CINXE.COM

Search results for: enhanced critical incident technique

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: enhanced critical incident technique</title> <meta name="description" content="Search results for: enhanced critical incident technique"> <meta name="keywords" content="enhanced critical incident technique"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="enhanced critical incident technique" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="enhanced critical incident technique"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 14309</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: enhanced critical incident technique</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14309</span> Interpersonal Emotion Regulation in Adolescence: An Enhanced Critical Incident Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Setareh%20Shayanfar">Setareh Shayanfar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Given the increasing importance of peer relationships during adolescence, the present study aimed to examine peer interactions that facilitate or hinder adolescents’ regulation of negative emotions. Using the Enhanced Critical Incident Technique, 1-hour semi-structured interviews were conducted with 16 junior high school adolescents. Participants were asked to recall situations when they experienced strong negative emotions during the past school year, indicate the peer interactions that helped or hindered their emotion regulation, and identify prospective interactions with the potential to help regulate their emotions. Data analysis extracted 182 critical incidents, including 109 helping incidents, 45 hindering incidents, and 28 wish list items, which generated 10 categories nested within four overarching themes: Positive Personal Support included (a) supportive presence, (b) expressing concern, (c) empathizing, and (d) encouraging and cheering up; while Strategy Transmission included (e) sharing perspective, and (f) giving advice; Activated Support included (g) taking action, and (h) distracting; while Negative Personal Interactions included (i) withdrawing and (j) punishing. Implications for mental health and service providers, as well as recommendations for future research, are presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescence" title="adolescence">adolescence</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20regulation" title=" emotion regulation"> emotion regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique" title=" enhanced critical incident technique"> enhanced critical incident technique</a>, <a href="https://publications.waset.org/abstracts/search?q=peers" title=" peers "> peers </a> </p> <a href="https://publications.waset.org/abstracts/98325/interpersonal-emotion-regulation-in-adolescence-an-enhanced-critical-incident-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98325.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14308</span> Tip-Enhanced Raman Spectroscopy with Plasmonic Lens Focused Longitudinal Electric Field Excitation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mingqian%20Zhang">Mingqian Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tip-enhanced Raman spectroscopy (TERS) is a scanning probe technique for individual objects and structured surfaces investigation that provides a wealth of enhanced spectral information with nanoscale spatial resolution and high detection sensitivity. It has become a powerful and promising chemical and physical information detection method in the nanometer scale. The TERS technique uses a sharp metallic tip regulated in the near-field of a sample surface, which is illuminated with a certain incident beam meeting the excitation conditions of the wave-vector matching. The local electric field, and, consequently, the Raman scattering, from the sample in the vicinity of the tip apex are both greatly tip-enhanced owning to the excitation of localized surface plasmons and the lightning-rod effect. Typically, a TERS setup is composed of a scanning probe microscope, excitation and collection optical configurations, and a Raman spectroscope. In the illumination configuration, an objective lens or a parabolic mirror is always used as the most important component, in order to focus the incident beam on the tip apex for excitation. In this research, a novel TERS setup was built up by introducing a plasmonic lens to the excitation optics as a focusing device. A plasmonic lens with symmetry breaking semi-annular slits corrugated on gold film was designed for the purpose of generating concentrated sub-wavelength light spots with strong longitudinal electric field. Compared to conventional far-field optical components, the designed plasmonic lens not only focuses an incident beam to a sub-wavelength light spot, but also realizes a strong z-component that dominants the electric field illumination, which is ideal for the excitation of tip-enhancement. Therefore, using a PL in the illumination configuration of TERS contributes to improve the detection sensitivity by both reducing the far-field background and effectively exciting the localized electric field enhancement. The FDTD method was employed to investigate the optical near-field distribution resulting from the light-nanostructure interaction. And the optical field distribution was characterized using an scattering-type scanning near-field optical microscope to demonstrate the focusing performance of the lens. The experimental result is in agreement with the theoretically calculated one. It verifies the focusing performance of the plasmonic lens. The optical field distribution shows a bright elliptic spot in the lens center and several arc-like side-lobes on both sides. After the focusing performance was experimentally verified, the designed plasmonic lens was used as a focusing component in the excitation configuration of TERS setup to concentrate incident energy and generate a longitudinal optical field. A collimated linearly polarized laser beam, with along x-axis polarization, was incident from the bottom glass side on the plasmonic lens. The incident light focused by the plasmonic lens interacted with the silver-coated tip apex and enhanced the Raman signal of the sample locally. The scattered Raman signal was gathered by a parabolic mirror and detected with a Raman spectroscopy. Then, the plasmonic lens based setup was employed to investigate carbon nanotubes and TERS experiment was performed. Experimental results indicate that the Raman signal is considerably enhanced which proves that the novel TERS configuration is feasible and promising. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20electric%20field" title="longitudinal electric field">longitudinal electric field</a>, <a href="https://publications.waset.org/abstracts/search?q=plasmonics" title=" plasmonics"> plasmonics</a>, <a href="https://publications.waset.org/abstracts/search?q=raman%20spectroscopy" title=" raman spectroscopy"> raman spectroscopy</a>, <a href="https://publications.waset.org/abstracts/search?q=tip-enhancement" title=" tip-enhancement"> tip-enhancement</a> </p> <a href="https://publications.waset.org/abstracts/39695/tip-enhanced-raman-spectroscopy-with-plasmonic-lens-focused-longitudinal-electric-field-excitation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39695.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14307</span> Multiple Fault Diagnosis in Digital Circuits using Critical Path Tracing and Enhanced Deduction Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Mahmoud">Mohamed Mahmoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper has developed an effect-cause analysis technique for fault diagnosis in digital circuits. The main algorithm of our technique is based on the Enhanced Deduction Algorithm, which processes the real response of the CUT to the applied test T to deduce the values of the internal lines. An experimental version of the algorithm has been implemented in C++. The code takes about 7592 lines. The internal values are determined based on the logic values under the permanent stuck-fault model. Using a backtracking strategy guarantees that the actual values are covered by at least one solution, or no solution is found. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enhanced%20deduction%20algorithm" title="enhanced deduction algorithm">enhanced deduction algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=backtracking%20strategy" title=" backtracking strategy"> backtracking strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20test%20equipment" title=" automatic test equipment"> automatic test equipment</a>, <a href="https://publications.waset.org/abstracts/search?q=verfication" title=" verfication"> verfication</a> </p> <a href="https://publications.waset.org/abstracts/144580/multiple-fault-diagnosis-in-digital-circuits-using-critical-path-tracing-and-enhanced-deduction-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144580.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14306</span> Unpacking Chilean Preservice Teachers’ Beliefs on Practicum Experiences through Digital Stories</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claudio%20D%C3%ADaz">Claudio Díaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mabel%20Ortiz"> Mabel Ortiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An EFL teacher education programme in Chile takes five years to train a future teacher of English. Preservice teachers are prepared to learn an advanced level of English and teach the language from 5th to 12th grade in the Chilean educational system. In the context of their first EFL Methodology course in year four, preservice teachers have to create a five-minute digital story that starts from a critical incident they have experienced as teachers-to-be during their observations or interventions in the schools. A critical incident can be defined as a happening, a specific incident or event either observed by them or involving them. The happening sparks their thinking and may make them subsequently think differently about the particular event. When they create their digital stories, preservice teachers put technology, teaching practice and theory together to narrate a story that is complemented by still images, moving images, text, sound effects and music. The story should be told as a personal narrative, which explains the critical incident. This presentation will focus on the creation process of 50 Chilean preservice teachers&rsquo; digital stories highlighting the critical incidents they started their stories. It will also unpack preservice teachers&rsquo; beliefs and reflections when approaching their teaching practices in schools. These beliefs will be coded and categorized through content analysis to evidence preservice teachers&rsquo; most rooted conceptions about English teaching and learning in Chilean schools. The findings seem to indicate that preservice teachers&rsquo; beliefs are strongly mediated by contextual and affective factors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=beliefs" title="beliefs">beliefs</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20stories" title=" digital stories"> digital stories</a>, <a href="https://publications.waset.org/abstracts/search?q=preservice%20teachers" title=" preservice teachers"> preservice teachers</a>, <a href="https://publications.waset.org/abstracts/search?q=practicum" title=" practicum"> practicum</a> </p> <a href="https://publications.waset.org/abstracts/60066/unpacking-chilean-preservice-teachers-beliefs-on-practicum-experiences-through-digital-stories" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14305</span> Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nahid%20Tavakoli">Nahid Tavakoli</a>, <a href="https://publications.waset.org/abstracts/search?q=Asghar%20Ehteshami"> Asghar Ehteshami</a>, <a href="https://publications.waset.org/abstracts/search?q=Akbar%20Hassanzadeh"> Akbar Hassanzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatemeh%20Amini"> Fatemeh Amini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value<o/oo1). Conclusions: According to ISO/IEC 27002 standards, none of the hospitals were completely complained with to present the best possible Information Security Incident Management. One of the most important aspects to consider when developing the information security incident management policy is to define the roles and responsibilities of the information security incident response team. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20incident%20management" title="information security incident management">information security incident management</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management" title=" information security management"> information security management</a>, <a href="https://publications.waset.org/abstracts/search?q=standards" title=" standards"> standards</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitals" title=" hospitals "> hospitals </a> </p> <a href="https://publications.waset.org/abstracts/38364/investigation-of-information-security-incident-management-based-on-international-standard-isoiec-27002-in-educational-hospitals-in-2014" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">576</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14304</span> Design of Incident Information System in IoT Virtualization Platform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amon%20Olimov">Amon Olimov</a>, <a href="https://publications.waset.org/abstracts/search?q=Umarov%20Jamshid"> Umarov Jamshid</a>, <a href="https://publications.waset.org/abstracts/search?q=Dae-Ho%20Kim"> Dae-Ho Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chol-U%20Lee"> Chol-U Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryum-Duck%20Oh"> Ryum-Duck Oh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes IoT virtualization platform based incident information system. IoT information based environment is the platform that was developed for the purpose of collecting a variety of data by managing regionally scattered IoT devices easily and conveniently in addition to analyzing data collected from roads. Moreover, this paper configured the platform for the purpose of providing incident information based on sensed data. It also provides the same input/output interface as UNIX and Linux by means of matching IoT devices with the directory of file system and also the files. In addition, it has a variety of approaches as to the devices. Thus, it can be applied to not only incident information but also other platforms. This paper proposes the incident information system that identifies and provides various data in real time as to urgent matters on roads based on the existing USN/M2M and IoT visualization platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incident%20information%20system" title="incident information system">incident information system</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualization%20platform" title=" virtualization platform"> virtualization platform</a>, <a href="https://publications.waset.org/abstracts/search?q=USN" title=" USN"> USN</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M" title=" M2M"> M2M</a> </p> <a href="https://publications.waset.org/abstracts/29328/design-of-incident-information-system-in-iot-virtualization-platform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29328.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">351</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14303</span> The Effects of Critical Incident Stress Debriefing and Other Related Interventions on the Psychological Recovery of Earthquake Survivors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joyce%20Fernandez">Joyce Fernandez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined the effects of critical incident stress debriefing and other related interventions on the psychological recovery of earthquake survivors. It is a mixed experimental and qualitative study using post-test only control group design and focus group discussion. After the conduct of critical incident stress debriefing activities and other related interventions in the form of counseling and psychiatric treatment to the survivors of a 6.9 magnitude earthquake, a post-test measuring the level of psychological recovery was given to randomized participants categorized as intervention and control groups. Using the traumatic assessment and belief scale as instrument for the quantitative aspect in order to gauge recovery in the psychological need areas of safety, trust, esteem, intimacy and control, the findings are the following: Intervention group participants have relatively better adjustment along the five psychological need areas compared to the control group participants; there is no significant difference in the psychological recovery among female and male participants of the invention and control groups and; there are significant differences between intervention and control groups in the psychological need areas of self-safety, self-trust, other-trust, self-esteem, and self-intimacy. Using a guided interview for the qualitative data, the themes derived are the following. Safety: The world is an unsafe place to live because of the calamities. Trust: Trust and dependence are anchored on the family. Esteem: Participants are having confused self-worth. Intimacy: Participants are thriving on attachment with their family. Control: Participants have unaltered desire to help but feeling restricted because of personal and logistical concerns.As an outcome of the study a Psychosocial Care Program for Individuals, Families and Communities Affected by Disaster and Trauma was proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20incident%20stress%20debriefing" title="critical incident stress debriefing">critical incident stress debriefing</a>, <a href="https://publications.waset.org/abstracts/search?q=earthquake%20survivors" title=" earthquake survivors"> earthquake survivors</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20recovery" title=" psychological recovery"> psychological recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=related%20interventions" title=" related interventions"> related interventions</a> </p> <a href="https://publications.waset.org/abstracts/59050/the-effects-of-critical-incident-stress-debriefing-and-other-related-interventions-on-the-psychological-recovery-of-earthquake-survivors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59050.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14302</span> Case Study Analysis of 2017 European Railway Traffic Management Incident: The Application of System for Investigation of Railway Interfaces Methodology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sanjeev%20Kumar%20Appicharla">Sanjeev Kumar Appicharla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the results of the modelling and analysis of the European Railway Traffic Management (ERTMS) safety-critical incident to raise awareness of biases in the systems engineering process on the Cambrian Railway in the UK using the RAIB 17/2019 as a primary input. The RAIB, the UK independent accident investigator, published the Report- RAIB 17/2019 giving the details of their investigation of the focal event in the form of immediate cause, causal factors, and underlying factors and recommendations to prevent a repeat of the safety-critical incident on the Cambrian Line. The Systems for Investigation of Railway Interfaces (SIRI) is the methodology used to model and analyze the safety-critical incident. The SIRI methodology uses the Swiss Cheese Model to model the incident and identify latent failure conditions (potentially less than adequate conditions) by means of the management oversight and risk tree technique. The benefits of the systems for investigation of railway interfaces methodology (SIRI) are threefold: first is that it incorporates the “Heuristics and Biases” approach advanced by 2002 Nobel laureate in Economic Sciences, Prof Daniel Kahneman, in the management oversight and risk tree technique to identify systematic errors. Civil engineering and programme management railway professionals are aware of the role “optimism bias” plays in programme cost overruns and are aware of bow tie (fault and event tree) model-based safety risk modelling techniques. However, the role of systematic errors due to “Heuristics and Biases” is not appreciated as yet. This overcomes the problems of omission of human and organizational factors from accident analysis. Second, the scope of the investigation includes all levels of the socio-technical system, including government, regulatory, railway safety bodies, duty holders, signaling firms and transport planners, and front-line staff such that lessons are learned at the decision making and implementation level as well. Third, the author’s past accident case studies are supplemented with research pieces of evidence drawn from the practitioner's and academic researchers’ publications as well. This is to discuss the role of system thinking to improve the decision-making and risk management processes and practices in the IEC 15288 systems engineering standard and in the industrial context such as the GB railways and artificial intelligence (AI) contexts as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accident%20analysis" title="accident analysis">accident analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=AI%20algorithm%20internal%20audit" title=" AI algorithm internal audit"> AI algorithm internal audit</a>, <a href="https://publications.waset.org/abstracts/search?q=bounded%20rationality" title=" bounded rationality"> bounded rationality</a>, <a href="https://publications.waset.org/abstracts/search?q=Byzantine%20failures" title=" Byzantine failures"> Byzantine failures</a>, <a href="https://publications.waset.org/abstracts/search?q=heuristics%20and%20biases%20approach" title=" heuristics and biases approach"> heuristics and biases approach</a> </p> <a href="https://publications.waset.org/abstracts/137535/case-study-analysis-of-2017-european-railway-traffic-management-incident-the-application-of-system-for-investigation-of-railway-interfaces-methodology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14301</span> e-Learning Security: A Distributed Incident Response Generator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bel%20G%20Raggad">Bel G Raggad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-Learning%20security" title=" e-Learning security"> e-Learning security</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20response" title=" incident response"> incident response</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection" title=" intrusion detection"> intrusion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20risk" title=" security risk"> security risk</a>, <a href="https://publications.waset.org/abstracts/search?q=statefull%20inspection" title=" statefull inspection"> statefull inspection</a> </p> <a href="https://publications.waset.org/abstracts/23292/e-learning-security-a-distributed-incident-response-generator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14300</span> Volunteered Geographic Information Coupled with Wildfire Fire Progression Maps: A Spatial and Temporal Tool for Incident Storytelling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cassandra%20Hansen">Cassandra Hansen</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Doherty"> Paul Doherty</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Ferner"> Chris Ferner</a>, <a href="https://publications.waset.org/abstracts/search?q=German%20Whitley"> German Whitley</a>, <a href="https://publications.waset.org/abstracts/search?q=Holly%20Torpey"> Holly Torpey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wildfire is a natural and inevitable occurrence, yet changing climatic conditions have increased the severity, frequency, and risk to human populations in the wildland/urban interface (WUI) of the Western United States. Rapid dissemination of accurate wildfire information is critical to both the Incident Management Team (IMT) and the affected community. With the advent of increasingly sophisticated information systems, GIS can now be used as a web platform for sharing geographic information in new and innovative ways, such as virtual story map applications. Crowdsourced information can be extraordinarily useful when coupled with authoritative information. Information abounds in the form of social media, emergency alerts, radio, and news outlets, yet many of these resources lack a spatial component when first distributed. In this study, we describe how twenty-eight volunteer GIS professionals across nine Geographic Area Coordination Centers (GACC) sourced, curated, and distributed Volunteered Geographic Information (VGI) from authoritative social media accounts focused on disseminating information about wildfires and public safety. The combination of fire progression maps with VGI incident information helps answer three critical questions about an incident, such as: where the first started. How and why the fire behaved in an extreme manner and how we can learn from the fire incident's story to respond and prepare for future fires in this area. By adding a spatial component to that shared information, this team has been able to visualize shared information about wildfire starts in an interactive map that answers three critical questions in a more intuitive way. Additionally, long-term social and technical impacts on communities are examined in relation to situational awareness of the disaster through map layers and agency links, the number of views in a particular region of a disaster, community involvement and sharing of this critical resource. Combined with a GIS platform and disaster VGI applications, this workflow and information become invaluable to communities within the WUI and bring spatial awareness for disaster preparedness, response, mitigation, and recovery. This study highlights progression maps as the ultimate storytelling mechanism through incident case studies and demonstrates the impact of VGI and sophisticated applied cartographic methodology make this an indispensable resource for authoritative information sharing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=storytelling" title="storytelling">storytelling</a>, <a href="https://publications.waset.org/abstracts/search?q=wildfire%20progression%20maps" title=" wildfire progression maps"> wildfire progression maps</a>, <a href="https://publications.waset.org/abstracts/search?q=volunteered%20geographic%20information" title=" volunteered geographic information"> volunteered geographic information</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20and%20temporal" title=" spatial and temporal"> spatial and temporal</a> </p> <a href="https://publications.waset.org/abstracts/140122/volunteered-geographic-information-coupled-with-wildfire-fire-progression-maps-a-spatial-and-temporal-tool-for-incident-storytelling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14299</span> Nanofocusing of Surface Plasmon Polaritons by Partially Metal- Coated Dielectric Conical Probe: Optimal Asymmetric Distance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ngo%20Thi%20Thu">Ngo Thi Thu</a>, <a href="https://publications.waset.org/abstracts/search?q=Kazuo%20Tanaka"> Kazuo Tanaka</a>, <a href="https://publications.waset.org/abstracts/search?q=Masahiro%20Tanaka"> Masahiro Tanaka</a>, <a href="https://publications.waset.org/abstracts/search?q=Dao%20Ngoc%20Chien"> Dao Ngoc Chien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nanometric superfocusing of optical intensity near the tip of partially metal- coated dielectric conical probe of the convergent surface plasmon polariton wave is investigated by the volume integral equation method. It is possible to perform nanofocusing using this probe by using both linearly and radially polarized Gaussian beams as the incident waves. Strongly localized and enhanced optical near-fields can be created on the tip of this probe for the cases of both incident Gaussian beams. However the intensity distribution near the probe tip was found to be very sensitive to the shape of the probe tip. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=waveguide" title="waveguide">waveguide</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20plasmons" title=" surface plasmons"> surface plasmons</a>, <a href="https://publications.waset.org/abstracts/search?q=electromagnetic%20theory" title=" electromagnetic theory"> electromagnetic theory</a> </p> <a href="https://publications.waset.org/abstracts/28337/nanofocusing-of-surface-plasmon-polaritons-by-partially-metal-coated-dielectric-conical-probe-optimal-asymmetric-distance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28337.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14298</span> Quantitative Evaluation of Efficiency of Surface Plasmon Excitation with Grating-Assisted Metallic Nanoantenna</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Almaz%20R.%20Gazizov">Almaz R. Gazizov</a>, <a href="https://publications.waset.org/abstracts/search?q=Sergey%20S.%20Kharintsev"> Sergey S. Kharintsev</a>, <a href="https://publications.waset.org/abstracts/search?q=Myakzyum%20Kh.%20Salakhov"> Myakzyum Kh. Salakhov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work deals with background signal suppression in tip-enhanced near-field optical microscopy (TENOM). The background appears because an optical signal is detected not only from the subwavelength area beneath the tip but also from a wider diffraction-limited area of laser’s waist that might contain another substance. The background can be reduced by using a taper probe with a grating on its lateral surface where an external illumination causes surface plasmon excitation. It requires the grating with parameters perfectly matched with a given incident light for effective light coupling. This work is devoted to an analysis of the light-grating coupling and a quest of grating parameters to enhance a near-field light beneath the tip apex. The aim of this work is to find the figure of merit of plasmon excitation depending on grating period and location of grating in respect to the apex. In our consideration the metallic grating on the lateral surface of the tapered plasmonic probe is illuminated by a plane wave, the electric field is perpendicular to the sample surface. Theoretical model of efficiency of plasmon excitation and propagation toward the apex is tested by fdtd-based numerical simulation. An electric field of the incident light is enhanced on the grating by every single slit due to lightning rod effect. Hence, grating causes amplitude and phase modulation of the incident field in various ways depending on geometry and material of grating. The phase-modulating grating on the probe is a sort of metasurface that provides manipulation by spatial frequencies of the incident field. The spatial frequency-dependent electric field is found from the angular spectrum decomposition. If one of the components satisfies the phase-matching condition then one can readily calculate the figure of merit of plasmon excitation, defined as a ratio of the intensities of the surface mode and the incident light. During propagation towards the apex, surface wave undergoes losses in probe material, radiation losses, and mode compression. There is an optimal location of the grating in respect to the apex. One finds the value by matching quadratic law of mode compression and the exponential law of light extinction. Finally, performed theoretical analysis and numerical simulations of plasmon excitation demonstrate that various surface waves can be effectively excited by using the overtones of a period of the grating or by phase modulation of the incident field. The gratings with such periods are easy to fabricate. Tapered probe with the grating effectively enhances and localizes the incident field at the sample. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=angular%20spectrum%20decomposition" title="angular spectrum decomposition">angular spectrum decomposition</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency" title=" efficiency"> efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=grating" title=" grating"> grating</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20plasmon" title=" surface plasmon"> surface plasmon</a>, <a href="https://publications.waset.org/abstracts/search?q=taper%20nanoantenna" title=" taper nanoantenna"> taper nanoantenna</a> </p> <a href="https://publications.waset.org/abstracts/63233/quantitative-evaluation-of-efficiency-of-surface-plasmon-excitation-with-grating-assisted-metallic-nanoantenna" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63233.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14297</span> Implications of Humanizing Pedagogy on Learning Design in a Technology-Enhanced Language Learning Environment: Critical Reflections on Student Identity and Agency</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mukhtar%20Raban">Mukhtar Raban</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nelson Mandela University subscribes to a humanizing pedagogy (HP), as housed under broader critical pedagogy, that underpins and informs learning and teaching activities at the institution. The investigation sought to explore the implications of humanizing and critical pedagogical considerations for a technology-enhanced language learning (TELL) environment in a university course. The paper inquires into the design of a learning resource in an online learning environment of an English communication module, that applied HP principles. With an objective of creating agentive spaces for foregrounding identity, student voice, critical self-reflection, and recognition of others’ humanity; a flexible and open 'My Presence' feature was added to the TELL environment that allowed students and lecturers to share elements of their backgrounds in a ‘mutually vulnerable’ manner as a way of establishing digital identity and a more ‘human’ presence in the online language learning encounter, serving as a catalyst for the recognition of the ‘other’. Following a qualitative research design, the study adopted an auto-ethnographic approach, complementing the critical inquiry nature embedded into the activity’s practices. The study’s findings provide critical reflections and deductions on the possibilities of leveraging digital human expression within a humanizing pedagogical framework to advance the realization of HP-adoption in language learning and teaching encounters. It was found that the consideration of humanizing pedagogical principles in the design of online learning was more effective when the critical outcomes were explicated to students and lecturers prior to the completion of the activities. The integration of humanizing pedagogy also led to a contextual advancement of ‘affective’ language learning. Upon critical reflection and analysis, student identity and agency can flourish in a technology-enhanced learning environment when humanizing, and critical pedagogy influences the learning design. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20reflection" title="critical reflection">critical reflection</a>, <a href="https://publications.waset.org/abstracts/search?q=humanizing%20pedagogy" title=" humanizing pedagogy"> humanizing pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20identity" title=" student identity"> student identity</a>, <a href="https://publications.waset.org/abstracts/search?q=technology-enhanced%20language%20learning" title=" technology-enhanced language learning"> technology-enhanced language learning</a> </p> <a href="https://publications.waset.org/abstracts/108414/implications-of-humanizing-pedagogy-on-learning-design-in-a-technology-enhanced-language-learning-environment-critical-reflections-on-student-identity-and-agency" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108414.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14296</span> Hauntology of History: Intimate Revolt in Lou Ye’s Summer Palace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yueming%20Li">Yueming Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes Lou Ye’s Summer Palace (2006), an autobiographical film of the Sixth Generation of Directors in Mainland China, from the approaches of inter-textual analysis and intellectual history. It highlights the film’s reconstruction of the June 4th Incident as an intermediary device for the revival and haunting of the 1980s’ New Enlightenment Movement. The paper demonstrates how the June 4th Incident unfolds as historical trauma and collective experience of the Generation through Lou’s flickering narrative in both plot organization and visual representation, under an individualized and internal viewpoint. It further proposes that these revenants of the June 4th Incident translate into “realms of memory,” which lend themselves for biographical and historical reconstruction of the June 4th Incident based on a politics of embodiment. Through this, Lou and his contemporaries acquire agency to actively respond to the June 4th Incident as an “intimate revolt.” In this sense, the film revisits the New Enlightenment Movement in that they similarly construct rebellious connotations in a seemingly depoliticized manner. As the paper examines how an autobiographical film reconstructs, revisits, and responds to a historical event and its absence, it answers how individuals’ agency intertwines with and counteracts their historical living contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=new%20enlightenment%20movement" title="new enlightenment movement">new enlightenment movement</a>, <a href="https://publications.waset.org/abstracts/search?q=summer%20palace" title=" summer palace"> summer palace</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20June%204th%20incident" title=" the June 4th incident"> the June 4th incident</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20sixth%20generation%20of%20directors" title=" the sixth generation of directors"> the sixth generation of directors</a> </p> <a href="https://publications.waset.org/abstracts/148940/hauntology-of-history-intimate-revolt-in-lou-yes-summer-palace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148940.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14295</span> Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagus%20Hanindhito">Bagus Hanindhito</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariz%20Azmi%20Pratama"> Fariz Azmi Pratama</a>, <a href="https://publications.waset.org/abstracts/search?q=Ulfah%20Nadiya"> Ulfah Nadiya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20information%20system" title="academic information system">academic information system</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20crime" title=" academic crime"> academic crime</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title=" digital forensic"> digital forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=high-availability%20server%20and%20storage" title=" high-availability server and storage"> high-availability server and storage</a>, <a href="https://publications.waset.org/abstracts/search?q=rapid%20evidence%20remote%20acquisition" title=" rapid evidence remote acquisition"> rapid evidence remote acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20incident" title=" security incident"> security incident</a> </p> <a href="https://publications.waset.org/abstracts/95626/rapid-evidence-remote-acquisition-in-high-availability-server-and-storage-system-for-digital-forensic-to-unravel-academic-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14294</span> Modification of the Risk for Incident Cancer with Changes in the Metabolic Syndrome Status: A Prospective Cohort Study in Taiwan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yung-Feng%20Yen">Yung-Feng Yen</a>, <a href="https://publications.waset.org/abstracts/search?q=Yun-Ju%20Lai"> Yun-Ju Lai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Metabolic syndrome (MetS) is reversible; however, the effect of changes in MetS status on the risk of incident cancer has not been extensively studied. We aimed to investigate the effects of changes in MetS status on incident cancer risk. Methods: This prospective, longitudinal study used data from Taiwan’s MJ cohort of 157,915 adults recruited from 2002–2016 who had repeated MetS measurements 5.2 (±3.5) years apart and were followed up for the new onset of cancer over 8.2 (±4.5) years. A new diagnosis of incident cancer in study individuals was confirmed by their pathohistological reports. The participants’ MetS status included MetS-free (n=119,331), MetS-developed (n=14,272), MetS-recovered (n=7,914), and MetS-persistent (n=16,398). We used the Fine-Gray sub-distribution method, with death as the competing risk, to determine the association between MetS changes and the risk of incident cancer. Results: During the follow-up period, 7,486 individuals had new development of cancer. Compared with the MetS-free group, MetS-persistent individuals had a significantly higher risk of incident cancer (adjusted hazard ratio [aHR], 1.10; 95% confidence interval [CI], 1.03-1.18). Considering the effect of dynamic changes in MetS status on the risk of specific cancer types, MetS persistence was significantly associated with a higher risk of incident colon and rectum, kidney, pancreas, uterus, and thyroid cancer. The risk of kidney, uterus, and thyroid cancer in MetS-recovered individuals was higher than in those who remained MetS but lower than MetS-persistent individuals. Conclusions: Persistent MetS is associated with a higher risk of incident cancer, and recovery from MetS may reduce the risk. The findings of our study suggest that it is imperative for individuals with pre-existing MetS to seek treatment for this condition to reduce the cancer risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metabolic%20syndrome%20change" title="metabolic syndrome change">metabolic syndrome change</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer" title=" cancer"> cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factor" title=" risk factor"> risk factor</a>, <a href="https://publications.waset.org/abstracts/search?q=cohort%20study" title=" cohort study"> cohort study</a> </p> <a href="https://publications.waset.org/abstracts/161544/modification-of-the-risk-for-incident-cancer-with-changes-in-the-metabolic-syndrome-status-a-prospective-cohort-study-in-taiwan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161544.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14293</span> Investigation of Arson Fire Incident in Textile Garment Building Using Fire Dynamic Simulation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsin%20Ali%20Shaikh">Mohsin Ali Shaikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Song%20Weiguo"> Song Weiguo</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Kashan%20Surahio"> Muhammad Kashan Surahio</a>, <a href="https://publications.waset.org/abstracts/search?q=Usman%20Shahid"> Usman Shahid</a>, <a href="https://publications.waset.org/abstracts/search?q=Rehmat%20Karim"> Rehmat Karim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigated a catastrophic arson fire incident that occurred at a textile garment building in Karachi, Pakistan. Unfortunately, a catastrophic event led to the loss of 262 lives and caused 55 severe injuries. The primary objective is to analyze the aspects of the fire incident and understand the causes of arson fire disasters. The study utilized Fire Dynamic Simulation (F.D.S) was employed to simulate fire propagation, visibility, harmful gas concentration, fire temperature, and numerical results. The analysis report has determined the specific circumstances that created the unpleasant incident in the present study. The significance of the current findings lies in their potential to prevent arson fires, improve fire safety measures, and the development of safety plans in building design. The fire dynamic simulation findings can serve as a theoretical basis for the investigation of arson fires and evacuation planning in textile garment buildings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=investigation" title="investigation">investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20arson%20incident" title=" fire arson incident"> fire arson incident</a>, <a href="https://publications.waset.org/abstracts/search?q=textile%20garment" title=" textile garment"> textile garment</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20dynamic%20simulation%20%28FDS%29" title=" fire dynamic simulation (FDS)"> fire dynamic simulation (FDS)</a> </p> <a href="https://publications.waset.org/abstracts/175170/investigation-of-arson-fire-incident-in-textile-garment-building-using-fire-dynamic-simulation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175170.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14292</span> The Excess Loop Delay Calibration in a Bandpass Continuous-Time Delta Sigma Modulators Based on Q-Enhanced LC Filter</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sorore%20Benabid">Sorore Benabid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Q-enhanced LC filters are the most used architecture in the Bandpass (BP) Continuous-Time (CT) Delta-Sigma (&Sigma;&Delta;) modulators, due to their: high frequencies operation, high linearity than the active filters and a high quality factor obtained by Q-enhanced technique. This technique consists of the use of a negative resistance that compensate the ohmic losses in the on-chip inductor. However, this technique introduces a zero in the filter transfer function which will affect the modulator performances in term of Dynamic Range (DR), stability and in-band noise (Signal-to-Noise Ratio (SNR)). In this paper, we study the effect of this zero and we demonstrate that a calibration of the excess loop delay (ELD) is required to ensure the best performances of the modulator. System level simulations are done for a 2ndorder BP CT (&Sigma;&Delta;) modulator at a center frequency of 300MHz. Simulation results indicate that the optimal ELD should be reduced by 13% to achieve the maximum SNR and DR compared to the ideal LC-based &Sigma;&Delta; modulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=continuous-time%20bandpass%20delta-sigma%20modulators" title="continuous-time bandpass delta-sigma modulators">continuous-time bandpass delta-sigma modulators</a>, <a href="https://publications.waset.org/abstracts/search?q=excess%20loop%20delay" title=" excess loop delay"> excess loop delay</a>, <a href="https://publications.waset.org/abstracts/search?q=on-chip%20inductor" title=" on-chip inductor"> on-chip inductor</a>, <a href="https://publications.waset.org/abstracts/search?q=Q-enhanced%20LC%20filter" title=" Q-enhanced LC filter"> Q-enhanced LC filter</a> </p> <a href="https://publications.waset.org/abstracts/81967/the-excess-loop-delay-calibration-in-a-bandpass-continuous-time-delta-sigma-modulators-based-on-q-enhanced-lc-filter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81967.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14291</span> Critical Path Segments Method for Scheduling Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sherif%20M.%20Hafez">Sherif M. Hafez</a>, <a href="https://publications.waset.org/abstracts/search?q=Remon%20F.%20Aziz"> Remon F. Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=May%20S.%20A.%20Elalim"> May S. A. Elalim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Project managers today rely on scheduling tools based on the Critical Path Method (CPM) to determine the overall project duration and the activities’ float times which lead to greater efficiency in planning and control of projects. CPM was useful for scheduling construction projects, but researchers had highlighted a number of serious drawbacks that limit its use as a decision support tool and lacks the ability to clearly record and represent detailed information. This paper discusses the drawbacks of CPM as a scheduling technique and presents a modified critical path method (CPM) model which is called critical path segments (CPS). The CPS scheduling mechanism addresses the problems of CPM in three ways: decomposing the activity duration of separated but connected time segments; all relationships among activities are converted into finish–to–start relationship; and analysis and calculations are made with forward path. Sample cases are included to illustrate the shortages in CPM, CPS full analysis and calculations are explained in details, and how schedules can be handled better with the CPS technique. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20management" title="construction management">construction management</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling" title=" scheduling"> scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20path%20method" title=" critical path method"> critical path method</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20path%20segments" title=" critical path segments"> critical path segments</a>, <a href="https://publications.waset.org/abstracts/search?q=forward%20pass" title=" forward pass"> forward pass</a>, <a href="https://publications.waset.org/abstracts/search?q=float" title=" float"> float</a>, <a href="https://publications.waset.org/abstracts/search?q=project%20control" title=" project control"> project control</a> </p> <a href="https://publications.waset.org/abstracts/17760/critical-path-segments-method-for-scheduling-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14290</span> Power, Values, Rules and Leader Decision Making: A Discourse Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cathryn%20Robinson">Cathryn Robinson</a>, <a href="https://publications.waset.org/abstracts/search?q=Bernard%20McKenna"> Bernard McKenna</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Rooney"> David Rooney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper argues that the application of values-based leadership increasingly challenges leaders in rules-based organisations, particularly in bureaucratic organisations such as the military, public service, police, and emergency services. Leaders are grappling to reconcile how to enact values-based leadership and decision-making when they are bound by rules, policies, and procedures. This interpretive study used a multi-faceted vignette (critical incident) as the basis of an interview with air force officers at three levels: executive, senior, and junior. In this way, practice is forced to intersect with discourse. The findings revealed a shared set of discourse themes (legal; rules; safety and risk; operational practice/theatre discourses), but also clear dialectical tensions. These tensions were evident in executive officers and senior leaders emphasizing rules and information themes, whereas junior officers emphasized decision making, collateral, and situation. These findings reveal discourse and practice incommensurability that could have grave implications in the conduct of war. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20incident" title="critical incident">critical incident</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title=" discourse analysis"> discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=rules-based" title=" rules-based"> rules-based</a>, <a href="https://publications.waset.org/abstracts/search?q=values-based" title=" values-based"> values-based</a> </p> <a href="https://publications.waset.org/abstracts/104145/power-values-rules-and-leader-decision-making-a-discourse-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104145.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14289</span> Modified Single-Folded Potentials for the Alpha-²⁴Mg and Alpha-²⁸Si Elastic Scattering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20N.%20A.%20Abdullah">M. N. A. Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Pritha%20Roy"> Pritha Roy</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20R.%20Shil"> R. R. Shil</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20R.%20Sarker"> D. R. Sarker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Alpha-nucleus interaction is obscured because it produces enhanced cross-sections at large scattering angles known as anomaly in large angle scattering (ALAS). ALAS is prominent in the elastic scattering of α-particles as well as in non-elastic processes involving α-particles for incident energies up to 50 MeV and for targets of mass A ≤ 50. The Woods-Saxon type of optical model potential fails to describe the processes in a consistent manner. Folded potential is a good candidate and often used to construct the potential which is derived from the microscopic as well as semi-microscopic folding calculations. The present work reports the analyses of the elastic scattering of α-particles from ²⁴Mg and ²⁸Si at Eα=22-100 MeV and 14.4-120 MeV incident energies respectively in terms of the modified single-folded (MSF) potential. To derive the MSF potential, we take the view that the nucleons in the target nuclei ²⁴Mg and ²⁸Si are primarily in α-like clusters and the rest of the time in unclustered nucleonic configuration. The MSF potential, found in this study, does not need any renormalization over the whole range of incident α energies, and the renormalization factor has been found to be exactly 1 for both the targets. The best-fit parameters yield 4Aα = 21 and AN = 3 for α-²⁴Mg potential, and 4Aα = 26 and AN = 2 for α-²⁸Si potential in time-average pictures. The root-mean-square radii of both ²⁴Mg and ²⁸Si are also deduced, and the results obtained from this work agree well with the outcomes of other studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=elastic%20scattering" title="elastic scattering">elastic scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20model" title=" optical model"> optical model</a>, <a href="https://publications.waset.org/abstracts/search?q=folded%20potential" title=" folded potential"> folded potential</a>, <a href="https://publications.waset.org/abstracts/search?q=renormalization" title=" renormalization"> renormalization</a> </p> <a href="https://publications.waset.org/abstracts/76022/modified-single-folded-potentials-for-the-alpha-24mg-and-alpha-28si-elastic-scattering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76022.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14288</span> Incident Management System: An Essential Tool for Oil Spill Response</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Heyder%20Alatas">Ali Heyder Alatas</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Xin"> D. Xin</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Nai%20Ming"> L. Nai Ming</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=command%20and%20control" title="command and control">command and control</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20management%20system" title=" incident management system"> incident management system</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20spill%20response" title=" oil spill response"> oil spill response</a>, <a href="https://publications.waset.org/abstracts/search?q=response%20organisation" title=" response organisation"> response organisation</a> </p> <a href="https://publications.waset.org/abstracts/90408/incident-management-system-an-essential-tool-for-oil-spill-response" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14287</span> Major Incident Tier System in the Emergency Department: An Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Bernard">Catherine Bernard</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Ransom"> Paul Ransom</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent events have prompted emergency planners to re-evaluate their emergency response to major incidents and mass casualties. At the Royal Sussex County Hospital, we have adopted a tiered system comprised of three levels, anticipating an increasing P1, P2 or P3 load. This will aid planning in the golden period between Major Incident ‘Standby,’ and ‘Declared’. Each tier offers step-by-step instructions on appropriate patient movement within and out of the department, as well as suggestions for overflow areas and additional staffing levels. This system can be adapted to individual hospitals and provides concise instructions to be followed in a potentially overwhelming situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disaster%20planning" title="disaster planning">disaster planning</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20preparedness" title=" emergency preparedness"> emergency preparedness</a>, <a href="https://publications.waset.org/abstracts/search?q=major%20incident%20planning" title=" major incident planning"> major incident planning</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20casualty%20event" title=" mass casualty event"> mass casualty event</a> </p> <a href="https://publications.waset.org/abstracts/85011/major-incident-tier-system-in-the-emergency-department-an-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85011.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14286</span> Stray Light Reduction Methodology by a Sinusoidal Light Modulation and Three-Parameter Sine Curve Fitting Algorithm for a Reflectance Spectrometer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hung%20Chih%20Hsieh">Hung Chih Hsieh</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Hao%20Chang"> Cheng Hao Chang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yun%20Hsiang%20Chang"> Yun Hsiang Chang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Lin%20Chang"> Yu Lin Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the applications of the spectrometer, the stray light that comes from the environment affects the measurement results a lot. Hence, environment and instrument quality control for the stray reduction is critical for the spectral reflectance measurement. In this paper, a simple and practical method has been developed to correct a spectrometer's response for measurement errors arising from the environment's and instrument's stray light. A sinusoidal modulated light intensity signal was incident on a tested sample, and then the reflected light was collected by the spectrometer. Since a sinusoidal signal modulated the incident light, the reflected light also had a modulated frequency which was the same as the incident signal. Using the three-parameter sine curve fitting algorithm, we can extract the primary reflectance signal from the total measured signal, which contained the primary reflectance signal and the stray light from the environment. The spectra similarity between the extracted spectra by this proposed method with extreme environment stray light is 99.98% similar to the spectra without the environment's stray light. This result shows that we can measure the reflectance spectra without the affection of the environment's stray light. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spectrometer" title="spectrometer">spectrometer</a>, <a href="https://publications.waset.org/abstracts/search?q=stray%20light" title=" stray light"> stray light</a>, <a href="https://publications.waset.org/abstracts/search?q=three-parameter%20sine%20curve%20fitting" title=" three-parameter sine curve fitting"> three-parameter sine curve fitting</a>, <a href="https://publications.waset.org/abstracts/search?q=spectra%20extraction" title=" spectra extraction"> spectra extraction</a> </p> <a href="https://publications.waset.org/abstracts/138998/stray-light-reduction-methodology-by-a-sinusoidal-light-modulation-and-three-parameter-sine-curve-fitting-algorithm-for-a-reflectance-spectrometer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138998.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14285</span> Comparison Between Tension Band Wiring Using K-Wires and Cannulated Screws in Transverse Patella Fracture Fixation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Francis">Daniel Francis</a>, <a href="https://publications.waset.org/abstracts/search?q=Mo%20Yassin"> Mo Yassin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transverse patella fractures are routinely fixed using tension band wiring (TBW) using Kirschner wires and a wire in the shape of a figure of 8. The idea of the study was to compare the outcomes of the traditional technique against the more recently used cannulated screws and fiber tape in the shape of a figure of 8. We performed a retrospective cohort study of all the surgically fixed patella fractures from the year 2019 to 2022. The patients were divided into two groups TBW group and cannulated screws group. The primary outcome measure was the failure of fixation and the need for the removal of metalwork. Twenty-six patellar fractures were studied. TBW was used in 14 (53.8%), and cannulated screws were used for fixation in 12 (46.2%). There was one incident of metalwork failure in the TBW and one incident in the cannulated screws group. Five (35.7%) of patients in the TBW needed symptomatic metal work removed and One (8.3%) in the cannulated screw group. In both groups, the rate of fixation failure was low. Symptomatic implants, the most common complication observed, were higher in the TBW group in our practice. Although the small numbers in both groups, the hope of this study is to shine the light on the use of cannulated screws for patella fractures as it would reduce the need for a second operation and reduce the load on the already stretched services as well as improving the patient experience by not requiring further surgery. Although this is not a brand-new technique, it is not commonly used as there have not yet been any studies that demonstrate the lower rates of second surgery needed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patella" title="patella">patella</a>, <a href="https://publications.waset.org/abstracts/search?q=tension%20band%20wiring" title=" tension band wiring"> tension band wiring</a>, <a href="https://publications.waset.org/abstracts/search?q=randomised" title=" randomised"> randomised</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technique" title=" new technique"> new technique</a> </p> <a href="https://publications.waset.org/abstracts/166556/comparison-between-tension-band-wiring-using-k-wires-and-cannulated-screws-in-transverse-patella-fracture-fixation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166556.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14284</span> Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Issam%20Alnader">Issam Alnader</a>, <a href="https://publications.waset.org/abstracts/search?q=Aboubaker%20Lasebae"> Aboubaker Lasebae</a>, <a href="https://publications.waset.org/abstracts/search?q=Rand%20Raheem"> Rand Raheem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title="wireless sensor networks">wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=dependability%20of%20safety%20WSNs" title=" dependability of safety WSNs"> dependability of safety WSNs</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20conservation" title=" energy conservation"> energy conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=sleep%20awake%20schedule" title=" sleep awake schedule"> sleep awake schedule</a> </p> <a href="https://publications.waset.org/abstracts/158308/using-hidden-markov-chain-for-improving-the-dependability-of-safety-critical-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158308.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14283</span> Artificial Intelligence for Safety Related Aviation Incident and Accident Investigation Scenarios</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bernabeo%20R.%20Alberto">Bernabeo R. Alberto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the tremendous improvements in the processing power of computers, the possibilities of artificial intelligence will increasingly be used in aviation and make autonomous flights, preventive maintenance, ATM (Air Traffic Management) optimization, pilots, cabin crew, ground staff, and airport staff training possible in a cost-saving, less time-consuming and less polluting way. Through the use of artificial intelligence, we foresee an interviewing scenario where the interviewee will interact with the artificial intelligence tool to contextualize the character and the necessary information in a way that aligns reasonably with the character and the scenario. We are creating simulated scenarios connected with either an aviation incident or accident to enhance also the training of future accident/incident investigators integrating artificial intelligence and augmented reality tools. The project's goal is to improve the learning and teaching scenario through academic and professional expertise in aviation and in the artificial intelligence field. Thus, we intend to contribute to the needed high innovation capacity, skills, and training development and management of artificial intelligence, supported by appropriate regulations and attention to ethical problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=aviation%20accident" title=" aviation accident"> aviation accident</a>, <a href="https://publications.waset.org/abstracts/search?q=aviation%20incident" title=" aviation incident"> aviation incident</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a> </p> <a href="https://publications.waset.org/abstracts/191510/artificial-intelligence-for-safety-related-aviation-incident-and-accident-investigation-scenarios" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">23</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14282</span> Analysis of the Scattered Fields by Dielectric Sphere Inside Different Dielectric Mediums: The Case of the Source and Observation Point Is Reciprocal</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emi%CC%87ne%20Av%C5%9Far%20Aydin">Emi̇ne Avşar Aydin</a>, <a href="https://publications.waset.org/abstracts/search?q=Nezahat%20G%C3%BCnen%C3%A7%20Tuncel"> Nezahat Günenç Tuncel</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Hami%CC%87t%20Serbest"> A. Hami̇t Serbest</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The electromagnetic scattering from a canonical structure is an important issue in electromagnetic theory. In this study, the electromagnetic scattering from a dielectric sphere with oblique incidence is investigated. The incident field is considered as a plane wave with H polarized. The scattered and transmitted field expressions with unknown coefficients are written. The unknown coefficients are obtained by using exact boundary conditions. Then, the sphere is considered as having frequency dependent dielectric permittivity. The frequency dependence is shown by Cole-Cole model. The far scattered field expressions are found respect to different incidence angles in the 1-8 GHz frequency range. The observation point is the angular distance of pi from an incident wave. While an incident wave comes with a certain angle, observation point turns from 0 to 360 degrees. According to this, scattered field amplitude is maximum at the location of the incident wave, scattered field amplitude is minimum at the across incident wave. Also, the scattered fields are plotted versus frequency to show frequency-dependence explicitly. Graphics are shown for some incident angles compared with the Harrington's solution. Thus, the results are obtained faster and more reliable with reciprocal rotation. It is expected that when there is another sphere with different properties in the outer sphere, the presence and location of the sphere will be detected faster. In addition, this study leads to use for biomedical applications in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=scattering" title="scattering">scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=dielectric%20sphere" title=" dielectric sphere"> dielectric sphere</a>, <a href="https://publications.waset.org/abstracts/search?q=oblique%20incidence" title=" oblique incidence"> oblique incidence</a>, <a href="https://publications.waset.org/abstracts/search?q=reciprocal%20rotation" title=" reciprocal rotation"> reciprocal rotation</a> </p> <a href="https://publications.waset.org/abstracts/32409/analysis-of-the-scattered-fields-by-dielectric-sphere-inside-different-dielectric-mediums-the-case-of-the-source-and-observation-point-is-reciprocal" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32409.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14281</span> Implications of Creating a 3D Vignette as a Reflective Practice for Continuous Professional Development of Foreign Language Teachers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samiah%20H.%20Ghounaim">Samiah H. Ghounaim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The topic of this paper is significant because of the increasing need for intercultural training for foreign language teachers due to the continuous challenges they face in their diverse classrooms. First, the structure of the intercultural training program designed will be briefly described, and the structure of a 3D vignette and its intended purposes will be elaborated on. This was the first stage where the program was designed and implemented on the period of three months with a group of local and expatriate foreign language teachers/practitioners at a university in the Middle East. After that, a set of primary data collected during the first stage of this research on the design and co-construction process of a 3D vignette will be reviewed and analysed in depth. Each practitioner designed a personal incident into a 3D vignette where each dimension of the vignette viewed the same incident from a totally different perspective. Finally, the results and the implications of having participant construct their personal incidents into a 3D vignette as a reflective practice will be discussed in detail as well as possible extensions for the research. This process proved itself to be an effective reflective practice where the participants were stimulated to view their incidents in a different light. Co-constructing one’s own critical incidents –be it a positive experience or not– into a structured 3D vignette encouraged participants to decentralise themselves from the incidents and, thus, creating a personal reflective space where they had the opportunity to see different potential outcomes for each incident, as well as prepare for the reflective discussion of their vignette with their peers. This provides implications for future developments in reflective writing practices and possibilities for educators’ continuous professional development (CPD). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=3D%20vignettes" title="3D vignettes">3D vignettes</a>, <a href="https://publications.waset.org/abstracts/search?q=intercultural%20competence%20training" title=" intercultural competence training"> intercultural competence training</a>, <a href="https://publications.waset.org/abstracts/search?q=reflective%20practice" title=" reflective practice"> reflective practice</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20training" title=" teacher training"> teacher training</a> </p> <a href="https://publications.waset.org/abstracts/106487/implications-of-creating-a-3d-vignette-as-a-reflective-practice-for-continuous-professional-development-of-foreign-language-teachers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106487.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14280</span> Assessment of the Photovoltaic and Solar Thermal Potential Installation Area on Residential Buildings: Case Study of Amman, Jordan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jenan%20Abu%20Qadourah">Jenan Abu Qadourah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The suitable surface areas for the ST and PV installation are determined based on incident solar irradiation on different surfaces, shading analysis and suitable architectural area for integration considering limitations due to the constructions, available surfaces area and use of the available surfaces for other purposes. The incident solar radiation on the building surfaces and the building solar exposure analysis of the location of Amman, Jordan, is performed with Autodesk Ecotect analysis 2011 simulation software. The building model geometry within the typical urban context is created in “SketchUp,” which is then imported into Ecotect. The hourly climatic data of Amman, Jordan selected are the same ones used for the building simulation in IDA ICE and Polysun simulation software. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=photovoltaic" title="photovoltaic">photovoltaic</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20thermal" title=" solar thermal"> solar thermal</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20incident" title=" solar incident"> solar incident</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20fa%C3%A7ade" title=" building façade"> building façade</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20potential" title=" solar potential"> solar potential</a> </p> <a href="https://publications.waset.org/abstracts/145964/assessment-of-the-photovoltaic-and-solar-thermal-potential-installation-area-on-residential-buildings-case-study-of-amman-jordan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145964.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=476">476</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=477">477</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=enhanced%20critical%20incident%20technique&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10