Search results for: Yuan George Shan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 688

Search results for: Yuan George Shan

328 A Breakthrough Improvement Brought by Taxi-Calling APPs for Taxi Operation Level

Authors: Yuan-Lin Liu, Ye Li, Tian Xia

Abstract:

Taxi-calling APPs have been used widely, while brought both benefits and a variety of issues for the taxi market. Many countries do not know whether the benefits are remarkable than the issues or not. This paper established a comparison between the basic scenario (2009-2012) and a taxi-calling software usage scenario (2012-2015) to explain the impact of taxi-calling APPs. The impacts of taxi-calling APPs illustrated by the comparison results are: 1) The supply and demand distribution is more balanced, extending from the city center to the suburb. The availability of taxi service has been improved in low density areas, thin market attribute has also been improved; 2)The ratio of short distance taxi trip decreased, long distance service increased, the utilization of mileage increased, and the rate of empty decreased; 3) The popularity of taxi-calling APPs was able to reduce the average empty distance, cruise time, empty mileage rate and average times of loading passengers, can also enhance the average operating speed, improve the taxi operating level, and reduce social cost although there are some disadvantages. This paper argues that the taxi industry and government can establish an integrated third-party credit information platform based on credit evaluated by the data of the drivers’ driving behaviors to supervise the drivers. Taxi-calling APPs under fully covered supervision in the mobile Internet environment will become a new trend.

Keywords: taxi, taxi-calling APPs, credit, scenario comparison

Procedia PDF Downloads 227
327 Urban Renewal from the Perspective of Industrial Heritage Protection: Taking the Qiaokou District of Wuhan as an Example

Authors: Yue Sun, Yuan Wang

Abstract:

Most of the earliest national industries in Wuhan are located along the Hanjiang River, and Qiaokou is considered to be a gathering place for Dahankou old industrial base. Zongguan Waterworks, Pacific Soap Factory, Fuxin Flour Factory, Nanyang Tobacco Factory and other hundred-year-old factories are located along Hanjiang River in Qiaokou District, especially the Gutian Industrial Zone, which was listed as one of 156 national restoration projects at the beginning of the founding of the People’s Republic of China. After decades of development, Qiaokou has become the gathering place of the chemical industry and secondary industry, causing damage to the city and serious pollution, becoming a marginalized area forgotten by the central city. In recent years, with the accelerated pace of urban renewal, Qiaokou has been constantly reforming and innovating, and has begun drastic changes in the transformation of old cities and the development of new districts. These factories have been listed as key reconstruction projects, and a large number of industrial heritage with historical value and full urban memory have been relocated, demolished and reformed, with only a few factory buildings preserved. Through the methods of industrial archaeology, image analysis, typology and field investigation, this paper analyzes and summarizes the spatial characteristics of industrial heritage in Qiaokou District, explores urban renewal from the perspective of industrial heritage protection, and provides design strategies for the regeneration of urban industrial sites and industrial heritage.

Keywords: industrial heritage, urban renewal, protection, urban memory

Procedia PDF Downloads 115
326 Integrated Evaluation of Green Design and Green Manufacturing Processes Using a Mathematical Model

Authors: Yuan-Jye Tseng, Shin-Han Lin

Abstract:

In this research, a mathematical model for integrated evaluation of green design and green manufacturing processes is presented. To design a product, there can be alternative options to design the detailed components to fulfill the same product requirement. In the design alternative cases, the components of the product can be designed with different materials and detailed specifications. If several design alternative cases are proposed, the different materials and specifications can affect the manufacturing processes. In this paper, a new concept for integrating green design and green manufacturing processes is presented. A green design can be determined based the manufacturing processes of the designed product by evaluating the green criteria including energy usage and environmental impact, in addition to the traditional criteria of manufacturing cost. With this concept, a mathematical model is developed to find the green design and the associated green manufacturing processes. In the mathematical model, the cost items include material cost, manufacturing cost, and green related cost. The green related cost items include energy cost and environmental cost. The objective is to find the decisions of green design and green manufacturing processes to achieve the minimized total cost. In practical applications, the decision-making can be made to select a good green design case and its green manufacturing processes. In this presentation, an example product is illustrated. It shows that the model is practical and useful for integrated evaluation of green design and green manufacturing processes.

Keywords: supply chain management, green supply chain, green design, green manufacturing, mathematical model

Procedia PDF Downloads 773
325 Risk Management in Industrial Supervision Projects

Authors: Érick Aragão Ribeiro, George André Pereira Thé, José Marques Soares

Abstract:

Several problems in industrial supervision software development projects may lead to the delay or cancellation of projects. These problems can be avoided or contained by using identification methods, analysis and control of risks. These procedures can give an overview of the possible problems that can happen in the projects and what are the immediate solutions. Therefore, we propose a risk management method applied to the teaching and development of industrial supervision software. The method is developed through a literature review and previous projects can be divided into phases of management and have basic features that are validated with experimental research carried out by mechatronics engineering students and professionals. The management is conducted through the stages of identification, analysis, planning, monitoring, control and communication of risks. Programmers use a method of prioritizing risks considering the gravity and the possibility of occurrence of the risk. The outputs of the method indicate which risks occurred or are about to happen. The first results indicate which risks occur at different stages of the project and what risks have a high probability of occurring. The results show the efficiency of the proposed method compared to other methods, showing the improvement of software quality and leading developers in their decisions. This new way of developing supervision software helps students identify design problems, evaluate software developed and propose effective solutions. We conclude that the risk management optimizes the development of the industrial process control software and provides higher quality to the product.

Keywords: supervision software, risk management, industrial supervision, project management

Procedia PDF Downloads 326
324 Performance Analysis of Air-Tunnel Heat Exchanger Integrated into Raft Foundation

Authors: Chien-Yeh Hsu, Yuan-Ching Chiang, Zi-Jie Chien, Sih-Li Chen

Abstract:

In this study, a field experiment and performance analysis of air-tunnel heat exchanger integrated with water-filled raft foundation of residential building were performed. In order to obtain better performance, conventional applications of air-tunnel inevitably have high initial cost or issues about insufficient installation space. To improve the feasibility of air tunnel heat exchanger in high-density housing, an integrated system consisting of air pipes immersed in the water-filled raft foundation was presented, taking advantage of immense amount of water and relatively stable temperature in raft foundation of building. The foundation-integrated air tunnel was applied to a residential building located in Yilan, Taiwan, and its thermal performance was measured in the field experiment. The results indicated that the cooling potential of integrated system was close to the potential of soil-based EAHE at 2 m depth or deeper. An analytical model based on thermal resistance method was validated by measurement results, and was used to carry out the dimensioning of foundation-integrated air tunnel. The discrepancies between calculated value and measured data were less than 2.7%. In addition, the return-on-investment with regard to thermal performance and economics of the application was evaluated. Because the installation for air tunnel is scheduled in the building foundation construction, the utilization of integrated system spends less construction cost compare to the conventional earth-air tunnel.

Keywords: air tunnel, ground heat exchanger, raft foundation, residential building

Procedia PDF Downloads 296
323 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 117
322 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 56
321 The Comparative Study of the Characteristics of Chinese and Foreign Excellent Woman’s Single Players’ Serve, Receive Tactic Author

Authors: Zhai Yuan, Wu Xueqing

Abstract:

This article statistics the technology which used by Chinese and foreign excellent players in the game, including types and serves areas,receive technology and effect and utilization ratio receiving and losing points. The sample is che videos which is world's top matches of excellent badminton athletes of che single, including Chinese players’ 43 games and foreign players’ 38 games. Conclusion: For the serving, Chinese and foreign single players are to give priority to forehand short-low serve and the long-high serve. And Chinese and foreign players in using forehand short-low serve and drive server exist significant differences; For the serves areas, Chinese and foreign players serve area is concentrated in area 1,5,6. Area 6 has the highest rate of all the district areas, following by the area 1and area 5. Among the 2ed serve area Sino-foreign player, there exist significant differences; In the receiver, when returning the frontcourt shutter, players is given priority to net lift and push. When returning the backcourt shutter, receiver's the best ball is smash, followed by clear and drop shot. Foreign players have higher utilization rate in smash than Chinese players in the backcourt; In the receiver result, Chinese players give priority to actively and equally situation than foreign players, but in negatively receiving is just opposite.

Keywords: badminton, woman’s singles, technique and tactics, comparative analysis

Procedia PDF Downloads 502
320 Using the Technological, Pedagogical, and Content Knowledge (TPACK) Model to Address College Instructors Weaknesses in Integration of Technology in Their Current Area Curricula

Authors: Junior George Martin

Abstract:

The purpose of this study was to explore college instructors’ integration of technology in their content area curriculum. The instructors indicated that they were in need of additional training to successfully integrate technology in their subject areas. The findings point to the implementation of a proposed the Technological, Pedagogical, and Content Knowledge (TPACK) model professional development workshop to satisfactorily address the weaknesses of the instructors in technology integration. The professional development workshop is proposed as a rational solution to adequately address the instructors’ inability to the successful integration of technology in their subject area in an effort to improve their pedagogy. The intense workshop would last for 5 days and will be designed to provide instructors with training in areas such as a use of technology applications and tools, and using modern methodologies to improve technology integration. Exposing the instructors to the specific areas identified will address the weaknesses they demonstrated during the study. Professional development is deemed the most appropriate intervention based on the opportunities it provides the instructors to access hands-on training to overcome their weaknesses. The purpose of the TPACK professional development workshop will be to improve the competence of the instructors so that they are adequately prepared to integrate technology successfully in their curricula. At the end of the period training, the instructors are expected to adopt strategies that will have a positive impact on the learning experiences of the students.

Keywords: higher education, modern technology tools, professional development, technology integration

Procedia PDF Downloads 289
319 Initiating Learning to Know among Fishers for Sustainable Fishery on Lake Victoria. A Case of Kigungu Fishing Ground Wakiso District

Authors: Namubiru Zula, Aganyira Kelle, Van der Linden Josje, Openjuru George Laadah

Abstract:

Learning to know is a key principle to lifelong learning, with self-direction as the cornerstone. This study sought to initiate self-direction for lifelong learning through social constructivism among fishers; with the major goal of creating a community of fishers who continuously learn from each other for sustainable fishing. Government of Uganda has instituted several mechanisms like co-management with Beach Management Unit (BMU) System against illegal fishing. However, illegal fishing persists, there is reduced fish stocks with several outcry on how fishers are handled. Some studies have indicated that it’s the poor orientation of BMU leaders and fishers which are top down. This initial engagement of fishers was conducted through a meeting and use of stake holder’s analysis tool to discuss the relevance of the study; harnessing fishers’ knowledge for sustainable fisheries on Lake Victoria, its objectives, the key stake holders to enable them fish sustainably. It revealed initial attempt to learn from each other and learning to know among fishers, with some elements of self-direction. However, fishers attempt to learning and self-direction are affected by prior brutal enforcement experiences. This meeting led to fishers gain some sense of hope towards enforcement brutality. The key stakeholders highlighted include MAAIF, FAO, UNBS, NaFIRRI, LVFO, BMU, UFPEA, Fishers m employers, Fisheries Protection Unit, GIZ, and any Non-Government organization but declined the Association of Fisheries and Lake Users in Uganda.

Keywords: self direction, lifelong learning, social constructivism, sustainable fishing

Procedia PDF Downloads 57
318 Measures of Phylogenetic Support for Phylogenomic and the Whole Genomes of Two Lungfish Restate Lungfish and Origin of Land Vertebrates

Authors: Yunfeng Shan, Xiaoliang Wang, Youjun Zhou

Abstract:

Whole-genome data from two lungfish species, along with other species, present a valuable opportunity to reassess the longstanding debate regarding the evolutionary relationships among tetrapods, lungfishes, and coelacanths. However, the use of bootstrap support has become outdated for large-scale phylogenomic data. Without robust phylogenetic support, the phylogenetic trees become meaningless. Therefore, it is necessary to re-evaluate the phylogenies of tetrapods, lungfishes, and coelacanths using novel measures of phylogenetic support specifically designed for phylogenomic data, as the previous phylogenies were based on 100% bootstrap support. Our findings consistently provide strong evidence favoring lungfish as the closest living relative of tetrapods. This conclusion is based on high gene support confidence with confidence intervals exceeding 95%, high internode certainty, and high gene concordance factor. The evidence stems from two datasets containing recently deciphered whole genomes of two lungfish species, as well as five previous datasets derived from lungfish transcriptomes. These results yield fresh insights into the three hypotheses regarding the phylogenies of tetrapods, lungfishes, and coelacanths. Importantly, these hypotheses are not mere conjectures but are substantiated by a significant number of genes. Analyzing real biological data further demonstrates that the inclusion of additional taxa diminishes the number of orthologues and leads to more diverse tree topologies. Consequently, gene trees and species trees may not be identical even when whole-genome sequencing data is utilized. However, it is worth noting that many gene trees can accurately reflect the species tree if an appropriate number of taxa, typically ranging from six to ten, are sampled. Therefore, it is crucial to carefully select the number of taxa and an appropriate outgroup while excluding fast-evolving taxa as outgroups to mitigate the adverse effects of long-branch attraction (LBA) and achieve an accurate reconstruction of the species tree. This is particularly important as more whole-genome sequencing data becomes available.

Keywords: gene support confidence (GSC), origin of land vertebrates, coelacanth, two whole genomes of lungfishes, confidence intervals

Procedia PDF Downloads 49
317 A Concept Analysis of Self-Efficacy for Cancer Pain Management

Authors: Yi-Fung Lin, Yuan-Mei Liao

Abstract:

Background: Pain is common among patients with cancer and is also one of the most disturbing symptoms. As this suffering is subjective, if patients proactively participate in their pain self-management, pain could be alleviated effectively. However, not everyone can carry out self-management very well because human behavior is a product of the cognition process. In this process, we can see that "self-efficacy" plays an essential role in affecting human behaviors. Methods: We used the eight steps of concept analysis proposed by Walker and Avant to clarify the concept of “self-efficacy for cancer pain management.” A comprehensive literature review was conducted for relevant publications that were published during the period of 1977 to 2021. We used several keywords, including self-efficacy, self-management, concept analysis, conceptual framework, and cancer pain, to search the following databases: PubMed, CINAHL, Web of Science, and Embase. Results: We identified three defining attributes for the concept of self-efficacy for cancer pain management, including pain management abilities, confidence, and continuous pain monitoring, and recognized six skills related to pain management abilities: problem-solving, decision-making, resource utilization, forming partnerships between medical professionals and patients, planning actions, and self-regulation. Five antecedents for the concept of self-efficacy for cancer pain management were identified: pain experience, existing cancer pain, pain-related knowledge, a belief in pain management, and physical/mental state. Consequences related to self-efficacy for cancer pain management were achievement of pain self-management, well pain control, satisfying quality of life, and containing motivation. Conclusions: This analysis provides researchers with a clearer understanding of the concept of “self-efficacy for cancer pain management.” The findings presented here provide a foundation for future research and nursing interventions to enhance self-efficacy for cancer pain management.

Keywords: cancer pain, concept analysis, self-efficacy, self-management

Procedia PDF Downloads 36
316 Investigating Citizens’ Perceptions and Attitudes toward China’s National Determined Contribution's Energy Restructuring Plan in Linfen City

Authors: Yuan Zhao, Phimsupha Kokchang

Abstract:

As a responsible nation, China has outlined its Nationally Determined Contributions (NDCs) of reaching peak carbon by 2030 and carbon neutrality by 2060. Peak and carbon neutrality are tough goals to achieve, and China must undertake a shift to green energy. In contrast, China's existing energy consumption structure is unsustainable and heavily dependent on coal supplies. China must revise its energy mix planning in order to strengthen energy security and satisfy the requirement for low-carbon energy generation to mitigate climate change. Shanxi Province is one of China's most important coal-producing regions, and Linfen is one of the province's key economic towns. However, Shanxi Province's economic development is severely hampered by the region's high levels of pollution and energy consumption. The purpose of this study is to investigate Linfen citizens' perceptions and attitudes toward China's NDC's energy restructuring plan through questionnaires. The majority of respondents were aware of China's NDCs, as indicated by 402 valid responses to an online questionnaire. Furthermore, respondents' perceptions and attitudes toward renewable energy initiatives are growing. To ensure that the results were dependable and consistent, reliability and validity were examined. According to the findings, the majority of Linfen's citizens believe that renewable energy projects such as solar and wind, which are consistent with China's NDCs, may improve their quality of life, public health, and the nation's economy.

Keywords: China’s NDC, perceptions, attitudes, Linfen, energy restructuring

Procedia PDF Downloads 52
315 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 144
314 Factors Influencing the Uptake of Family Planning Services among Young People (18-24 Years) at Community Level in Rural Budaka District, Uganda

Authors: Mathew Nyashanu, George K. Kiggundu, Mandu S. Ekpenyong

Abstract:

There is an increased number of young people engaging in early sexual relationships worldwide. Furthermore, statistics for early pregnancy among young people have also increased, especially in low and middle-income countries. This has health implications for both the parents and the baby. High uptake in family planning contraception among young people can reduce early pregnancy and subsequent negative health outcomes on the young parents and the baby. This study was set to explore the factors influencing the uptake of family planning contraceptive services among young people (18-24 years) at a community level in rural Budaka district, Uganda. The study utilised an explorative qualitative approach. The study found out that religion, partner resistance; perceived loss of libido, perceived barren, long waiting time and distance from the health facility, lack of privacy/confidentiality, excessive menstrual bleeding, cancer, and fear of having disabled babies, limited the utilisation of family planning contraceptive services while contraception as HIV prevention and child spacing encouraged young people to use family planning contraceptive services. There is a need for a culturally orientated community-based contraceptive health promotion approach to increase the uptake of family planning contraception services among young people.

Keywords: Young people, Family Planning, Contraceptives, Black sub-Sahara African

Procedia PDF Downloads 106
313 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 252
312 Propranalol is Not Effective in Preventing the Progression to Severe Portal Hypertensive Gastropathy in Cirrhotic Patients who Had Undergone Variceal Eradication: A Randomised Controlled Trial

Authors: Jeffey George, Varghese Thomas

Abstract:

Background and Objectives: PHG is an important source of gastrointestinal bleeding in patients with portal hypertension. Aim: To assess the progression to severe portal hypertensive gastropathy(PHG) in patients with cirrhosis who were treated with maximum tolerated dose of propranalol, after variceal eradication to grade II or below. Methods: Cirrhotic patients(child A and B) presenting with upper gastrointestinal bleeding with endoscopic findings of mild or no PHG were followed up over 6 months after variceal eradication to assess the progression to severe PHG. Included patients were randomised to either maximum tolerated doses of propranalol (group A) or to no treatment (group B). Primary end point of the study were the development of gastrointestinal bleed, evidence of hepatic decompensation and death. Progression to severe PHG were compared between the two groups. Results: 56 patients (49 males) were enrolled (group A = 28, group B = 28). 8 patients were excluded from final analysis (gi bleed=5, encephalopathy=2,HCC=1 including 4 deaths).3 patients were lost to follow-up, and 1 developed intolerance to propranalol. Mean dose of propranalol used was 60 mg per day. Progression to severe PHG in the fundus over 6 months was 23.8% in group A versus 15.8 % in group B (p = 0.52). Severe PHG was noted in body in 14.3% in group A versus 21.1% in group B (p = 0.57). 23.8 % in group A had progression to severe PHG compared with 15.8 % in group B (p =0.52). There was no statistically significant difference in the progression of PHG between the two groups(p=0.43). Conclusion: In this short term study propranalol was found not to prevent the progression to severe portal hypertensive gastropathy in cirrhotic patients who had undergone endotherapy for esophageal varices.

Keywords: propranalol, portal hypertensive gastropathy, cirrhotic patients, gastroenterology

Procedia PDF Downloads 318
311 Short and Long Term Effects of an Attachment-Based Intervention on Child Behaviors

Authors: Claire Baudry, Jessica Pearson, Laura-Emilie Savage, George Tarbulsy

Abstract:

Over the last fifty years, maternal sensitivity and child development among vulnerable families have been a priority for researchers. For this reason, attachment-based interventions have been implemented and been shown to be effective in enhancing child development. Most of the time, child outcomes are measured shortly after the intervention. Objectives: The goal of the study was to investigate the effects of an attachment-based intervention on child development shortly after the intervention ended and one-year post-intervention. Methods: Over the seventy-two mother-child dyads referred by Child Protective Services in the province of Québec, Canada, forty-two were included in this study: 24 dyads who received 6 to 8 intervention sessions and 18 dyads who did not. Intervention and none intervention dyads were matched for the following variables: duration of child protective services, the reason for involvement with child protection, age, sex, and family status. Internalizing and externalizing behaviors were measured 3 and 12 months after the end of the intervention when the average age of children were respectively 45 and 54 months old. Findings: Independent-sample t-tests were conducted to compare scores between the two groups and the two data collection times. In general, on differences observed between the two groups three months after the intervention ended, just a few of them were still present nine months later. Conclusions: This first set of analyses suggests that the effects of attachment-based intervention observed three months following the intervention are not lasting for most of them. Those results inform us of the importance of considering the possibility to offer more attachment-based intervention sessions for those highly vulnerable families.

Keywords: attachment-based intervention, child behaviors, child protective services, highly vulnerable families

Procedia PDF Downloads 101
310 Temperament as a Success Determinant in Formative Assessment

Authors: George Fomunyam Kehdinga

Abstract:

Assessment is a vital part of the educational process, and formative assessment is a way of ensuring that higher education achieves the desired effects. Different factors influence how students perform in assessments in general, and formative assessment in particular and temperament is one of such determining factors. This paper which is a qualitative case study of four universities in four different countries examines how the temperamental make up of students either empowers them to perform excellently in formative assessment or incapacitates their performance. These four universities were chosen from Cameroon, South Africa, United Kingdom and the United States of America and three students were chosen from each institution, six of which were undergraduate student and six postgraduate students. Data in this paper was generated through qualitative interviews and document analyses which was preceded by a temperament test. From the data generated, it was discovered that cholerics who are natural leaders, hence do not struggle to express themselves often perform excellently in formative assessment while sanguines on the other hand who are also extroverts like cholerics perform relatively well. Phlegmatics and melancholics performed averagely and poorly respectively in formative assessment because they are naturally prone to fear and hate such activities because they like keeping to themselves. The paper, therefore, suggest that temperament is a success determinant in formative assessment. It also proposes that lecturers need and understanding of temperaments to be able to fully administer formative assessment in the lecturer room. It also suggests that assessment should be balance in the classroom so that some students because of their temperamental make-up are not naturally disadvantaged while others are performing excellently. Lastly, the paper suggests that since formative assessment is a process of generating data, it should be contextualised or given and individualised approach so as to ensure that trustworthy data is generated.

Keywords: temperament, formative assessment, academic success, students

Procedia PDF Downloads 227
309 Soil and the Gut Microbiome: Supporting the 'Hygiene Hypothesis'

Authors: Chris George, Adam Hamlin, Lily Pereg, Richard Charlesworth, Gal Winter

Abstract:

Background: According to the ‘hygiene hypothesis’ the current rise in allergies and autoimmune diseases stems mainly from reduced microbial exposure due, amongst other factors, to urbanisation and distance from soil. However, this hypothesis is based on epidemiological and not biological data. Useful insights into the underlying mechanisms of this hypothesis can be gained by studying our interaction with soil. Soil microbiota may be directly ingested or inhaled by humans, enter the body through skin-soil contact or using plants as vectors. This study aims to examine the ability of soil microbiota to colonise the gut, study the interaction of soil microbes with the immune system and their potential protective activity. Method: The nutrition of the rats was supplemented daily with fresh or autoclaved soil for 21 days followed by 14 days of no supplementations. Faecal samples were collected throughout and analysed using 16S sequencing. At the end of the experiment rats were sacrificed and tissues and digesta were collected. Results/Conclusion: Results showed significantly higher richness and diversity following soil supplementation even after recovery. Specific soil microbial groups identified as able to colonise the gut. Of particular interest was the mucosal layer which emerged as a receptive host for soil microorganisms. Histological examination revealed innate and adaptive immune activation. Findings of this study reinforce the ‘hygiene hypothesis’ by demonstrating the ability of soil microbes to colonise the gut and activate the immune system. This paves the way for further studies aimed to examine the interaction of soil microorganisms with the immune system.

Keywords: gut microbiota, hygiene hypothesis, microbiome, soil

Procedia PDF Downloads 221
308 Patterns of Sustainable Financial Incentives Utilisation among Fashion Design Entrepreneurs in Nigeria

Authors: O. B. Urhibo, D. Imhonopi, T. George

Abstract:

The global rate of decline in entrepreneurial activities, and the prevalence in Africa, especially Nigeria, is more worrisome. In recent times, these problems, such as the lack of accessibility and utilization of financial incentives needed to promote entrepreneurial activities, have led to a decrease in entrepreneurial activities. The causes of the decline have been evaluated from a different perspective and have further confirmed the relevance and need for the sustainability of the Fashion industry. With the increasing rate of unemployment and poverty in Nigeria and the literature gap in the social context, this study investigated the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria through a qualitative approach. The Eastern part of Nigeria was considered in this study because of the high rate of market activity for textile and clothing firms. Specifically, Delta state was considered in this study. A purposive sampling technique was used to select key informants consisting of twelve (12) executives of the associations (i.e., Fashion Designer & Exhibitors Association, Delta Fashion Designers, and Fashion Designers Association of Nigeria for the interview sessions. Four themes emanate from the thematic analysis -lack of sufficient collateral, difficulties and duration of loan application processes, unacceptable business proposal/plan, and the absence of audited financial accounts were found to be the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria. The promotion of sustainable patterns and supports has been suggested to reduce the challenges of sustainable financial incentives utilisation among fashion design entrepreneurs.

Keywords: entrepreneurship, fashion design, financial incentives, patterns, sustainability, utilisation

Procedia PDF Downloads 49
307 Hybrid Energy Harvesting System with Energy Storage Management

Authors: Lucian Pîslaru-Dănescu, George-Claudiu Zărnescu, Laurențiu Constantin Lipan, Rareș-Andrei Chihaia

Abstract:

In recent years, the utilization of supercapacitors for energy storage (ES) devices that are designed for energy harvesting (EH) applications has increased substantially. The use of supercapacitors as energy storage devices in hybrid energy harvesting systems allows the miniaturization of electronic structures for energy storage. This study is concerned with the concept of energy management capacitors – supercapacitors and the new electronic structures for energy storage used for energy harvesting devices. Supercapacitors are low-voltage devices, and electronic overvoltage protection is needed for powering the source. The power management device that uses these proposed new electronic structures for energy storage is better than conventional electronic structures used for this purpose, like rechargeable batteries, supercapacitors, and hybrid systems. A hybrid energy harvesting system with energy storage management is able to simultaneously use several energy sources with recovery from the environment. The power management device uses a summing electronic block to combine the electric power obtained from piezoelectric composite plates and from a photovoltaic conversion system. Also, an overvoltage protection circuit used as a voltage detector and an improved concept of charging supercapacitors is presented. The piezoelectric composite plates are realized only by pressing two printed circuit boards together without damaging or prestressing the piezoceramic elements. The photovoltaic conversion system has the advantage that the modules are covered with glass plates with nanostructured film of ZnO with the role of anti-reflective coating and to improve the overall efficiency of the solar panels.

Keywords: supercapacitors, energy storage, electronic overvoltage protection, energy harvesting

Procedia PDF Downloads 38
306 Commercialization of Research Outputs in Kenyan Universities

Authors: John Ayisi, Gideon M. Kivengea, George A. Ombakho

Abstract:

In this emerging era of knowledge economy, universities, as major centres of learning and research, are becoming increasingly important as sources of ideas, knowledge, skills, innovation and technological advances. These ideas can be turned into new products, processes and systems needed to drive their respective national economies, and thus placing universities at the centre of the national innovation systems. Thus, commercialization of research outputs from universities to industry has become an area of strong policy interest in African countries. To assess the level of commercialization of research outputs in Kenyan universities, a standardized questionnaire covering seven sub-sections, namely: University Commercialization Environment, Management of Commercialization Activities, Commercialization Office, Intellectual Property Rights (IPRs), Early Stage Financing and Venture Capital; Industrial Linkages; and Technology Parks and Incubators was administered among a few selected public and private universities. Results show that all the universities have a strategic plan; though not all have innovation and commercialization as part of it. Half the nineteen surveyed universities indicated they have created designated offices for fostering commercialization. Majority have guidelines on IPRs which advocate IP to be co-owned by researcher/university. University-industry linkages are weak. Most universities are taking precursory steps to incentivise and encourage entrepreneurial activities among their academic staff and students, even though the level of resources devoted to them is low. It is recommended that building capacity in entrepreneurship among staff and students and committing more resources to R&D activities hold potential to increased commercialization of university research outputs.

Keywords: commercialization, knowledge, R&D, university

Procedia PDF Downloads 400
305 A 3D Bioprinting System for Engineering Cell-Embedded Hydrogels by Digital Light Processing

Authors: Jimmy Jiun-Ming Su, Yuan-Min Lin

Abstract:

Bioprinting has been applied to produce 3D cellular constructs for tissue engineering. Microextrusion printing is the most common used method. However, printing low viscosity bioink is a challenge for this method. Herein, we developed a new 3D printing system to fabricate cell-laden hydrogels via a DLP-based projector. The bioprinter is assembled from affordable equipment including a stepper motor, screw, LED-based DLP projector, open source computer hardware and software. The system can use low viscosity and photo-polymerized bioink to fabricate 3D tissue mimics in a layer-by-layer manner. In this study, we used gelatin methylacrylate (GelMA) as bioink for stem cell encapsulation. In order to reinforce the printed construct, surface modified hydroxyapatite has been added in the bioink. We demonstrated the silanization of hydroxyapatite could improve the crosslinking between the interface of hydroxyapatite and GelMA. The results showed that the incorporation of silanized hydroxyapatite into the bioink had an enhancing effect on the mechanical properties of printed hydrogel, in addition, the hydrogel had low cytotoxicity and promoted the differentiation of embedded human bone marrow stem cells (hBMSCs) and retinal pigment epithelium (RPE) cells. Moreover, this bioprinting system has the ability to generate microchannels inside the engineered tissues to facilitate diffusion of nutrients. We believe this 3D bioprinting system has potential to fabricate various tissues for clinical applications and regenerative medicine in the future.

Keywords: bioprinting, cell encapsulation, digital light processing, GelMA hydrogel

Procedia PDF Downloads 149
304 Observation of the Orthodontic Tooth's Long-Term Movement Using Stereovision System

Authors: Hao-Yuan Tseng, Chuan-Yang Chang, Ying-Hui Chen, Sheng-Che Chen, Chih-Han Chang

Abstract:

Orthodontic tooth treatment has demonstrated a high success rate in clinical studies. It has been agreed upon that orthodontic tooth movement is based on the ability of surrounding bone and periodontal ligament (PDL) to react to a mechanical stimulus with remodeling processes. However, the mechanism of the tooth movement is still unclear. Recent studies focus on the simple principle compression-tension theory while rare studies directly measure tooth movement. Therefore, tracking tooth movement information during orthodontic treatment is very important in clinical practice. The aim of this study is to investigate the mechanism responses of the tooth movement during the orthodontic treatments. A stereovision system applied to track the tooth movement of the patient with the stamp brackets. The system was established by two cameras with their relative position calibrate. And the orthodontic force measured by 3D printing model with the six-axis load cell to determine the initial force application. The result shows that the stereovision system accuracy revealed the measurement presents a maximum error less than 2%. For the study on patient tracking, the incisor moved about 0.9 mm during 60 days tracking, and half of movement occurred in the first few hours. After removing the orthodontic force in 100 hours, the distance between before and after position incisor tooth decrease 0.5 mm consisted with the release of the phenomenon. Using the stereovision system can accurately locate the three-dimensional position of the teeth and superposition of 3D coordinate system for all the data to integrate the complex tooth movement.

Keywords: orthodontic treatment, tooth movement, stereovision system, long-term tracking

Procedia PDF Downloads 392
303 Characterization of Bacteriophage for Biocontrol of Pseudomonas syringae, Causative Agent of Canker in Prunus spp.

Authors: Mojgan Rabiey, Shyamali Roy, Billy Quilty, Ryan Creeth, George Sundin, Robert W. Jackson

Abstract:

Bacterial canker is a major disease of Prunus species such as cherry (Prunus avium). It is caused by Pseudomonas syringae species including P. syringae pv. syringae (Pss) and P. syringae pv. morsprunorum race 1 (Psm1) and race 2 (Psm2). Concerns over the environmental impact of, and developing resistance to, copper controls call for alternative approaches to disease management. One method of control could be achieved using naturally occurring bacteriophage (phage) infective to the bacterial pathogens. Phages were isolated from soil, leaf, and bark of cherry trees in five locations in the South East of England. The phages were assessed for their host range against strains of Pss, Psm1, and Psm2. The phages exhibited a differential ability to infect and lyse different Pss and Psm isolates as well as some other P. syringae pathovars. However, the phages were unable to infect beneficial bacteria such as Pseudomonas fluorescens. A subset of 18 of these phages were further characterised genetically (Random Amplification of Polymorphic DNA-PCR fingerprinting and sequencing) and using electron microscopy. The phages are tentatively identified as belonging to the order Caudovirales and the families Myoviridae, Podoviridae, and Siphoviridae, with genetic material being dsDNA. Future research will fully sequence the phage genomes. The efficacy of the phage, both individually and in cocktails, to reduce disease progression in vivo will be investigated to understand the potential for practical use of these phages as biocontrol agents.

Keywords: bacteriophage, pseudomonas, bacterial cancker, biological control

Procedia PDF Downloads 121
302 A Fast Community Detection Algorithm

Authors: Chung-Yuan Huang, Yu-Hsiang Fu, Chuen-Tsai Sun

Abstract:

Community detection represents an important data-mining tool for analyzing and understanding real-world complex network structures and functions. We believe that at least four criteria determine the appropriateness of a community detection algorithm: (a) it produces useable normalized mutual information (NMI) and modularity results for social networks, (b) it overcomes resolution limitation problems associated with synthetic networks, (c) it produces good NMI results and performance efficiency for Lancichinetti-Fortunato-Radicchi (LFR) benchmark networks, and (d) it produces good modularity and performance efficiency for large-scale real-world complex networks. To our knowledge, no existing community detection algorithm meets all four criteria. In this paper, we describe a simple hierarchical arc-merging (HAM) algorithm that uses network topologies and rule-based arc-merging strategies to identify community structures that satisfy the criteria. We used five well-studied social network datasets and eight sets of LFR benchmark networks to validate the ground-truth community correctness of HAM, eight large-scale real-world complex networks to measure its performance efficiency, and two synthetic networks to determine its susceptibility to resolution limitation problems. Our results indicate that the proposed HAM algorithm is capable of providing satisfactory performance efficiency and that HAM-identified communities were close to ground-truth communities in social and LFR benchmark networks while overcoming resolution limitation problems.

Keywords: complex network, social network, community detection, network hierarchy

Procedia PDF Downloads 191
301 An Exploratory Research of Human Character Analysis Based on Smart Watch Data: Distinguish the Drinking State from Normal State

Authors: Lu Zhao, Yanrong Kang, Lili Guo, Yuan Long, Guidong Xing

Abstract:

Smart watches, as a handy device with rich functionality, has become one of the most popular wearable devices all over the world. Among the various function, the most basic is health monitoring. The monitoring data can be provided as an effective evidence or a clue for the detection of crime cases. For instance, the step counting data can help to determine whether the watch wearer was quiet or moving during the given time period. There is, however, still quite few research on the analysis of human character based on these data. The purpose of this research is to analyze the health monitoring data to distinguish the drinking state from normal state. The analysis result may play a role in cases involving drinking, such as drunk driving. The experiment mainly focused on finding the figures of smart watch health monitoring data that change with drinking and figuring up the change scope. The chosen subjects are mostly in their 20s, each of whom had been wearing the same smart watch for a week. Each subject drank for several times during the week, and noted down the begin and end time point of the drinking. The researcher, then, extracted and analyzed the health monitoring data from the watch. According to the descriptive statistics analysis, it can be found that the heart rate change when drinking. The average heart rate is about 10% higher than normal, the coefficient of variation is less than about 30% of the normal state. Though more research is needed to be carried out, this experiment and analysis provide a thought of the application of the data from smart watches.

Keywords: character analysis, descriptive statistics analysis, drink state, heart rate, smart watch

Procedia PDF Downloads 133
300 Near-Infrared Optogenetic Manipulation of a Channelrhodopsin via Upconverting Nanoparticles

Authors: Kanchan Yadav, Ai-Chuan Chou, Rajesh Kumar Ulaganathan, Hua-De Gao, Hsien-Ming Lee, Chien-Yuan Pan, Yit-Tsong Chen

Abstract:

Optogenetics is an innovative technology now widely adopted by researchers in different fields of the biological sciences. However, due to the weak tissue penetration capability of the short wavelengths used to activate light-sensitive proteins, an invasive light guide has been used in animal studies for photoexcitation of target tissues. Upconverting nanoparticles (UCNPs), which transform near-infrared (NIR) light to short-wavelength emissions, can help address this issue. To improve optogenetic performance, we enhance the target selectivity for optogenetic controls by specifically conjugating the UCNPs with light-sensitive proteins at a molecular level, which shortens the distance as well as enhances the efficiency of energy transfer. We tagged V5 and Lumio epitopes to the extracellular N-terminal of channelrhodopsin-2 with an mCherry conjugated at the intracellular C-terminal (VL-ChR2m) and then bound NeutrAvidin-functionalized UCNPs (NAv-UCNPs) to the VL-ChR2m via a biotinylated antibody against V5 (bV5-Ab). We observed an apparent energy transfer from the excited UCNP (donor) to the bound VL-ChR2m (receptor) by measuring emission-intensity changes at the donor-receptor complex. The successful patch-clamp electrophysiological test and an intracellular Ca2+ elevation observed in the designed UCNP-ChR2 system under optogenetic manipulation confirmed the practical employment of UCNP-assisted NIR-optogenetic functionality. This work represents a significant step toward improving therapeutic optogenetics.

Keywords: Channelrhodopsin-2, near infrared, optogenetics, upconverting nanoparticles

Procedia PDF Downloads 251
299 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 11