Search results for: communications protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1130

Search results for: communications protocols

290 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 359
289 Relationship among Teams' Information Processing Capacity and Performance in Information System Projects: The Effects of Uncertainty and Equivocality

Authors: Ouafa Sakka, Henri Barki, Louise Cote

Abstract:

Uncertainty and equivocality are defined in the information processing literature as two task characteristics that require different information processing responses from managers. As uncertainty often stems from a lack of information, addressing it is thought to require the collection of additional data. On the other hand, as equivocality stems from ambiguity and a lack of understanding of the task at hand, addressing it is thought to require rich communication between those involved. Past research has provided weak to moderate empirical support to these hypotheses. The present study contributes to this literature by defining uncertainty and equivocality at the project level and investigating their moderating effects on the association between several project information processing constructs and project performance. The information processing constructs considered are the amount of information collected by the project team, and the richness and frequency of formal communications among the team members to discuss the project’s follow-up reports. Data on 93 information system development (ISD) project managers was collected in a questionnaire survey and analyzed it via the Fisher Test for correlation differences. The results indicate that the highest project performance levels were observed in projects characterized by high uncertainty and low equivocality in which project managers were provided with detailed and updated information on project costs and schedules. In addition, our findings show that information about user needs and technical aspects of the project is less useful to managing projects where uncertainty and equivocality are high. Further, while the strongest positive effect of interactive use of follow-up reports on performance occurred in projects where both uncertainty and equivocality levels were high, its weakest effect occurred when both of these were low.

Keywords: uncertainty, equivocality, information processing model, management control systems, project control, interactive use, diagnostic use, information system development

Procedia PDF Downloads 263
288 CRISPR-Mediated Genome Editing for Yield Enhancement in Tomato

Authors: Aswini M. S.

Abstract:

Tomato (Solanum lycopersicum L.) is one of the most significant vegetable crops in terms of its economic benefits. Both fresh and processed tomatoes are consumed. Tomatoes have a limited genetic base, which makes breeding extremely challenging. Plant breeding has become much simpler and more effective with genome editing tools of CRISPR and CRISPR-associated 9 protein (CRISPR/Cas9), which address the problems with traditional breeding, chemical/physical mutagenesis, and transgenics. With the use of CRISPR/Cas9, a number of tomato traits have been functionally distinguished and edited. These traits include plant architecture as well as flower characters (leaf, flower, male sterility, and parthenocarpy), fruit ripening, quality and nutrition (lycopene, carotenoid, GABA, TSS, and shelf-life), disease resistance (late blight, TYLCV, and powdery mildew), tolerance to abiotic stress (heat, drought, and salinity) and resistance to herbicides. This study explores the potential of CRISPR/Cas9 genome editing for enhancing yield in tomato plants. The study utilized the CRISPR/Cas9 genome editing technology to functionally edit various traits in tomatoes. The de novo domestication of elite features from wild cousins to cultivated tomatoes and vice versa has been demonstrated by the introgression of CRISPR/Cas9. The CycB (Lycopene beta someri) gene-mediated Cas9 editing increased the lycopene content in tomato. Also, Cas9-mediated editing of the AGL6 (Agamous-like 6) gene resulted in parthenocarpic fruit development under heat-stress conditions. The advent of CRISPR/Cas has rendered it possible to use digital resources for single guide RNA design and multiplexing, cloning (such as Golden Gate cloning, GoldenBraid, etc.), creating robust CRISPR/Cas constructs, and implementing effective transformation protocols like the Agrobacterium and DNA free protoplast method for Cas9-gRNAs ribonucleoproteins (RNPs) complex. Additionally, homologous recombination (HR)-based gene knock-in (HKI) via geminivirus replicon and base/prime editing (Target-AID technology) remains possible. Hence, CRISPR/Cas facilitates fast and efficient breeding in the improvement of tomatoes.

Keywords: CRISPR-Cas, biotic and abiotic stress, flower and fruit traits, genome editing, polygenic trait, tomato and trait introgression

Procedia PDF Downloads 44
287 Diplomatic Assurances in International Law

Authors: William Thomas Worster

Abstract:

Diplomatic assurances issued by states declaring that they will not mistreat individuals returned to them occupy a strange middle ground between being legal and non-legal obligations. States assert that they are non-binding, yet at other times that they are binding. However, this assertion may not be the end of the discussion. The International Court of Justice and other tribunals have concluded that similar instruments were binding, states have disagreed that certain similar instruments were binding, and the Vienna Convention on the Law of Treaties and its travaux prépératoires do not appear to contemplate non-binding instruments. This paper is a case study of diplomatic assurances but, by necessity, touches on the delicate question of whether certain texts are treaties, promises, or non-binding political statements. International law, and law in general, requires a binary approach to obligation. All communications must be binding or not, even if the fit is not precise. Through this study, we will find that some of the obligations in certain assurances can be understood as legal and some not. We will attempt to state the current methodology for determining which obligations are legal under the law of treaties and law on binding unilateral promises. The paper begins with some background of the legal environment of diplomatic assurances and their use in cases of expulsion. The paper then turns to discuss the legal nature of diplomatic assurances, proceeding to address various possibilities for legal value as treaties and as binding unilateral statements. This paper will not examine the legal value of diplomatic assurances solely under customary international law other than the way in which customary international law might further refine the treaty definition. In order to identify whether any assurances are contained in legal acts, this study identifies a pool of relevant assurances and qualitatively analyzes whether any of those are contained in treaties or binding unilateral statements. To the author’s best knowledge, this study is the first large-scale, qualitative qualitative analysis of assurances as a group of instruments that accounts for their heterogenous nature. It is also the first study to identify the indicators of whether an instrument is a treaty or promise.

Keywords: diplomatic assurances, deportation, extradition, expulsion, non-refoulement, torture, persecution, death penalty, human rights, memorandum of understanding, promises, secret, monitoring, compliance, enforcement

Procedia PDF Downloads 60
286 Quantum Graph Approach for Energy and Information Transfer through Networks of Cables

Authors: Mubarack Ahmed, Gabriele Gradoni, Stephen C. Creagh, Gregor Tanner

Abstract:

High-frequency cables commonly connect modern devices and sensors. Interestingly, the proportion of electric components is rising fast in an attempt to achieve lighter and greener devices. Modelling the propagation of signals through these cable networks in the presence of parameter uncertainty is a daunting task. In this work, we study the response of high-frequency cable networks using both Transmission Line and Quantum Graph (QG) theories. We have successfully compared the two theories in terms of reflection spectra using measurements on real, lossy cables. We have derived a generalisation of the vertex scattering matrix to include non-uniform networks – networks of cables with different characteristic impedances and propagation constants. The QG model implicitly takes into account the pseudo-chaotic behavior, at the vertices, of the propagating electric signal. We have successfully compared the asymptotic growth of eigenvalues of the Laplacian with the predictions of Weyl law. We investigate the nearest-neighbour level-spacing distribution of the resonances and compare our results with the predictions of Random Matrix Theory (RMT). To achieve this, we will compare our graphs with the generalisation of Wigner distribution for open systems. The problem of scattering from networks of cables can also provide an analogue model for wireless communication in highly reverberant environments. In this context, we provide a preliminary analysis of the statistics of communication capacity for communication across cable networks, whose eventual aim is to enable detailed laboratory testing of information transfer rates using software defined radio. We specialise this analysis in particular for the case of MIMO (Multiple-Input Multiple-Output) protocols. We have successfully validated our QG model with both TL model and laboratory measurements. The growth of Eigenvalues compares well with Weyl’s law and the level-spacing distribution agrees so well RMT predictions. The results we achieved in the MIMO application compares favourably with the prediction of a parallel on-going research (sponsored by NEMF21.)

Keywords: eigenvalues, multiple-input multiple-output, quantum graph, random matrix theory, transmission line

Procedia PDF Downloads 131
285 Targeted Photodynamic Therapy for Intraperitoneal Ovarian Cancer, A Way to Stimulate Anti-Tumoral Immune Response

Authors: Lea Boidin, Martha Baydoun, Bertrand Leroux, Olivier Morales, Samir Acherar, Celine Frochot, Nadira Delhem

Abstract:

Ovarian cancer (OC) is one of the most defying diseases in gynecologic oncology. Even though surgery remains crucial in the therapy of patients with primary ovarian cancer, recurrent recidivism calls for the development of new therapy protocols to propose for patients dealing with this cancer. FRα is described as a tumor‐associated antigen in OC, where FRα expression is usually linked with more poorly differentiated, aggressive tumors. The Photodynamic treatment (PDT) available data have shown improvements in the uptake of small tumors and in the induction of a proper anti-tumoral immune response. In order to target specifically peritoneal metastatis, which overexpress FRα, a new-patented PS coupled with folic acid has been developed in our team. Herein we propose PDT using this new patented PS for PDT applied in an in vivo mice model. The efficacy of the treatment was evaluated in mice without and with PBMC reconstitution. Mice were divided into four groups: Non-Treated, PS, Light Only, and PDT Treated and subjected to illumination by laser set at 668nm with a duration of illumination of 45 minutes (or 1 min of illumination followed by 2 minutes of pause repeated 45 times). When mice were not reconstituted and after fractionized PDT protocol, a significant decrease in the tumor volume was noticed. An induction in the anti-tumoral cytokine IFNγ chaperoned this decrease while a subsequent inhibition in the cytokine TGFβ. Even more crucial, when mice were reconstituted and upon PDT, the fold of tumor decrease was even higher. An immune response was activated decoded with an increase in NK, CD3 +, LT helper and Cytotoxic T cells. Thereafter, an increase in the expression of the cytokines IFNγ and TNFα were noticed while an inhibition in TGFβ, IL8 and IL10 accompanied this immune response activation. Therefore, our work has shown for the first time that a fractionized PDT protocol using a folate-targeted PDT is effective for treatment of ovarian cancer. The interest in using PDT in this case, goes beyond the local induction of tumor apoptosis only, but can promote subsequent anti-tumor response. Most of the therapies currently used to treat ovarian cancer, have an uncooperative outcomes on the host immune response. The readiness of a tumor adjuvant treatment like PDT adequate in eliminating the tumor and in concert stimulating anti-tumor immunity would be weighty.

Keywords: folate receptor, ovarian cancer, photodynamic therapy, humanized mice model

Procedia PDF Downloads 82
284 Self-Marketing on Line Person-to-Person Social Media

Authors: Chih-Ping Chen

Abstract:

Today, technology does not necessitate change; rather, social media has afforded a new arena and digital tools for users/individuals to be symbolized and marketed in meaningful exchanges of digital identities. We argue that these symbolic interactions may afford individuals the ability to create and present less restricted Line person-to-person (P2P) chats than would be possible in face-to-face communications. Individuals can select flexible influence strategies to market themselves, which enables them to create and present their digital identities and impressions in alternative ways within a dynamic sociocultural context. Therefore, this paper aims to explore the novel phenomenon of how individuals market themselves to manage their digital identities and impressions to connect with other users through the symbolic interactions created by new digital tools (e.g., stickers). A netnographic approach was developed by applying a triangulated methodology consisting of user self-diary reports, in-depth interviews, and observations. Totally, 20 participants (10 females and 10 males) were of Taiwanese origin, and their ages ranged from 20–47 years old. The findings of this research showed that individuals on Line P2P social media where traditional cultural gender norms have shifted. Both male and female participants market their modern digital identities by adopting a combination of flexible influence tactics/strategies when using digital stickers. Some findings showed that their influence tactics/strategies often flouted Taiwanese cultural gender norms or skirted traditional rules to fit individual or P2P needs. Finally, these findings potentially contributed to the literature regarding the consumer culture theory and symbolic interaction theory in digital marketing and social media fields.

Keywords: Consumer culture theory, Digital sticker, Self-marketing, Impression, Symbolic interaciton

Procedia PDF Downloads 53
283 Virtual Screening and in Silico Toxicity Property Prediction of Compounds against Mycobacterium tuberculosis Lipoate Protein Ligase B (LipB)

Authors: Junie B. Billones, Maria Constancia O. Carrillo, Voltaire G. Organo, Stephani Joy Y. Macalino, Inno A. Emnacen, Jamie Bernadette A. Sy

Abstract:

The drug discovery and development process is generally known to be a very lengthy and labor-intensive process. Therefore, in order to be able to deliver prompt and effective responses to cure certain diseases, there is an urgent need to reduce the time and resources needed to design, develop, and optimize potential drugs. Computer-aided drug design (CADD) is able to alleviate this issue by applying computational power in order to streamline the whole drug discovery process, starting from target identification to lead optimization. This drug design approach can be predominantly applied to diseases that cause major public health concerns, such as tuberculosis. Hitherto, there has been no concrete cure for this disease, especially with the continuing emergence of drug resistant strains. In this study, CADD is employed for tuberculosis by first identifying a key enzyme in the mycobacterium’s metabolic pathway that would make a good drug target. One such potential target is the lipoate protein ligase B enzyme (LipB), which is a key enzyme in the M. tuberculosis metabolic pathway involved in the biosynthesis of the lipoic acid cofactor. Its expression is considerably up-regulated in patients with multi-drug resistant tuberculosis (MDR-TB) and it has no known back-up mechanism that can take over its function when inhibited, making it an extremely attractive target. Using cutting-edge computational methods, compounds from AnalytiCon Discovery Natural Derivatives database were screened and docked against the LipB enzyme in order to rank them based on their binding affinities. Compounds which have better binding affinities than LipB’s known inhibitor, decanoic acid, were subjected to in silico toxicity evaluation using the ADMET and TOPKAT protocols. Out of the 31,692 compounds in the database, 112 of these showed better binding energies than decanoic acid. Furthermore, 12 out of the 112 compounds showed highly promising ADMET and TOPKAT properties. Future studies involving in vitro or in vivo bioassays may be done to further confirm the therapeutic efficacy of these 12 compounds, which eventually may then lead to a novel class of anti-tuberculosis drugs.

Keywords: pharmacophore, molecular docking, lipoate protein ligase B (LipB), ADMET, TOPKAT

Procedia PDF Downloads 395
282 Assessing the Informed Consent Practices during Normal Vaginal Delivery Process and Immediate Postpartum Care in Tertiary Level Hospitals of Bangladesh

Authors: Md. Abdul Karim, Syed Imran Ahmed, Pandora T. Hardtman

Abstract:

Informed consent is one of the basic human and ethical rights for childbearing women. It plays a central role in promoting informed decision making between patients and service providers during the labor process. It gives mothers rights to accept or reject any examination and/or procedure, increases the respect and dignity of the mother during pregnancy, delivery and postpartum care. To assess the practices of this right during normal vaginal delivery and immediate postpartum care in tertiary level hospital setting in Bangladesh, a quantitative study with cross-sectional design was conducted in Dhaka Medical College & Hospital (DMCH) and Sir Salimullah Medical College & Mitford Hospital (SSMCH) in Dhaka in November 2015. A prevalence-based sample size of 190 was calculated where prevalence, confidence interval and level of significance were at 9.7%, 98% and 5% respectively. The respondents were the mothers who gave normal vaginal childbirth within past 24 hours and received postpartum care there. They were selected through systematic random sampling technique and their face-to-face interview of 190 mothers was done using a structured questionnaire. Data were entered into the spreadsheet (MS Excel 2013 version) and descriptive analysis of findings was done. The result shows the complete absence of informed consent practices and mostly absence of consented care such as right to information, respect for choices of preferences for examination and/or procedure of childbearing women. Although 95% of the mothers were informed that they were being proceeded with normal vaginal delivery, their choice of preference was absent during the process. Only consent (not informed consent) was taken from 50%-72% mothers for examination (except breast examination ‘0%’) and 8%-83% for any procedures during postpartum care. Only one-ninth (11%) of the mothers could ask service providers regarding the services they received. No consent was taken from 3% of the mothers- neither in the labor process nor in postpartum care. This current practice doesn’t comply with the Respectful Maternity Care (RMC) Charter 2011. The issue is not even clarified in the current Standard Clinical Management Protocols of the country. So, improvement of the existing protocol and increased awareness are essential to address this right of child-bearing women and to practice it during normal vaginal delivery and postpartum care.

Keywords: informed consent, normal vaginal delivery, respectful maternity care, tertiary level hospital

Procedia PDF Downloads 133
281 The Role of Metaphor in Communication

Authors: Fleura Shkëmbi, Valbona Treska

Abstract:

In elementary school, we discover that a metaphor is a decorative linguistic device just for poets. But now that we know, it's also a crucial tactic that individuals employ to understand the universe, from fundamental ideas like time and causation to the most pressing societal challenges today. Metaphor is the use of language to refer to something other than what it was originally intended for or what it "literally" means in order to suggest a similarity or establish a connection between the two. People do not identify metaphors as relevant in their decisions, according to a study on metaphor and its effect on decision-making; instead, they refer to more "substantive" (typically numerical) facts as the basis for their problem-solving decision. Every day, metaphors saturate our lives via language, cognition, and action. They argue that our conceptions shape our views and interactions with others and that concepts define our reality. Metaphor is thus a highly helpful tool for both describing our experiences to others and forming notions for ourselves. In therapeutic contexts, their shared goal appears to be twofold. The cognitivist approach to metaphor regards it as one of the fundamental foundations of human communication. The benefits and disadvantages of utilizing the metaphor differ depending on the target domain that the metaphor portrays. The challenge of creating messages and surroundings that affect customers' notions of abstract ideas in a variety of industries, including health, hospitality, romance, and money, has been studied for decades in marketing and consumer psychology. The aim of this study is to examine, through a systematic literature review, the role of the metaphor in communication and in advertising. This study offers a selected analysis of this literature, concentrating on research on customer attitudes and product appraisal. The analysis of the data identifies potential research questions. With theoretical and applied implications for marketing, design, and persuasion, this study sheds light on how, when, and for whom metaphoric communications are powerful.

Keywords: metaphor, communication, advertising, cognition, action

Procedia PDF Downloads 72
280 Design Evaluation Tool for Small Wind Turbine Systems Based on the Simple Load Model

Authors: Jihane Bouabid

Abstract:

The urgency to transition towards sustainable energy sources has revealed itself imperative. Today, in the 21st Century, the intellectual society have imposed technological advancements and improvements, and anticipates expeditious outcomes as an integral component of its relentless pursuit of an elevated standard of living. As a part of empowering human development, driving economic growth and meeting social needs, the access to energy services has become a necessity. As a part of these improvements, we are introducing the project "Mywindturbine" - an interactive web user interface for design and analysis in the field of wind energy, with a particular adherence to the IEC (International Electrotechnical Commission) standard 61400-2 "Wind turbines – Part 2: Design requirements for small wind turbines". Wind turbines play a pivotal role in Morocco's renewable energy strategy, leveraging the nation's abundant wind resources. The IEC 61400-2 standard ensures the safety and design integrity of small wind turbines deployed in Morocco, providing guidelines for performance and safety protocols. The conformity with this standard ensures turbine reliability, facilitates standards alignment, and accelerates the integration of wind energy into Morocco's energy landscape. The aim of the GUI (Graphical User Interface) for engineers and professionals from the field of wind energy systems who would like to design a small wind turbine system following the safety requirements of the international standards IEC 61400-2. The interface provides an easy way to analyze the structure of the turbine machine under normal and extreme load conditions based on the specific inputs provided by the user. The platform introduces an overview to sustainability and renewable energy, with a focus on wind turbines. It features a cross-examination of the input parameters provided from the user for the SLM (Simple Load Model) of small wind turbines, and results in an analysis according to the IEC 61400-2 standard. The analysis of the simple load model encompasses calculations for fatigue loads on blades and rotor shaft, yaw error load on blades, etc. for the small wind turbine performance. Through its structured framework and adherence to the IEC standard, "Mywindturbine" aims to empower professionals, engineers, and intellectuals with the knowledge and tools necessary to contribute towards a sustainable energy future.

Keywords: small wind turbine, IEC 61400-2 standard, user interface., simple load model

Procedia PDF Downloads 25
279 An Overview of Technology Availability to Support Remote Decentralized Clinical Trials

Authors: Simone Huber, Bianca Schnalzer, Baptiste Alcalde, Sten Hanke, Lampros Mpaltadoros, Thanos G. Stavropoulos, Spiros Nikolopoulos, Ioannis Kompatsiaris, Lina Pérez- Breva, Vallivana Rodrigo-Casares, Jaime Fons-Martínez, Jeroen de Bruin

Abstract:

Developing new medicine and health solutions and improving patient health currently rely on the successful execution of clinical trials, which generate relevant safety and efficacy data. For their success, recruitment and retention of participants are some of the most challenging aspects of protocol adherence. Main barriers include: i) lack of awareness of clinical trials; ii) long distance from the clinical site; iii) the burden on participants, including the duration and number of clinical visits and iv) high dropout rate. Most of these aspects could be addressed with a new paradigm, namely the Remote Decentralized Clinical Trials (RDCTs). Furthermore, the COVID-19 pandemic has highlighted additional advantages and challenges for RDCTs in practice, allowing participants to join trials from home and not depend on site visits, etc. Nevertheless, RDCTs should follow the process and the quality assurance of conventional clinical trials, which involve several processes. For each part of the trial, the Building Blocks, existing software and technologies were assessed through a systematic search. The technology needed to perform RDCTs is widely available and validated but is yet segmented and developed in silos, as different software solutions address different parts of the trial and at various levels. The current paper is analyzing the availability of technology to perform RDCTs, identifying gaps and providing an overview of Basic Building Blocks and functionalities that need to be covered to support the described processes.

Keywords: architectures and frameworks for health informatics systems, clinical trials, information and communications technology, remote decentralized clinical trials, technology availability

Procedia PDF Downloads 183
278 Safer Staff: A Survey of Staff Experiences of Violence and Aggression at Work in Coventry and Warwickshire Partnership National Health Service Trust

Authors: Rupinder Kaler, Faith Ndebele, Nadia Saleem, Hafsa Sheikh

Abstract:

Background: Workplace related violence and aggression seems to be considered an acceptable occupational hazard for staff in mental health services. There is literature evidence that healthcare workers in mental health settings are at higher risk from aggression from patients. Aggressive behaviours pose a physical and psychological threat to the psychiatric staff and can result in stress, burnout, sickness, and exhaustion. Further evidence informs that health professionals are the most exposed to psychological disorders such as anxiety, depression and post-traumatic stress disorder. Fear that results from working in a dangerous environment and exhaustion can have a damaging impact on patient care and healthcare relationship. Aim: The aim of this study is to investigate the prevalence and impact of aggressive behaviour on staff working at Coventry and Warwickshire Partnership Trust. Methodology: The study methodology included carrying out a manual, anonymised, multi-disciplinary cross-sectional survey questionnaire across all clinical and non-clinical staff at CWPT from both inpatient and community settings. Findings: The unsurprising finding was that of higher prevalence of aggressive behaviours in in-patients in comparison to community staff. Conclusion: There is a high rate of verbal and physical aggression at work and this has a negative impact on the staff emotional and physical well- being. There is also a higher reliance on colleagues for support on an informal basis than formal organisational support systems. Recommendations: A workforce that is well and functioning is the biggest resource for an organisation. Staff safety during working hours is everyone's responsibility and sits with both individual staff members and the organisation. Post-incident organisational support needs to be consolidated, and hands-on, timely support offered to help maintain emotionally well staff on CWPT. The authors recommend development of preventative and practical protocols for aggression with patient and carer involvement. Post-incident organisational support needs to be consolidated, and hands-on, timely support offered to help maintain emotionally well staff on CWPT.

Keywords: safer staff, survey of staff experiences, violence and aggression, mental health

Procedia PDF Downloads 179
277 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System

Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari

Abstract:

For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.

Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)

Procedia PDF Downloads 143
276 Acculturation of Iranian Students in Europe

Authors: Shirin Sadat Ahmadi

Abstract:

The number of people, particularly university students, migrating from Iran and applying for American and European universities has been rising during recent years. Different people may have various reasons and goals for migration, but one of the common issues among all these people is the cultural challenges they experience when living in the adopted society. Immigrants usually confront obstacles during the Intercultural transition and adaption process. Different variables such as age, religion, gender, education, knowing the spoken language in destination country, financial condition, interactions with natives, and using social media can affect the cultural challenges people face after migration and how they conquer issues appearing due to intercultural differences and conflicts. In this research we have interviewed a sample consisted of 15 Iranian students living and studying abroad found by using snowball sampling technique via video call to realize what cultural challenges they have experienced in the new society, how the mentioned variables above eased these challenges or made them harder and what approaches and solutions they adopted to adjust themselves to the new society and its cultural dimensions. Based on John Berry's acculturation theory of migrant-host relationship, we have classified these 15 people in five different categories: Assimilation, Separation, Marginalization, and Integration. In addition we have considered Y.Y. Kim's communication-based theory of cross-cultural adaption to explain how communications helped migrant populations in adaption process. Based on the findings of this study, 12 of 15 interviewed members of the study used the integration strategy to adapt to the new cultural environment, 3 of them used the assimilation strategy, and none of them used marginalization or separation strategies. Communicating with natives, knowing the language, and education were the factors that helped all the interviewed members of the sample to overcome the difficulties of intercultural transition.

Keywords: acculturation, culture, intercultural transition, migration

Procedia PDF Downloads 44
275 Maker Education as Means for Early Entrepreneurial Education: Evaluation Results from a European Pilot Action

Authors: Elisabeth Unterfrauner, Christian Voigt

Abstract:

Since the foundation of the first Fab Lab by the Massachusetts Institute of Technology about 17 years ago, the Maker movement has spread globally with the foundation of maker spaces and Fab Labs worldwide. In these workshops, citizens have access to digital fabrication technologies such as 3D printers and laser cutters to develop and test their own ideas and prototypes, which makes it an attractive place for start-up companies. Know-How is shared not only in the physical space but also online in diverse communities. According to the Horizon report, the Maker movement, however, will also have an impact on educational settings in the following years. The European project ‘DOIT - Entrepreneurial skills for young social innovators in an open digital world’ has incorporated key elements of making to develop an early entrepreneurial education program for children between the age of six and 16. The Maker pedagogy builds on constructive learning approaches, learning by doing principles, learning in collaborative and interdisciplinary teams and learning through trial and error where mistakes are acknowledged as learning opportunities. The DOIT program consists of seven consecutive elements. It starts with a motivation phase where students get motivated by envisioning the scope of their possibilities. The second step is about Co-design: Students are asked to collect and select potential ideas for innovations. In the Co-creation phase students gather in teams and develop first prototypes of their ideas. In the iteration phase, the prototype is continuously improved and in the next step, in the reflection phase, feedback on the prototypes is exchanged between the teams. In the last two steps, scaling and reaching out, the robustness of the prototype is tested with a bigger group of users outside of the educational setting and finally students will share their projects with a wider public. The DOIT program involves 1,000 children in two pilot phases at 11 pilot sites in ten different European countries. The comprehensive evaluation design is based on a mixed method approach with a theoretical backbone on Lackeus’ model of entrepreneurship education, which distinguishes between entrepreneurial attitudes, entrepreneurial skills and entrepreneurial knowledge. A pre-post-test with quantitative measures as well as qualitative data from interviews with facilitators, students and workshop protocols will reveal the effectiveness of the program. The evaluation results will be presented at the conference.

Keywords: early entrepreneurial education, Fab Lab, maker education, Maker movement

Procedia PDF Downloads 105
274 Metabolic Profiling in Breast Cancer Applying Micro-Sampling of Biological Fluids and Analysis by Gas Chromatography – Mass Spectrometry

Authors: Mónica P. Cala, Juan S. Carreño, Roland J.W. Meesters

Abstract:

Recently, collection of biological fluids on special filter papers has become a popular micro-sampling technique. Especially, the dried blood spot (DBS) micro-sampling technique has gained much attention and is momently applied in various life sciences reserach areas. As a result of this popularity, DBS are not only intensively competing with the venous blood sampling method but are at this moment widely applied in numerous bioanalytical assays. In particular, in the screening of inherited metabolic diseases, pharmacokinetic modeling and in therapeutic drug monitoring. Recently, microsampling techniques were also introduced in “omics” areas, whereunder metabolomics. For a metabolic profiling study we applied micro-sampling of biological fluids (blood and plasma) from healthy controls and from women with breast cancer. From blood samples, dried blood and plasma samples were prepared by spotting 8uL sample onto pre-cutted 5-mm paper disks followed by drying of the disks for 100 minutes. Dried disks were then extracted by 100 uL of methanol. From liquid blood and plasma samples 40 uL were deproteinized with methanol followed by centrifugation and collection of supernatants. Supernatants and extracts were evaporated until dryness by nitrogen gas and residues derivated by O-methyxyamine and MSTFA. As internal standard C17:0-methylester in heptane (10 ppm) was used. Deconvolution and alignment of and full scan (m/z 50-500) MS data were done by AMDIS and SpectConnect (http://spectconnect.mit.edu) software, respectively. Statistical Data analysis was done by Principal Component Analysis (PCA) using R software. The results obtained from our preliminary study indicate that the use of dried blood/plasma on paper disks could be a powerful new tool in metabolic profiling. Many of the metabolites observed in plasma (liquid/dried) were also positively identified in whole blood samples (liquid/dried). Whole blood could be a potential substitute matrix for plasma in Metabolomic profiling studies as well also micro-sampling techniques for the collection of samples in clinical studies. It was concluded that the separation of the different sample methodologies (liquid vs. dried) as observed by PCA was due to different sample treatment protocols applied. More experiments need to be done to confirm obtained observations as well also a more rigorous validation .of these micro-sampling techniques is needed. The novelty of our approach can be found in the application of different biological fluid micro-sampling techniques for metabolic profiling.

Keywords: biofluids, breast cancer, metabolic profiling, micro-sampling

Procedia PDF Downloads 389
273 Tourism Development and Its Role in the Urban Expansion of Al-Khomse City, Libya

Authors: Khaled Klib, Yousri Azzam, Ibrahim Maarouf

Abstract:

Tourism is one of the most important and fastest growing economic activities in the world, which has a prominent role in the growth and development of countries and has become increasingly important as business and trade after the World War II. The tourism development is one of the most important aspects of urban development, which aims to plan and develop tourist attractions and improve the urban environment within cities. Tourism development has become a priority for the urban development policy of cities, particularly those which have many tourist potentials. Complementary services, such as infrastructure, roads’ networks, transportation, and communications are needed for these potentials to function properly. In order to achieve these functionalities, also a new planning for the new areas as an expansion is required, or developing and renovating the existing urban areas according to pre-prepared plans to avoid random expansion of the urban structure of the city. This paper aims to determine the tourist attractions of Al-Khomse city, by reviewing the most important tourist attractions such as the Roman city (Leptis Magna), the geographical location on the Mediterranean coast, the temperate climate and diversity of the natural environment. The paper also examines the reality of the infrastructure and tourist services in the city and its suitability to serve the tourism sector. The paper also includes a proposed for tourism development in the city as one of the city's urban expansion trends, which can guide the development strategy in the future. The paper concludes with a vision for the tourism development areas as one of the trends for urban expansion in the future. The paper also concludes tourism development will have an effective role in the growth and development of urban, economic and social, in addition to preserving the natural environment. The paper recommended the need to emphasize the role of tourism development as one of the pillars and trends for the development policy and expansion of Al-Khomse city, preservation of tourist attractions and natural resources and developing infrastructure and tourist services such as accommodation, entertainment, mobility, and accessibility.

Keywords: tourism, tourist attractions, tourism development, urban expansion

Procedia PDF Downloads 213
272 Dancing with Perfectionism and Emotional Inhibition on the Ground of Disordered Eating Behaviors: Investigating Emotion Regulation Difficulties as Mediating Factor

Authors: Merve Denizci Nazligul

Abstract:

Dancers seem to have much higher risk levels for the development of eating disorders, compared to non-dancing counterparts. In a remarkably competitive nature of dance environment, perfectionism and emotion regulation difficulties become inevitable risk factors. Moreover, early maladaptive schemas are associated with various eating disorders. In the current study, it was aimed to investigate the mediating role of difficulties with emotion regulation on the relationship between perfectionism and disordered eating behaviors, as well as on the relationship between early maladaptive schemas and disordered eating behaviors. A total of 70 volunteer dancers (n = 47 women, n = 23 men) were recruited in the study (M age = 25.91, SD = 8.9, range 19–63) from the university teams or private clubs in Turkey. The sample included various types of dancers (n = 26 ballets or ballerinas, n =32 Latin, n = 10 tango, n = 2 hiphop). The mean dancing hour per week was 11.09 (SD = 7.09) within a range of 1-30 hours. The participants filled a questionnaire set including demographic information form, Dutch Eating Behavior Questionnaire, Multidimensional Perfectionism Scale, three subscales (Emotional Inhibition, Unrelenting Standards-Hypercriticalness, Approval Seeking-Recognition Seeking) from Young Schema Questionnaire-Short Form-3 and Difficulties in Emotion Regulation Scale. The mediation hypotheses were tested using the PROCESS macro in SPSS. The findings revealed that emotion regulation difficulties significantly mediated the relationship between three distinct subtypes of perfectionism and emotional eating. The results of the Sobel test suggested that there were significant indirect effects of self-oriented perfectionism (b = .06, 95% CI = .0084, .1739), other-oriented perfectionism (b = .15, 95% CI = .0136, .4185), and socially prescribed perfectionism (b = .09, 95% CI = .0104, .2344) on emotional eating through difficulties with emotion regulation. Moreover, emotion regulation difficulties significantly mediated the relationship between emotional inhibition and emotional eating (F(1,68) = 4.67, R2 = .06, p < .05). These results seem to provide some evidence that perfectionism might become a risk factor for disordered eating behaviors when dancers are not able to regulate their emotions. Further, gaining an understanding of how inhibition of emotions leads to inverse effects on eating behavior may be important to develop intervention strategies to manage their disordered eating patterns in risk groups. The present study may also support the importance of using unified protocols for transdiagnostic approaches which focus on identifying, accepting, prompting to express maladaptive emotions and appraisals.

Keywords: dancers, disordered eating, emotion regulation difficulties, perfectionism

Procedia PDF Downloads 118
271 Development of Electronic Waste Management Framework at College of Design Art, Design and Technology

Authors: Wafula Simon Peter, Kimuli Nabayego Ibtihal, Nabaggala Kimuli Nashua

Abstract:

The worldwide use of information and communications technology (ICT) equipment and other electronic equipment is growing and consequently, there is a growing amount of equipment that becomes waste after its time in use. This growth is expected to accelerate since equipment lifetime decreases with time and growing consumption. As a result, e-waste is one of the fastest-growing waste streams globally. The United Nations University (UNU) calculates in its second Global E-waste Monitor 44.7 million metric tonnes (Mt) of e-waste were generated globally in 2016. The study population was 80 respondents, from which a sample of 69 respondents was selected using simple and purposive sampling techniques. This research was carried out to investigate the problem of e-waste and come up with a framework to improve e-waste management. The objective of the study was to develop a framework for improving e-waste management at the College of Engineering, Design, Art and Technology (CEDAT). This was achieved by breaking it down into specific objectives, and these included the establishment of the policy and other Regulatory frameworks being used in e-waste management at CEDAT, the determination of the effectiveness of the e-waste management practices at CEDAT, the establishment of the critical challenges constraining e-waste management at the College, development of a framework for e-waste management. The study reviewed the e-waste regulatory framework used at the college and then collected data which was used to come up with a framework. The study also established that weak policy and regulatory framework, lack of proper infrastructure, improper disposal of e-waste and a general lack of awareness of the e-waste and the magnitude of the problem are the critical challenges of e-waste management. In conclusion, the policy and regulatory framework should be revised, localized and strengthened to contextually address the problem. Awareness campaigns, the development of proper infrastructure and extensive research to establish the volumes and magnitude of the problems will come in handy. The study recommends a framework for the improvement of e-waste.

Keywords: e-waste, treatment, disposal, computers, model, management policy and guidelines

Procedia PDF Downloads 52
270 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 244
269 Music Listening in Dementia: Current Developments and the Potential for Automated Systems in the Home: Scoping Review and Discussion

Authors: Alexander Street, Nina Wollersberger, Paul Fernie, Leonardo Muller, Ming Hung HSU, Helen Odell-Miller, Jorg Fachner, Patrizia Di Campli San Vito, Stephen Brewster, Hari Shaji, Satvik Venkatesh, Paolo Itaborai, Nicolas Farina, Alexis Kirke, Sube Banerjee, Eduardo Reck Miranda

Abstract:

Escalating neuropsychiatric symptoms (NPS) in people with dementia may lead to earlier care home admission. Music listening has been reported to stimulate cognitive function, potentially reducing agitation in this population. We present a scoping review, reporting on current developments and discussing the potential for music listening with related technology in managing agitation in dementia care. Of two searches for music listening studies, one focused on older people or people living with dementia where music listening interventions, including technology, were delivered in participants’ homes or in institutions to address neuropsychiatric symptoms, quality of life and independence. The second included any population focusing on the use of music technology for health and wellbeing. In search one 70/251 full texts were included. The majority reported either statistical significance (6, 8.5%), significance (17, 24.2%) or improvements (26, 37.1%). Agitation was specifically reported in 36 (51.4%). The second search included 51/99 full texts, reporting improvement (28, 54.9%), significance (11, 21.5%), statistical significance (1, 1.9%) and no difference compared to the control (6, 11.7%). The majority in the first focused on mood and agitation, and the second on mood and psychophysiological responses. Five studies used AI or machine learning systems to select music, all involving healthy controls and reporting benefits. Most studies in both reviews were not conducted in a home environment (review 1 = 12; 17.1%; review 2 = 11; 21.5%). Preferred music listening may help manage NPS in the care home settings. Based on these and other data extracted in the review, a reasonable progression would be to co-design and test music listening systems and protocols for NPS in all settings, including people’s homes. Machine learning and automated technology for music selection and arousal adjustment, driven by live biodata, have not been explored in dementia care. Such approaches may help deliver the right music at the appropriate time in the required dosage, reducing the use of medication and improving quality of life.

Keywords: music listening, dementia, agitation, scoping review, technology

Procedia PDF Downloads 78
268 The Compliance of Safe-Work Behaviors among Undergraduate Nursing Students with Different Clinical Experiences

Authors: K. C. Wong, K. L. Siu, S. N. Ng, K. N. Yip, Y. Y. Yuen, K. W. Lee, K. W. Wong, C. C. Li, H. P. Lam

Abstract:

Background: Occupational injuries among nursing profession were found related to repeated bedside nursing care, such as transfer, lifting and manual handling patients from previous studies. Likewise, undergraduate nursing students are also exposed to potential safety hazard due to their similar work nature of registered nurses. Especially, those students who worked as Temporary undergraduate nursing students (TUNS) which is a part-time clinical job in hospitals in Hong Kong who mainly assisted in providing bedside cares appeared to at high risk of work-related injuries. Several studies suggested the level of compliance with safe work behaviors was highly associated with work-related injuries. Yet, it had been limitedly studied among nursing students. This study was conducted to assess and compare the compliance with safe work behaviors and the levels of awareness of different workplace safety issues between undergraduate nursing students with or without TUNS experiences. Methods: This is a quantitative descriptive study using convenience sampling. 362 undergraduate nursing students in Hong Kong were recruited. The Safe Work Behavior relating to Patient Handling (SWB-PH) was used to assess their compliance of safe-work behaviors and the level of awareness of different workplace safety issues. Results: The results showed that most of the participants (n=250, 69.1%) who were working as TUNS. However, students who worked as TUNS had significantly lower safe-work behaviors compliance (mean SWB-PH score = 3.64±0.54) than those did not worked as TUNS (SWB-PH score=4.21±0.54) (p<0.001). Particularly, these students had higher awareness to seek help and use assistive devices but lower awareness of workplace safety issues and awareness of proper work posture than students without TUNS experiences. The students with TUNS experiences had higher engagement in help-seeking behaviors might be possibly explained by their richer clinical experiences which served as a facilitator to seek help from clinical staff whenever necessary. Besides, these experienced students were more likely to bear risks for occupational injuries and worked alone when no available aid which might be related to the busy working environment, heightened work pressures and high expectations of TUNS. Eventually, students who worked as TUNS might target on completing the assigned tasks and gradually neglecting the occupational safety. Conclusion: The findings contributed to an understanding of the level of compliance with safe work behaviors among nursing students with different clinical experiences. The results might guide the modification of current safety protocols and the introduction of multiple clinical training courses to improve nursing student’s engagement in safe work behaviors.

Keywords: Occupational safety, Safety compliance, Safe-work behavior, Nursing students

Procedia PDF Downloads 117
267 A Convolutional Neural Network Based Vehicle Theft Detection, Location, and Reporting System

Authors: Michael Moeti, Khuliso Sigama, Thapelo Samuel Matlala

Abstract:

One of the principal challenges that the world is confronted with is insecurity. The crime rate is increasing exponentially, and protecting our physical assets especially in the motorist industry, is becoming impossible when applying our own strength. The need to develop technological solutions that detect and report theft without any human interference is inevitable. This is critical, especially for vehicle owners, to ensure theft detection and speedy identification towards recovery efforts in cases where a vehicle is missing or attempted theft is taking place. The vehicle theft detection system uses Convolutional Neural Network (CNN) to recognize the driver's face captured using an installed mobile phone device. The location identification function uses a Global Positioning System (GPS) to determine the real-time location of the vehicle. Upon identification of the location, Global System for Mobile Communications (GSM) technology is used to report or notify the vehicle owner about the whereabouts of the vehicle. The installed mobile app was implemented by making use of python as it is undoubtedly the best choice in machine learning. It allows easy access to machine learning algorithms through its widely developed library ecosystem. The graphical user interface was developed by making use of JAVA as it is better suited for mobile development. Google's online database (Firebase) was used as a means of storage for the application. The system integration test was performed using a simple percentage analysis. Sixty (60) vehicle owners participated in this study as a sample, and questionnaires were used in order to establish the acceptability of the system developed. The result indicates the efficiency of the proposed system, and consequently, the paper proposes the use of the system can effectively monitor the vehicle at any given place, even if it is driven outside its normal jurisdiction. More so, the system can be used as a database to detect, locate and report missing vehicles to different security agencies.

Keywords: CNN, location identification, tracking, GPS, GSM

Procedia PDF Downloads 130
266 Serological Evidence of Enzootic Bovine Leukosis in Dairy Cattle Herds in the United Arab Emirates

Authors: Nabeeha Hassan Abdel Jalil, Lulwa Saeed Al Badi, Mouza Ghafan Alkhyeli, Khaja Mohteshamuddin, Ahmad Al Aiyan, Mohamed Elfatih Hamad, Robert Barigye

Abstract:

The present study was done to elucidate the prevalence of enzootic bovine leucosis (EBL) in the UAE, the seroprevalence rates of EBL in dairy herds from the Al Ain area, Abu Dhabi (AD) and indigenous cattle at the Al Ain livestock market (AALM) were assessed. Of the 949 sera tested by ELISA, 657 were from adult Holstein-Friesians from three farms and 292 from indigenous cattle at the AALM. The level of significance between the proportions of seropositive cattle were analyzed by the Marascuilo procedure and questionnaire data on husbandry and biosecurity practices evaluated. Overall, the aggregated farm and AALM data demonstrated a seroprevalence of 25.9%, compared to 37.0% for the study farms, and 1.0% for the indigenous cattle. Additionally, the seroprevalence rates at farms #1, #2 and #3 were 54.7%, 0.0%, and 26.3% respectively. Except for farm #2 and the AALM, statistically significant differences were noted between the proportions of seropositive cattle for farms #1 and #2 (Critical Range or CR=0.0803), farms #1 and #3 (p=0.1069), and farms #2 and #3 (CR=0.0707), farm #1 and the AALM (CR=0.0819), and farm #3 and the AALM (CR=0.0726). Also, the proportions of seropositive animals on farm #1 were 9.8%, 59.8%, 29.3%, and 1.2% in the 12-36, 37-72, 73-108, and 109-144-mo-old age groups respectively compared to 21.5%, 60.8%, 15.2%, and 2.5% in the respective age groups for farm #2. On both farms and the AALM, the 37-72-mo-old age group showed the highest EBL seroprevalence rate while all the 57 cattle on farm #2 were seronegative. Additionally, farms #1 and #3 had 3,130 and 2,828 intensively managed Holstein-Friesian cattle respectively, and all animals were routinely immunized against several diseases except EBL. On both farms #1 and #3, artificial breeding was practiced using semen sourced from the USA, and USA and Canada respectively, all farms routinely quarantined new stock, and farm #1 previously imported dairy cattle from an unspecified country, and farm #3 from the Netherlands, Australia and South Africa. While farm #1 provided no information on animal nutrition, farm #3 cited using hay, concentrates, and ad lib water. To the authors’ best knowledge, this is the first serological evidence of EBL in the UAE and as previously reported, the seroprevalence rates are comparatively higher in the intensively managed dairy herds than in indigenous cattle. As two of the study farms previously sourced cattle and semen from overseas, biosecurity protocols need to be revisited to avoid inadvertent EBL incursion and the possibility of regional transboundary disease spread also needs to be assessed. After the proposed molecular studies have adduced additional data, the relevant UAE animal health authorities may need to develop evidence-based EBL control policies and programs.

Keywords: cattle, enzootic bovine leukosis, seroprevalence, UAE

Procedia PDF Downloads 117
265 Learning through Reflective Practice of Nursing Students in the Delivery Room: A Qualitative Research

Authors: Peeranan Wisanskoonwong, Sumitta Sawangtook

Abstract:

Practicum in Midwifery II is the subject that affects most students to be stressed and anxious because they lack of experiences and self-confidence in delivery baby. This study is a qualitative research. That research objectives were (1) to study learning through reflective practice of nursing students (2) to explain the effects of learning through reflective practice of nursing students in the delivery room. The selected key informant method was criterion-based selection. Thirty-two of fourth-year nursing students in Kuakarun Faculty of nursing who practiced in Delivery room at Taksin Hospital in academic year 2014 were selected. Data collection was data triangulation which consisted of in-depth interview, group discussion and reading students’ reflective practice journal. The research instruments were students’ reflective practice journal, semi-structured questionnaires for in-depth interview, group discussion. Data analysis was thematic analysis. The research result found that: The learning method through reflective practice of nursing students in the delivery room were (1) reflective practice journal (2) dialogue (3) critical thinking and problem solving (4) incident analysis (5) self-criticism (6) observation and evaluation of practice. There were eight issues that students learned through their reflective practice were that (1) students' ethics and morality. (2) students' knowledge and comprehension (3) creative thinking of students (4) communications and collaboration (5) experiential learning of students (6) students’memories and impressions (7) students’experience in delivery baby (8) self-learning of students. Learning through reflective practice supported students’ awareness in improving knowledge and learning continuously and systematically. It helped to adjust the attitude to learning and leadership to be careful which help develop their skills, including critical thinking and understand themselves and understand others. Recommendation for applying research results: midwifery and nursing lecturers can apply these results to be a guide for development their clinical teaching in delivery rooms and other wards.

Keywords: learning, reflection, birth, qualitative research

Procedia PDF Downloads 258
264 Interaction or Conflict: Addressing Modern Trans-Himalayan Pastoralism and Wildlife

Authors: Amit Kaushik

Abstract:

Equus kiang kiang is an indigenous large-bodied herbivore species, and in India, it is restricted to limited geographies of Ladakh. One of such areas is the Tsokar Basin. With the rise in global pashmina demand, the livestock numbers have grown significantly. Previous studies have reported conflict between a nomadic pastoral community, the Changpas, and kiang. Absentee pastoralism (in lieu of pure pastoralism) and tourism are two major economic activities among the local people. However, the social, economic, political, and ecological changes are inevitable in such a contemporary system. The study examines several factors influencing the local pastoral economy and focuses on the presence of two non-human cohabitants, kiang, and the wolf. This study used semi-structured interviews and vehicle count method in four different seasons. The results show that people perceived kiang as a threat but also reveal a level of tolerance towards them. The locals predicted high kiang numbers ranging from 200-3000 in the basin and contrastingly ranked them behind wolves, which are very few in numbers. Due to a lack of scientific pieces of evidence, the kiang population status remains obscure, and local peoples’ concerns remain unaddressed. But how this competitive dysfunctionality does take place? On one side, the rural development or the animal husbandry department aims at developing the area by providing stall-feed and tourism, whereas, on another side, the wildlife department emphasizes wildlife conservation. Therefore, the managers and planners may need to be cautious about the local socio-ecological complexities and may require inter-departmental communications. The study concludes that an interdisciplinary inquiry may be an important tool in understanding such a precarious situation and may be used in the policy-making processes.

Keywords: coexistence, human-livestock-wildlife interactions, interdisciplinary approach, kiang, policymaking, tsokar.

Procedia PDF Downloads 111
263 Revolutionizing Healthcare Facility Maintenance: A Groundbreaking AI, BIM, and IoT Integration Framework

Authors: Mina Sadat Orooje, Mohammad Mehdi Latifi, Behnam Fereydooni Eftekhari

Abstract:

The integration of cutting-edge Internet of Things (IoT) technologies with advanced Artificial Intelligence (AI) systems is revolutionizing healthcare facility management. However, the current landscape of hospital building maintenance suffers from slow, repetitive, and disjointed processes, leading to significant financial, resource, and time losses. Additionally, the potential of Building Information Modeling (BIM) in facility maintenance is hindered by a lack of data within digital models of built environments, necessitating a more streamlined data collection process. This paper presents a robust framework that harmonizes AI with BIM-IoT technology to elevate healthcare Facility Maintenance Management (FMM) and address these pressing challenges. The methodology begins with a thorough literature review and requirements analysis, providing insights into existing technological landscapes and associated obstacles. Extensive data collection and analysis efforts follow to deepen understanding of hospital infrastructure and maintenance records. Critical AI algorithms are identified to address predictive maintenance, anomaly detection, and optimization needs alongside integration strategies for BIM and IoT technologies, enabling real-time data collection and analysis. The framework outlines protocols for data processing, analysis, and decision-making. A prototype implementation is executed to showcase the framework's functionality, followed by a rigorous validation process to evaluate its efficacy and gather user feedback. Refinement and optimization steps are then undertaken based on evaluation outcomes. Emphasis is placed on the scalability of the framework in real-world scenarios and its potential applications across diverse healthcare facility contexts. Finally, the findings are meticulously documented and shared within the healthcare and facility management communities. This framework aims to significantly boost maintenance efficiency, cut costs, provide decision support, enable real-time monitoring, offer data-driven insights, and ultimately enhance patient safety and satisfaction. By tackling current challenges in healthcare facility maintenance management it paves the way for the adoption of smarter and more efficient maintenance practices in healthcare facilities.

Keywords: artificial intelligence, building information modeling, healthcare facility maintenance, internet of things integration, maintenance efficiency

Procedia PDF Downloads 24
262 Tumor Size and Lymph Node Metastasis Detection in Colon Cancer Patients Using MR Images

Authors: Mohammadreza Hedyehzadeh, Mahdi Yousefi

Abstract:

Colon cancer is one of the most common cancer, which predicted to increase its prevalence due to the bad eating habits of peoples. Nowadays, due to the busyness of people, the use of fast foods is increasing, and therefore, diagnosis of this disease and its treatment are of particular importance. To determine the best treatment approach for each specific colon cancer patients, the oncologist should be known the stage of the tumor. The most common method to determine the tumor stage is TNM staging system. In this system, M indicates the presence of metastasis, N indicates the extent of spread to the lymph nodes, and T indicates the size of the tumor. It is clear that in order to determine all three of these parameters, an imaging method must be used, and the gold standard imaging protocols for this purpose are CT and PET/CT. In CT imaging, due to the use of X-rays, the risk of cancer and the absorbed dose of the patient is high, while in the PET/CT method, there is a lack of access to the device due to its high cost. Therefore, in this study, we aimed to estimate the tumor size and the extent of its spread to the lymph nodes using MR images. More than 1300 MR images collected from the TCIA portal, and in the first step (pre-processing), histogram equalization to improve image qualities and resizing to get the same image size was done. Two expert radiologists, which work more than 21 years on colon cancer cases, segmented the images and extracted the tumor region from the images. The next step is feature extraction from segmented images and then classify the data into three classes: T0N0، T3N1 و T3N2. In this article, the VGG-16 convolutional neural network has been used to perform both of the above-mentioned tasks, i.e., feature extraction and classification. This network has 13 convolution layers for feature extraction and three fully connected layers with the softmax activation function for classification. In order to validate the proposed method, the 10-fold cross validation method used in such a way that the data was randomly divided into three parts: training (70% of data), validation (10% of data) and the rest for testing. It is repeated 10 times, each time, the accuracy, sensitivity and specificity of the model are calculated and the average of ten repetitions is reported as the result. The accuracy, specificity and sensitivity of the proposed method for testing dataset was 89/09%, 95/8% and 96/4%. Compared to previous studies, using a safe imaging technique (MRI) and non-use of predefined hand-crafted imaging features to determine the stage of colon cancer patients are some of the study advantages.

Keywords: colon cancer, VGG-16, magnetic resonance imaging, tumor size, lymph node metastasis

Procedia PDF Downloads 37
261 A Paradigm Shift towards Personalized and Scalable Product Development and Lifecycle Management Systems in the Aerospace Industry

Authors: David E. Culler, Noah D. Anderson

Abstract:

Integrated systems for product design, manufacturing, and lifecycle management are difficult to implement and customize. Commercial software vendors, including CAD/CAM and third party PDM/PLM developers, create user interfaces and functionality that allow their products to be applied across many industries. The result is that systems become overloaded with functionality, difficult to navigate, and use terminology that is unfamiliar to engineers and production personnel. For example, manufacturers of automotive, aeronautical, electronics, and household products use similar but distinct methods and processes. Furthermore, each company tends to have their own preferred tools and programs for controlling work and information flow and that connect design, planning, and manufacturing processes to business applications. This paper presents a methodology and a case study that addresses these issues and suggests that in the future more companies will develop personalized applications that fit to the natural way that their business operates. A functioning system has been implemented at a highly competitive U.S. aerospace tooling and component supplier that works with many prominent airline manufacturers around the world including The Boeing Company, Airbus, Embraer, and Bombardier Aerospace. During the last three years, the program has produced significant benefits such as the automatic creation and management of component and assembly designs (parametric models and drawings), the extensive use of lightweight 3D data, and changes to the way projects are executed from beginning to end. CATIA (CAD/CAE/CAM) and a variety of programs developed in C#, VB.Net, HTML, and SQL make up the current system. The web-based platform is facilitating collaborative work across multiple sites around the world and improving communications with customers and suppliers. This work demonstrates that the creative use of Application Programming Interface (API) utilities, libraries, and methods is a key to automating many time-consuming tasks and linking applications together.

Keywords: PDM, PLM, collaboration, CAD/CAM, scalable systems

Procedia PDF Downloads 155