also of ideology) intentions, but also the necessary resources, to build an empire that may have the power to counterbalance the influence of the United States and stop the expansion of the North-Atlantic Treaty Organization in an equation understood of multipolar Russian view. But in order to do this, there is necessary to follow a well-established plan or policy. Thus, the aim of the paper is to discuss how has the foreign policy of the Russian Federation evolved under the influence of the military and security strategies of the Russian nation, to briefly examine some of the factors that sculpture Russian foreign policy and behavior, in order to reshape a Russian (Soviet) profile so far considered antiquated. Our approach is an argument in favor of the analyses of the recent evolutions embedded in the course of history. In this context, the paper will include analytical thoughts about the Russian foreign policy and the latest strategic documents (security strategy and military doctrine) adopted by the Putin administration, with the purpose to highlight the main direction of action followed by all these documents together. The paper concludes that the military component is to be found in all these strategic documents, as well as at the core of Russian national interest, aspect that proves that Russia is still the adept of the traditional realist paradigm, reshaped in a Russian theory of the multipolar world.

Keywords: hybrid warfare, military component, military doctrine, Russian foreign policy, security strategy

Procedia PDF Downloads 303
1328 Web-Based Cognitive Writing Instruction (WeCWI): A Theoretical-and-Pedagogical e-Framework for Language Development

Authors: Boon Yih Mah

Abstract:

Web-based Cognitive Writing Instruction (WeCWI)’s contribution towards language development can be divided into linguistic and non-linguistic perspectives. In linguistic perspective, WeCWI focuses on the literacy and language discoveries, while the cognitive and psychological discoveries are the hubs in non-linguistic perspective. In linguistic perspective, WeCWI draws attention to free reading and enterprises, which are supported by the language acquisition theories. Besides, the adoption of process genre approach as a hybrid guided writing approach fosters literacy development. Literacy and language developments are interconnected in the communication process; hence, WeCWI encourages meaningful discussion based on the interactionist theory that involves input, negotiation, output, and interactional feedback. Rooted in the e-learning interaction-based model, WeCWI promotes online discussion via synchronous and asynchronous communications, which allows interactions happened among the learners, instructor, and digital content. In non-linguistic perspective, WeCWI highlights on the contribution of reading, discussion, and writing towards cognitive development. Based on the inquiry models, learners’ critical thinking is fostered during information exploration process through interaction and questioning. Lastly, to lower writing anxiety, WeCWI develops the instructional tool with supportive features to facilitate the writing process. To bring a positive user experience to the learner, WeCWI aims to create the instructional tool with different interface designs based on two different types of perceptual learning style.

Keywords: WeCWI, literacy discovery, language discovery, cognitive discovery, psychological discovery

Procedia PDF Downloads 561
1327 Aza-Flavanones as Small Molecule Inhibitors of MicroRNA-10b in MDA-MB-231 Breast Cancer Cells

Authors: Debasmita Mukhopadhyay, Manika Pal Bhadra

Abstract:

MiRNAs contribute to oncogenesis either as tumor suppressors or oncogenes. Hence, discovery of miRNA-based therapeutics are imperative to ameliorate cancer. Modulation of miRNA maturation is accomplished via several therapeutic agents, including small molecules and oligonucleotides. Due to the attractive pharmacokinetic properties of small molecules over oligonucleotides, we set to identify small molecule inhibitors of a metastasis-inducing microRNA. Cytotoxicity profile of aza-flavanone C1 was analyzed in a panel of breast cancer cells employing the NCI-60 screen protocols. Flow cytometry, immunofluorescence and western blotting of apoptotic or EMT markers were performed to analyze the effect of C1. A dual luciferase assay unequivocally suggested that C1 repressed endogenous miR-10b in MDA-MB-231 cells. A derivative of aza-flavanone C1 is shown as a strong inhibitor miR-10b. Blockade of miR-10b by C1 resulted in decreased expression of miR-10b targets in an aggressive breast cancer cell line model, MDA-MB-231. Abrogation of TWIST1, an EMT-inducing transcription factor also contributed to C1 mediated apoptosis. Moreover C1 exhibited a specific and selective down-regulation of miR-10b and did not function as a general inhibitor of miRNA biogenesis or other oncomiRs of breast carcinoma. Aza-flavanone congener C1 functions as a potent inhibitor of the metastasis-inducing microRNA, miR-10b. Our present study provides evidence for targeting metastasis-inducing microRNA, miR-10b with a derivative of Aza-flavanone. Better pharmacokinetic properties of small molecules place them as attractive agents compared to nucleic acids based therapies to target miRNA. Further work, in generating analogues based on aza-flavanone moieties will significantly improve the affinity of the small molecules to bind miR-10b. Finally, it is imperative to develop small molecules as novel miRNA-therapeutics in the fight against cancer.

Keywords: breast cancer, microRNA, metastasis, EMT

Procedia PDF Downloads 565
1326 Exploring Reading into Writing: A Corpus-Based Analysis of Postgraduate Students’ Literature Review Essays

Authors: Tanzeela Anbreen, Ammara Maqsood

Abstract:

Reading into writing is one of university students' most required academic skills. The current study explored postgraduate university students’ writing quality using a corpus-based approach. Twelve postgraduate students’ literature review essays were chosen for the corpus-based analysis. These essays were chosen because students had to incorporate multiple reading sources in these essays, which was a new writing exercise for them. The students were provided feedback at least two times which comprised of the written comments by the tutor highlighting the areas of improvement and also by using the ‘track changes’ function. This exercise was repeated two times, and students submitted two drafts. This investigation included only the finally submitted work of the students. A corpus-based approach was adopted to analyse the essays because it promotes autonomous discovery and personalised learning. The aim of this analysis was to understand the existing level of students’ writing before the start of their postgraduate thesis. Text Inspector was used to analyse the quality of essays. With the help of the Text Inspector tool, the vocabulary used in the essays was compared to the English Vocabulary Profile (EVP), which describes what learners know and can do at each Common European Framework of Reference (CEFR) level. Writing quality was also measured for the Flesch reading ease score, which is a standard to describe the ease of understanding the writing content. The results reflected that students found writing essays using multiple sources challenging. In most essays, the vocabulary level achieved was between B1-B2 of the CEFL level. The study recommends that students need extensive training in developing academic writing skills, particularly in writing the literature review type assignment, which requires multiple sources citations.

Keywords: literature review essays, postgraduate students, corpus-based analysis, vocabulary proficiency

Procedia PDF Downloads 73
1325 Using Deep Learning for the Detection of Faulty RJ45 Connectors on a Radio Base Station

Authors: Djamel Fawzi Hadj Sadok, Marrone Silvério Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner

Abstract:

A radio base station (RBS), part of the radio access network, is a particular type of equipment that supports the connection between a wide range of cellular user devices and an operator network access infrastructure. Nowadays, most of the RBS maintenance is carried out manually, resulting in a time consuming and costly task. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. A suitable candidate for RBS maintenance automation is repairing faulty links between devices caused by missing or unplugged connectors. This paper proposes and compares two deep learning solutions to identify attached RJ45 connectors on network ports. We named connector detection, the solution based on object detection, and connector classification, the one based on object classification. With the connector detection, we get an accuracy of 0:934, mean average precision 0:903. Connector classification, get a maximum accuracy of 0:981 and an AUC of 0:989. Although connector detection was outperformed in this study, this should not be viewed as an overall result as connector detection is more flexible for scenarios where there is no precise information about the environment and the possible devices. At the same time, the connector classification requires that information to be well-defined.

Keywords: radio base station, maintenance, classification, detection, deep learning, automation

Procedia PDF Downloads 201
1324 Potential Application of Artocarpus odoratisimmus Seed Flour in Bread Production

Authors: Hasmadi Mamat, Noorfarahzilah Masri

Abstract:

The search for lesser known and underutilized crops, many of which are potentially valuable as human and animal foods has been the focus of research in recent years. Tarap (Artocarpus odoratisimmus) is one of the most delicious tropical fruit and can be found extensively in Borneo, particularly in Sabah and Sarawak. This study was conducted in order to determine the proximate composition, mineral contents as well as to study the effect of the seed flour on the quality of bread produced. Tarap seed powder (TSP) was incorporated (up to 20%) with wheat flour and used to produce bread. The moisture content, ash, protein, fat, ash, carbohydrates, and dietary fiber were measured using AOAC methods while the mineral content was determined using AAS. The effect of substitution of wheat flour with Tarap seed flour on the quality of dough and bread was investigated using various techniques. Farinograph tests were applied to determine the effect of seaweed powder on the rheological properties of wheat flour dough, while texture profile analysis (TPA) was used to measure the textural properties of the final product. Besides that sensory evaluations were also conducted. On a dry weight basis, the TSP was composed of 12.50% moisture, 8.78% protein, 15.60% fat, 1.17% ash, 49.65% carbohydrate and 12.30% of crude fiber. The highest mineral found were Mg, followed by K, Ca, Fe and Na respectively. Farinograh results found that as TSP percentage increased, dough consistency, water absorption capacity and development time of dough decreased. Sensory analysis results showed that bread with 10% of TSP was the most accepted by panelists where the highest acceptability score were found for aroma, taste, colour, crumb texture as well as overall acceptance. The breads with more than 10% of TSP obtained lower acceptability score in most of attributes tested.

Keywords: tarap seed, proximate analysis, bread, sensory evaluation

Procedia PDF Downloads 182
1323 Metagenomics-Based Molecular Epidemiology of Viral Diseases

Authors: Vyacheslav Furtak, Merja Roivainen, Olga Mirochnichenko, Majid Laassri, Bella Bidzhieva, Tatiana Zagorodnyaya, Vladimir Chizhikov, Konstantin Chumakov

Abstract:

Molecular epidemiology and environmental surveillance are parts of a rational strategy to control infectious diseases. They have been widely used in the worldwide campaign to eradicate poliomyelitis, which otherwise would be complicated by the inability to rapidly respond to outbreaks and determine sources of the infection. The conventional scheme involves isolation of viruses from patients and the environment, followed by their identification by nucleotide sequences analysis to determine phylogenetic relationships. This is a tedious and time-consuming process that yields definitive results when it may be too late to implement countermeasures. Because of the difficulty of high-throughput full-genome sequencing, most such studies are conducted by sequencing only capsid genes or their parts. Therefore the important information about the contribution of other parts of the genome and inter- and intra-species recombination to viral evolution is not captured. Here we propose a new approach based on the rapid concentration of sewage samples with tangential flow filtration followed by deep sequencing and reconstruction of nucleotide sequences of viruses present in the samples. The entire nucleic acids content of each sample is sequenced, thus preserving in digital format the complete spectrum of viruses. A set of rapid algorithms was developed to separate deep sequence reads into discrete populations corresponding to each virus and assemble them into full-length consensus contigs, as well as to generate a complete profile of sequence heterogeneities in each of them. This provides an effective approach to study molecular epidemiology and evolution of natural viral populations.

Keywords: poliovirus, eradication, environmental surveillance, laboratory diagnosis

Procedia PDF Downloads 281
1322 A Step Magnitude Haptic Feedback Device and Platform for Better Way to Review Kinesthetic Vibrotactile 3D Design in Professional Training

Authors: Biki Sarmah, Priyanko Raj Mudiar

Abstract:

In the modern world of remotely interactive virtual reality-based learning and teaching, including professional skill-building training and acquisition practices, as well as data acquisition and robotic systems, the revolutionary application or implementation of field-programmable neurostimulator aids and first-hand interactive sensitisation techniques into 3D holographic audio-visual platforms have been a coveted dream of many scholars, professionals, scientists, and students. Integration of 'kinaesthetic vibrotactile haptic perception' along with an actuated step magnitude contact profiloscopy in augmented reality-based learning platforms and professional training can be implemented by using an extremely calculated and well-coordinated image telemetry including remote data mining and control technique. A real-time, computer-aided (PLC-SCADA) field calibration based algorithm must be designed for the purpose. But most importantly, in order to actually realise, as well as to 'interact' with some 3D holographic models displayed over a remote screen using remote laser image telemetry and control, all spatio-physical parameters like cardinal alignment, gyroscopic compensation, as well as surface profile and thermal compositions, must be implemented using zero-order type 1 actuators (or transducers) because they provide zero hystereses, zero backlashes, low deadtime as well as providing a linear, absolutely controllable, intrinsically observable and smooth performance with the least amount of error compensation while ensuring the best ergonomic comfort ever possible for the users.

Keywords: haptic feedback, kinaesthetic vibrotactile 3D design, medical simulation training, piezo diaphragm based actuator

Procedia PDF Downloads 166
1321 Capacity Assessment of Kish Island in Visa Exchanging and Its Effect on Tourism Development

Authors: Leila Zarei

Abstract:

The primary objective of the 2014 Survey of The Capacity Assessment of Kish Island in Visa Exchange and its Effect of Tourism Development was to obtain more comprehensive statistical information relating to foreign tourists who aimed to renew their visa in Kish Island. Kish Island the pearl of Persian Gulf is well known as a destination for visa exchange to many alien who work and live in the country located around Persian Gulf. Foreign visitors fly to Kish with aim of visa exchange and after passing through official procedures they return back to their country of resident. The present thesis studied the subject of capacity and potential of Kish Island in visa exchange. In accordance with it a survey had been conducted in English written form of a questionnaire which was researcher's made composed of 120 questions which covers diverse aspects of the field of this study (airport, public transportation, accommodate and medical centers and travel agencies). The data collected were obtained at the airport, hotels and other places from the international tourists and covered the following items: a) the profile of the tourists (sex, age, occupation, purpose of visit, etc.) b) The Rating of services and Prices. The target population was all international tourists who master English and non Iranian. Main findings: 56% of tourists interviewed were males and 44% were females. The age of arrived tourist was 30 – 39 years with the highest percentage of 47%. The highest percentage frequencies of income belong to the 1000- 2500 Dhrs. (26%). In addition, that 50 percentage of the population was married and rest was single. Concerning the religion, 26 percent of the travelers were Muslim and 65% Christian and the rest from the other branches which all these populations reach Kish via air. The majority (56%) of visa exchangers hold diploma.

Keywords: Kish Island, tourism development, visa exchange, Iran

Procedia PDF Downloads 248
1320 Agile Smartphone Porting and App Integration of Signal Processing Algorithms Obtained through Rapid Development

Authors: Marvin Chibuzo Offiah, Susanne Rosenthal, Markus Borschbach

Abstract:

Certain research projects in Computer Science often involve research on existing signal processing algorithms and developing improvements on them. Research budgets are usually limited, hence there is limited time for implementing the algorithms from scratch. It is therefore common practice, to use implementations provided by other researchers as a template. These are most commonly provided in a rapid development, i.e. 4th generation, programming language, usually Matlab. Rapid development is a common method in Computer Science research for quickly implementing and testing new developed algorithms, which is also a common task within agile project organization. The growing relevance of mobile devices in the computer market also gives rise to the need to demonstrate the successful executability and performance measurement of these algorithms on a mobile device operating system and processor, particularly on a smartphone. Open mobile systems such as Android, are most suitable for this task, which is to be performed most efficiently. Furthermore, efficiently implementing an interaction between the algorithm and a graphical user interface (GUI) that runs exclusively on the mobile device is necessary in cases where the project’s goal statement also includes such a task. This paper examines different proposed solutions for porting computer algorithms obtained through rapid development into a GUI-based smartphone Android app and evaluates their feasibilities. Accordingly, the feasible methods are tested and a short success report is given for each tested method.

Keywords: SMARTNAVI, Smartphone, App, Programming languages, Rapid Development, MATLAB, Octave, C/C++, Java, Android, NDK, SDK, Linux, Ubuntu, Emulation, GUI

Procedia PDF Downloads 478
1319 Chatbots as Language Teaching Tools for L2 English Learners

Authors: Feiying Wu

Abstract:

Chatbots are computer programs that attempt to engage a human in a dialogue, which originated in the 1960s with MIT's Eliza. However, they have become widespread more recently as advances in language technology have produced chatbots with increasing linguistic quality and sophistication, leading to their potential to serve as a tool for Computer-Assisted Language Learning(CALL). The aim of this article is to assess the feasibility of using two chatbots, Mitsuku and CleverBot, as pedagogical tools for learning English as a second language by stimulating L2 learners with distinct English proficiencies. Speaking of the input of stimulated learners, they are measured by AntWordProfiler to match the user's expected vocabulary proficiency. Totally, there are four chat sessions as each chatbot will converse with both beginners and advanced learners. For evaluation, it focuses on chatbots' responses from a linguistic standpoint, encompassing vocabulary and sentence levels. The vocabulary level is determined by the vocabulary range and the reaction to misspelled words. Grammatical accuracy and responsiveness to poorly formed sentences are assessed for the sentence level. In addition, the assessment of this essay sets 25% lexical and grammatical incorrect input to determine chatbots' corrective ability towards different linguistic forms. Based on statistical evidence and illustration of examples, despite the small sample size, neither Mitsuku nor CleverBot is ideal as educational tools based on their performance through word range, grammatical accuracy, topic range, and corrective feedback for incorrect words and sentences, but rather as a conversational tool for beginners of L2 English.

Keywords: chatbots, CALL, L2, corrective feedback

Procedia PDF Downloads 78
1318 A Computationally Intelligent Framework to Support Youth Mental Health in Australia

Authors: Nathaniel Carpenter

Abstract:

Web-enabled systems for supporting youth mental health management in Australia are pioneering in their field; however, with their success, these systems are experiencing exponential growth in demand which is straining an already stretched service. Supporting youth mental is critical as the lack of support is associated with significant and lasting negative consequences. To meet this growing demand, and provide critical support, investigations are needed on evaluating and improving existing online support services. Improvements should focus on developing frameworks capable of augmenting and scaling service provisions. There are few investigations informing best-practice frameworks when implementing e-mental health support systems for youth mental health; there are fewer which implement machine learning or artificially intelligent systems to facilitate the delivering of services. This investigation will use a case study methodology to highlight the design features which are important for systems to enable young people to self-manage their mental health. The investigation will also highlight the current information system challenges, to include challenges associated with service quality, provisioning, and scaling. This work will propose methods of meeting these challenges through improved design, service augmentation and automation, service quality, and through artificially intelligent inspired solutions. The results of this study will inform a framework for supporting youth mental health with intelligent and scalable web-enabled technologies to support an ever-growing user base.

Keywords: artificial intelligence, information systems, machine learning, youth mental health

Procedia PDF Downloads 110
1317 Identitarian Speech in Exile by Representatives of Central Europe

Authors: Georgiana Ciobotaru

Abstract:

The experience of exile is a defining one for the mittleeuropean writers, which is also the generator of an identity discourse manifested in the plan of fiction. In exile, the authors often build their marginality in opposition to that deserted mundi center. The Polish Gombrowicz carried out his existence, for more than twenty-three years, in a geographical exile, distancing himself from his country, and, from a cultural point of view, the writing meant a possibility of escape, of plunge into a literary exile that often constituted a way of conditioning the practice of writers. He opted for one of the attitudes that a writer in exile may have, namely he preferred to continue speaking Polish, although he was far from his homeland, turning to the public in his homeland, his entire literary creation in exile being promoted through Kulturia, the Paris-based immigration magazine. The problem of exile must be constantly related to three essential aspects, namely: territory, identity and language. The exile, both the writer and his characters, displays a characteristic attitude towards the abandoned land, but also towards the adoptive, towards the mother tongue, but also towards the idiom encountered, thus proving an original manner in terms of how it asserts, de-builds or re-builds its identity. In these texts written after leaving Poland, a series of open works by Trans-Atlantic, Gombrowicz assumes and internalizes the inadequacy between his self and the reality outside to make it the principle of his perception of the world. The expression of marginality that characterized the texts developed when the writer was still in Poland seems to acquire a certain coherence against the background of a logic imposed on the new experience, namely that of exile. Texts created during his exile in Argentina appear in a different context, in other words, in a situation of inadequacy towards the world: ignorance of the language, poverty, isolation that characterizes especially the first years spent there. This study aims to highlight how the Polish author de-builds and reconstructs his Mittel-European identity profile through language.

Keywords: discourse, exile, identity, immigration

Procedia PDF Downloads 139
1316 Study of the Polymer Elastic Behavior in the Displacement Oil Drops at Pore Scale

Authors: Luis Prada, Jose Gomez, Arlex Chaves, Julio Pedraza

Abstract:

Polymeric liquids have been used in the oil industry, especially at enhanced oil recovery (EOR). From the rheological point of view, polymers have the particularity of being viscoelastic liquids. One of the most common and useful models to describe that behavior is the Upper Convected Maxwell model (UCM). The main characteristic of the polymer used in EOR process is the increase in viscosity which pushes the oil outside of the reservoir. The elasticity could contribute in the drag of the oil that stays in the reservoir. Studying the elastic effect on the oil drop at the pore scale, bring an explanation if the addition of elastic force could mobilize the oil. This research explores if the contraction and expansion of the polymer in the pore scale may increase the elastic behavior of this kind of fluid. For that reason, this work simplified the pore geometry and build two simple geometries with micrometer lengths. Using source terms with the user define a function this work introduces the UCM model in the ANSYS fluent simulator with the purpose of evaluating the elastic effect of the polymer in a contraction and expansion geometry. Also, using the Eulerian multiphase model, this research considers the possibility that extra elastic force will show a deformation effect on the oil; for that reason, this work considers an oil drop on the upper wall of the geometry. Finally, all the simulations exhibit that at the pore scale conditions exist extra vortices at UCM model but is not possible to deform the oil completely and push it outside of the restrictions, also this research find the conditions for the oil displacement.

Keywords: ANSYS fluent, interfacial fluids mechanics, polymers, pore scale, viscoelasticity

Procedia PDF Downloads 132
1315 Dental Education in Brazil: A Systematic Literature Review

Authors: Fabiane Alves Farias Guimarães, Rodrigo Otávio Moretti-Pires, Ana Lúcia Schaefer Ferreira de Mello

Abstract:

Introduction: Considering the last changes in Brazilian Health and Higher Educational Systems, the production of scientific knowledge regarding dental education and training has been increasing. The National Curriculum Guidelines for undergraduate courses in Dentistry established in 2002 the principles and procedures to perform a more generalist dental professional profile. Objectives: To perform a systematic review of the Brazilian scientific literature about dental education and training. Methods: The systematic review was conducted considering the Lilacs - Latin American Literature in Health Sciences and SciELO - Scientific Electronic Library Online data bases, using the combination of key words dentistry, education, teaching or training. It was select original research articles, published between 2010 and 2013, in Portuguese. Results: Based on the selection criteria, it was found 23 articles. In order to organize the outcomes, the analysis was separated in three themes: Ethical aspects of education (3 articles), integrating dental service with training (10 articles) and Dental education and the Brazilian curriculum guidelines (10 articles). Most of the studies were published between 2011 and 2012 (35% each) and were held in public universities. The studied populations included dental students, teachers, universities directors, health managers and dentists. The qualitative methodological approach was predominant. Conclusion: It was possible to identify a transience time in Brazilian undergraduate courses in Dentistry after curricular changes. The produced literature shows some advances, as the incorporation of ethical values on dental education and the inclusion of new practices environments for students by integrating education and training in diversified dental services scenarios.

Keywords: Teaching, Dental Students, Human resources in dentistry

Procedia PDF Downloads 532
1314 Innovation and Employment in Sub-Saharan Africa: Evidence from Uganda Microdata

Authors: Milton Ayoki, Edward Bbaale

Abstract:

This paper analyses the relationship between innovation and employment at firm level with the objective of understanding the contribution of the different innovation strategies in fostering employment growth in Uganda. We use National Innovation Survey (micro-data of 705 Ugandan firms) for the period 2011-2014 and follow closely Harrison et al. (2014) structured approach, and relate employment growth to process innovations and to the growth of sales separately due to innovative and unchanged products. We find positive effects of product innovation on employment at firm level, while process innovation has no discernable impact on employment. Although there is evidence to suggest displacement of labour in some cases where firms only introduce new process, this effect is compensated by growth in employment from new products, which for most firms are introduced simultaneously with new process. Results suggest that source of innovation as well as size of innovating firms or end users of innovation matter for job growth. Innovation that develops from within the firm itself (user) and involving larger firms has greater impact on employment than that developed from outside or coming from within smaller firms. In addition, innovative firms are one and half times more likely to survive in the innovation driven economy environment than those that do not innovate. These results have important implications for policymakers and stakeholders in innovation ecosystem. Supporting policies need to be correctly tailored since the impacts depend on the innovation strategy (type) and characteristics and sector of the innovative firms (small, large, industry, etc.). Policies to spur investment, particularly in innovative sectors and firms with high growth potential would have long lasting effects on job creation. JEL Classification: D24, J0, J20, L20, O30.

Keywords: employment, process innovation, product innovation, Sub-Saharan Africa

Procedia PDF Downloads 171
1313 Gender and Language: Exploring Sociolinguistic Differences

Authors: Marvelyn F. Carolino, Charlene R. Cunanan, Gellien Faith O. Masongsong, Berlinda A. Ofrecio

Abstract:

This study delves into the language usage differences among men, women, and individuals with other gender preferences. It specifically centers on the sociolinguistic aspects within the English majors at the College of Education of Rizal Technological University-Pasig, spanning from the first-year to fourth-year levels. The researchers employed a triangulation approach for data collection, utilizing a validated self-made questionnaire, interviews, and observations. The results revealed that language usage among different genders is influenced by a combination of cultural norms, social dynamics, and technological factors. Cultural norms significantly shape how respondents use language, as they conform to expected speech patterns based on their gender. Social factors, such as peer pressure, were found to impact language usage for individuals of all genders. This influence was viewed as constructive for personal development rather than inhibiting performance or communication. In terms of technological factors, respondents strongly agreed that the time spent on social media and educational applications influenced their language use. These platforms provided opportunities to expand and enhance their vocabulary. Additionally, the study employed hypothesis testing through the z-test formula to assess the impact of demographic profiles on language usage differences among genders. The results indicated that gender, economic status, locality, and ethnicity did not show statistically significant differences in language use. This lack of significant variation in findings was attributed to the relatively homogeneous demographic profile of respondents, primarily composed of females with low-income backgrounds and Tagalog ethnicity. This demographic similarity likely minimized the diversity of responses.

Keywords: gender, language, sociolinguistics, differences

Procedia PDF Downloads 100
1312 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 95