Search results for: personal and sensitive data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26640

Search results for: personal and sensitive data

26370 Effect of Cellulase Pretreatment for n-Hexane Extraction of Oil from Garden Cress Seeds

Authors: Boutemak Khalida, Dahmani Siham

Abstract:

Garden cress (Lepidium Sativum L.) belonging to the family Brassicaceae, is edible growing annual herb. Its various parts (roots, leaves and seeds) have been used to treat various human ailments. Its seed extracts have been screened for various biological activities like hypotensive, antimicrobial, bronchodilator, hypoglycaemic and antianemic. The aim of the present study is to optimize the process parameters (cellulase concentration and incubation time) of enzymatic pre-treatment of the garden cress seeds and to evaluate the effect of cellulase pre-treatment of the crushed seeds on the oil yield, physico-chemical properties and antibacterial activity and comparing to non-enzymatic method. The optimum parameters of cellulase pre-treatment were as follows: cellulase of 0,1% w/w and incubation time of 2h. After enzymatic pre-treatment, the oil was extracted by n-hexane for 1.5 h, the oil yield was 4,01% for cellulase pre-treatment as against 10,99% in the control sample. The decrease in yield might be caused a result of mucilage. Garden cress seeds are covered with a layer of mucilage which gels on contact with water. At the same time, the antibacterial activity was carried out using agar diffusion method against 4 food-borne pathogens (Escherichia coli, Salmonella typhi,Staphylococcus aureus, Bacillus subtilis). The results showed that bacterial strains are very sensitive to the oil with cellulase pre-treatment. Staphylococcus aureus is extremely sensitive with the largest zone of inhibition (40 mm), Escherichia coli and salmonella typhi had a very sensitive to the oil with a zone of inhibition (26 mm). Bacillus subtilizes is averagely sensitive which gave an inhibition of 16 mm. But it does not exhibit sensivity to the oil without enzymatic pre-treatment with a zone inhibition (< 8 mm). Enzymatic pre-treatment could be useful for antimicrobial activity of the oil, and hold a good potential for use in food and pharmaceutical industries.

Keywords: Lepidium sativum L., cellulase, enzymatic pretreatment, antibacterial activity.

Procedia PDF Downloads 430
26369 Holistic Risk Assessment Based on Continuous Data from the User’s Behavior and Environment

Authors: Cinzia Carrodano, Dimitri Konstantas

Abstract:

Risk is part of our lives. In today’s society risk is connected to our safety and safety has become a major priority in our life. Each person lives his/her life based on the evaluation of the risk he/she is ready to accept and sustain, and the level of safety he/she wishes to reach, based on highly personal criteria. The assessment of risk a person takes in a complex environment and the impact of actions of other people’actions and events on our perception of risk are alements to be considered. The concept of Holistic Risk Assessment (HRA) aims in developing a methodology and a model that will allow us to take into account elements outside the direct influence of the individual, and provide a personalized risk assessment. The concept is based on the fact that in the near future, we will be able to gather and process extremely large amounts of data about an individual and his/her environment in real time. The interaction and correlation of these data is the key element of the holistic risk assessment. In this paper, we present the HRA concept and describe the most important elements and considerations.

Keywords: continuous data, dynamic risk, holistic risk assessment, risk concept

Procedia PDF Downloads 87
26368 Factors Associated with Hand Functional Disability in People with Rheumatoid Arthritis: A Systematic Review and Best-Evidence Synthesis

Authors: Hisham Arab Alkabeya, A. M. Hughes, J. Adams

Abstract:

Background: People with Rheumatoid Arthritis (RA) continue to experience problems with hand function despite new drug advances and targeted medical treatment. Consequently, it is important to identify the factors that influence the impact of RA disease on hand function. This systematic review identified observational studies that reported factors that influenced the impact of RA on hand function. Methods: MEDLINE, EMBASE, CINAL, AMED, PsychINFO, and Web of Science database were searched from January 1990 up to March 2017. Full-text articles published in English that described factors related to hand functional disability in people with RA were selected following predetermined inclusion and exclusion criteria. Pertinent data were thoroughly extracted and documented using a pre-designed data extraction form by the lead author, and cross-checked by the review team for completion and accuracy. Factors related to hand function were classified under the domains of the International Classification of Functioning, Disability, and Health (ICF) framework and health-related factors. Three reviewers independently assessed the methodological quality of the included articles using the quality of cross-sectional studies (AXIS) tool. Factors related to hand function that was investigated in two or more studies were explored using a best-evidence synthesis. Results: Twenty articles form 19 studies met the inclusion criteria from 1,271 citations; all presented cross-sectional data (five high quality and 15 low quality studies), resulting in at best limited evidence in the best-evidence synthesis. For the factors classified under the ICF domains, the best-evidence synthesis indicates that there was a range of body structure and function factors that were related with hand functional disability. However, key factors were hand strength, disease activity, and pain intensity. Low functional status (physical, emotional and social) level was found to be related with limited hand function. For personal factors, there is limited evidence that gender is not related with hand function; whereas, conflicting evidence was found regarding the relationship between age and hand function. In the domain of environmental factors, there was limited evidence that work activity was not related with hand function. Regarding health-related factors, there was limited evidence that the level of the rheumatoid factor (RF) was not related to hand function. Finally, conflicting evidence was found regarding the relationship between hand function and disease duration and general health status. Conclusion: Studies focused on body structure and function factors, highlighting a lack of investigation into personal and environmental factors when considering the impact of RA on hand function. The level of evidence which exists was limited, but identified that modifiable factors such as grip or pinch strength, disease activity and pain are the most influential factors on hand function in people with RA. The review findings suggest that important personal and environmental factors that impact on hand function in people with RA are not yet considered or reported in clinical research. Well-designed longitudinal, preferably cohort, studies are now needed to better understand the causality between personal and environmental factors and hand functional disability in people with RA.

Keywords: factors, hand function, rheumatoid arthritis, systematic review

Procedia PDF Downloads 121
26367 Scalable and Accurate Detection of Pathogens from Whole-Genome Shotgun Sequencing

Authors: Janos Juhasz, Sandor Pongor, Balazs Ligeti

Abstract:

Next-generation sequencing, especially whole genome shotgun sequencing, is becoming a common approach to gain insight into the microbiomes in a culture-independent way, even in clinical practice. It does not only give us information about the species composition of an environmental sample but opens the possibility to detect antimicrobial resistance and novel, or currently unknown, pathogens. Accurately and reliably detecting the microbial strains is a challenging task. Here we present a sensitive approach for detecting pathogens in metagenomics samples with special regard to detecting novel variants of known pathogens. We have developed a pipeline that uses fast, short read aligner programs (i.e., Bowtie2/BWA) and comprehensive nucleotide databases. Taxonomic binning is based on the lowest common ancestor (LCA) principle; each read is assigned to a taxon, covering the most significantly hit taxa. This approach helps in balancing between sensitivity and running time. The program was tested both on experimental and synthetic data. The results implicate that our method performs as good as the state-of-the-art BLAST-based ones, furthermore, in some cases, it even proves to be better, while running two orders magnitude faster. It is sensitive and capable of identifying taxa being present only in small abundance. Moreover, it needs two orders of magnitude less reads to complete the identification than MetaPhLan2 does. We analyzed an experimental anthrax dataset (B. anthracis strain BA104). The majority of the reads (96.50%) was classified as Bacillus anthracis, a small portion, 1.2%, was classified as other species from the Bacillus genus. We demonstrate that the evaluation of high-throughput sequencing data is feasible in a reasonable time with good classification accuracy.

Keywords: metagenomics, taxonomy binning, pathogens, microbiome, B. anthracis

Procedia PDF Downloads 108
26366 Canadian High School Students' Attitudes and Perspectives Towards People With Disabilities, Autism, and ADHD

Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan

Abstract:

Canadian High School Students' Attitudes & Perspectives Towards People With Disabilities, Autism, and ADHD. Objective: To survey Canadian high school students' regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with disability may impact these views. Methods A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participants’ age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, and people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities. This poster will report upon these trends and explore in more depth how personal factors such as age, gender and personal disability status impact high school students attitudes toward persons with disability in general and in regards to Autism and ADHD specifically.

Keywords: disability, autism, ADHD, community research, acceptance, adolescence, high school

Procedia PDF Downloads 47
26365 Novel IPN Hydrogel Beads as pH Sensitive Drug Delivery System for an Anti-Ulcer Drug

Authors: Vishal Kumar Gupta

Abstract:

Purpose: This study has been undertaken to develop novel pH sensitive interpenetrating network hydrogel beads. Methods: The pH sensitive PAAM-g-Guar gum copolymer was synthesized by free radical polymerization followed by alkaline hydrolysis. Beads of guar gum-grafted-polyacrylamide and sodium Carboxy methyl cellulose (Na CMC) loaded with Pantoprazole sodium were prepared and evaluated for pH sensitivity, swelling properties, drug entrapment efficiency and in vitro drug release characteristics. Seven formulations were prepared for the drug with varying polymer and cross linker concentrations. Results: The grafting and alkaline hydrolysis reactions were confirmed by FT-IR spectroscopy. Differential scanning calorimetry was carried out to know the compatibility of encapsulated drug with the polymers. Scanning electron microscopic study revealed that the IPN beads were spherical. The entrapment efficiency was found to be in the range of 85-92%. Particle size analysis was carried out by optical microscopy. As the pH of the medium was changed from 1.2 to 7.4, a considerable increase in swelling was observed for all beads. Increase in the copolymer concentration showed sustained the drug release up to 12 hrs. Drug release from the beads followed super case II transport mechanism. Conclusion: It was concluded that guar gum-acrylamide beads, cross-linked with aluminum chloride offer an opportunity for controlled drug release of pantoprazole sodium.

Keywords: IPN, hydrogels, DSC, SEM

Procedia PDF Downloads 250
26364 Interface between Personal Values and Social Entrepreneurship in Social Projects That Develop Sports Practice

Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp

Abstract:

The context of social, economic and environmental transformations has driven innumerable changes in the organizational environment, influencing the social interactions that occur in this scenario. In this sense, social entrepreneurship emerges as a unique opportunity to challenge, question, rethink certain concepts and traditional theories widely discussed in relation to entrepreneurship. Therefore, the interest in studying personal values has been based on the idea that they might be predictors of the behavior of individuals. As an attempt to relate personal values with the characteristics of social entrepreneurs, this study aims to investigate the salient values and the social entrepreneurship perceptions that occur in two social projects responsible for developing sports skills among the students. For purposes of analysis, it is intended to consider: (i) a description of both Social Projects and their respective institutions, considering their history and relevance in the context; (ii) analysis of the personal values of the idealizers and teachers responsible for the projects, (iii) identification of the characteristics of social entrepreneurship manifested in the two projects, and (iv) discussion of similarities and disparities of the categories identified among the participants of the projects. Therefore, this study will carry a qualitative analysis from the interviews with 10 participants of each social project (named Projeto Remar/ASENA and Projeto Mãos Dadas/JUDÔ SANTA MARIA): 2 projects coordinators, 2 students, 2 parents of students, 2 physical education internships and 2 businessmen who stablished a partnership with each project. The data collection will be done through semi-structured interviews that are going to last around 30 minutes each, being recorded, transcribed and later analyzed, through the categorical analysis. The option for categorical analysis is supported by the fact that it is the best alternative when one wants to study values, opinions, attitudes and beliefs, through qualitative ones. In the present research, the pre-analysis phase consisted of an organization of the material collected during the research with Remar and Mãos Dadas Project, and a dynamic reading of this material, seeking to identify the characteristics of social entrepreneurship and values addressed in the study. In the analytical description phase, a more in-depth analysis of the material collected in the research will be carried out. The third phase, referred to as referential interpretation or treatment of results obtained will allow to verify the homogeneity and the heterogeneity among the participants' perceptions of the projects. Some preliminary results coming from the first interviews revealed the projects are guided by values such as cooperation, respect, well-being and nature preservation. These values are linked to the social entrepreneurship perception of the projects managers, who established their activities in behalf of the local community.

Keywords: personal values, social entrepreneurship, social projects, sports participants

Procedia PDF Downloads 329
26363 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 44
26362 Personal Perception of the Acoustic Properties of Three Different Rooms for Music Lessons

Authors: Natalia Ivanova, Konstantin Adamov

Abstract:

The importance of acoustics in music classes made us analyse three music rooms in a Bulgarian school. The same music piece was performed in every one of the classrooms. The recording was played to 2 groups of students. A survey was then taken among those students in order to determine their personal preferences and impressions of the acoustic. The results show differences in the preferences of older students compared to younger ones. Results of the survey show a correlation between older students’ preferences and the standard requirements. However, we discover that younger students’ classrooms should be further analysed and adapted to their needs and preferences.

Keywords: acousic, building acoustic, sound quality, scool acoustic

Procedia PDF Downloads 74
26361 SO2 Sensing Performance of Nanostructured CdSnO3 Thin Films Prepared by Spray Pyrolysis Technique

Authors: R. H. Bari

Abstract:

The nanostructured thin films of CdSnO3 are sensitive to change in their environment. CdSnO3 is successfully used as gas sensor due to the dependence of the electrical conductivity on the ambient gas composition. Nanostructured CdSnO3 thin films of different substrate temperature (300 0C, 350 0C, 400 0C and 450 0C) were deposited onto heated glass substrate by simple spray pyrolysis (SP) technique. Sensing elements of nanostructured CdSnO3 were annealed at 500 0C for 1 hrs. Characterization includes a different analytical technique such as, X-ray diffractogram (XRD), energy dispersive X-ray analysis (EDAX), and Field emission scanning electron microscope (FE-SEM). The average grain size observed from XRD and FF-SEM was found to be less than 18.36 and 23 nm respectively. The films sprayed at substrate temperature for 400 0C was observed to be most sensitive (S = 530) to SO2 for 500 ppm at 300 0C. The response and recovery time is 4 sec, 8 sec respectively.

Keywords: nanostructured CdSnO3, spray pyrolysis, SO2 gas sensing, quick response

Procedia PDF Downloads 259
26360 Brainbow Image Segmentation Using Bayesian Sequential Partitioning

Authors: Yayun Hsu, Henry Horng-Shing Lu

Abstract:

This paper proposes a data-driven, biology-inspired neural segmentation method of 3D drosophila Brainbow images. We use Bayesian Sequential Partitioning algorithm for probabilistic modeling, which can be used to detect somas and to eliminate cross talk effects. This work attempts to develop an automatic methodology for neuron image segmentation, which nowadays still lacks a complete solution due to the complexity of the image. The proposed method does not need any predetermined, risk-prone thresholds since biological information is inherently included in the image processing procedure. Therefore, it is less sensitive to variations in neuron morphology; meanwhile, its flexibility would be beneficial for tracing the intertwining structure of neurons.

Keywords: brainbow, 3D imaging, image segmentation, neuron morphology, biological data mining, non-parametric learning

Procedia PDF Downloads 458
26359 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence

Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers

Abstract:

Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.

Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design

Procedia PDF Downloads 70
26358 Care: A Cluster Based Approach for Reliable and Efficient Routing Protocol in Wireless Sensor Networks

Authors: K. Prasanth, S. Hafeezullah Khan, B. Haribalakrishnan, D. Arun, S. Jayapriya, S. Dhivya, N. Vijayarangan

Abstract:

The main goal of our approach is to find the optimum positions for the sensor nodes, reinforcing the communications in points where certain lack of connectivity is found. Routing is the major problem in sensor network’s data transfer between nodes. We are going to provide an efficient routing technique to make data signal transfer to reach the base station soon without any interruption. Clustering and routing are the two important key factors to be considered in case of WSN. To carry out the communication from the nodes to their cluster head, we propose a parameterizable protocol so that the developer can indicate if the routing has to be sensitive to either the link quality of the nodes or the their battery levels.

Keywords: clusters, routing, wireless sensor networks, three phases, sensor networks

Procedia PDF Downloads 465
26357 Effects of Hypoxic Duration at Different Growth Stages on Yield Potential of Waxy Corn (Zea mays L.)

Authors: S. Boonlertnirun, R. Suvannasara, K. Boonlertnirun

Abstract:

Hypoxia has negative effects on growth and crop yield, its severity is so varied depending on crop growth stages, duration of hypoxia and crop species. The objective was to evaluate the sensitive growth stage and the duration of hypoxia negatively affecting growth and yield of waxy corn. Pot experiment was conducted using a split plot in randomized complete block with 3 growth stages: V3 (3-4 true leaves), V7 (7-8 true leaves), and R1 (silking stage), and three hypoxic durations: 6, 9, and 12 days, in an open–ended outdoor greenhouse during January to March 2013. The results revealed that different growth stages had significantly (p < 0.5) different responses to hypoxia, seeing that the sensitive growth stage affecting plant height, yield and yield components was mostly detected in V7 growth stage whereas leaf greenness and days to silking were sensitive to hypoxia at R1 growth stage. Different hypoxic durations significantly affected the yield and yield components, hypoxic duration of twelve days showed the most negative effect greater than the others. In this present study, it can be concluded that waxy corn plants were waterlogged at V7 growth stage for twelve days had the most negative effect on yield and yield components.

Keywords: hypoxia duration, waxy corn, growth stage, Zea mays L.

Procedia PDF Downloads 359
26356 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 47
26355 Biosensor Technologies in Neurotransmitters Detection

Authors: Joanna Cabaj, Sylwia Baluta, Karol Malecha

Abstract:

Catecholamines are vital neurotransmitters that mediate a variety of central nervous system functions, such as motor control, cognition, emotion, memory processing, and endocrine modulation. Dysfunctions in catecholamine neurotransmission are induced in some neurologic and neuropsychiatric diseases. Changeable neurotransmitters level in biological fluids can be a marker of several neurological disorders. Because of its significance in analytical techniques and diagnostics, sensitive and selective detection of neurotransmitters is increasingly attracting a lot of attention in different areas of bio-analysis or biomedical research. Recently, optical techniques for the detection of catecholamines have attracted interests due to their reasonable cost, convenient control, as well as maneuverability in biological environments. Nevertheless, with the observed need for a sensitive and selective catecholamines sensor, the development of a convenient method for this neurotransmitter is still at its basic level. The manipulation of nanostructured materials in conjunction with biological molecules has led to the development of a new class of hybrid-modified enzymatic sensors in which both enhancement of charge transport and biological activity preservation may be obtained. Immobilization of biomaterials on electrode surfaces is the crucial step in fabricating electrochemical as well as optical biosensors and bioelectronic devices. Continuing systematic investigation in manufacturing of enzyme–conducting sensitive systems, here is presented a convenient fluorescence as well as electrochemical sensing strategy for catecholamines detection.

Keywords: biosensors, catecholamines, fluorescence, enzymes

Procedia PDF Downloads 83
26354 A Minimum Spanning Tree-Based Method for Initializing the K-Means Clustering Algorithm

Authors: J. Yang, Y. Ma, X. Zhang, S. Li, Y. Zhang

Abstract:

The traditional k-means algorithm has been widely used as a simple and efficient clustering method. However, the algorithm often converges to local minima for the reason that it is sensitive to the initial cluster centers. In this paper, an algorithm for selecting initial cluster centers on the basis of minimum spanning tree (MST) is presented. The set of vertices in MST with same degree are regarded as a whole which is used to find the skeleton data points. Furthermore, a distance measure between the skeleton data points with consideration of degree and Euclidean distance is presented. Finally, MST-based initialization method for the k-means algorithm is presented, and the corresponding time complexity is analyzed as well. The presented algorithm is tested on five data sets from the UCI Machine Learning Repository. The experimental results illustrate the effectiveness of the presented algorithm compared to three existing initialization methods.

Keywords: degree, initial cluster center, k-means, minimum spanning tree

Procedia PDF Downloads 377
26353 Factors Related to Behaviors of Thai Travelers Traveling to Koh Kred Island, Nonthaburi Province

Authors: Bundit Pungnirund, Boonyada Pahasing

Abstract:

The objective of this research is to study factors related to behaviors of Thai travelers traveling to Koh Kret Island, Nonthaburi Province. The subjects of this study included 400 Thai travelers coming to Koh Kred. Questionnaires were used to collect data which were analyzed by computer program to find mean and correlation coefficient by Pearson. The results showed that Thai travelers reported their opinions and attitudes in high level on the marketing service mix, product, price, place, promotion, personal, physical evidence, and process. They reported on travelling motivation factor, tourist attraction, and facility at high level. Moreover, marketing service mix, product, price, place, promotion, personal, physical, and process including travelling motivation factor, tourist attraction, and facility had positive relationship with the frequency in travelling at statistically significant level (0.01), though in a low relationship but in the same direction.

Keywords: factors, behaviors, Thai travelers, Koh Kled, Nonthaburi Province

Procedia PDF Downloads 200
26352 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 440
26351 Gawa Gawa Lang ‘Yan: A Qualitative Study of the Perception of Mental Health between Generations X and Z in Metro Manila, Philippines

Authors: Pierre Angelo Alino, Rafael Alejandro Ang, Maria Carmela Espanol, Dominic Gerard Ferreol, Jendrietch Adrian Lopez

Abstract:

This study aims to explore the differences in perception between Generation X and Generation Z towards mental health and mental health illnesses. Through this study, the researchers seek to identify and explore the differences that exist in the generational perception and determine the possible factors that influence the difference in perception. In order to achieve this, we conducted two focus group discussions (FGD), one composed of Generation X and the other composed of Generation Z. Participants for both focus group discussions were recruited through purposive sampling and online recruitment methods. In these discussions, they were asked questions relating to their personal history, experiences with mental health, and related illnesses, as well as their opinions regarding the subject matter. Afterwhich, we analyzed our data through a thematic analysis. Our study’s findings indicate notable differences in the perception of mental health as well as mental illness between the members of Generations X and Z. Additionally, factors such as culture, personal history, and intimate relationships influence the perceptions of mental health between generation groups.

Keywords: generational difference, mental health, mental health illness, perception

Procedia PDF Downloads 160
26350 The Impact of Major Accounting Events on Managerial Ability and the Accuracy of Environmental Capital Expenditure Projections of the Environmentally Sensitive Industries

Authors: Jason Chen, Jennifer Chen, Shiyu Li

Abstract:

We examine whether managerial ability (MA), the passing of Sarbanes-Oxley in 2002 (SOX), and corporate operational complexity affect the accuracy of environmental capital expenditure projections of the environmentally sensitive industries (ESI). Prior studies found that firms in the ESI manipulated their projected environmental capital expenditures as a tool to achieve corporate legitimation and suggested that human factors must be examined to determine whether they are part of the determinants. We use MA to proxy for the latent human factors to examine whether MA affects the accuracy of financial disclosures in the ESI. To expand Chen and Chen (2020), we further investigate whether (1) SOX and (2) firms with complex operations and financial reporting in conjunction with MA affect firms’ projection accuracy. We find, overall, that MA is positively correlated with firm’s projection accuracy in the annual 10-Ks. Furthermore, results suggest that SOX has a positive, yet temporary, effect on MA, and that leads to better accuracy. Finally, MA matters for firms with more complex operations and financial reporting to make less projection errors than their less-complex counterparts. These results suggest that MA is a determinant that affects the accuracy of environmental capital expenditure projections for the firms in the ESI.

Keywords: managerial ability, environmentally sensitive industries, sox, corporate operational complexity

Procedia PDF Downloads 112
26349 The Equality Test of Ceftriaxone Anti-Bacterial Effect and Ethanol Extract of Ant Plant (Myermecodia pendens Merr. and L. M Perry) to MRSA

Authors: Rifa’ah Mahmudah Bulu’

Abstract:

MRSA is an important nosocomial pathogen in the world. Therefore, the prevention and effort to control MRSA is still very important to conduct. One of the preventions of MRSA, which have been reported by several studies, is Cefriaxone and Ethanol Extract of Ant Plant. This research is an experimental test to determine the potency of MRSA’s anti-bacterial with Cefriaxone (30 μg) and Ethanol Extract of Ant Plant (13 mg/ml) based on inhibition zone on LAB (Lempeng Agar Biasa). The size of inhibition zone that is formed on Cefriaxone is adjusted with CSLI criteria, which ≥ 21 mm of inhibition zone is called sensitive; ≤13 mm is called resistance and between 14-20 mm is called intermediate. This research is conducted three times. Comparative test between Cefriaxone and Ethanol Extract of Ant Plant is analyzed by Maan Whitney’s statistic method. The Result of Cefriaxone anti-bacterial potency shows the variety of inhibition zone. Cefriaxone forms approximately 16,5-20 mm with average 18,22mm of inhibition zone that make Cefriaxone’s criteria to MRSA’s inhibition is intermediate. Anti-bacterial potency of Ethanol Extract of Ant Plant is about 0,5-2 mm with average 1,17 mm of inhibition zone that prove MRSA is sensitive to Ant Plant. The conclusion of this research shows that Cefriaxone is intermediate to MRSA’s inhibition, while MRSA is sensitive to Ethanol Extract of Ant Plant, which at the end; it creates different potency of anti-bacterial between Cefriaxone and Ethanol Extract of Ant Plant.

Keywords: MRSA, cefriaxone, ant plant, CSLI, mann whitney

Procedia PDF Downloads 336
26348 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine

Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret

Abstract:

Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.

Keywords: mobile tool, body damage, personal injury and disability, telemedicine

Procedia PDF Downloads 52
26347 Body Image Dissatifaction with and Personal Behavioral Control in Obese Patients Who are Attending to Treatment

Authors: Mariela Gonzalez, Zoraide Lugli, Eleonora Vivas, Rosana Guzmán

Abstract:

The objective was to determine the predictive capacity of self-efficacy perceived for weight control, locus of weight control and skills of weight self-management in the dissatisfaction of the body image in obese people who attend treatment. Sectional study conducted in the city of Maracay, Venezuela, with 243 obese who attend to treatment, 173 of the feminine gender and 70 of the male, with ages ranging between 18 and 57 years old. The sample body mass index ranged between 29.39 and 44.14. The following instruments were used: The Body Shape Questionnaire (BSQ), the inventory of body weight self-regulation, The Inventory of self-efficacy in the regulation of body weight and the Inventory of the Locus of weight control. Calculating the descriptive statistics and of central tendency, coefficients of correlation and multiple regression; it was found that a low ‘perceived Self-efficacy in the weight control’ and a high ‘Locus of external control’, predict the dissatisfaction with body image in obese who attend treatment. The findings are a first approximation to give an account of the importance of the personal control variables in the study of the psychological grief on the overweight individual.

Keywords: dissatisfaction with body image, obese people, personal control, psychological variables

Procedia PDF Downloads 404
26346 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 336
26345 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System

Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad

Abstract:

The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.

Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3

Procedia PDF Downloads 170
26344 Highly Sensitive, Low-Cost Oxygen Gas Sensor Based on ZnO Nanoparticles

Authors: Xin Chang, Daping Chu

Abstract:

Oxygen gas sensing technology has progressed since the last century and it has been extensively used in a wide range of applications such as controlling the combustion process by sensing the oxygen level in the exhaust gas of automobiles to ensure the catalytic converter is in a good working condition. Similar sensors are also used in industrial boilers to make the combustion process economic and environmentally friendly. Different gas sensing mechanisms have been developed: ceramic-based potentiometric equilibrium sensors and semiconductor-based sensors by oxygen absorption. In this work, we present a highly sensitive and low-cost oxygen gas sensor based on Zinc Oxide nanoparticles (average particle size of 35nm) dispersion in ethanol. The sensor is able to measure the pressure range from 103 mBar to 10-5 mBar with a sensitivity of more than 102 mA/Bar. The sensor is also erasable with heat.

Keywords: nanoparticles, oxygen, sensor, ZnO

Procedia PDF Downloads 110
26343 Understanding Children’s Visual Attention to Personal Protective Equipment Using Eye-Tracking

Authors: Vanessa Cho, Janet Hsiao, Nigel King, Robert Anthonappa

Abstract:

Background: The personal protective equipment (PPE) requirements for health care workers (HCWs) have changed significantly during the COVID-19 pandemic. Aim: To ascertain, using eye-tracking technology, what children notice the most when seeing HCWs in various PPE. Design: A Tobii nano pro-eye-tracking camera tracked 156 children's visual attention while they viewed photographs of HCWs in various PPEs. Eye Movement analysis with Hidden Markov Models (EMHMM) was employed to analyse 624 recordings using two approaches, namely (i) data-driven where children's fixation determined the regions of interest (ROIs), and (ii) fixed ROIs where the investigators predefined the ROIs. Results: Two significant eye movement patterns, namely distributed(85.2%) and selective(14.7%), were identified(P<0.05). Most children fixated primarily on the face regardless of the different PPEs. Children fixated equally on all PPE images in the distributed pattern, while a strong preference for unmasked faces was evident in the selective pattern (P<0.01). Conclusion: Children as young as 2.5 years used a top-down visual search behaviour and demonstrated their face processing ability. Most children did not show a strong visual preference for a specific PPE, while a minority preferred PPE with distinct facial features, namely without masks and loupes.

Keywords: COVID-19, PPE, dentistry, pediatric

Procedia PDF Downloads 56
26342 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 157
26341 Second Language Acquisition in a Study Abroad Context: International Students’ Perspectives of the Evolution of Their ‘Second Language Self’

Authors: Dianah Kitiabi

Abstract:

This study examines the experiences of graduate international students in Study Abroad (SA) in order to understand the evolution of their second language (L2) skills during the period of their sojourn abroad. The study documents students’ perspectives through analysis of interview data situated within the context of their overall SA experience. Based on a phenomenological approach, the study focuses on a sample of nine graduate students with at least one year of SA experience. Gass & Mackey’s (2007) interaction approach and Vygotsky’s (1962) sociocultural theory help frame the study within the discourse of second language acquisition (SLA) in SA, such as to highlight the effects of SA on L2 skills of advanced-level learners. The findings of the study are first presented as individual case vignettes where students’ interpretations of their personal experiences are described in entirety, followed by an analysis across the cases that highlight emergent themes. The results of this study show that the linguistic outcomes of international students studying abroad are highly individualized. Although students reported to have improved some of their L2 skills, they also reported a lack of improvement in other L2 skills, most of which differed by case. What emerges is that besides contextual factors, students’ pre-program exposure to L2, interactions with NSs, frequency of L2 use in context, and personal beliefs contribute to their linguistic gains in SA.

Keywords: context, interaction, second language acquisition, study abroad

Procedia PDF Downloads 45