Search results for: and fraudulent means.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4401

Search results for: and fraudulent means.

4131 Religious Coercion as Means of Trafficking in Women and Faith Communities’ Role in Ending Such Religious Exploitation

Authors: Xiaoyu Stephanie Ren

Abstract:

With the increase of massive migration, economic polarization, as well as increasing awareness and respects for religious freedom in the world, women have become unprecedentedly vulnerable to trafficking involving religious coercion. Such cases can also bring enormous challenges for prosecution in which the prosecutor bears the burden of proving that the victim acted, or not acted in a certain way due to the exploitation of her belief system: (1) Jurors who are nonbelievers tend not to be convinced that something of intangible nature can act as the force to get victim into women trafficking situation; (2) Court more often than not rules in favor of victims in women trafficking cases involving religious exploitation only when there is physical coercion in addition to religious coercion; (3) Female victims are often reluctant to testify at court due to their godly fear and loyalty to trafficker. Using case study methodology, this paper examines the unique characteristics of religious coercion as means of trafficking in women from a legal perspective and proposes multiple ways based on communal beliefs that faith communities, as victims for such crime themselves, can act in order to help to end religious exploitation. The purpose of this paper is threefold: to improve acknowledgment for the role of religious coercion as a sole force for women trafficking situation; to discuss legal hurdles in prosecuting women trafficking cases involving religious coercion; and to propose collaboration across borders among faith communities to end such exploitation.

Keywords: women trafficking, sex violence, religious exploitation, faith community, prosecution, law

Procedia PDF Downloads 140
4130 Development of Light-Weight Fibre-Based Materials for Building Envelopes

Authors: René Čechmánek, Vladan Prachař, Ludvík Lederer, Jiří Loskot

Abstract:

Thin-walled elements with a matrix set on a base of high-valuable Portland cement with dispersed reinforcement from alkali-resistant glass fibres are used in a range of applications as claddings of buildings and infrastructure constructions as well as various architectural elements of residential buildings. Even if their elementary thickness and therefore total weight is quite low, architects and building companies demand on even further decreasing of the bulk density of these fibre-cement elements for the reason of loading elimination of connected superstructures and easier assembling in demand conditions. By the means of various kinds of light-weight aggregates it is possible to achieve light-weighing of thin-walled fibre-cement composite elements. From the range of possible fillers with different material properties granulated expanded glass worked the best. By the means of laboratory testing an effect of two fillers based on expanded glass on the fibre reinforced cement composite was verified. Practical applicability was tested in the production of commonly manufactured glass fibre reinforced concrete elements, such as channels for electrical cable deposition, products for urban equipment and especially various cladding elements. Even if these are not structural elements, it is necessary to evaluate also strength characteristics and resistance to environment for their durability in certain applications.

Keywords: fibre-cement composite, granulated expanded glass, light-weighing

Procedia PDF Downloads 270
4129 Research on Ecological Space Improvement Strategy from the Perspective of Urban Double Reform

Authors: Sisi Xia, Dezhuan Tao

Abstract:

Urban Double Reform is an effective means to improve the quality of ecological space, based on improving the living environment and urban functions and promoting the organic integration of the city and nature. This paper takes the design of Qinyang Wetland Park in Jiaozuo, Henan Province, as an example, attempting to closely link the ecological restoration of wetland with the urban culture and to extend the urban spirit of the ancient county of Qinyang while purifying the ecological water system. This design uses ecological technology to repair underwater forests and underwater turf, rapidly improving the quality of urban water without biological side effects. The ecological grass slope is used to create multiple bank forms, combining with a number of hydrophilic platforms to provide a good view of the public. Through the placement of ecological education bases, urban cultural exhibition halls, and other means, the cultural value of wetland parks will be enhanced, and the citizens will return to nature and experience the ecology and appreciate the charm of urban culture in the ecological space. Repair the ecosystem, sculpt the urban culture, let the public return to nature, experience the ecology, and experience the charm of urban culture in the ecological space.

Keywords: urban double reform, ecological space, improvement strategy, wetland park design

Procedia PDF Downloads 203
4128 Nonlinear Response of Infinite Beams on a Multilayer Tensionless Extensible Geosynthetic – Reinforced Earth Bed under Moving Load

Authors: K. Karuppasamy

Abstract:

In this paper analysis of an infinite beam resting on multilayer tensionless extensible geosynthetic reinforced granular fill - poor soil system overlying soft soil strata under moving the load with constant velocity is presented. The beam is subjected to a concentrated load moving with constant velocity. The upper reinforced granular bed is modeled by a rough membrane embedded in Pasternak shear layer overlying a series of compressible nonlinear Winkler springs representing the underlying the very poor soil. The multilayer tensionless extensible geosynthetic layer has been assumed to deform such that at the interface the geosynthetic and the soil have some deformation. Nonlinear behavior of granular fill and the very poor soil has been considered in the analysis by means of hyperbolic constitutive relationships. Governing differential equations of the soil foundation system have been obtained and solved with the help of appropriate boundary conditions. The solution has been obtained by employing finite difference method by means of Gauss-Siedel iterative scheme. Detailed parametric study has been conducted to study the influence of various parameters on the response of soil – foundation system under consideration by means of deflection and bending moment in the beam and tension mobilized in the geosynthetic layer. These parameters include the magnitude of applied load, the velocity of the load, damping, the ultimate resistance of the poor soil and granular fill layer. The range of values of parameters has been considered as per Indian Railways conditions. This study clearly observed that the comparisons of multilayer tensionless extensible geosynthetic reinforcement with poor foundation soil and magnitude of applied load, relative compressibility of granular fill and ultimate resistance of poor soil has significant influence on the response of soil – foundation system. However, for the considered range of velocity, the response has been found to be insensitive towards velocity. The ultimate resistance of granular fill layer has also been found to have no significant influence on the response of the system.

Keywords: infinite beams, multilayer tensionless extensible geosynthetic, granular layer, moving load and nonlinear behavior of poor soil

Procedia PDF Downloads 414
4127 Music Therapy Intervention as a Means of Stimulating Communicative Abilities of Seniors with Neurocognitive Disorders – Theory versus Practice

Authors: Pavel Svoboda, Oldřich Müller

Abstract:

The paper contains a screening of the opinions of helping professional workers working in a home for seniors with individuals with neurocognitive disorders and compares them with the opinions of a younger generation of students who are just preparing for this work. The authors carried out a comparative questionnaire survey with both target groups, focusing on the analysis and comparison of possible differences in their knowledge in the field of care for elderly people with neurocognitive disorders. Specifically, they focused on knowledge and experience with approaches, methods and tools applicable within the framework of music therapy interventions, as they are understood in practice in comparison with the theoretical knowledge of secondary school students focused on social work. The questionnaire was mainly aimed at assessing the knowledge of the possibilities of effective memory stimulation of the elderly and their communication skills using the means of music. The conducted investigation was based on the research of studies dealing with so-called non-pharmacological approaches to the given clientele; for professional caregivers, it followed music therapy lessons, which the authors regularly implemented from the beginning of 2022. Its results will, among other things, serve as the basis for an upcoming study with a scoping design review.

Keywords: neurocognitive disorders, seniors, music therapy intervention, melody, rhythm, text, memory stimulation, communication skills

Procedia PDF Downloads 49
4126 Investigating Reservior Sedimentation Control in the Conservation of Water

Authors: Mosupi Ratshaa

Abstract:

Despite years of diligent study, sedimentation is still undoubtedly the most severe technical problem faced by the dam industry. The problem of sedimentation build-up and its removal should be the focus as an approach to remedy this. The world's reservoirs lose about 1% of their storage capacity yearly to sedimentation, what this means is that 1% of water that could be stored is lost the world-over. The increase in population means that the need for water also increases and, therefore, the loss due to sedimentation is of great concern especially to the conservation of water. When it comes to reservoir sedimentation, the thought of water conservation comes with soil conservation since this increasing sediment that takes the volume meant for water is being lost from dry land. For this reason, reservoir sediment control is focused on reducing sediment entering the reservoir and reducing sediment within the reservoir. There are many problems with sediment control such as the difficulty to predict settling patterns, inability to greatly reduce the sediment volume entering the river flow which increases the reservoirs trap efficiency just to mention a few. Notably reservoirs are habitats for flora and fauna, the process of removing sediment from these reservoirs damages this ecosystem so there is an ethical point to be considered in this section. This paper looks at the methods used to control the sedimentation of reservoirs and their effects to the ecosystem in the aim of reducing water losses due to sedimentation. Various control measures which reduce sediment entering the reservoir such as Sabo dams or Check dams along with measures which emphasize the reduction in built-up settled sediment such as flushing will be reviewed all with the prospect of conservation.

Keywords: sedimentation, conservation, ecosystem, flushing

Procedia PDF Downloads 319
4125 Renewable Energy Industry Trends and Its Contributions to the Development of Energy Resilience in an Era of Accelerating Climate Change

Authors: A. T. Asutosh, J. Woo, M. Kouhirostami, M. Sam, A. Khantawang, C. Cuales, W. Ryor, C. Kibert

Abstract:

Climate change and global warming vortex have grown to alarming proportions. Therefore, the need for a shift in the conceptualization of energy production is paramount. Energy practices have been created in the current situation. Fossil fuels continue their prominence, at the expense of renewable sources. Despite this abundance, a large percentage of the world population still has no access to electricity but there have been encouraging signs in global movement from nonrenewable to renewable energy but means to reverse climate change have been elusive. Worldwide, organizations have put tremendous effort into innovation. Conferences and exhibitions act as a platform that allows a broad exchange of information regarding trends in the renewable energy field. The Solar Power International (SPI) conference and exhibition is a gathering of concerned activists, and probably the largest convention of its kind. This study investigates current development in the renewable energy field, analyzing means by which industry is being applied to the issue. In reviewing the 2019 SPI conference, it was found innovations in recycling and assessing the environmental impacts of the solar products that need critical attention. There is a huge movement in the electrical storage but there exists a large gap in the development of security systems. This research will focus on solar energy, but impacts will be relevant to the entire renewable energy market.

Keywords: climate change, renewable energy, solar, trends, research, solar power international, SPI

Procedia PDF Downloads 88
4124 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 140
4123 Technologic Information about Photovoltaic Applied in Urban Residences

Authors: Stephanie Fabris Russo, Daiane Costa Guimarães, Jonas Pedro Fabris, Maria Emilia Camargo, Suzana Leitão Russo, José Augusto Andrade Filho

Abstract:

Among renewable energy sources, solar energy is the one that has stood out. Solar radiation can be used as a thermal energy source and can also be converted into electricity by means of effects on certain materials, such as thermoelectric and photovoltaic panels. These panels are often used to generate energy in homes, buildings, arenas, etc., and have low pollution emissions. Thus, a technological prospecting was performed to find patents related to the use of photovoltaic plates in urban residences. The patent search was based on ESPACENET, associating the keywords photovoltaic and home, where we found 136 patent documents in the period of 1994-2015 in the fields title and abstract. Note that the years 2009, 2010, 2011, 2012, 2013 and 2014 had the highest number of applicants, with respectively, 11, 13, 23, 29, 15 and 21. Regarding the country that deposited about this technology, it is clear that China leads with 67 patent deposits, followed by Japan with 38 patents applications. It is important to note that most depositors, 50% are companies, 44% are individual inventors and only 6% are universities. On the International Patent classification (IPC) codes, we noted that the most present classification in results was H02J3/38, which represents provisions in parallel to feed a single network by two or more generators, converters or transformers. Among all categories, there is the H session, which means Electricity, with 70% of the patents.

Keywords: photovoltaic, urban residences, technology forecasting, prospecting

Procedia PDF Downloads 271
4122 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 73
4121 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 272
4120 Identifying Autism Spectrum Disorder Using Optimization-Based Clustering

Authors: Sharifah Mousli, Sona Taheri, Jiayuan He

Abstract:

Autism spectrum disorder (ASD) is a complex developmental condition involving persistent difficulties with social communication, restricted interests, and repetitive behavior. The challenges associated with ASD can interfere with an affected individual’s ability to function in social, academic, and employment settings. Although there is no effective medication known to treat ASD, to our best knowledge, early intervention can significantly improve an affected individual’s overall development. Hence, an accurate diagnosis of ASD at an early phase is essential. The use of machine learning approaches improves and speeds up the diagnosis of ASD. In this paper, we focus on the application of unsupervised clustering methods in ASD as a large volume of ASD data generated through hospitals, therapy centers, and mobile applications has no pre-existing labels. We conduct a comparative analysis using seven clustering approaches such as K-means, agglomerative hierarchical, model-based, fuzzy-C-means, affinity propagation, self organizing maps, linear vector quantisation – as well as the recently developed optimization-based clustering (COMSEP-Clust) approach. We evaluate the performances of the clustering methods extensively on real-world ASD datasets encompassing different age groups: toddlers, children, adolescents, and adults. Our experimental results suggest that the COMSEP-Clust approach outperforms the other seven methods in recognizing ASD with well-separated clusters.

Keywords: autism spectrum disorder, clustering, optimization, unsupervised machine learning

Procedia PDF Downloads 86
4119 Road Traffic Accidents Analysis in Mexico City through Crowdsourcing Data and Data Mining Techniques

Authors: Gabriela V. Angeles Perez, Jose Castillejos Lopez, Araceli L. Reyes Cabello, Emilio Bravo Grajales, Adriana Perez Espinosa, Jose L. Quiroz Fabian

Abstract:

Road traffic accidents are among the principal causes of traffic congestion, causing human losses, damages to health and the environment, economic losses and material damages. Studies about traditional road traffic accidents in urban zones represents very high inversion of time and money, additionally, the result are not current. However, nowadays in many countries, the crowdsourced GPS based traffic and navigation apps have emerged as an important source of information to low cost to studies of road traffic accidents and urban congestion caused by them. In this article we identified the zones, roads and specific time in the CDMX in which the largest number of road traffic accidents are concentrated during 2016. We built a database compiling information obtained from the social network known as Waze. The methodology employed was Discovery of knowledge in the database (KDD) for the discovery of patterns in the accidents reports. Furthermore, using data mining techniques with the help of Weka. The selected algorithms was the Maximization of Expectations (EM) to obtain the number ideal of clusters for the data and k-means as a grouping method. Finally, the results were visualized with the Geographic Information System QGIS.

Keywords: data mining, k-means, road traffic accidents, Waze, Weka

Procedia PDF Downloads 383
4118 Geographic Origin Determination of Greek Rice (Oryza Sativa L.) Using Stable Isotopic Ratio Analysis

Authors: Anna-Akrivi Thomatou, Anastasios Zotos, Eleni C. Mazarakioti, Efthimios Kokkotos, Achilleas Kontogeorgos, Athanasios Ladavos, Angelos Patakas

Abstract:

It is well known that accurate determination of geographic origin to confront mislabeling and adulteration of foods is considered as a critical issue worldwide not only for the consumers, but also for producers and industries. Among agricultural products, rice (Oryza sativa L.) is the world’s third largest crop, providing food for more than half of the world’s population. Consequently, the quality and safety of rice products play an important role in people’s life and health. Despite the fact that rice is predominantly produced in Asian countries, rice cultivation in Greece is of significant importance, contributing to national agricultural sector income. More than 25,000 acres are cultivated in Greece, while rice exports to other countries consist the 0,5% of the global rice trade. Although several techniques are available in order to provide information about the geographical origin of rice, little data exist regarding the ability of these methodologies to discriminate rice production from Greece. Thus, the aim of this study is the comparative evaluation of stable isotope ratio methodology regarding its discriminative ability for geographical origin determination of rice samples produced in Greece compared to those from three other Asian countries namely Korea, China and Philippines. In total eighty (80) samples were collected from selected fields of Central Macedonia (Greece), during October of 2021. The light element (C, N, S) isotope ratios were measured using Isotope Ratio Mass Spectrometry (IRMS) and the results obtained were analyzed using chemometric techniques, including principal components analysis (PCA). Results indicated that the 𝜹 15N and 𝜹 34S values of rice produced in Greece were more markedly influenced by geographical origin compared to the 𝜹 13C. In particular, 𝜹 34S values in rice originating from Greece was -1.98 ± 1.71 compared to 2.10 ± 1.87, 4.41 ± 0.88 and 9.02 ± 0.75 for Korea, China and Philippines respectively. Among stable isotope ratios studied, values of 𝜹 34S seem to be the more appropriate isotope marker to discriminate rice geographic origin between the studied areas. These results imply the significant capability of stable isotope ratio methodology for effective geographical origin discrimination of rice, providing a valuable insight into the control of improper or fraudulent labeling. Acknowledgement: This research has been financed by the Public Investment Programme/General Secretariat for Research and Innovation, under the call “YPOERGO 3, code 2018SE01300000: project title: ‘Elaboration and implementation of methodology for authenticity and geographical origin assessment of agricultural products.

Keywords: geographical origin, authenticity, rice, isotope ratio mass spectrometry

Procedia PDF Downloads 65
4117 An Understanding of Child Sexual Abuse in South Africa: Case Study of Eastern Cape Province

Authors: Mandlenkosi Richard Mphatheni

Abstract:

The Constitution of the Republic of South Africa (Act 108 of 1996 section 28(1) (d)) states, ‘Every child has the right to be protected from maltreatment, neglect, abuse, and degradation’. Qualitative research studied perceptions of the selected sample. Objectives of the research were to determine factors that influence perpetrators of sexual violence to target children, the risk factors of child sexual abuse, the effects of child sexual abuse on the development of the child, and the community prevention measures to minimize the risks of child sexual abuse. The research aimed to understand perspective and experiences of the Ngangelizwe community members on the problem of sexual violence against children and the perpetrator’s perceived motive for sexually abusing children. Convenience non-probability sampling technique was adopted to select 20 participants within the Ngangelizwe Township at Mthatha. Thematic analyses were used to analyse data. It was found that sexual abuse of children affects severely child and parents, while the community reported to be trivially affected by the sexual abuse of a child. The research revealed ignorance of some forms of sexual violence, as the commonly known form of sexual violence was rape. Therefore, ignorance of community members regarding various forms of sexual abuse means that such acts are either ignored, tolerated, or even regarded as acceptable. It thus means that community members cannot reject any actions or behaviour if they themselves are ignorant of what constitutes sexual violence. This study recommends that communities should be educated about different sexual offenses.

Keywords: child sexual abuse, community, childhood attachment, adult attachment

Procedia PDF Downloads 115
4116 How Sustainable is Tourism Architecture in Uganda

Authors: Goodman Conrad Kazoroa

Abstract:

Among the most remarkable socioeconomic phenomena of the post-World War II era has been the expansion of the global tourism industry. Intensifying tourism activity is continuing to affect more and more places and there can no longer be any doubt as to the potential of this sector to affect fundamental economic, social-cultural and environmental change. A phenomenon with far reaching effects like this needs to be carefully controlled and planned so as not to compromise the chances for the future generations to enjoy this resource, therefore the issue of tourism sustainability, as a result, is unveiled. The concept of sustainable tourism remains vague in Uganda as the country has seen an increase in resorts, hotels and lodges especially in most of Uganda’s ecologically vulnerable areas National Parks. To many, sustainable tourism it is merely the application of the sustainable development idea to the sector of tourism. To others, it is the conservation of the environment and its natural resources, realising and appropriately using them to achieve sustainable built environments that promote tourism. Architecture and the built environment can be the first means to link the global dimension of this phenomenon of sustainable tourism to its local implications. The aim of this paper was to critically analyse the extent to which sustainability related considerations have been pursued in the built environments for Uganda’s national parks as means to achieving sustainable tourism. This was achieved by use of a sustainable architecture rating tool that was modified to fit Uganda’s context. The results of this are presented as the final results of the study. There are many examples of sustainable tourism resorts, or what tourism managers and developers claim are sustainable tourism resorts throughout the country. This paper reveals the truth, that is, true sustainable tourism resorts are very few and far between.

Keywords: sustainable tourism, tourism architecture, sustainable architecture, sustainable tourism resorts

Procedia PDF Downloads 354
4115 Dynamic Compensation for Environmental Temperature Variation in the Coolant Refrigeration Cycle as a Means of Increasing Machine-Tool Precision

Authors: Robbie C. Murchison, Ibrahim Küçükdemiral, Andrew Cowell

Abstract:

Thermal effects are the largest source of dimensional error in precision machining, and a major proportion is caused by ambient temperature variation. The use of coolant is a primary means of mitigating these effects, but there has been limited work on coolant temperature control. This research critically explored whether CNC-machine coolant refrigeration systems adapted to actively compensate for ambient temperature variation could increase machining accuracy. Accuracy data were collected from operators’ checklists for a CNC 5-axis mill and statistically reduced to bias and precision metrics for observations of one day over a sample period of 27 days. Temperature data were collected using three USB dataloggers in ambient air, the chiller inflow, and the chiller outflow. The accuracy and temperature data were analysed using Pearson correlation, then the thermodynamics of the system were described using system identification with MATLAB. It was found that 75% of thermal error is reflected in the hot coolant temperature but that this is negligibly dependent on ambient temperature. The effect of the coolant refrigeration process on hot coolant outflow temperature was also found to be negligible. Therefore, the evidence indicated that it would not be beneficial to adapt coolant chillers to compensate for ambient temperature variation. However, it is concluded that hot coolant outflow temperature is a robust and accessible source of thermal error data which could be used for prevention strategy evaluation or as the basis of other thermal error strategies.

Keywords: CNC manufacturing, machine-tool, precision machining, thermal error

Procedia PDF Downloads 63
4114 The Effect of Language and Literature Integration on the Teaching of English Vocabulary and Grammar in Secondary Schools in Zamfara State, Nigeria

Authors: Umar Bello

Abstract:

Literature has become an invaluable subject which has added a great value and contribution to the teaching of English language and the discovery of many other developed ideas. Literature produces an exhilarating impulse that imprints a lasting picture on the mind of a learner. Many researchers have devised various means and approaches to language Teaching methods which remain unconvinging and which yield little result, but it has remained unconvincing because it has only produced little results. Devicing a method that eliminates monotony and boredome to learners is a good factor that enhances students’ motivation to learning. In this sense, literature and language become unavoidable components that aid intellectual development. This study examines the indispensability of literature as a means of English Language teaching to secondary school classes. The researcher has developed many instructive activities which are believed will help students to improve their study in grammar and vocabulary. The researcher has used quasi-experimental approach using experimental group and control group to find out how literature enhances the students grammar as well as their vocabulary. The findings revealed a positive performance in the experimental group doing better than the control group using simple percentage. The results make it clear that literature allows learners to pay more attention and develop more interest to their studies. In giving a perspicacious linguistic development, literature therefore remains an essential tool for language teaching classrooms, thereby enhancing their grammatical and vocabulary usage.

Keywords: teaching vocabulary, integration, poetry, classroom

Procedia PDF Downloads 82
4113 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 83
4112 Combining the Deep Neural Network with the K-Means for Traffic Accident Prediction

Authors: Celso L. Fernando, Toshio Yoshii, Takahiro Tsubota

Abstract:

Understanding the causes of a road accident and predicting their occurrence is key to preventing deaths and serious injuries from road accident events. Traditional statistical methods such as the Poisson and the Logistics regressions have been used to find the association of the traffic environmental factors with the accident occurred; recently, an artificial neural network, ANN, a computational technique that learns from historical data to make a more accurate prediction, has emerged. Although the ability to make accurate predictions, the ANN has difficulty dealing with highly unbalanced attribute patterns distribution in the training dataset; in such circumstances, the ANN treats the minority group as noise. However, in the real world data, the minority group is often the group of interest; e.g., in the road traffic accident data, the events of the accident are the group of interest. This study proposes a combination of the k-means with the ANN to improve the predictive ability of the neural network model by alleviating the effect of the unbalanced distribution of the attribute patterns in the training dataset. The results show that the proposed method improves the ability of the neural network to make a prediction on a highly unbalanced distributed attribute patterns dataset; however, on an even distributed attribute patterns dataset, the proposed method performs almost like a standard neural network.

Keywords: accident risks estimation, artificial neural network, deep learning, k-mean, road safety

Procedia PDF Downloads 130
4111 Frustration Measure for Dipolar Spin Ice and Spin Glass

Authors: Konstantin Nefedev, Petr Andriushchenko

Abstract:

Usually under the frustrated magnetics, it understands such materials, in which ones the interaction between located magnetic moments or spins has competing character, and can not to be satisfied simultaneously. The most well-known and simplest example of the frustrated system is antiferromagnetic Ising model on the triangle. Physically, the existence of frustrations means, that one cannot select all three pairs of spins anti-parallel in the basic unit of the triangle. In physics of the interacting particle systems, the vector models are used, which are constructed on the base of the pair-interaction law. Each pair interaction energy between one-component vectors can take two opposite in sign values, excluding the case of zero. Mathematically, the existence of frustrations in system means that it is impossible to have all negative energies of pair interactions in the Hamiltonian even in the ground state (lowest energy). In fact, the frustration is the excitation, which leaves in system, when thermodynamics does not work, i.e. at the temperature absolute zero. The origin of the frustration is the presence at least of one ''unsatisfied'' pair of interacted spins (magnetic moments). The minimal relative quantity of these excitations (relative quantity of frustrations in ground state) can be used as parameter of frustration. If the energy of the ground state is Egs, and summary energy of all energy of pair interactions taken with a positive sign is Emax, that proposed frustration parameter pf takes values from the interval [0,1] and it is defined as pf=(Egs+Emax)/2Emax. For antiferromagnetic Ising model on the triangle pf=1/3. We calculated the parameters of frustration in thermodynamic limit for different 2D periodical structures of Ising dipoles, which were on the ribs of the lattice and interact by means of the long-range dipolar interaction. For the honeycomb lattice pf=0.3415, triangular - pf=0.2468, kagome - pf=0.1644. All dependencies of frustration parameter from 1/N obey to the linear law. The given frustration parameter allows to consider the thermodynamics of all magnetic systems from united point of view and to compare the different lattice systems of interacting particle in the frame of vector models. This parameter can be the fundamental characteristic of frustrated systems. It has no dependence from temperature and thermodynamic states, in which ones the system can be found, such as spin ice, spin glass, spin liquid or even spin snow. It shows us the minimal relative quantity of excitations, which ones can exist in system at T=0.

Keywords: frustrations, parameter of order, statistical physics, magnetism

Procedia PDF Downloads 148
4110 Teaching Buddhist Meditation: An Investigation into Self-Learning Methods

Authors: Petcharat Lovichakorntikul, John Walsh

Abstract:

Meditation is in the process of becoming a globalized practice and its benefits have been widely acknowledged. The first wave of internationalized meditation techniques and practices was represented by Chan and Zen Buddhism and a new wave of practice has arisen in Thailand as part of the Phra Dhammakaya temple movement. This form of meditation is intended to be simple and straightforward so that it can easily be taught to people unfamiliar with the basic procedures and philosophy. This has made Phra Dhammakaya an important means of outreach to the international community. One notable aspect is to encourage adults to become like children to perform it – that is, to return to a naïve state prior to the adoption of ideology as a means of understanding the world. It is said that the Lord Buddha achieved the point of awakening at the age of seven and Phra Dhammakaya has a program to teach meditation to both children and adults. This brings about the research question of how practitioners respond to the practice of meditation and how should they be taught? If a careful understanding of how children behave can be achieved, then it will help in teaching adults how to become like children (albeit idealized children) in their approach to meditation. This paper reports on action research in this regard. Personal interviews and focus groups are held with a view to understanding self-learning methods with respect to Buddhist meditation and understanding and appreciation of the practices involved. The findings are considered in the context of existing knowledge about different learning techniques among people of different ages. The implications for pedagogical practice are discussed and learning methods are outlined.

Keywords: Buddhist meditation, Dhammakaya, meditation technique, pedagogy, self-learning

Procedia PDF Downloads 461
4109 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides

Authors: Maria Elisabete Costa Ferreira

Abstract:

Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.

Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force

Procedia PDF Downloads 44
4108 Influence of 3D Printing Parameters on Surface Finish of Ceramic Hip Prostheses Fixed by Means of Osteointegration

Authors: Irene Buj-Corral, Ali Bagheri, Alejandro Dominguez-Fernandez

Abstract:

In recent years, use of ceramic prostheses as an implant in some parts of body has become common. In the present study, research has focused on replacement of the acetabulum bone, which is a part of the pelvis bone. Metallic prostheses have shown some problems such as release of metal ions into patient's blood. In addition, fracture of liners and squeezing between surface of femoral head and inner surface of acetabulum have been reported. Ceramic prostheses have the advantage of low debris and high strength, although they are more difficult to be manufactured than metallic ones. Specifically, new designs try to attempt an acetabulum in which the outer surface will be porous for proliferation of cells and fixation of the prostheses by means of osteointegration, while inner surface must be smooth enough to assure that the movement between femoral head and inner surface will be carried out with on feasibility. In the present study, 3D printing technologies are used for manufacturing ceramic prostheses. In Fused Deposition Modelling (FDM) process, 3D printed plastic prostheses are obtained by means of melting of a plastic filament and subsequent deposition on a glass surface. A similar process is applied to ceramics in which ceramic powders need to be mixed with a liquid polymer before depositing them. After 3D printing, parts are subjected to a sintering process in an oven so that they can achieve final strength. In the present paper, influence of printing parameters on surface roughness 3D printed ceramic parts are presented. Three parameter full factorial design of experiments was used. Selected variables were layer height, infill and nozzle diameter. Responses were average roughness Ra and mean roughness depth Rz. Regression analysis was applied to responses in order to obtain mathematical models for responses. Results showed that surface roughness depends mainly on layer height and nozzle diameter employed, while infill was found not to be significant. In order to get low surface roughness, low layer height and low infill should be selected. As a conclusion, layer height and infill are important parameters for obtaining good surface finish in ceramic 3D printed prostheses. However, use of too low infill could lead to prostheses with low mechanical strength. Such prostheses could not be able to bear the static and dynamic charges to which they are subjected once they are implanted in the body. This issue will be addressed in further research.

Keywords: ceramic, hip prostheses, surface roughness, 3D printing

Procedia PDF Downloads 177
4107 Entertainment-Education for the Prevention & Intervention of Eating Disorders in Adolescents

Authors: Tracey Lion-Cachet

Abstract:

Eating disorders typically manifest in adolescence and are notoriously difficult to treat. There are two notable reasons for this. Firstly, research consistently demonstrates that early intervention is a critical mediator of prognosis, with early intervention leading to a better prognosis. However, because eating disorders do not originate as full-syndrome diagnoses but rather as prodromal cases, they often go undetected; by the time symptoms meet diagnostic criteria, they have become recalcitrant. Another interrelated issue is motivation to change. Research demonstrates that in the early stages of an eating disorder, adolescents are highly resistant to change, and motivation increases only once symptoms have shifted from egosyntonic to egodystonic in nature. The purpose of this project was to design a prevention model based on the social psychology paradigm of Entertainment-Education, which embeds messages within the genre of film as a means of affecting change. The resulting project was a narrative screenplay targeting teenagers/young adults from diverse backgrounds. The goals of the project were to create a film script that, if ultimately made into a film, could serve to: 1) interrupt symptom progression and improve prognosis through early intervention; 2) incorporate techniques from third-wave cognitive behavioral treatment models, acceptance and commitment therapy (ACT) and rational recovery (RR), with a focus on the effects of mindfulness as a means of informing recovery; 3) target issues to do with motivation to change by shifting the perception of eating disorders from culturally specific psychiatric illnesses to habit-based brain wiring issues. Nine licensed clinicians were asked to evaluate two excerpts taken from the final script. They subsequently provided feedback on a Likert-scale, which assessed whether the script had achieved its goals. Overall, evaluators agreed that the project’s etiological and intervention models have the potential to inspire change and serve as an effective means of prevention and treatment of eating disorders. However, one-third of the evaluators did not find the content developmentally appropriate. This is a notable limitation to the study and will need to be addressed in the larger script before the final project can potentially be targeted to a teenage and young adult audience.

Keywords: adolescents, eating disorders, pediatrics, entertainment-education, mindfulness-based intervention, prevention

Procedia PDF Downloads 51
4106 Reduction of the Number of Traffic Accidents by Function of Driver's Anger Detection

Authors: Masahiro Miyaji

Abstract:

When a driver happens to be involved in some traffic congestion or after traffic incidents, the driver may fall in a state of anger. State of anger may encounter decisive risk resulting in severer traffic accidents. Preventive safety function using driver’s psychosomatic state with regard to anger may be one of solutions which would avoid that kind of risks. Identifying driver’s anger state is important to create countermeasures to prevent the risk of traffic accidents. As a first step, this research figured out root cause of traffic incidents by means of using Internet survey. From statistical analysis of the survey, dominant psychosomatic states immediately before traffic incidents were haste, distraction, drowsiness and anger. Then, we replicated anger state of a driver while driving, and then, replicated it by means of using driving simulator on bench test basis. Six types of facial expressions including anger were introduced as alternative characteristics. Kohonen neural network was adopted to classify anger state. Then, we created a methodology to detect anger state of a driver in high accuracy. We presented a driving support safety function. The function adapts driver’s anger state in cooperation with an autonomous driving unit to reduce the number of traffic accidents. Consequently, e evaluated reduction rate of driver’s anger in the traffic accident. To validate the estimation results, we referred the reduction rate of Advanced Safety Vehicle (ASV) as well as Intelligent Transportation Systems (ITS).

Keywords: Kohonen neural network, driver’s anger state, reduction of traffic accidents, driver’s state adaptive driving support safety

Procedia PDF Downloads 338
4105 Automated Monitoring System to Support Investigation of Contributing Factors of Work-Related Disorders and Accidents

Authors: Erika R. Chambriard, Sandro C. Izidoro, Davidson P. Mendes, Douglas E. V. Pires

Abstract:

Work-related illnesses and disorders have been a constant aspect of work. Although their nature has changed over time, from musculoskeletal disorders to illnesses related to psychosocial aspects of work, its impact on the life of workers remains significant. Despite significant efforts worldwide to protect workers, the disparity between changes in work legislation and actual benefit for workers’ health has been creating a significant economic burden for social security and health systems around the world. In this context, this study aims to propose, test and validate a modular prototype that allows for work environmental aspects to be assessed, monitored and better controlled. The main focus is also to provide a historical record of working conditions and the means for workers to obtain comprehensible and useful information regarding their work environment and legal limits of occupational exposure to different types of environmental variables, as means to improve prevention of work-related accidents and disorders. We show the developed prototype provides useful and accurate information regarding the work environmental conditions, validating them with standard occupational hygiene equipment. We believe the proposed prototype is a cost-effective and adequate approach to work environment monitoring that could help elucidate the links between work and occupational illnesses, and that different industry sectors, as well as developing countries, could benefit from its capabilities.

Keywords: Arduino prototyping, occupational health and hygiene, work environment, work-related disorders prevention

Procedia PDF Downloads 104
4104 The Characteristics of Transformation of Institutional Changes and Georgia

Authors: Nazira Kakulia

Abstract:

The analysis of transformation of institutional changes outlines two important characteristics. These are: the speed of the changes and their sequence. Successful transformation must be carried out in three different stages; On the first stage, macroeconomic stabilization must be achieved with the help of fiscal and monetary tools. Two-tier banking system should be established and the active functions of central bank should be replaced by the passive ones (reserve requirements and refinancing rate), together with the involvement growth of private sector. Fiscal policy by itself here means the creation of tax system which must replace previously existing direct state revenues; the share of subsidies in the state expenses must be reduced also. The second stage begins after reaching the macroeconomic stabilization at a time of change of formal institutes which must stimulate the private business. Corporate legislation creates a competitive environment at the market and the privatization of state companies takes place. Bankruptcy and contract law is created. he third stage is the most extended one, which means the formation of all state structures that is necessary for the further proper functioning of a market economy. These three stages about the cycle period of political and social transformation and the hierarchy of changes can also be grouped by the different methodology: on the first and the most short-term stage the transfer of power takes place. On the second stage institutions corresponding to new goal are created. The last phase of transformation is extended in time and it includes the infrastructural, socio-cultural and socio-structural changes. The main goal of this research is to explore and identify the features of such kind of models.

Keywords: competitive environment, fiscal policy, macroeconomic stabilization, tax system

Procedia PDF Downloads 244
4103 Using Social Media to Amplify Social Entrepreneurial Message

Authors: Irfan Khairi

Abstract:

It is arguable that today's social media has dramatically redefined human contact, and chiefly because the platforms enable communication opportunities unprecedented. Without question, billions of individuals globally engage in the media, a reality by no means lost on businesses and social entrepreneurs desirous of generating interest in a cause, movement, or other social effort. If, however, the opportunities are immense, so too is the competition. Private persons and entrepreneurial concerns alike virtually saturate the popular sites of Facebook, Twitter, and Instagram, and most are intent on capturing as much external interest as possible. At the same time, however, the social entrepreneur possesses an advantage over the individual concerned only the social aspects of the sites, as they express interests in, and measures applicable to, important causes of which the public at large may be unaware. There is, unfortunately, no single means of assuring success in using the media outlets to generate interest. Nonetheless, a general awareness of how social media sites function, as well as the psychological elements relevant to the functioning, is necessary. It is as important to comprehend basic realities of the platforms and approaches that fail as it is to develop strategy, for the latter relies on knowledge of the former. This awareness in place, the social entrepreneur is then better enabled to determine strategy, in terms of which sites to focus upon and how to most effectively convey their message. What is required is familiarity with the online communities, with attention to the specific advantages each provides. Ultimately, today's social entrepreneur may establish a highly effective platform of promotion and engagement, provided they fully comprehend the social investment necessary for success.

Keywords: social media, marketing, e-commerce, internet business

Procedia PDF Downloads 185
4102 Feature Based Unsupervised Intrusion Detection

Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein

Abstract:

The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.

Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka

Procedia PDF Downloads 274