Search results for: wireless communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1220

Search results for: wireless communications

140 District 10 in Tehran: Urban Transformation and the Survey Evidence of Loss in Place Attachment in High Rises

Authors: Roya Morad, W. Eirik Heintz

Abstract:

The identity of a neighborhood is inevitably shaped by the architecture and the people of that place. Conventionally the streets within each neighborhood served as a semi-public-private extension of the private living spaces. The street as a design element formed a hybrid condition that was neither totally public nor private, and it encouraged social interactions. Thus through creating a sense of community, one of the most basic human needs of belonging was achieved. Similar to major global cities, Tehran has undergone serious urbanization. Developing into a capital city of high rises has resulted in an increase in urban density. Although allocating more residential units in each neighborhood was a critical response to the population boom and the limited land area of the city, it also created a crisis in terms of social communication and place attachment. District 10 in Tehran is a neighborhood that has undergone the most urban transformation among the other 22 districts in the capital and currently has the highest population density. This paper will explore how the active streets in district 10 have changed into their current condition of high rises with a lack of meaningful social interactions amongst its inhabitants. A residential building can be thought of as a large group of people. One would think that as the number of people increases, the opportunities for social communications would increase as well. However, according to the survey, there is an indirect relationship between the two. As the number of people of a residential building increases, the quality of each acquaintance reduces, and the depth of relationships between people tends to decrease. This comes from the anonymity of being part of a crowd and the lack of social spaces characterized by most high-rise apartment buildings. Without a sense of community, the attachment to a neighborhood is decreased. This paper further explores how the neighborhood participates to fulfill ones need for social interaction and focuses on the qualitative aspects of alternative spaces that can redevelop the sense of place attachment within the community.

Keywords: high density, place attachment, social communication, street life, urban transformation

Procedia PDF Downloads 97
139 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 381
138 Signal Processing Techniques for Adaptive Beamforming with Robustness

Authors: Ju-Hong Lee, Ching-Wei Liao

Abstract:

Adaptive beamforming using antenna array of sensors is useful in the process of adaptively detecting and preserving the presence of the desired signal while suppressing the interference and the background noise. For conventional adaptive array beamforming, we require a prior information of either the impinging direction or the waveform of the desired signal to adapt the weights. The adaptive weights of an antenna array beamformer under a steered-beam constraint are calculated by minimizing the output power of the beamformer subject to the constraint that forces the beamformer to make a constant response in the steering direction. Hence, the performance of the beamformer is very sensitive to the accuracy of the steering operation. In the literature, it is well known that the performance of an adaptive beamformer will be deteriorated by any steering angle error encountered in many practical applications, e.g., the wireless communication systems with massive antennas deployed at the base station and user equipment. Hence, developing effective signal processing techniques to deal with the problem due to steering angle error for array beamforming systems has become an important research work. In this paper, we present an effective signal processing technique for constructing an adaptive beamformer against the steering angle error. The proposed array beamformer adaptively estimates the actual direction of the desired signal by using the presumed steering vector and the received array data snapshots. Based on the presumed steering vector and a preset angle range for steering mismatch tolerance, we first create a matrix related to the direction vector of signal sources. Two projection matrices are generated from the matrix. The projection matrix associated with the desired signal information and the received array data are utilized to iteratively estimate the actual direction vector of the desired signal. The estimated direction vector of the desired signal is then used for appropriately finding the quiescent weight vector. The other projection matrix is set to be the signal blocking matrix required for performing adaptive beamforming. Accordingly, the proposed beamformer consists of adaptive quiescent weights and partially adaptive weights. Several computer simulation examples are provided for evaluating and comparing the proposed technique with the existing robust techniques.

Keywords: adaptive beamforming, robustness, signal blocking, steering angle error

Procedia PDF Downloads 100
137 The Impact of E-commerce to Improve of Banking Services

Authors: Azzi Mohammed Amin

Abstract:

Summary: This note aims to demonstrate the impact that comes out of electronic commerce to improve the quality of banking services and to answer the questions raised in the problem; it also aims to find out the methods applied in the banks to improve the quality of banking. And it identified a conceptual framework for electronic commerce and electronic banking. In addition, the inclusion of case study includes the Algerian Popular Credit Bank to measure the impact of electronic commerce on the quality of banking services. Has been focusing on electronic banking services as a field of modern knowledge, including fields characterized by high module in content and content, where banking management concluded that the service and style of electronic submission is the only area to compete and improve their quality. After studying the exploration of some of the banks operating in Algeria, and concluded that the majority relies sites, especially on the Internet, to introduce themselves and their affiliates as well as the definition of customer coverage for traditional and electronic, which are still at the beginning of the road where only some plastic cards, e-Banking, Bank of cellular, ATM and fast transfers. The establishment of an electronic network that requires the use of an effective banking system overall settlement of all economic sectors also requires the Algerian banks to be ready to receive this technology through the modernization of management and modernization of services (expand the use of credit cards, electronic money, and expansion of the Internet). As well as the development of the banking media to contribute to the dissemination of electronic banking culture in the community. Has been reached that the use of the communications revolution has made e-banking services inevitable impose itself in determining the future of banks and development, has also been reached that there is the impact of electronic commerce on the improvement of banking services through the provision of the information base and extensive refresher on-site research and development, and apply strategies Marketing, all of which help banks to increase the performance of its services, despite the presence of some of the risks of the means of providing electronic service and not the nature of the service itself and clear impact also by changing the shape or location of service from traditional to electronic which works to reduce and the costs of providing high-quality service and thus access to the largest segment.

Keywords: e-commerce, e-banking, impact e-commerce, B2C

Procedia PDF Downloads 62
136 Inversely Designed Chipless Radio Frequency Identification (RFID) Tags Using Deep Learning

Authors: Madhawa Basnayaka, Jouni Paltakari

Abstract:

Fully passive backscattering chipless RFID tags are an emerging wireless technology with low cost, higher reading distance, and fast automatic identification without human interference, unlike already available technologies like optical barcodes. The design optimization of chipless RFID tags is crucial as it requires replacing integrated chips found in conventional RFID tags with printed geometric designs. These designs enable data encoding and decoding through backscattered electromagnetic (EM) signatures. The applications of chipless RFID tags have been limited due to the constraints of data encoding capacity and the ability to design accurate yet efficient configurations. The traditional approach to accomplishing design parameters for a desired EM response involves iterative adjustment of design parameters and simulating until the desired EM spectrum is achieved. However, traditional numerical simulation methods encounter limitations in optimizing design parameters efficiently due to the speed and resource consumption. In this work, a deep learning neural network (DNN) is utilized to establish a correlation between the EM spectrum and the dimensional parameters of nested centric rings, specifically square and octagonal. The proposed bi-directional DNN has two simultaneously running neural networks, namely spectrum prediction and design parameters prediction. First, spectrum prediction DNN was trained to minimize mean square error (MSE). After the training process was completed, the spectrum prediction DNN was able to accurately predict the EM spectrum according to the input design parameters within a few seconds. Then, the trained spectrum prediction DNN was connected to the design parameters prediction DNN and trained two networks simultaneously. For the first time in chipless tag design, design parameters were predicted accurately after training bi-directional DNN for a desired EM spectrum. The model was evaluated using a randomly generated spectrum and the tag was manufactured using the predicted geometrical parameters. The manufactured tags were successfully tested in the laboratory. The amount of iterative computer simulations has been significantly decreased by this approach. Therefore, highly efficient but ultrafast bi-directional DNN models allow rapid and complicated chipless RFID tag designs.

Keywords: artificial intelligence, chipless RFID, deep learning, machine learning

Procedia PDF Downloads 19
135 Improvising Grid Interconnection Capabilities through Implementation of Power Electronics

Authors: Ashhar Ahmed Shaikh, Ayush Tandon

Abstract:

The swift reduction of fossil fuels from nature has crucial need for alternative energy sources to cater vital demand. It is essential to boost alternative energy sources to cover the continuously increasing demand for energy while minimizing the negative environmental impacts. Solar energy is one of the reliable sources that can generate energy. Solar energy is freely available in nature and is completely eco-friendly, and they are considered as the most promising power generating sources due to their easy availability and other advantages for the local power generation. This paper is to review the implementation of power electronic devices through Solar Energy Grid Integration System (SEGIS) to increase the efficiency. This paper will also concentrate on the future grid infrastructure and various other applications in order to make the grid smart. Development and implementation of a power electronic devices such as PV inverters and power controllers play an important role in power supply in the modern energy economy. Solar Energy Grid Integration System (SEGIS) opens pathways for promising solutions for new electronic and electrical components such as advanced innovative inverter/controller topologies and their functions, economical energy management systems, innovative energy storage systems with equipped advanced control algorithms, advanced maximum-power-point tracking (MPPT) suited for all PV technologies, protocols and the associated communications. In addition to advanced grid interconnection capabilities and features, the new hardware design results in small size, less maintenance, and higher reliability. The SEGIS systems will make the 'advanced integrated system' and 'smart grid' evolutionary processes to run in a better way. Since the last few years, there was a major development in the field of power electronics which led to more efficient systems and reduction of the cost per Kilo-watt. The inverters became more efficient and had reached efficiencies in excess of 98%, and commercial solar modules have reached almost 21% efficiency.

Keywords: solar energy grid integration systems, smart grid, advanced integrated system, power electronics

Procedia PDF Downloads 157
134 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 269
133 The Development of a Digitally Connected Factory Architecture to Enable Product Lifecycle Management for the Assembly of Aerostructures

Authors: Nicky Wilson, Graeme Ralph

Abstract:

Legacy aerostructure assembly is defined by large components, low build rates, and manual assembly methods. With an increasing demand for commercial aircraft and emerging markets such as the eVTOL (electric vertical take-off and landing) market, current methods of manufacturing are not capable of efficiently hitting these higher-rate demands. This project will look at how legacy manufacturing processes can be rate enabled by taking a holistic view of data usage, focusing on how data can be collected to enable fully integrated digital factories and supply chains. The study will focus on how data is flowed both up and down the supply chain to create a digital thread specific to each part and assembly while enabling machine learning through real-time, closed-loop feedback systems. The study will also develop a bespoke architecture to enable connectivity both within the factory and the wider PLM (product lifecycle management) system, moving away from traditional point-to-point systems used to connect IO devices to a hub and spoke architecture that will exploit report-by-exception principles. This paper outlines the key issues facing legacy aircraft manufacturers, focusing on what future manufacturing will look like from adopting Industry 4 principles. The research also defines the data architecture of a PLM system to enable the transfer and control of a digital thread within the supply chain and proposes a standardised communications protocol to enable a scalable solution to connect IO devices within a production environment. This research comes at a critical time for aerospace manufacturers, who are seeing a shift towards the integration of digital technologies within legacy production environments, while also seeing build rates continue to grow. It is vital that manufacturing processes become more efficient in order to meet these demands while also securing future work for many manufacturers.

Keywords: Industry 4, digital transformation, IoT, PLM, automated assembly, connected factories

Procedia PDF Downloads 51
132 Shaped Crystal Growth of Fe-Ga and Fe-Al Alloy Plates by the Micro Pulling down Method

Authors: Kei Kamada, Rikito Murakami, Masahiko Ito, Mototaka Arakawa, Yasuhiro Shoji, Toshiyuki Ueno, Masao Yoshino, Akihiro Yamaji, Shunsuke Kurosawa, Yuui Yokota, Yuji Ohashi, Akira Yoshikawa

Abstract:

Techniques of energy harvesting y have been widely developed in recent years, due to high demand on the power supply for ‘Internet of things’ devices such as wireless sensor nodes. In these applications, conversion technique of mechanical vibration energy into electrical energy using magnetostrictive materials n have been brought to attention. Among the magnetostrictive materials, Fe-Ga and Fe-Al alloys are attractive materials due to the figure of merits such price, mechanical strength, high magnetostrictive constant. Up to now, bulk crystals of these alloys are produced by the Bridgman–Stockbarger method or the Czochralski method. Using these method big bulk crystal up to 2~3 inch diameter can be grown. However, non-uniformity of chemical composition along to the crystal growth direction cannot be avoid, which results in non-uniformity of magnetostriction constant and reduction of the production yield. The micro-pulling down (μ-PD) method has been developed as a shaped crystal growth technique. Our group have reported shaped crystal growth of oxide, fluoride single crystals with different shape such rod, plate tube, thin fiber, etc. Advantages of this method is low segregation due to high growth rate and small diffusion of melt at the solid-liquid interface, and small kerf loss due to near net shape crystal. In this presentation, we report the shaped long plate crystal growth of Fe-Ga and Fe-Al alloys using the μ-PD method. Alloy crystals were grown by the μ-PD method using calcium oxide crucible and induction heating system under the nitrogen atmosphere. The bottom hole of crucibles was 5 x 1mm² size. A <100> oriented iron-based alloy was used as a seed crystal. 5 x 1 x 320 mm³ alloy crystal plates were successfully grown. The results of crystal growth, chemical composition analysis, magnetostrictive properties and a prototype vibration energy harvester are reported. Furthermore, continuous crystal growth using powder supply system will be reported to minimize the chemical composition non-uniformity along the growth direction.

Keywords: crystal growth, micro-pulling-down method, Fe-Ga, Fe-Al

Procedia PDF Downloads 307
131 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 78
130 Responsive Integrative Therapeutic Method: Paradigm for Addressing Core Deficits in Autism by Balkibekova

Authors: Balkibekova Venera Serikpaevna

Abstract:

Background: Autism Spectrum Disorder (ASD) poses significant challenges in both diagnosis and treatment. Existing therapeutic interventions often target specific symptoms, necessitating the exploration of alternative approaches. This study investigates the RITM (Rhythm Integration Tapping Music) developed by Balkibekova, aiming to create imitation, social engagement and a wide range of emotions through brain development. Methods: A randomized controlled trial was conducted with 100 participants diagnosed with ASD, aged 1 to 4 years. Participants were randomly assigned to either the RITM therapy group or a control group receiving standard care. The RITM therapy, rooted in tapping rhythm to music such as: marche on the drums, waltz on bells, lullaby on musical triangle, dancing on tambourine, polka on wooden spoons. Therapy sessions were conducted over a 3 year period, with assessments at baseline, midpoint, and post-intervention. Results: Preliminary analyses reveal promising outcomes in the RITM therapy group. Participants demonstrated significant improvements in social interactions, speech understanding, birth of speech, and adaptive behaviors compared to the control group. Careful examination of subgroup analyses provides insights into the differential effectiveness of the RITM approach across various ASD profiles. Conclusions: The findings suggest that RITM therapy, as developed by Balkibekova, holds promise as intervention for ASD. The integrative nature of the approach, addressing multiple domains simultaneously, may contribute to its efficacy. Further research is warranted to validate these preliminary results and explore the long-term impact of RITM therapy on individuals with ASD. This abstract presents a snapshot of the research, emphasizing the significance, methodology, key findings, and implications of the RITM therapy method for consideration in an autism conference.

Keywords: RITM therapy, tapping rhythm, autism, mirror neurons, bright emotions, social interactions, communications

Procedia PDF Downloads 36
129 Pioneering Technology of Night Photo-Stimulation of the Brain Lymphatic System: Therapy of Brain Diseases during Sleep

Authors: Semyachkina-Glushkovskaya Oxana, Fedosov Ivan, Blokhina Inna, Terskov Andrey, Evsukova Arina, Elovenko Daria, Adushkina Viktoria, Dubrovsky Alexander, Jürgen Kurths

Abstract:

In modern neurobiology, sleep is considered a novel biomarker and a promising therapeutic target for brain diseases. This is due to recent discoveries of the nighttime activation of the brain lymphatic system (BLS), playing an important role in the removal of wastes and toxins from the brain and contributes neuroprotection of the central nervous system (CNS). In our review, we discuss that night stimulation of BLS might be a breakthrough strategy in a new treatment of Alzheimer’s and Parkinson’s disease, stroke, brain trauma, and oncology. Although this research is in its infancy, however, there are pioneering and promising results suggesting that night transcranial photostimulation (tPBM) stimulates more effectively lymphatic removal of amyloid-beta from mouse brain than daily tPBM that is associated with a greater improvement of the neurological status and recognition memory of animals. In our previous study, we discovered that tPBM modulates the tone and permeability of the lymphatic endothelium by stimulating NO formation, promoting lymphatic clearance of wastes and toxins from the brain tissues. We also demonstrate that tPBM can also lead to angio- and lymphangiogenesis, which is another mechanism underlying tPBM-mediated stimulation of BLS. Thus, photo-augmentation of BLS might be a promising therapeutic target for preventing or delaying brain diseases associated with BLS dysfunction. Here we present pioneering technology for simultaneous tPBM in humans and sleep monitoring for stimulation of BLS to remove toxins from CNS and modulation of brain immunity. The wireless-controlled gadget includes a flexible organic light-emitting diode (LED) source that is controlled directly by a sleep-tracking device via a mobile application. The designed autonomous LED source is capable of providing the required therapeutic dose of light radiation at a certain region of the patient’s head without disturbing of sleeping patient. To minimize patients' discomfort, advanced materials like flexible organic LEDs were used. Acknowledgment: This study was supported by RSF project No. 23-75-30001.

Keywords: brain diseases, brain lymphatic system, phototherapy, sleep

Procedia PDF Downloads 53
128 The Reality of Teaching Arabic for Specific Purposes in Educational Institutions

Authors: Mohammad Anwarul Kabir, Fayezul Islam

Abstract:

Language invariably is learned / taught to be used primarily as means of communications. Teaching a language for its native audience differs from teaching it to non-native audience. Moreover, teaching a language for communication only is different from teaching it for specific purposes. Arabic language is primarily regarded as the language of the Quran and the Sunnah (Prophetic tradition). Arabic is, therefore, learnt and spread all over the globe. However, Arabic is also a cultural heritage shared by all Islamic nations which has used Arabic for a long period to record the contributions of Muslim thinkers made in the field of wide spectrum of knowledge and scholarship. That is why the phenomenon of teaching Arabic by different educational institutes became quite rife, and the idea of teaching Arabic for specific purposes is heavily discussed in the academic sphere. Although the number of learners of Arabic is increasing consistently, yet their purposes vary. These include religious purpose, international trade, diplomatic purpose, better livelihood in the Arab world extra. By virtue of this high demand for learning Arabic, numerous institutes have been established all over the world including Bangladesh. This paper aims at focusing on the current status of the language institutes which has been established for learning Arabic for specific purposes in Bangladesh including teaching methodology, curriculum, and teachers’ quality. Such curricula and using its materials resulted in a lot of problems. The least, it confused teachers and students as well. Islamic educationalists have been working hard to professionally meet the need. They are following a systematic approach of stating clear and achievable goals, building suitable content, and applying new technology to present these learning experiences and evaluate them. It also suggests a model for designing instructional systems that responds to the need of non-Arabic speaking Islamic communities and provide the knowledge needed in both linguistic and cultural aspects. It also puts forward a number of suggestions for the improvement of the teaching / learning Arabic for specific purposes in Bangladesh after a detailed investigation in the following areas: curriculum, teachers’ skills, method of teaching and assessment policy.

Keywords: communication, Quran, sunnah, educational institutes, specific purposes, curriculum, method of teaching

Procedia PDF Downloads 255
127 Chilled Books: Managing Defamatory Content in Non-fiction Trade Publishing

Authors: Katherine Day

Abstract:

Non-fiction genres (autobiographies and biographies, true stories and criticism, investigative journalism and narrative journalism) have enjoyed increasing sales in the English-language publishing territories over the last decade, but writing the tell-all or exposé is not without consequences: defamation laws cast a “chilling effect” by regarding reputation above publications with a public interest element. This is evident in the many publications that have been amended or pulped after publication. These communications, alterations and negotiations indicate that the threat of legal action forms part of the editorial decision-making around such publications, the presence of which could be attributed to strict defamation laws. In the UK and Australia, particularly, defamation law has proved notoriously biased in favour of plaintiffs. The legal obstacles have prompted law reform by way of section 4 of the UK Defamation Act, which allows for editorial assessment into whether the statement/s made are in the public interest; as of July 1st 2021, the NSW Government in Australia also implemented reforms to help steer the law towards more flexibility in the digital age – the most interesting of these developments for commercial publishing being the new ‘public interest’ defence (s 29A), which is modelled on the UK’s section 4 and which most states in Australia have now integrated into their respective state laws (Queensland, new South Wales, Victoria and South Australia, with the remaining states committing at a later date). This paper will outline and discuss the preliminary findings of a 1-year project that aims to explore how potentially litigious content is managed in unpublished non-fiction manuscripts in two countries identified as having strict defamation laws: Australia and the UK. Significantly, it expects to indicate the burden of current defamation laws on publishing practice and publishing outputs in these countries by interrogating in-house editorial processes and the likelihood of editorial management in a ‘post negotiation space’, where the activities and communication between authors and editors are reconstructed, if necessary, to correct the author/publisher power balance and affirm the business relationship. In doing so, the project asks: has the threat, explicit or implicit, of defamation action produced a significant chilling effect in trade non-fiction publishing in the UK and Australia?

Keywords: defamation, publishing, socio-legal, authorship, editing, literature

Procedia PDF Downloads 38
126 Computer-Assisted Management of Building Climate and Microgrid with Model Predictive Control

Authors: Vinko Lešić, Mario Vašak, Anita Martinčević, Marko Gulin, Antonio Starčić, Hrvoje Novak

Abstract:

With 40% of total world energy consumption, building systems are developing into technically complex large energy consumers suitable for application of sophisticated power management approaches to largely increase the energy efficiency and even make them active energy market participants. Centralized control system of building heating and cooling managed by economically-optimal model predictive control shows promising results with estimated 30% of energy efficiency increase. The research is focused on implementation of such a method on a case study performed on two floors of our faculty building with corresponding sensors wireless data acquisition, remote heating/cooling units and central climate controller. Building walls are mathematically modeled with corresponding material types, surface shapes and sizes. Models are then exploited to predict thermal characteristics and changes in different building zones. Exterior influences such as environmental conditions and weather forecast, people behavior and comfort demands are all taken into account for deriving price-optimal climate control. Finally, a DC microgrid with photovoltaics, wind turbine, supercapacitor, batteries and fuel cell stacks is added to make the building a unit capable of active participation in a price-varying energy market. Computational burden of applying model predictive control on such a complex system is relaxed through a hierarchical decomposition of the microgrid and climate control, where the former is designed as higher hierarchical level with pre-calculated price-optimal power flows control, and latter is designed as lower level control responsible to ensure thermal comfort and exploit the optimal supply conditions enabled by microgrid energy flows management. Such an approach is expected to enable the inclusion of more complex building subsystems into consideration in order to further increase the energy efficiency.

Keywords: price-optimal building climate control, Microgrid power flow optimisation, hierarchical model predictive control, energy efficient buildings, energy market participation

Procedia PDF Downloads 440
125 Implementation of Chlorine Monitoring and Supply System for Drinking Water Tanks

Authors: Ugur Fidan, Naim Karasekreter

Abstract:

Healthy and clean water should not contain disease-causing micro-organisms and toxic chemicals and must contain the necessary minerals in a balanced manner. Today, water resources have a limited and strategic importance, necessitating the management of water reserves. Water tanks meet the water needs of people and should be regularly chlorinated to prevent waterborne diseases. For this purpose, automatic chlorination systems placed in water tanks for killing bacteria. However, the regular operation of automatic chlorination systems depends on refilling the chlorine tank when it is empty. For this reason, there is a need for a stock control system, in which chlorine levels are regularly monitored and supplied. It has become imperative to take urgent measures against epidemics caused by the fact that most of our country is not aware of the end of chlorine. The aim of this work is to rehabilitate existing water tanks and to provide a method for a modern water storage system in which chlorination is digitally monitored by turning the newly established water tanks into a closed system. A sensor network structure using GSM/GPRS communication infrastructure has been developed in the study. The system consists of two basic units: hardware and software. The hardware includes a chlorine level sensor, an RFID interlock system for authorized personnel entry into water tank, a motion sensor for animals and other elements, and a camera system to ensure process safety. It transmits the data from the hardware sensors to the host server software via the TCP/IP protocol. The main server software processes the incoming data through the security algorithm and informs the relevant unit responsible (Security forces, Chlorine supply unit, Public health, Local Administrator) by e-mail and SMS. Since the software is developed base on the web, authorized personnel are also able to monitor drinking water tank and report data on the internet. When the findings and user feedback obtained as a result of the study are evaluated, it is shown that closed drinking water tanks are built with GRP type material, and continuous monitoring in digital environment is vital for sustainable health water supply for people.

Keywords: wireless sensor networks (WSN), monitoring, chlorine, water tank, security

Procedia PDF Downloads 134
124 Problems concerning Formation of Institutional Framework for Electronic Democracy in Georgia

Authors: Giorgi Katamadze

Abstract:

Open public service and accountability towards citizens is an important feature of democratic state based on rule of law. Effective use of electronic resources simplifies bureaucratic procedures, makes direct communications, helps exchange information, ensures government’s openness and in general helps develop electronic/digital democracy. Development of electronic democracy should be a strategic dimension of Georgian governance. Formation of electronic democracy, its functional improvement should become an important dimension of the state’s information policy. Electronic democracy is based on electronic governance and implies modern information and communication systems, their adaptation to universal standards. E-democracy needs involvement of governments, voters, political parties and social groups in an electronic form. In the last years the process of interaction between the citizen and the state becomes simpler. This process is achieved by the use of modern technological systems which gives to a citizen a possibility to use different public services online. For example, the website my.gov.ge makes interaction between the citizen, business and the state more simple, comfortable and secure. A higher standard of accountability and interaction is being established. Electronic democracy brings new forms of interactions between the state and the citizen: e-engagement – participation of society in state politics via electronic systems; e-consultation – electronic interaction among public officials, citizens and interested groups; e-controllership – electronic rule and control of public expenses and service. Public transparency is one of the milestones of electronic democracy as well as representative democracy as only on mutual trust and accountability can democracy be established. In Georgia, institutional changes concerning establishment and development of electronic democracy are not enough. Effective planning and implementation of a comprehensive and multi component e-democracy program (central, regional, local levels) requires telecommunication systems, institutional (public service, competencies, logical system) and informational (relevant conditions for public involvement) support. Therefore, a systematic project of formation of electronic governance should be developed which will include central, regional, municipal levels and certain aspects of development of instrumental basis for electronic governance.

Keywords: e-democracy, e-governance, e-services, information technology, public administration

Procedia PDF Downloads 309
123 Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba

Authors: Mavis Ofosuah Asante, Abena Abokoma Asemanyi, Belinda Osei-mensah, Stephen Osei Akyiaw

Abstract:

The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services.

Keywords: mobile money, fraud, telecommunication, merchant

Procedia PDF Downloads 40
122 An Analysis of the Continuum in Inter-Caste Relations in India

Authors: Sujit Kumar

Abstract:

Historicity of inter-caste relations can be traced in the early stages of evolution of rural community in the Indian society. These have witnessed vicissitudes during long drawn interactions between caste groups. Inter-caste relations evolved in a more organized form in the guise of Jajmani system. This is a system of permanent and hereditary inter-caste relations and gives a kaleidoscopic view of socio-economic relations among various caste groupings. Universality of its prevalence in rural India for centuries is well recognized and documented. But it has been undergoing metamorphic change in some regions and changing at a slower pace in the others during post-independence period. An empirical study was conducted with the objectives to know whether Jajmani system is in vogue in the rural areas and type and intensity of socio-economic ties among different caste categories and to find out the change in inter-caste relations, if any owing to industrialization and modernization. Information was elicited from 225 respondents using interview schedule designed for this purpose. It is discernible that in majority of cases, inter-caste social relations which find better expression on the occasions like marriage, death, birth and festivals etc. among Brahmins and lower castes vis-à-vis other caste categories have grown weak. The data further unearth that economic relations as maintained on the occasions of marriage, sacred thread ceremony, mundan sacrament, birthday, death, yajna, katha, routine hair cut, manufacture and repair of various iron, earthen, wooden and leather articles between members of higher castes (general category) and lower castes (scheduled castes) are moderate but weak in case of Other Backward Classes vis-à-vis all other caste categories. Overwhelming majority of informants believe that decline in hereditary occupations, depreciation of old products and services and their availability from the market being made by industry are main reasons in descending order for change in inter caste relations. Modernization, westernization, industrialization, transportation and communications, growing materialism and consumerism together have brought change in relations among caste groups affecting about a billion population inhabiting rural India.

Keywords: inter-caste, Jajmani, sacrament, Yajna

Procedia PDF Downloads 104
121 Electronic Six-Minute Walk Test (E-6MWT): Less Manpower, Higher Efficiency, and Better Data Management

Authors: C. M. Choi, H. C. Tsang, W. K. Fong, Y. K. Cheng, T. K. Chui, L. Y. Chan, K. W. Lee, C. K. Yuen, P. W. Lau, Y. L. To, K. C. Chow

Abstract:

Six-minute walk test (6MWT) is a sub-maximal exercise test to assess aerobic capacity and exercise tolerance of patients with chronic respiratory disease and heart failure. This has been proven to be a reliable and valid tool and commonly used in clinical situations. Traditional 6MWT is labour-intensive and time-consuming especially for patients who require assistance in ambulation and oxygen use. When performing the test with these patients, one staff will assist the patient in walking (with or without aids) while another staff will need to manually record patient’s oxygen saturation, heart rate and walking distance at every minute and/or carry oxygen cylinder at the same time. Physiotherapist will then have to document the test results in bed notes in details. With the use of electronic 6MWT (E-6MWT), patients wear a wireless oximeter that transfers data to a tablet PC via Bluetooth. Real-time recording of oxygen saturation, heart rate, and distance are displayed. No manual work on recording is needed. The tablet will generate a comprehensive report which can be directly attached to the patient’s bed notes for documentation. Data can also be saved for later patient follow up. This study was carried out in North District Hospital. Patients who followed commands and required 6MWT assessment were included. Patients were assigned to study or control groups. In the study group, patients adopted the E-6MWT while those in control group adopted the traditional 6MWT. Manpower and time consumed were recorded. Physiotherapists also completed a questionnaire about the use of E-6MWT. Total 12 subjects (Study=6; Control=6) were recruited during 11-12/2017. An average number of staff required and time consumed in traditional 6MWT were 1.67 and 949.33 seconds respectively; while in E-6MWT, the figures were 1.00 and 630.00 seconds respectively. Compared to traditional 6MWT, E-6MWT required 67.00% less manpower and 50.10% less in time spent. Physiotherapists (n=7) found E-6MWT is convenient to use (mean=5.14; satisfied to very satisfied), requires less manpower and time to complete the test (mean=4.71; rather satisfied to satisfied), has better data management (mean=5.86; satisfied to very satisfied) and is recommended to be used clinically (mean=5.29; satisfied to very satisfied). It is proven that E-6MWT requires less manpower input with higher efficiency and better data management. It is welcomed by the clinical frontline staff.

Keywords: electronic, physiotherapy, six-minute walk test, 6MWT

Procedia PDF Downloads 124
120 Sector-Wide Collaboration to Reduce Food Waste

Authors: Carolyn Cameron

Abstract:

Stop Food Waste Australia is working with the industry to co-design sector action plans to prevent and reduce food waste across the supply chain. We are a public-private partnership, funded in 2021 by the Australian national government under the 2017 National Food Waste Strategy. Our partnership has representatives from all levels of government, industry associations from farm to fork, and food rescue groups. Like many countries, Australia has adopted the Sustainable Development Goal (SDG) target of 12.3 to halve food waste by 2030. A seminal 2021 study, the National Food Waste Feasibility Report, developed a robust national baseline, illustrating hotspots in commodities and across the supply chain. This research found that the consumption stages – households, food service, and institutions - account for over half of all food waste, and 22% of food produced never leaves the farm gate. Importantly the study found it is feasible for Australia to meet SDG 12.3, but it will require unprecedented action by governments, industry, and the community. Sector Action Plans (Plan) are one of the four main initiatives of Stop Food Waste Australia, including a voluntary commitment, a coordinated food waste communications hub, and robust monitoring and reporting framework. These plans provide a systems-based approach to reducing food loss and waste while realising multiple benefits for supply chain partners and other collaborators. Each plan is being co-designed with the key stakeholders most able to directly control or influence the root cause(s) of food waste hotspots and to take action to reduce or eliminate food waste in their value chain.  The initiatives in the Plans are fit-for-purpose, reflecting current knowledge and recognising priorities may refocus over time. To date, sector action plans have been developed with the Food Rescue, Cold Chain, Bread and Bakery, and Dairy Sectors. Work is currently underway on Meat and Horticulture, and we are also developing supply-chain stage plans for food services and institutions. The study will provide an overview of Australia’s food waste baseline and challenges, the important role of sector action plans in reducing food waste, and case studies of implementation outcomes.

Keywords: co-design, horticulture, sector action plans, voluntary

Procedia PDF Downloads 103
119 The Role of Women in Criminal Organizations

Authors: Rossella Marzullo

Abstract:

Family plays a central role in the Calabrian criminal organization, which draws its strength from blood ties and gender stereotypes that still impose a strong verticalization of intra-family relationships for the benefit of men. However, female figures are of great importance in the organizational structure of the 'Ndrangheta families, despite the fact that they appear to be formally suffocated by the culture of gender subordination still strongly present in the archaic world of criminal organizations. And this is so much true that over time, the women of the 'Ndrangheta have added to the function of ‘internal containment’, the increasingly explicit function of intermediaries in the ‘external’ activities of the clan. But what happens in the 'Ndrangheta if women break the bond and decide to speak? The results are shocking. When a woman starts talking to ask the institutions for help, the system ‘goes crazy’, because the woman is considered the means of consolidating and transmitting family codes: she educates, forges, holds the structure together. If a woman from the 'Ndrangheta decides to speak out and get out of the family bottlenecks of the clan, she does not exclusively destroy the family; she destroys the system. This happens because, while not playing the same roles as men within organizations, women carry out support activities as intermediaries for the circulation of communications, thus ensuring the operability of the gang in practice and on a daily basis. Crossing the border means breaking the bonds of belonging, thus questioning one's own identity and reconstructing it according to other points of reference. How much these disruptive choices are feared by the men of the 'Ndrangheta has been seen in the dramatic stories of Lea Garofalo and Maria Concetta Cacciola: the fear of the breaking of the family pact, of the earthquake that arises from within, has marked their fate of death, useful both to stop the judicial action and to recompose the organization's estate under the aegis of terror. With physical, psychological violence, underhanded torture, and moral blackmail, the men of the mafia family tried to heal the shock caused by the voices of women, relying on violence and yet another attempt to subordinate them. This proves that the 'Ndrangheta is really afraid of them. The female voices of the 'Ndrangheta, who have shaken a consolidated and considered intangible system, represent the anti-'ndrangheta par excellence; in their choices, there is an even stronger desire to break with the mafia world.

Keywords: families, gender, ‘Ndrangheta, stereotypes

Procedia PDF Downloads 100
118 Comparison of EMG Normalization Techniques Recommended for Back Muscles Used in Ergonomics Research

Authors: Saif Al-Qaisi, Alif Saba

Abstract:

Normalization of electromyography (EMG) data in ergonomics research is a prerequisite for interpreting the data. Normalizing accounts for variability in the data due to differences in participants’ physical characteristics, electrode placement protocols, time of day, and other nuisance factors. Typically, normalized data is reported as a percentage of the muscle’s isometric maximum voluntary contraction (%MVC). Various MVC techniques have been recommended in the literature for normalizing EMG activity of back muscles. This research tests and compares the recommended MVC techniques in the literature for three back muscles commonly used in ergonomics research, which are the lumbar erector spinae (LES), latissimus dorsi (LD), and thoracic erector spinae (TES). Six healthy males from a university population participated in this research. Five different MVC exercises were compared for each muscle using the Tringo wireless EMG system (Delsys Inc.). Since the LES and TES share similar functions in controlling trunk movements, their MVC exercises were the same, which included trunk extension at -60°, trunk extension at 0°, trunk extension while standing, hip extension, and the arch test. The MVC exercises identified in the literature for the LD were chest-supported shoulder extension, prone shoulder extension, lat-pull down, internal shoulder rotation, and abducted shoulder flexion. The maximum EMG signal was recorded during each MVC trial, and then the averages were computed across participants. A one-way analysis of variance (ANOVA) was utilized to determine the effect of MVC technique on muscle activity. Post-hoc analyses were performed using the Tukey test. The MVC technique effect was statistically significant for each of the muscles (p < 0.05); however, a larger sample of participants was needed to detect significant differences in the Tukey tests. The arch test was associated with the highest EMG average at the LES, and also it resulted in the maximum EMG activity more often than the other techniques (three out of six participants). For the TES, trunk extension at 0° was associated with the largest EMG average, and it resulted in the maximum EMG activity the most often (three out of six participants). For the LD, participants obtained their maximum EMG either from chest-supported shoulder extension (three out of six participants) or prone shoulder extension (three out of six participants). Chest-supported shoulder extension, however, had a larger average than prone shoulder extension (0.263 and 0.240, respectively). Although all the aforementioned techniques were superior in their averages, they did not always result in the maximum EMG activity. If an accurate estimate of the true MVC is desired, more than one technique may have to be performed. This research provides additional MVC techniques for each muscle that may elicit the maximum EMG activity.

Keywords: electromyography, maximum voluntary contraction, normalization, physical ergonomics

Procedia PDF Downloads 168
117 Defence Ethics : A Performance Measurement Framework for the Defence Ethics Program

Authors: Allyson Dale, Max Hlywa

Abstract:

The Canadian public expects the highest moral standards from Canadian Armed Forces (CAF) members and Department of National Defence (DND) employees. The Chief, Professional Conduct and Culture (CPCC) stood up in April 2021 with the mission of ensuring that the defence culture and members’ conduct are aligned with the ethical principles and values that the organization aspires towards. The Defence Ethics Program (DEP), which stood up in 1997, is a values-based ethics program for individuals and organizations within the DND/CAF and now falls under CPCC. The DEP is divided into five key functional areas, including policy, communications, collaboration, training and education, and advice and guidance. The main focus of the DEP is to foster an ethical culture within defence so that members and organizations perform to the highest ethical standards. The measurement of organizational ethics is often complex and challenging. In order to monitor whether the DEP is achieving its intended outcomes, a performance measurement framework (PMF) was developed using the Director General Military Personnel Research and Analysis (DGMPRA) PMF development process. This evidence-based process is based on subject-matter expertise from the defence team. The goal of this presentation is to describe each stage of the DGMPRA PMF development process and to present and discuss the products of the DEP PMF (e.g., logic model). Specifically, first, a strategic framework was developed to provide a high-level overview of the strategic objectives, mission, and vision of the DEP. Next, Key Performance Questions were created based on the objectives in the strategic framework. A logic model detailing the activities, outputs (what is produced by the program activities), and intended outcomes of the program were developed to demonstrate how the program works. Finally, Key Performance Indicators were developed based on both the intended outcomes in the logic model and the Key Performance Questions in order to monitor program effectiveness. The Key Performance Indicators measure aspects of organizational ethics such as ethical conduct and decision-making, DEP collaborations, and knowledge and awareness of the Defence Ethics Code while leveraging ethics-related items from multiple DGMPRA surveys where appropriate.

Keywords: defence ethics, ethical culture, organizational performance, performance measurement framework

Procedia PDF Downloads 77
116 Carbon Based Wearable Patch Devices for Real-Time Electrocardiography Monitoring

Authors: Hachul Jung, Ahee Kim, Sanghoon Lee, Dahye Kwon, Songwoo Yoon, Jinhee Moon

Abstract:

We fabricated a wearable patch device including novel patch type flexible dry electrode based on carbon nanofibers (CNFs) and silicone-based elastomer (MED 6215) for real-time ECG monitoring. There are many methods to make flexible conductive polymer by mixing metal or carbon-based nanoparticles. In this study, CNFs are selected for conductive nanoparticles because carbon nanotubes (CNTs) are difficult to disperse uniformly in elastomer compare with CNFs and silver nanowires are relatively high cost and easily oxidized in the air. Wearable patch is composed of 2 parts that dry electrode parts for recording bio signal and sticky patch parts for mounting on the skin. Dry electrode parts were made by vortexer and baking in prepared mold. To optimize electrical performance and diffusion degree of uniformity, we developed unique mixing and baking process. Secondly, sticky patch parts were made by patterning and detaching from smooth surface substrate after spin-coating soft skin adhesive. In this process, attachable and detachable strengths of sticky patch are measured and optimized for them, using a monitoring system. Assembled patch is flexible, stretchable, easily skin mountable and connectable directly with the system. To evaluate the performance of electrical characteristics and ECG (Electrocardiography) recording, wearable patch was tested by changing concentrations of CNFs and thickness of the dry electrode. In these results, the CNF concentration and thickness of dry electrodes were important variables to obtain high-quality ECG signals without incidental distractions. Cytotoxicity test is conducted to prove biocompatibility, and long-term wearing test showed no skin reactions such as itching or erythema. To minimize noises from motion artifacts and line noise, we make the customized wireless, light-weight data acquisition system. Measured ECG Signals from this system are stable and successfully monitored simultaneously. To sum up, we could fully utilize fabricated wearable patch devices for real-time ECG monitoring easily.

Keywords: carbon nanofibers, ECG monitoring, flexible dry electrode, wearable patch

Procedia PDF Downloads 158
115 Challenges and Practical Tips for Advance Care Planning and End-of-Life Communications With Cancer Patients in Global Pandemic

Authors: Poonam Goswami

Abstract:

Background: The diagnosis of a serious illness like cancer can have an impact on a patient’s emotional well-being and may result in psychological symptoms, anxiety, depression, and loss of control. Advance care planning discussions ensure patients’ values and goals of care, including patients’ freedom to choose their place of death, are respected. Unfortunately, these discussions are often delayed and are not initiated early in patients’ cancer trajectory. As a result, patients’ wishes often remains unknown until the last phase of their life. Evidence suggests that many patients inappropriately receive aggressive treatment near the end of life, which does lead to higher resource utilization, decreased quality of life, and increased cost. Additionally, the novel coronavirus disease 2019 (COVID-19) pandemic challenged the health care systems worldwide and raised important ethical issues, especially regarding the potential need for rationing health care in the context of scarce resources and crisis capacity. The importance of goal concordant care is now even substantially important and is heightened in the context of this pandemic. Problem: Although there is growing evidence on the effects of the ACP on the completion of advanced directives, improved patient and family concordance for preferences for medical care, and receipt of care, there is still a lack of standardized ACP conversation strategies for patients with cancer. Methods: The Key concepts of ACP include (1) assessing patient and family readiness, (2) identifying a surrogate decision maker ( medical power of attorney), (3) exploring patient and family understanding of the disease and treatment options,(4) discussing the values and goals of care, and options for end-of-life care, (5) documenting patient preferences in the medical record, and (6) revisiting the discussions at every change in the treatment plan and /or change in clinical status, including at every hospitalization. Conclusion/Implication for practice: Advance Care Planning (ACP) and end-of-life (EOL) discussions are important for patients, families, and health care providers. Adopting the verbal and nonverbal communication strategies can help overcome the barriers to effective communication on these difficult discussions. ACP with goals of care discussions should not be delayed until the patient is hospitalized.

Keywords: advance care planning, end of life, cancer, global, pandemic

Procedia PDF Downloads 105
114 An Audit of the Diagnosis of Asthma in Children in Primary Care and the Emergency Department

Authors: Abhishek Oswal

Abstract:

Background: Inconsistencies between the guidelines for childhood asthma can pose a diagnostic challenge to clinicians. NICE guidelines are the most commonly followed guidelines in primary care in the UK; they state that to be diagnosed with asthma, a child must be more than 5 years old and must have objective evidence of the disease. When diagnoses are coded in general practice (GP), these guidelines may be superseded by communications from secondary care. Hence it is imperative that diagnoses are correct, as per up to date guidelines and evidence, as this affects follow up and management both in primary and secondary care. Methods: A snapshot audit at a general practice surgery was undertaken of children (less than 16 years old) with a coded diagnosis of 'asthma', to review the age at diagnosis and whether any objective evidence of asthma was documented at diagnosis. 50 cases of asthma in children presenting to the emergency department (ED) were then audited to review the age at presentation, whether there was evidence of previous asthma diagnosis and whether the patient was discharged from ED. A repeat audit is planned in ED this winter. Results: In a GP surgery, there were 83 coded cases of asthma in children. 51 children (61%) were diagnosed under 5, with 9 children (11%) who had objective evidence of asthma documented at diagnosis. In ED, 50 cases were collected, of which 4 were excluded as they were referred to the other services, or for incorrect coding. Of the 46 remaining, 27 diagnoses confirmed to NICE guidelines (59%). 33 children (72%) were discharged from ED. Discussion: The most likely reason for the apparent low rate of a correct diagnosis is the significant challenge of obtaining objective evidence of asthma in children. There were a number of patients who were diagnosed from secondary care services and then coded as 'asthma' in GP, without having objective documented evidence. The electronic patient record (EPR) system used in our emergency department (ED) did not allow coding of 'suspected diagnosis' or of 'viral induced wheeze'. This may have led to incorrect diagnoses coded in primary care, of children who had no confirmed diagnosis of asthma. We look forward to the re-audit, as the EPR system has been updated to allow suspected diagnoses. In contrast to the NICE guidelines used here, British Thoracic Society (BTS) guidelines allow for a trial of treatment and subsequent confirmation of diagnosis without objective evidence. It is possible that some of the cases which have been classified as incorrect in this audit may still meet other guidelines. Conclusion: The diagnosis of asthma in children is challenging. Incorrect diagnoses may be related to clinical pressures and the provision of services to allow compliance with NICE guidelines. Consensus statements between the various groups would also aid the decision-making process and diagnostic dilemmas that clinicians face, to allow more consistent care of the patient.

Keywords: asthma, diagnosis, primary care, emergency department, guidelines, audit

Procedia PDF Downloads 117
113 Quantum Graph Approach for Energy and Information Transfer through Networks of Cables

Authors: Mubarack Ahmed, Gabriele Gradoni, Stephen C. Creagh, Gregor Tanner

Abstract:

High-frequency cables commonly connect modern devices and sensors. Interestingly, the proportion of electric components is rising fast in an attempt to achieve lighter and greener devices. Modelling the propagation of signals through these cable networks in the presence of parameter uncertainty is a daunting task. In this work, we study the response of high-frequency cable networks using both Transmission Line and Quantum Graph (QG) theories. We have successfully compared the two theories in terms of reflection spectra using measurements on real, lossy cables. We have derived a generalisation of the vertex scattering matrix to include non-uniform networks – networks of cables with different characteristic impedances and propagation constants. The QG model implicitly takes into account the pseudo-chaotic behavior, at the vertices, of the propagating electric signal. We have successfully compared the asymptotic growth of eigenvalues of the Laplacian with the predictions of Weyl law. We investigate the nearest-neighbour level-spacing distribution of the resonances and compare our results with the predictions of Random Matrix Theory (RMT). To achieve this, we will compare our graphs with the generalisation of Wigner distribution for open systems. The problem of scattering from networks of cables can also provide an analogue model for wireless communication in highly reverberant environments. In this context, we provide a preliminary analysis of the statistics of communication capacity for communication across cable networks, whose eventual aim is to enable detailed laboratory testing of information transfer rates using software defined radio. We specialise this analysis in particular for the case of MIMO (Multiple-Input Multiple-Output) protocols. We have successfully validated our QG model with both TL model and laboratory measurements. The growth of Eigenvalues compares well with Weyl’s law and the level-spacing distribution agrees so well RMT predictions. The results we achieved in the MIMO application compares favourably with the prediction of a parallel on-going research (sponsored by NEMF21.)

Keywords: eigenvalues, multiple-input multiple-output, quantum graph, random matrix theory, transmission line

Procedia PDF Downloads 131
112 Mobile and Hot Spot Measurement with Optical Particle Counting Based Dust Monitor EDM264

Authors: V. Ziegler, F. Schneider, M. Pesch

Abstract:

With the EDM264, GRIMM offers a solution for mobile short- and long-term measurements in outdoor areas and at production sites. For research as well as permanent areal observations on a near reference quality base. The model EDM264 features a powerful and robust measuring cell based on optical particle counting (OPC) principle with all the advantages that users of GRIMM's portable aerosol spectrometers are used to. The system is embedded in a compact weather-protection housing with all-weather sampling, heated inlet system, data logger, and meteorological sensor. With TSP, PM10, PM4, PM2.5, PM1, and PMcoarse, the EDM264 provides all fine dust fractions real-time, valid for outdoor applications and calculated with the proven GRIMM enviro-algorithm, as well as six additional dust mass fractions pm10, pm2.5, pm1, inhalable, thoracic and respirable for IAQ and workplace measurements. This highly versatile instrument performs real-time monitoring of particle number, particle size and provides information on particle surface distribution as well as dust mass distribution. GRIMM's EDM264 has 31 equidistant size channels, which are PSL traceable. A high-end data logger enables data acquisition and wireless communication via LTE, WLAN, or wired via Ethernet. Backup copies of the measurement data are stored in the device directly. The rinsing air function, which protects the laser and detector in the optical cell, further increases the reliability and long term stability of the EDM264 under different environmental and climatic conditions. The entire sample volume flow of 1.2 L/min is analyzed by 100% in the optical cell, which assures excellent counting efficiency at low and high concentrations and complies with the ISO 21501-1standard for OPCs. With all these features, the EDM264 is a world-leading dust monitor for precise monitoring of particulate matter and particle number concentration. This highly reliable instrument is an indispensable tool for many users who need to measure aerosol levels and air quality outdoors, on construction sites, or at production facilities.

Keywords: aerosol research, aerial observation, fence line monitoring, wild fire detection

Procedia PDF Downloads 119
111 Building Student Empowerment through Live Commercial Projects: A Reflective Account of Participants

Authors: Nilanthi Ratnayake, Wen-Ling Liu

Abstract:

Prior research indicates an increasing gap between the skills and capabilities of graduates in the contemporary workplace across the globe. The challenge of addressing this issue primarily lies on the hands of higher education institutes/universities. In particular, surveys of UK employers and retailers found that soft skills including communication, numeracy, teamwork, confidence, analytical ability, digital/IT skills, business sense, language, and social skills are highly valued by graduate employers, and in achieving this, there are various assessed and non-assessed learning exercises have already been embedded into the university curriculum. To this end, this research study aims to explore the reflections of postgraduate student participation in a live commercial project (i.e. designing an advertising campaign for open days, summer school etc.) implemented with the intention of offering a transformative experience by deploying this project. Qualitative research methodology has been followed in this study, collecting data from three types of target audiences; students, academics and employers via a series of personal interviews and focus group discussions. Recorded data were transcribed, entered into NVIVO, and analysed using meaning condensation and content analysis. Students reported that they had a very positive impact towards improving self-efficacy, especially in relation to soft skills and confidence in seeking employment opportunities. In addition, this project has reduced cultural barriers for international students in general communications. Academic staff and potential employers who attended on the presentation day expressed their gratitude for offering a lifelong experience for students, and indeed believed that these type of projects contribute significantly to enhance skills and capabilities of students to cater the demands of employers. In essence, key findings demonstrate that an integration of knowledge-based skills into a live commercial project facilitate individuals to make the transition from education to employment in terms of skills, abilities and work behaviours more effectively in comparison to some other activities/assuagements that are currently in place in higher education institutions/universities.

Keywords: soft skills, commercially live project, higher education, student participation

Procedia PDF Downloads 332