Search results for: disruption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 312

Search results for: disruption

222 Technological Enhancements in Supply Chain Management Post COVID-19

Authors: Miran Ismail

Abstract:

COVID-19 has caused widespread disruption in all economical sectors and industries around the world. The COVID-19 lockdown measures have resulted in production halts, restrictions on persons and goods movement, border closures, logistical constraints, and a slowdown in trade and economic activity. The main subject of this paper is to leverage technology to manage the supply chain effectively and efficiently through the usage of artificial intelligence. The research methodology is based on empirical data collected through a questionnaire survey. One of the approaches utilized is a case study of industrial organizations that face obstacles such as high operational costs, large inventory levels, a lack of well-established supplier relationships, human behavior, and system issues. The main contribution of this research to the body of knowledge is the empirical insights and on supply chain sustainability performance measurement. The results provide guidelines for the selection of advanced technologies to support supply chain processes and for the design of sustainable performance measurement systems.

Keywords: information technology, artificial intelligence, supply chain management, industrial organizations

Procedia PDF Downloads 95
221 Phytodiversity and Phytogeographic Characterization Stands of Pistacia lentiscus L. in the Coastal Region of Honaine, Tlemcen, Western Algeria

Authors: I. Benmehdi, O. Hasnaoui, N. Hachemi, M. Bouazza

Abstract:

The Understanding of the mechanisms structuring of plant diversity in the region of Tlemcen (western Algeria) is a related problem. The current floristic composition of different groups in Pistacia lentiscus L. resulting from the combination of human and climate action. This study is devoted to biodiversity inventory and phytogeographic characterization of Pistacia lentiscus groups in the Honaine coastal (western Algeria). The floristic inventory (150 levels) made in three stations of the study area allowed to count a 109 species belonging to 44 families of vascular plants. The biogeographical analysis of the Pistacia lentiscus groups reveals the most representative elements. The Mediterranean elements are numerically the most dominant with 39.45% represented by: Pistacia lentiscus, Cistus monspeliensis, Plantago lagopus, Linum strictum, Echium vulgare; followed by the western Mediterranean elements with 10.09% and are represented by: Chamaerops humilis, Lavandula dentata, Ampelodesma mauritanicum and Iris xyphium. However, this phytotaxonomic wealth is exposed to anthropogenic impact causing its disruption see its decline.

Keywords: Pistacia lentiscus L., phytodiversity, phytogeography, honaine, western Algeria

Procedia PDF Downloads 369
220 Dietary Gluten and the Balance of Gut Microbiota in the Dextran Sulphate Sodium Induced Colitis Model

Authors: Austin Belfiori, Kevin Rinek, Zach Barcroft, Jennifer Berglind

Abstract:

Diet influences the composition of the gut microbiota and host's health. Disruption of the balance among the microbiota, epithelial cells, and resident immune cells in the intestine is involved in the pathogenesis of inflammatory bowel disease (IBD). To study the role of gut microbiota in intestinal inflammation, the microbiome of control mice (C57BL6) given a gluten-containing standard diet versus C57BL6 mice given the gluten-free (GF) feed (n=10 in each group) was examined. All mice received the 3% DSS for 5 days. Throughout the study, feces were collected and processed for DNA extraction and MiSeq Illumina sequencing of V4 region of bacterial 16S rRNA gene. Alpha and beta diversities and compositional differences at phylum and genus levels were determined in intestinal microbiota. The mice receiving the GF diet showed a significantly increased abundance of Firmicutes and a decrease of Bacteroides and Lactobacillus at phylum level. Therefore, the gluten free diet led to reductions in beneficial gut bacteria populations. These findings indicate a role of wheat gluten in dysbiosis of the intestinal microbiota.

Keywords: gluten, colitis, microbiota, DSS, dextran sulphate sodium

Procedia PDF Downloads 179
219 Impact of Transgenic Adipose Derived Stem Cells in the Healing of Spinal Cord Injury of Dogs

Authors: Imdad Ullah Khan, Yongseok Yoon, Kyeung Uk Choi, Kwang Rae Jo, Namyul Kim, Eunbee Lee, Wan Hee Kim, Oh-Kyeong Kweon

Abstract:

The primary spinal cord injury (SCI) causes mechanical damage to the neurons and blood vessels. It leads to secondary SCI, which activates multiple pathological pathways, which expand neuronal damage at the injury site. It is characterized by vascular disruption, ischemia, excitotoxicity, oxidation, inflammation, and apoptotic cell death. It causes nerve demyelination and disruption of axons, which perpetuate a loss of impulse conduction through the injured spinal cord. It also leads to the production of myelin inhibitory molecules, which with a concomitant formation of an astroglial scar, impede axonal regeneration. The pivotal role regarding the neuronal necrosis is played by oxidation and inflammation. During an early stage of spinal cord injury, there occurs an abundant expression of reactive oxygen species (ROS) due to defective mitochondrial metabolism and abundant migration of phagocytes (macrophages, neutrophils). ROS cause lipid peroxidation of the cell membrane, and cell death. Abundant migration of neutrophils, macrophages, and lymphocytes collectively produce pro-inflammatory cytokines such as tumor necrosis factor-alpha (TNF-α), interleukin-6 (IL-6), interleukin-1beta (IL-1β), matrix metalloproteinase, superoxide dismutase, and myeloperoxidases which synergize neuronal apoptosis. Therefore, it is crucial to control inflammation and oxidation injury to minimize the nerve cell death during secondary spinal cord injury. Therefore, in response to oxidation and inflammation, heme oxygenase-1 (HO-1) is induced by the resident cells to ameliorate the milieu. In the meanwhile, neurotrophic factors are induced to promote neuroregeneration. However, it seems that anti-stress enzyme (HO-1) and neurotrophic factor (BDNF) do not significantly combat the pathological events during secondary spinal cord injury. Therefore, optimum healing can be induced if anti-inflammatory and neurotrophic factors are administered in a higher amount through an exogenous source. During the first experiment, the inflammation and neuroregeneration were selectively targeted. HO-1 expressing MSCs (HO-1 MSCs) and BDNF expressing MSCs (BDNF MSC) were co-transplanted in one group (combination group) of dogs with subacute spinal cord injury to selectively control the expression of inflammatory cytokines by HO-1 and induce neuroregeneration by BDNF. We compared the combination group with the HO-1 MSCs group, BDNF MSCs group, and GFP MSCs group. We found that the combination group showed significant improvement in functional recovery. It showed increased expression of neural markers and growth-associated proteins (GAP-43) than in other groups, which depicts enhanced neuroregeneration/neural sparing due to reduced expression of pro-inflammatory cytokines such as TNF-alpha, IL-6 and COX-2; and increased expression of anti-inflammatory markers such as IL-10 and HO-1. Histopathological study revealed reduced intra-parenchymal fibrosis in the injured spinal cord segment in the combination group than in other groups. Thus it was concluded that selectively targeting the inflammation and neuronal growth with the combined use of HO-1 MSCs and BDNF MSCs more favorably promote healing of the SCI. HO-1 MSCs play a role in controlling the inflammation, which favors the BDNF induced neuroregeneration at the injured spinal cord segment of dogs.

Keywords: HO-1 MSCs, BDNF MSCs, neuroregeneration, inflammation, anti-inflammation, spinal cord injury, dogs

Procedia PDF Downloads 98
218 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 270
217 Personnel Training of Automotive Manufacturers in Virtual Reality

Authors: Mirza Ahsan Baig, Paul Evans

Abstract:

Due to the high demand for automobiles, manufacturers have to run their production lines non-stop for long periods. At such a scale, unplanned downtime could cost up to $50 billion annually. Improper training of new hires could lead to safety issues causing unplanned downtimes. The project developed a virtual reality simulation that could train personnel for key operations on an automobile manufacturing floor, reducing the risk of unplanned downtime while eliminating any disruption (due to training) on the assembly line. An automation firm sponsored it to explore the possibilities the likes of Jaguar and BMW are yet to achieve! The project was inspired by Bentley, the only company that succeeded in simulation training scenarios within virtual space. The project aims to inspire other significant firms to do the same. It was increasing employee safety, eliminating downtimes, and improving efficiency. The developed prototype uncovered various limitations within existing simulation providers and was able to simulate state-of-the-art training scenarios. It also explored the possibility of a multiuser interface and resolved complex issues such as lack of movement space within the training area.

Keywords: virtual reality, scenario training, limited movement, multiuser

Procedia PDF Downloads 53
216 Disaster Management Using Wireless Sensor Networks

Authors: Akila Murali, Prithika Manivel

Abstract:

Disasters are defined as a serious disruption of the functioning of a community or a society, which involves widespread human, material, economic or environmental impacts. The number of people suffering food crisis as a result of natural disasters has tripled in the last thirty years. The economic losses due to natural disasters have shown an increase with a factor of eight over the past four decades, caused by the increased vulnerability of the global society, and also due to an increase in the number of weather-related disasters. Efficient disaster detection and alerting systems could reduce the loss of life and properties. In the event of a disaster, another important issue is a good search and rescue system with high levels of precision, timeliness and safety for both the victims and the rescuers. Wireless Sensor Networks technology has the capability of quick capturing, processing, and transmission of critical data in real-time with high resolution. This paper studies the capacity of sensors and a Wireless Sensor Network to collect, collate and analyze valuable and worthwhile data, in an ordered manner to help with disaster management.

Keywords: alerting systems, disaster detection, Ad Hoc network, WSN technology

Procedia PDF Downloads 384
215 Nearly Zero-Energy Regulation and Buildings Built with Prefabricated Technology: The Case of Hungary

Authors: András Horkai, Attila Talamon, Viktória Sugár

Abstract:

There is an urgent need nowadays to reduce energy demand and the current level of greenhouse gas emission and use renewable energy sources increase in energy efficiency. On the other hand, the European Union (EU) countries are largely dependent on energy imports and are vulnerable to disruption in energy supply, which may, in turn, threaten the functioning of their current economic structure. Residential buildings represent a significant part of the energy consumption of the building stock. Only a small part of the building stock is exchanged every year, thus it is essential to increase the energy efficiency of the existing buildings. Present paper focuses on the buildings built with industrialized technology only, and their opportunities in the boundaries of nearly zero-energy regulation. Current paper shows the emergence of panel construction method, and past and present of the ‘panel’ problem in Hungary with a short outlook to Europe. The study shows as well as the possibilities for meeting the nearly zero and cost optimized requirements for residential buildings by analyzing the renovation scenarios of an existing residential typology.

Keywords: Budapest, energy consumption, industrialized technology, nearly zero-energy buildings

Procedia PDF Downloads 312
214 Molecular Docking and Synthesis of Nitrogen-Containing Bisphosphonates

Authors: S. Ghalem, M. Mesmoudi, I. Daoudand, H. Allali

Abstract:

The nitrogen-containing bisphosphonates (N-BPs) are well established as the treatments of choice for disorders of excessive bone resorption, myeloma and bone metastases, and osteoporosis. They inhibit farnesyl pyrophosphate synthase (FFPS), a key enzyme in the mevalonate pathway, resulting in inhibition of the prenylation of small GTP-binding proteins in osteoclasts and disruption of their cytoskeleton, adhesion/spreading, and invasion of cancer cells. A very few examples for synthesis of α-amino bisphosphonates based on several amino acids are known from the literature. In the present work, esters of aminoacid react with ketophsophonate (or their analog acid or acyl) to afford the desired products, α-iminophosphonates. The reaction of imine with dimethyl phosphate in the presence of catalytic amount of I2 give ester of α-aminobisphosphonate as sole product in good yield. Finally, we used computational docking methods to predict how several α-aminobisphosphonates bind to FPPS and how R and X influence. Pamidronate, β-aminobisphosphonate already marketed, was used as reference. These results are of interest since they represent a new and simple way to sythesize α-aminobisphosphonates with a free COOH group increased by R2 functionalisable and opening up the possibility of using the molecular docking to facilitate the design of other, novel FFPS inhibitors.

Keywords: drug research, cancer, α-amino bisphosphonates, molecular docking

Procedia PDF Downloads 244
213 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 232
212 Evaluation of the Efficiency of Intelligent Systems in Traffic Congestion Pricing Schemes in Urban Streets

Authors: Saeed Sayyad Hagh Shomar

Abstract:

Traffic congestion pricing as one of the demand management strategies constrains expenditure to network users so that it helps reduction in traffic congestion and environment pollution like air pollution. Despite the development of congestion pricing schemes for traffic in our country, the matters of traditional toll collection, drivers’ waste of time and delay in traffic are still widespread. Electronic toll collection as a part of the intelligent transportation system provides the possibility of collecting tolls without car-stop and traffic disruption. Unlike the satisfying outcomes of using intelligent systems in congestion pricing schemes, implementation costs and technological problems are the barriers in these schemes. In this research first, a variety of electronic pay toll systems and their components are introduced then their functional usage is discussed. In the following, by analyzing and comparing the barriers, limitations and advantages, the selection criteria of intelligent systems are described and the results show that the choice of the best technology depends on the various parameters which, by examining them, it is concluded that in a long-term run and by providing the necessary conditions, DSRC technology as the main system in the schemes and ANPR as a major backup system of the main one can be employed.

Keywords: congestion pricing, electronic toll collection, intelligent systems, technology, traffic

Procedia PDF Downloads 575
211 Installing Photovoltaic Panels to Generate Optimal Energy in SPAV Hostel, Vijayawada

Authors: J. Jayasuriya

Abstract:

In this research paper, a procedure for installing and assessment of a solar PV plant to generate optimal solar energy SPAV hostel at Vijayawada city was analyzed. The hostel was experiencing power disruption and had a need for an unceasing energy source. The solar panel is one of the best solutions to obtain uninterrupted clean renewable energy for an institutional building as it neither makes din nor pollutes the atmosphere. The electricity usage per month was initially measured to discriminate the energy change. The solar array was installed with its financial and environmental assessment considering recent market prices. All the aspects related to a solar PV plant were considered for the feasibility and efficiency of PV plant near this site i.e., the orientation of the site, the size and shape of the terrace, the sun path were considered while installing panels. Various precautions were taken to intercept the factors which cause interference in energy generation, with respect to temperature, overshadowing, the wiring of panels, pollution etc. The solar panels were frequently installed, monitored and maintained properly to procure optimal energy output. Result obtained with the assessment of the proposed plant and deflation in the electric bill will show the maximal energy that can be generated in a month on that particular site.

Keywords: solar efficiency, building sustainability, PV panel, solar energy

Procedia PDF Downloads 111
210 Flood-Induced River Disruption: Geomorphic Imprints and Topographic Effects in Kelantan River Catchment from Kemubu to Kuala Besar, Kelantan, Malaysia

Authors: Mohamad Muqtada Ali Khan, Nor Ashikin Shaari, Donny Adriansyah bin Nazaruddin, Hafzan Eva Bt Mansoor

Abstract:

Floods play a key role in landform evolution of an area. This process is likely to alter the topography of the earth’s surface. The present study area, Kota Bharu is very prone to floods extends from upstream of Kelantan River near Kemubu to the downstream area near Kuala Besar. These flood events which occur every year in the study area exhibit a strong bearing on river morphological set-up. In the present study, three satellite imageries of different time periods have been used to manifest the post-flood landform changes. The pre-processing of the images such as subset, geometric corrections and atmospheric corrections were carried-out using ENVI 4.5 followed by the analysis processes. Twenty sets of cross sections were plotted using software Erdas 9.2, ERDAS and ArcGis 10 for the all three images. The results show a significant change in the length of the cross section which suggest that the geomorphological processes play a key role in carving and shaping the river banks during the floods.

Keywords: flood induced, geomorphic imprints, Kelantan river, Malaysia

Procedia PDF Downloads 519
209 Cognitive Stylistics and Horror Fiction: A Case Study of Stephen King’s Misery

Authors: Kriangkrai Vathanalaoha

Abstract:

Misery generates fear and anxiety in readers through its intense plot associated with the unpredictable emotional states of the nurse, Annie Wilkes. At the same time, she mentally and physically abuses the novelist victim, Paul Sheldon. The suspense is not only at the story level, where the violent expressions are used but also at the discourse level, where the linguistic structures may intentionally cause the reader to view language as disturbing performative. This performativity could be reflected through linguistic choices where the writer triggers a new imaginative world through experiential metafunction and schema disruption. This study explores striking excerpts from the fiction through mind style and transitivity analysis to demonstrate how the horrific experience contrasts when the protagonist and the antagonist converse extensively. The results reveal that stylistic deviation can be found at the syntactic levels, where the intensity of emotions can be apparent when the protagonist is verbally abused. In addition, transitivity can flesh out how the protagonist is expressed chiefly through the internalized process, whereas the antagonist is eminent with the externalized process. The findings suggest that the application of cognitive stylistics, such as mind style and transitivity analysis, could contribute to the mental representation of horrific reality.

Keywords: horror, mind style, misery, stylistics, transitivity

Procedia PDF Downloads 110
208 Influence of Chemical Pollution on Thermal Habitats of the Ciliate Tetrahymena thermophila

Authors: Doufoungognon C. Kone

Abstract:

Global change, in particular pollution and global warming, threatens ecosystems and the biodiversity they harbor. Due to pollutants exposure, organisms might modify their thermal niches in order to track the thermal conditions limiting the negative impacts of chemical stressors depending on their mode of action. This study tests the influence of different pollutants, copper, salt, and chloramphenicol, on the thermal preferences of the ciliate Tetrahymena thermophila. Six genotypes were exposed to a gradient of concentrations ranging from 0 to 500mg/L for copper, 0 to 300 mg/l for chloramphenicol, and 0 to 12g/l for salt in synthetic media at eight temperatures ranging from 11 to 39° C. The measured fitness proxies are the maximum growth rate and the 50% growth inhibitory concentration (IC50). The results show that the majority of genotypes are more resistant to chloramphenicol in temperatures below their thermal optimum without pollutants, while they better tolerate other salt and copper in temperatures above their thermal optimum. In addition, generalists reduce their niche width while specialists widen it in chloramphenicol. Overall, results suggest that global warming would have a particularly deleterious effect in the case of chemical pollution. This pollution would induce the full disruption of the thermal habitats.

Keywords: ciliate, thermal niche, growth rate, toxicity, multiple stressors

Procedia PDF Downloads 58
207 GABARAPL1 (GEC1) mRNA Expression Levels in Patients with Alzheimer's Disease

Authors: Ali Bayram, Burak Uz, Ilhan Dolasik, Remzi Yiğiter

Abstract:

The GABARAP (GABAA-receptor-associated protein) family consists of GABARAP, GABARAPL1 (GABARAP-like 1) and GABARAPL2 (GABARAP-like 2). GABARAPL1, like GABARAP, was described to interact with both GABAA receptor and tubulin, and to be involved in intracellular GABAA receptor trafficking and promoting tubulin polymerization. In addition, GABARAPL1 is thought to be involved in various physiological (autophagosome closure, regulation of circadian rhythms) and/or pathological mechanisms (cancer, neurodegeneration). Alzheimer’s disease (AD) is a progressive neuro degenerative disorder characterized with impaired cognitive functions. Disruption of the GABAergic neuro transmission as well as cholinergic and glutamatergic interactions, may also be involved in the pathogenesis of AD. GABARAPL1 presents a regulated tissue expression and is the most expressed gene among the GABARAP family members in the central nervous system. We, herein, conducted a study to investigate the GABARAPL1 mRNA expression levels in patients with AD. 50 patients with AD and 49 control patients were enrolled to the present study. Messenger RNA expression levels of GABARAPL1 were detected by real-time polymerase chain reaction. GABARAPL1 mRNA expression in AD / control patients was 0,495 (95% confidence interval: 0,404-0,607), p= 0,00000002646. Reduced activity of GABARAPL1 gene might play a role, at least partly, in the pathophysiology of AD.

Keywords: Alzheimer’s disease, GABARAPL1, mRNA expression, RT-PCR

Procedia PDF Downloads 428
206 A Novel Paradigm in the Management of Pancreatic Trauma

Authors: E. Tan, O. McKay, T. Clarnette T., D. Croagh

Abstract:

Background: Historically with pancreatic trauma, complete disruption of the main pancreatic duct (MPD), classified as Grade IV-V by the American Association for the Surgery of Trauma (AAST), necessitated a damage-control laparotomy. This was to avoid mortality, shorten diet upgrade timeframe, and hence shorter length of stay. However, acute pancreatic resection entailed complications of pancreatic fistulas and leaks. With the advance of imaging-guided interventions, non-operative management such as percutaneous and transpapillary drainage of traumatic peripancreatic collections have been trialled favourably. The aim of this case series is to evaluate the efficacy of endoscopic ultrasound-guided (EUS) transmural drainage in managing traumatic peripancreatic collections as a less invasive alternative to traditional approaches. This study also highlights the importance of anatomical knowledge regarding peripancreatic collection’s common location in the lesser sac, the pancreas relationship to adjacent organs, and the formation of the main pancreatic duct in regards to the feasibility of therapeutic internal drainage. Methodology: A retrospective case series was conducted at a single tertiary endoscopy unit, analysing patient data over a 5-year period. Inclusion criteria outlined patients age 5 to 80-years-old, traumatic pancreatic injury of at least Grade IV and haemodynamic stability. Exclusion criteria involved previous episodes of pancreatitis or abdominal trauma. Patient demographics and clinicopathological characteristics were retrospectively collected. Results: The study identified 7 patients with traumatic pancreatic injuries that were managed from 2018-2022; age ranging from 5 to 34 years old, with majority being female (n=5). Majority of the mechanisms of trauma were a handlebar injury (n=4). Diagnosis was confirmed with an elevated lipase and computerized tomotography (CT) confirmation of proximal pancreatic transection with MPD disruption. All patients sustained an isolated single organ grade IV pancreatic injury, except case 4 and 5 with other intra-abdominal visceral Grade 1 injuries. 6 patients underwent early ERCP-guided transpapillary drainage with 1 being unsuccessful for pancreatic duct stent insertion (case 1) and 1 complication of stent migration (case 2). Surveillance imaging post ERCP showed the stents were unable to bridge the disrupted duct and development of symptomatic collections with an average size of 9.9cm. Hence, all patients proceeded to EUS-guided transmural drainage, with 2/7 patients requiring repeat drainages (case 6 and 7). Majority (n=6) had a cystogastrostomy, whilst 1 (case 6) had a cystoenterostomy due to feasibility of the peripancreatic collection being adjacent to duodenum rather than stomach. However, case 6 subsequently required repeat EUS-guided drainage with cystogastrostomy for ongoing collections. Hence all patients avoided initial laparotomy with an average index length of stay of 11.7 days. Successful transmural drainage was demonstrated, with no long-term complications of pancreatic insufficiency; except for 1 patient requiring a distal pancreatectomy at 2 year follow-up due to chronic pain. Conclusion: The early results of this series support EUS-guided transmural drainage as a viable management option for traumatic peripancreatic collections, showcasing successful outcomes, minimal complications, and long-term efficacy in avoiding surgical interventions. More studies are required before the adoption of this procedure as a less invasive and complication-prone management approach for traumatic peripancreatic collections.

Keywords: endoscopic ultrasound, cystogastrostomy, pancreatic trauma, traumatic peripancreatic collection, transmural drainage

Procedia PDF Downloads 15
205 Supplier Selection in a Scenario Based Stochastic Model with Uncertain Defectiveness and Delivery Lateness Rates

Authors: Abeer Amayri, Akif A. Bulgak

Abstract:

Due to today’s globalization as well as outsourcing practices of the companies, the Supply Chain (SC) performances have become more dependent on the efficient movement of material among places that are geographically dispersed, where there is more chance for disruptions. One such disruption is the quality and delivery uncertainties of outsourcing. These uncertainties could lead the products to be unsafe and, as is the case in a number of recent examples, companies may have to end up in recalling their products. As a result of these problems, there is a need to develop a methodology for selecting suppliers globally in view of risks associated with low quality and late delivery. Accordingly, we developed a two-stage stochastic model that captures the risks associated with uncertainty in quality and delivery as well as a solution procedure for the model. The stochastic model developed simultaneously optimizes supplier selection and purchase quantities under price discounts over a time horizon. In particular, our target is the study of global organizations with multiple sites and multiple overseas suppliers, where the pricing is offered in suppliers’ local currencies. Our proposed methodology is applied to a case study for a US automotive company having two assembly plants and four potential global suppliers to illustrate how the proposed model works in practice.

Keywords: global supply chains, quality, stochastic programming, supplier selection

Procedia PDF Downloads 427
204 Language Learning, Drives and Context: A Grounded Theory of Learning Behavior

Authors: Julian Pigott

Abstract:

This paper introduces the Language Learning as a Means of Drive Engagement (LLMDE) theory, derived from a grounded theory analysis of interviews with Japanese university students. According to LLMDE theory, language learning can be understood as a means of engaging one or more of four self-fulfillment drives: the drive to expand one’s horizons (perspective drive); the drive to make a success of oneself (status drive); the drive to engage in interaction with others (communication drive); and the drive to obtain intellectual and affective stimulation (entertainment drive). While many theories of learner psychology focus on conscious agency, LLMDE theory addresses the role of the unconscious. In addition, supplementary thematic analysis of the data revealed the role of context in mediating drive engagement. Unexpected memorable events, for example, play a key role in instigating and, indirectly, in regulating learning, as do institutional and cultural contexts. Given the apparent importance of such factors beyond the immediate control of the learner, and given the pervasive role of habit and drives, it is argued that the concept of motivation merits theoretical reappraisal. Rather than an underlying force determining language learning success or failure, it can be understood to emerge sporadically in consciousness to promote behavioral change, or to protect habitual behavior from disruption.

Keywords: drives, grounded theory, motivation, significant events

Procedia PDF Downloads 120
203 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 76
202 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks

Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali

Abstract:

To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.

Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility

Procedia PDF Downloads 162
201 The Artificial Intelligence (AI) Impact on Project Management: A Destructive or Transformative Agent

Authors: Kwame Amoah

Abstract:

Artificial intelligence (AI) has the prospect of transforming project management, significantly improving efficiency and accuracy. By automating specific tasks with defined guidelines, AI can assist project managers in making better decisions and allocating resources efficiently, with possible risk mitigation. This study explores how AI is already impacting project management and likely future AI's impact on the field. The AI's reaction has been a divided opinion; while others picture it as a destroyer of jobs, some welcome it as an innovation advocate. Both sides agree that AI will be disruptive and revolutionize PM's functions. If current research is to go by, AI or some form will replace one-third of all learning graduate PM jobs by as early as 2030. A recent survey indicates AI spending will reach $97.9 billion by the end of 2023. Considering such a profound impact, the project management profession will also see a paradigm shift driven by AI. The study examines what the project management profession will look like in the next 5-10 years after this technological disruption. The research methods incorporate existing literature, develop trend analysis, and conduct structured interviews with project management stakeholders from North America to gauge the trend. PM professionals can harness the power of AI, ensuring a smooth transition and positive outcomes. AI adoption will maximize benefits, minimize adverse consequences, and uphold ethical standards, leading to improved project performance.

Keywords: project management, disruptive teacnologies, project management function, AL applications, artificial intelligence

Procedia PDF Downloads 48
200 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 314
199 Nurses’ Views on ‘Effective Nurse Leader’ Characteristics in Iraq

Authors: S. Abed, S. O’Neill

Abstract:

This research explored ward nurses’ views about the characteristics of effective nurse leaders in the context of Iraq as a developing country, where the delivery of health care continues to face disruption and change. It is well established that the provision of modern health care requires effective nurse leaders, but in countries such as Iraq the lack of effective nurse leaders is noted as a major challenge. In a descriptive quantitative study, a survey questionnaire was administered to 210 ward nurses working in two public hospitals in a major city in the north of Iraq. The participating nurses were of the opinion that the effectiveness of their nurse leaders was evident in their ability to demonstrate: good clinical knowledge, effective communication and managerial skills. They also viewed their leaders as needing to hold high-level nursing qualifications, though this was not necessarily the case in practice. Additionally, they viewed nurse leaders’ personal qualities as important, which included politeness, ethical behaviour, and trustworthiness. When considered against the issues raised in interviews with a smaller group (20) of senior nurse leaders, representative of the various occupational levels, implications identify the need for professional development that focuses on how the underpinning competencies relate to leadership and how transformational leadership is evidenced in practice.

Keywords: health care, nurse education, nursing in Iraq, nurse leadership

Procedia PDF Downloads 242
198 Effect of Ultrasound on Carotenoids Extraction from Pepper and Process Optimization Using Response Surface Methodology (RSM)

Authors: Elham Mahdian, Reza Karazhian, Rahele Dehghan Tanha

Abstract:

Pepper (Capsicum annum L.) which belong to the family Solananceae, are known for their versatility as a vegetable crop and are consumed both as fresh vegetables or dehydrated for spices. Pepper is considered an excellent source of bioactive nutrients. Ascorbic acid, carotenoids and phenolic compounds are its main antioxidant constituents. Ultrasound assisted extraction is an inexpensive, simple and efficient alternative to conventional extraction techniques. The mechanism of action for ultrasound-assisted extraction are attributed to cavitations, mechanical forces and thermal impact, which result in disruption of cells walls, reduce particle size, and enhance mass transfer across cell membranes. In this study, response surface methodology was used to optimize experimental conditions for ultrasonic assisted extraction of carotenoid compounds from Chili peppers. Variables were included extraction temperatures at 3 levels (30, 40 and 50 °C), extraction times at 3 levels (10, 25 and 40 minutes) and power at 3 levels (30, 60 and 90 %). It was observed that ultrasound waves applied at temperature of 49°C, time of 10 minutes and power 89 % resulted to the highest carotenoids contents (lycopene and β-carotene), while the lowest value was recorded in the control. Thus, results showed that ultrasound waves have strong impact on extraction of carotenoids from pepper.

Keywords: carotenoids, optimization, pepper, response surface methodology

Procedia PDF Downloads 436
197 Mobi-DiQ: A Pervasive Sensing System for Delirium Risk Assessment in Intensive Care Unit

Authors: Subhash Nerella, Ziyuan Guan, Azra Bihorac, Parisa Rashidi

Abstract:

Intensive care units (ICUs) provide care to critically ill patients in severe and life-threatening conditions. However, patient monitoring in the ICU is limited by the time and resource constraints imposed on healthcare providers. Many critical care indices such as mobility are still manually assessed, which can be subjective, prone to human errors, and lack granularity. Other important aspects, such as environmental factors, are not monitored at all. For example, critically ill patients often experience circadian disruptions due to the absence of effective environmental “timekeepers” such as the light/dark cycle and the systemic effect of acute illness on chronobiologic markers. Although the occurrence of delirium is associated with circadian disruption risk factors, these factors are not routinely monitored in the ICU. Hence, there is a critical unmet need to develop systems for precise and real-time assessment through novel enabling technologies. We have developed the mobility and circadian disruption quantification system (Mobi-DiQ) by augmenting biomarker and clinical data with pervasive sensing data to generate mobility and circadian cues related to mobility, nightly disruptions, and light and noise exposure. We hypothesize that Mobi-DiQ can provide accurate mobility and circadian cues that correlate with bedside clinical mobility assessments and circadian biomarkers, ultimately important for delirium risk assessment and prevention. The collected multimodal dataset consists of depth images, Electromyography (EMG) data, patient extremity movement captured by accelerometers, ambient light levels, Sound Pressure Level (SPL), and indoor air quality measured by volatile organic compounds, and the equivalent CO₂ concentration. For delirium risk assessment, the system recognizes mobility cues (axial body movement features and body key points) and circadian cues, including nightly disruptions, ambient SPL, and light intensity, as well as other environmental factors such as indoor air quality. The Mobi-DiQ system consists of three major components: the pervasive sensing system, a data storage and analysis server, and a data annotation system. For data collection, six local pervasive sensing systems were deployed, including a local computer and sensors. A video recording tool with graphical user interface (GUI) developed in python was used to capture depth image frames for analyzing patient mobility. All sensor data is encrypted, then automatically uploaded to the Mobi-DiQ server through a secured VPN connection. Several data pipelines are developed to automate the data transfer, curation, and data preparation for annotation and model training. The data curation and post-processing are performed on the server. A custom secure annotation tool with GUI was developed to annotate depth activity data. The annotation tool is linked to the MongoDB database to record the data annotation and to provide summarization. Docker containers are also utilized to manage services and pipelines running on the server in an isolated manner. The processed clinical data and annotations are used to train and develop real-time pervasive sensing systems to augment clinical decision-making and promote targeted interventions. In the future, we intend to evaluate our system as a clinical implementation trial, as well as to refine and validate it by using other data sources, including neurological data obtained through continuous electroencephalography (EEG).

Keywords: deep learning, delirium, healthcare, pervasive sensing

Procedia PDF Downloads 65
196 Assignment of Airlines Technical Members under Disruption

Authors: Walid Moudani

Abstract:

The Crew Reserve Assignment Problem (CRAP) considers the assignment of the crew members to a set of reserve activities covering all the scheduled flights in order to ensure a continuous plan so that operations costs are minimized while its solution must meet hard constraints resulting from the safety regulations of Civil Aviation as well as from the airlines internal agreements. The problem considered in this study is of highest interest for airlines and may have important consequences on the service quality and on the economic return of the operations. In this communication, a new mathematical formulation for the CRAP is proposed which takes into account the regulations and the internal agreements. While current solutions make use of Artificial Intelligence techniques run on main frame computers, a low cost approach is proposed to provide on-line efficient solutions to face perturbed operating conditions. The proposed solution method uses a dynamic programming approach for the duties scheduling problem and when applied to the case of a medium airline while providing efficient solutions, shows good potential acceptability by the operations staff. This optimization scheme can then be considered as the core of an on-line Decision Support System for crew reserve assignment operations management.

Keywords: airlines operations management, combinatorial optimization, dynamic programming, crew scheduling

Procedia PDF Downloads 334
195 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 120
194 The Position of Space weather in Africa-Education and Outreach

Authors: Babagana Abubakar, Alhaji Kuya

Abstract:

Although the field of Space weather science is a young field among the space sciences, but yet history has it that activities related to this science began since the year 1859 when the great solar storm happened which resulted in the disruptions of telegraphs operations around the World at that particular time subsequently making it possible for the scientist Richard Carrington to be able to connect the Solar flare observed a day earlier before the great storm and the great deflection of the Earth’s Magnetic field (geometric storm) simultaneous with the telegraph disruption. However years later as at today with the advent of and the coming into existence of the Explorer 1, the Luna 1 and the establishments of the United States International Space Weather Program, International Geophysical Year (IGY) as well as the International Center for Space Weather Sciences and Education (ICSWSE) have made us understand the Space weather better and enable us well define the field of Space weather science. Despite the successes recorded in the development of Space sciences as a whole over the last century and the coming onboard of specialized bodies/programs on space weather like the International Space Weather Program and the ICSWSE, the majority of Africans including institutions, research organizations and even some governments are still ignorant about the existence of theSpace weather science,because apart from some very few countries like South Africa, Nigeria and Egypt among some few others the majority of the African nations and their academic institutions have no knowledge or idea about the existence of this field of Space science (Space weather).

Keywords: Africa, space, weather, education, science

Procedia PDF Downloads 416
193 Cognitive Behavioral Modification in the Treatment of Aggressive Behavior in Children

Authors: Dijana Sulejmanović

Abstract:

Cognitive-behavioral modification (CBM) is a combination of cognitive and behavioral learning principles to shape and encourage the desired behaviors. A crucial element of cognitive-behavioral modification is that a change the behavior precedes awareness of how it affects others. CBM is oriented toward changing inner speech and learning to control behaviors through self-regulation techniques. It aims to teach individuals how to develop the ability to recognize, monitor and modify their thoughts, feelings, and behaviors. The review of literature emphasizes the efficiency the CBM approach in the treatment of children's hyperactivity and negative emotions such as anger. The results of earlier research show how impulsive and hyperactive behavior, agitation, and aggression may slow down and block the child from being able to actively monitor and participate in regular classes, resulting in the disruption of the classroom and the teaching process, and the children may feel rejected, isolated and develop long-term poor image of themselves and others. In this article, we will provide how the use of CBM, adapted to child's age, can incorporate measures of cognitive and emotional functioning which can help us to better understand the children’s cognitive processes, their cognitive strengths, and weaknesses, and to identify factors that may influence their behavioral and emotional regulation. Such a comprehensive evaluation can also help identify cognitive and emotional risk factors associated with aggressive behavior, specifically the processes involved in modulating and regulating cognition and emotions.

Keywords: aggressive behavior, cognitive behavioral modification, cognitive behavioral theory, modification

Procedia PDF Downloads 285