Search results for: cleansing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 39

Search results for: cleansing

9 Rohingya Resettlement Roadblocks: Challenges and Potentials

Authors: Ishrat Zakia Sultana

Abstract:

The solution to the Rohingya crisis has become complicated than it was anticipated. Because of consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma, four major influxes of the Rohingya people took place to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda, and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving such a large number of Rohingya, eventually finding a solution to the Rohingya crisis has become a serious problem. The host country and the Rohingya themselves long for repatriation, the most desired solution to the crisis. But going back to their own country is now almost an impossible matter due to the unwillingness of the Myanmar government. The other two options to the solution to Rohingya crisis – reintegration in the host country and third country resettlement – have drawn little attention until now. On the one hand, the geopolitical factors have been making the Rohingya crisis complex. On the other, the war and conflict between Russia-Ukraine and Palestine-Israel have lessening the importance of the Rohingya issue and been diverting the world’s attention from the Rohingya crisis. Clearly, without the support of international community, Bangladesh finds no sustainable way to repatriate 1.1 million Rohingya. Yet, possibilities of a third country resettlement remain unexplored. In the past few years, some countries have expressed interest in accepting the Rohingya as part of third country resettlement but the number they wanted to take is like a drop in the ocean. This paper examines the roadblocks for third country resettlement of the Rohingya. It aims to look at the underlying reasons for which international community is less interested in accepting the Rohingya as refugees. Is it the racial and religious identity of the Rohingya that are considered problematic to the resettlement process? In what ways geopolitical complexities affecting the resettlement issue? How do the Rohingya view third country resettlement? This paper looks for the answers to these questions. The paper is based on qualitative study conducted from 2016-2018 and 2021-2023 in Rohingya camps in Cox’s Bazar, Bangladesh. The camp management authority, the Rohingya themselves, and the NGOs working in the camp participated in the study.

Keywords: rohingya, refugee, resettlement, bangladesh

Procedia PDF Downloads 32
8 A Dataset of Program Educational Objectives Mapped to ABET Outcomes: Data Cleansing, Exploratory Data Analysis and Modeling

Authors: Addin Osman, Anwar Ali Yahya, Mohammed Basit Kamal

Abstract:

Datasets or collections are becoming important assets by themselves and now they can be accepted as a primary intellectual output of a research. The quality and usage of the datasets depend mainly on the context under which they have been collected, processed, analyzed, validated, and interpreted. This paper aims to present a collection of program educational objectives mapped to student’s outcomes collected from self-study reports prepared by 32 engineering programs accredited by ABET. The manual mapping (classification) of this data is a notoriously tedious, time consuming process. In addition, it requires experts in the area, which are mostly not available. It has been shown the operational settings under which the collection has been produced. The collection has been cleansed, preprocessed, some features have been selected and preliminary exploratory data analysis has been performed so as to illustrate the properties and usefulness of the collection. At the end, the collection has been benchmarked using nine of the most widely used supervised multiclass classification techniques (Binary Relevance, Label Powerset, Classifier Chains, Pruned Sets, Random k-label sets, Ensemble of Classifier Chains, Ensemble of Pruned Sets, Multi-Label k-Nearest Neighbors and Back-Propagation Multi-Label Learning). The techniques have been compared to each other using five well-known measurements (Accuracy, Hamming Loss, Micro-F, Macro-F, and Macro-F). The Ensemble of Classifier Chains and Ensemble of Pruned Sets have achieved encouraging performance compared to other experimented multi-label classification methods. The Classifier Chains method has shown the worst performance. To recap, the benchmark has achieved promising results by utilizing preliminary exploratory data analysis performed on the collection, proposing new trends for research and providing a baseline for future studies.

Keywords: ABET, accreditation, benchmark collection, machine learning, program educational objectives, student outcomes, supervised multi-class classification, text mining

Procedia PDF Downloads 142
7 Air Handling Units Power Consumption Using Generalized Additive Model for Anomaly Detection: A Case Study in a Singapore Campus

Authors: Ju Peng Poh, Jun Yu Charles Lee, Jonathan Chew Hoe Khoo

Abstract:

The emergence of digital twin technology, a digital replica of physical world, has improved the real-time access to data from sensors about the performance of buildings. This digital transformation has opened up many opportunities to improve the management of the building by using the data collected to help monitor consumption patterns and energy leakages. One example is the integration of predictive models for anomaly detection. In this paper, we use the GAM (Generalised Additive Model) for the anomaly detection of Air Handling Units (AHU) power consumption pattern. There is ample research work on the use of GAM for the prediction of power consumption at the office building and nation-wide level. However, there is limited illustration of its anomaly detection capabilities, prescriptive analytics case study, and its integration with the latest development of digital twin technology. In this paper, we applied the general GAM modelling framework on the historical data of the AHU power consumption and cooling load of the building between Jan 2018 to Aug 2019 from an education campus in Singapore to train prediction models that, in turn, yield predicted values and ranges. The historical data are seamlessly extracted from the digital twin for modelling purposes. We enhanced the utility of the GAM model by using it to power a real-time anomaly detection system based on the forward predicted ranges. The magnitude of deviation from the upper and lower bounds of the uncertainty intervals is used to inform and identify anomalous data points, all based on historical data, without explicit intervention from domain experts. Notwithstanding, the domain expert fits in through an optional feedback loop through which iterative data cleansing is performed. After an anomalously high or low level of power consumption detected, a set of rule-based conditions are evaluated in real-time to help determine the next course of action for the facilities manager. The performance of GAM is then compared with other approaches to evaluate its effectiveness. Lastly, we discuss the successfully deployment of this approach for the detection of anomalous power consumption pattern and illustrated with real-world use cases.

Keywords: anomaly detection, digital twin, generalised additive model, GAM, power consumption, supervised learning

Procedia PDF Downloads 125
6 The Antioxidant Gel Mask Supplies Of Bitter Melon's Extract ( Momordica charantia Linn.)

Authors: N. S. Risqina, G. Edijanti, P. S. Nurita, L. Endang, R. A. Siti, R. Tri

Abstract:

Skin is an important and vital organs and also as a mirror of health and life. Facial skin care is one of the main emphasis to get the beautiful, healthy, and fresh skin. Potentially antioxidant phenolic compounds shows, antimutagen, antitumor, anti-inflammatory, and anti-cancer. Flavonoids are a group of polyphenolic compounds that have the nature of free radicals, inhibiting the oxidative and hydrolytic enzymes as well as anti-inflammatory. Bitter melon (Momordica charantia Linn) is a plant that contains flavonoids, and phenolic antioxidant activity. Bitter melon has strong antioxidant activity that can counteract the free radicals.These compounds can prevent free radicals that cause premature aging. Gel masks including depth cleansing is the cosmetics which work in depth and could raise the dead skin cells. Measurement of antioxidant activity of the extract and gel mask is done by using the immersion method of DPPH. IC50 value of ethanol extract of bitter melon fruit of 287.932 ppm. The preparation of gel mask bitter melon fruit extract, necessary to test the effectiveness of antioxidants using DPPH method is done by measuring the inhibition of DPPH and using UV spectrophotometer at the wavelength of maximum DPPH solution. Tests conducted at the beginning and end of the evaluation (day 0 and day 28). The purpose of this study is to determine the antioxidant activity of the bitter melon's extract and to determine the antioxidant activity of ethanol extract gel mask pare in varying concentrations, ie 1xIC100 (0.295%), 2xIC100 (0.590%) and 4xIC100 (1.180%). Evaluation of physical properties of the preparation on (Day-0,7,14,21, and 28) and evaluation of antioxidant activity (day 0 and 28). Data were analyzed using One Way ANOVA to determine differences in the physical properties of each formula. The statistical results showed that differences in the formula and storage time affects the adhesion, dispersive power, dry time and pH it is shown on a significant value of p <0.05, but longer storage does not affect the pH because the significance value p> 0,05. The antioxidant test showed that there are differences in antioxidant activity in all formulas. Measurement of antioxidant activity of bitter melon fruit extract gel mask on day 0 with a concentration of 0.295%, 0.590%, and 1.180%, respectively, are 124,209.277 ppm, ppm 83819.223 and 47323.592 ppm, whereas day 28 consecutive 130 411, 495 ppm, and 53239.806 95561.645 ppm ppm. The Conclusions drawn that there are antioxidant activity in preparation gel mask of bitter melon fruit extract. The antioxidant activity of bitter melon fruit extract gel mask on the day 0 with a concentration of 0.295%, 0.590%, and 1.180%, respectively, are 124,209.277 ppm, ppm 83819.223 and 47323.592 ppm, whereas on day 28 of antioxidant activity gel mask bitter melon fruit extract with a concentration of 0.295%, 0.590%, and 1.180% in succession, namely: 130,411.495 ppm, ppm 95561.645 and 53239.806 ppm.

Keywords: antioxdant, bitter melon, gel mask, IC50

Procedia PDF Downloads 447
5 Bed Evolution under One-Episode Flushing in a Truck Sewer in Paris, France

Authors: Gashin Shahsavari, Gilles Arnaud-Fassetta, Alberto Campisano, Roberto Bertilotti, Fabien Riou

Abstract:

Sewer deposits have been identified as a major cause of dysfunctions in combined sewer systems regarding sewer management, which induces different negative consequents resulting in poor hydraulic conveyance, environmental damages as well as worker’s health. In order to overcome the problematics of sedimentation, flushing has been considered as the most operative and cost-effective way to minimize the sediments impacts and prevent such challenges. Flushing, by prompting turbulent wave effects, can modify the bed form depending on the hydraulic properties and geometrical characteristics of the conduit. So far, the dynamics of the bed-load during high-flow events in combined sewer systems as a complex environment is not well understood, mostly due to lack of measuring devices capable to work in the “hostile” in combined sewer system correctly. In this regards, a one-episode flushing issue from an opening gate valve with weir function was carried out in a trunk sewer in Paris to understanding its cleansing efficiency on the sediments (thickness: 0-30 cm). During more than 1h of flushing within 5 m distance in downstream of this flushing device, a maximum flowrate and a maximum level of water have been recorded at 5 m in downstream of the gate as 4.1 m3/s and 2.1 m respectively. This paper is aimed to evaluate the efficiency of this type of gate for around 1.1 km (from the point -50 m to +1050 m in downstream from the gate) by (i) determining bed grain-size distribution and sediments evolution through the sewer channel, as well as their organic matter content, and (ii) identifying sections that exhibit more changes in their texture after the flush. For the first one, two series of sampling were taken from the sewer length and then analyzed in laboratory, one before flushing and second after, at same points among the sewer channel. Hence, a non-intrusive sampling instrument has undertaken to extract the sediments smaller than the fine gravels. The comparison between sediments texture after the flush operation and the initial state, revealed the most modified zones by the flush effect, regarding the sewer invert slope and hydraulic parameters in the zone up to 400 m from the gate. At this distance, despite the increase of sediment grain-size rages, D50 (median grain-size) varies between 0.6 mm and 1.1 mm compared to 0.8 mm and 10 mm before and after flushing, respectively. Overall, regarding the sewer channel invert slope, results indicate that grains smaller than sands (< 2 mm) are more transported to downstream along about 400 m from the gate: in average 69% before against 38% after the flush with more dispersion of grain-sizes distributions. Furthermore, high effect of the channel bed irregularities on the bed material evolution has been observed after the flush.

Keywords: bed-load evolution, combined sewer systems, flushing efficiency, sediments transport

Procedia PDF Downloads 375
4 Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh

Authors: Ishrat Zakia Sultana

Abstract:

The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way.

Keywords: Rohingya, Refugee, Bangladesh, Education

Procedia PDF Downloads 32
3 The Rite of Jihadification in ISIS Modified Video Games: Mass Deception and Dialectic of Religious Regression in Technological Progression

Authors: Venus Torabi

Abstract:

ISIS, the terrorist organization, modified two videogames, ARMA III and Grand Theft Auto 5 (2013) as means of online recruitment and ideological propaganda. The urge to study the mechanism at work, whether it has been successful or not, derives (Digital) Humanities experts to explore how codes of terror, Islamic ideology and recruitment strategies are incorporated into the ludic mechanics of videogames. Another aspect of the significance lies in the fact that this is a latent problem that has not been fully addressed in an interdisciplinary framework prior to this study, to the best of the researcher’s knowledge. Therefore, due to the complexity of the subject, the present paper entangles with game studies, philosophical and religious poles to form the methodology of conducting the research. As a contextualized epistemology of such exploitation of videogames, the core argument is building on the notion of “Culture Industry” proposed by Theodore W. Adorno and Max Horkheimer in Dialectic of Enlightenment (2002). This article posits that the ideological underpinnings of ISIS’s cause corroborated by the action-bound mechanics of the videogames are in line with adhering to the Islamic Eschatology as a furnishing ground and an excuse in exercising terrorism. It is an account of ISIS’s modification of the videogames, a tool of technological progression to practice online radicalization. Dialectically, this practice is packed up in rhetoric for recognizing a religious myth (the advent of a savior), as a hallmark of regression. The study puts forth that ISIS’s wreaking havoc on the world, both in reality and within action videogames, is negotiating the process of self-assertion in the players of such videogames (by assuming one’s self a member of terrorists) that leads to self-annihilation. It tries to unfold how ludic Mod videogames are misused as tools of mass deception towards ethnic cleansing in reality and line with the distorted Eschatological myth. To conclude, this study posits videogames to be a new avenue of mass deception in the framework of the Culture Industry. Yet, this emerges as a two-edged sword of mass deception in ISIS’s modification of videogames. It shows that ISIS is not only trying to hijack the minds through online/ludic recruitment, it potentially deceives the Muslim communities or those prone to radicalization into believing that it's terrorist practices are preparing the world for the advent of a religious savior based on Islamic Eschatology. This is to claim that the harsh actions of the videogames are potentially breeding minds by seeds of terrorist propaganda and numbing them to violence. The real world becomes an extension of that harsh virtual environment in a ludic/actual continuum, the extension that is contributing to the mass deception mechanism of the terrorists, in a clandestine trend.

Keywords: culture industry, dialectic, ISIS, islamic eschatology, mass deception, video games

Procedia PDF Downloads 116
2 Text Mining Past Medical History in Electrophysiological Studies

Authors: Roni Ramon-Gonen, Amir Dori, Shahar Shelly

Abstract:

Background and objectives: Healthcare professionals produce abundant textual information in their daily clinical practice. The extraction of insights from all the gathered information, mainly unstructured and lacking in normalization, is one of the major challenges in computational medicine. In this respect, text mining assembles different techniques to derive valuable insights from unstructured textual data, so it has led to being especially relevant in Medicine. Neurological patient’s history allows the clinician to define the patient’s symptoms and along with the result of the nerve conduction study (NCS) and electromyography (EMG) test, assists in formulating a differential diagnosis. Past medical history (PMH) helps to direct the latter. In this study, we aimed to identify relevant PMH, understand which PMHs are common among patients in the referral cohort and documented by the medical staff, and examine the differences by sex and age in a large cohort based on textual format notes. Methods: We retrospectively identified all patients with abnormal NCS between May 2016 to February 2022. Age, gender, and all NCS attributes reports were recorded, including the summary text. All patients’ histories were extracted from the text report by a query. Basic text cleansing and data preparation were performed, as well as lemmatization. Very popular words (like ‘left’ and ‘right’) were deleted. Several words were replaced with their abbreviations. A bag of words approach was used to perform the analyses. Different visualizations which are common in text analysis, were created to easily grasp the results. Results: We identified 5282 unique patients. Three thousand and five (57%) patients had documented PMH. Of which 60.4% (n=1817) were males. The total median age was 62 years (range 0.12 – 97.2 years), and the majority of patients (83%) presented after the age of forty years. The top two documented medical histories were diabetes mellitus (DM) and surgery. DM was observed in 16.3% of the patients, and surgery at 15.4%. Other frequent patient histories (among the top 20) were fracture, cancer (ca), motor vehicle accident (MVA), leg, lumbar, discopathy, back and carpal tunnel release (CTR). When separating the data by sex, we can see that DM and MVA are more frequent among males, while cancer and CTR are less frequent. On the other hand, the top medical history in females was surgery and, after that, DM. Other frequent histories among females are breast cancer, fractures, and CTR. In the younger population (ages 18 to 26), the frequent PMH were surgery, fractures, trauma, and MVA. Discussion: By applying text mining approaches to unstructured data, we were able to better understand which medical histories are more relevant in these circumstances and, in addition, gain additional insights regarding sex and age differences. These insights might help to collect epidemiological demographical data as well as raise new hypotheses. One limitation of this work is that each clinician might use different words or abbreviations to describe the same condition, and therefore using a coding system can be beneficial.

Keywords: abnormal studies, healthcare analytics, medical history, nerve conduction studies, text mining, textual analysis

Procedia PDF Downloads 63
1 Saline Aspiration Negative Intravascular Test: Mitigating Risk with Injectable Fillers

Authors: Marcelo Lopes Dias Kolling, Felipe Ferreira Laranjeira, Guilherme Augusto Hettwer, Pedro Salomão Piccinini, Marwan Masri, Carlos Oscar Uebel

Abstract:

Introduction: Injectable fillers are among the most common nonsurgical cosmetic procedures, with significant growth yearly. Knowledge of rheological and mechanical characteristics of fillers, facial anatomy, and injection technique is essential for safety. Concepts such as the use of cannula versus needle, aspiration before injection, and facial danger zones have been well discussed. In case of an accidental intravascular puncture, the pressure inside the vessel may not be sufficient to push blood into the syringe due to the characteristics of the filler product; this is especially true for calcium hydroxyapatite (CaHA) or hyaluronic acid (HA) fillers with high G’. Since viscoelastic properties of normal saline are much lower than those of fillers, aspiration with saline prior to filler injection may decrease the risk of a false negative aspiration and subsequent catastrophic effects. We discuss a technique to add an additional safety step to the procedure with saline aspiration prior to injection, a ‘’reverse Seldinger’’ technique for intravascular access, which we term SANIT: Saline Aspiration Negative Intravascular Test. Objectives: To demonstrate the author’s (PSP) technique which adds an additional safety step to the process of filler injection, with both CaHA and HA, in order to decrease the risk of intravascular injection. Materials and Methods: Normal skin cleansing and topical anesthesia with prilocaine/lidocaine cream are performed; the facial subunits to be treated are marked. A 3mL Luer lock syringe is filled with 2mL of 0.9% normal saline and a 27G needle, which is turned one half rotation. When a cannula is to be used, the Luer lock syringe is attached to a 27G 4cm single hole disposable cannula. After skin puncture, the 3mL syringe is advanced with the plunger pulled back (negative pressure). Progress is made to the desired depth, all the while aspirating. Once the desired location of filler injection is reached, the syringe is exchanged for the syringe containing a filler, securely grabbing the hub of the needle and taking care to not dislodge the needle tip. Prior to this, we remove 0.1mL of filler to allow for space inside the syringe for aspiration. We again aspirate and inject retrograde. SANIT is especially useful for CaHA, since the G’ is much higher than HA, and thus reflux of blood into the syringe is less likely to occur. Results: The technique has been used safely for the past two years with no adverse events; the increase in cost is negligible (only the cost of 2mL of normal saline). Over 100 patients (over 300 syringes) have been treated with this technique. The risk of accidental intravascular puncture has been calculated to be between 1:6410 to 1:40882 syringes among expert injectors; however, the consequences of intravascular injection can be catastrophic even with board-certified physicians. Conclusions: While the risk of intravascular filler injection is low, the consequences can be disastrous. We believe that adding the SANIT technique can help further mitigate risk with no significant untoward effects and could be considered by all performing injectable fillers. Further follow-up is ongoing.

Keywords: injectable fillers, safety, saline aspiration, injectable filler complications, hyaluronic acid, calcium hydroxyapatite

Procedia PDF Downloads 126