Search results for: media capabilities
1023 Generative Behaviors and Psychological Well-Being in Mexican Elders
Authors: Ana L. Gonzalez-Celis, Edgardo Ruiz-Carrillo, Karina Reyes-Jarquin, Margarita Chavez-Becerra
Abstract:
Since recent decades, the aging has been viewed from a more positive perspective, where is not only about losses and damage, but also about being on a stage where you can enjoy life and live with well-being and quality of life. The challenge to feel better is to find those resources that seniors have. For that reason, psychological well-being has shown interest in the study of the affect and life satisfaction (hedonic well-being), while from a more recent tradition, focus on the development of capabilities and the personal growth, considering both as the main indicators of the quality of life. A resource that can be used in the later age is generativity, which refers to the ability of older people to develop and grow through activities that contribute with the improvement of the context in which they live and participate. In this way the generative interest is understood as a favourable attitude that contribute to the common benefit while strengthening and enriching the social institutions, to ensure continuity between generations and social development. On the other hand, generative behavior, differentiating from generative interest, is the expression of that attitude reflected in activities that make a social contribution and a benefit for generations to come. Hence the purpose of the research was to test if there is an association between the generative behaviour type and the psychological well-being with their dimensions. For this reason 188 Mexican adults from 60 to 94 years old (M = 69.78), 67% women, 33% men, completed two instruments: The Ryff’s Well-Being Scales to measure psychological well-being with 39 items with two dimensions (Hedonic and Eudaimonic well-being), and the Loyola’s Generative Behaviors Scale, grouped in five categories: Knowledge transmitted to the next generation, things to be remember, creativity, be productive, contribution to the community, and responsibility of other people. In addition, the socio-demographic data sheet was tested, and self-reported health status. The results indicated that the psychological well-being and its dimensions were significantly associated with the presence of generative behavior, where the level of well-being was higher when the frequency of some generative behaviour excelled; finding that the behavior with greater psychological well-being (M = 81.04, SD = 8.18) was "things to be remembered"; while with greater hedonic well-being (M = 73.39, SD = 12.19) was the behavior "responsibility of other people"; and with greater Eudaimonic well-being (M = 84.61, SD = 6.63), was the behavior "things to be remembered”. The most important findings highlight the importance of generative behaviors in adulthood, finding empirical evidence that the generativity in the last stage of life is associated with well-being. However, by finding differences in the types of generative behaviors at the level of well-being, is proposed the idea that generativity is not situated as an isolated construct, but needs other contextualized and related constructs that can simultaneously operate at different levels, taking into account the relationship between the environment and the individual, encompassing both the social and psychological dimension.Keywords: eudaimonic well-being, generativity, hedonic well-being, Mexican elders, psychological well-being
Procedia PDF Downloads 2731022 Prenatal Development of Heart and Great Vessels in Buffalo (Bubalus bubalis)
Authors: Anuradha Gupta, Neelam Bansal, Varinder Uppal
Abstract:
The present investigation was made on 35 Indian buffalo fetuses ranging from 0.9 cm to 104 cm curved crown rump length (CVRL). The gross anatomical study revealed that all structures were developed at 13 cm CVRL (87 days) in group I. At 0.9 cm CVRL (32 days) the heart was unseptated and tubular and was clearly divided into common atrial chamber dorsally and primitive ventricle in 1.2 cm CVRL fetus (34 days). Septum primum appeared at 1.9 cm CVRL (37 days), truncal ridges at 2.5 cm CVRL (39 days) and foramen ovale in 3.0 cm CVRL (42 days) buffalo foetuses. At 7.6 cm CVRL (62 days) endocardial cushions fused to form left and right atrioventricular openings and four chambered heart was formed in 8.7 cm CVRL (66 days). Endocardium and epicardium was thicker in atria as compared to ventricles in all the age groups. Myocardium of atria was thin as compared to ventricles in all the age groups and was loosely arranged. Immature hyaline cartilage was first appeared at base of aorta in 62 cm CVRL (213 days) fetuses. Intercalated discs were seen in group III and aorta, pulmonary artery, coronary artery were well appreciated in 3.2 cm CVRL (43 days). Neutral and acid mucopolysaccharides were comparatively more in atria than ventricles. Basic proteins showed strong reaction in atrium and ventricle, and intense in conduction system. Lipids and phospholipids were more in myocardium and conduction system than endocardium and epicardium. All the histochemical moieties were comparatively more in tunica intima than media and adventitia of all the great vessels of heart.Keywords: buffalo, fetal development, histochemistry, heart
Procedia PDF Downloads 2751021 Sensory Gap Analysis on Port Wine Promotion and Perceptions
Authors: José Manue Carvalho Vieira, Mariana Magalhães, Elizabeth Serra
Abstract:
The Port Wine industry is essential to Portugal because it carries a tangible cultural heritage and for social and economic reasons. Positioned as a luxury product, brands need to pay more attention to the new generation's habits, preferences, languages, and sensory perceptions. Healthy lifestyles, anti-alcohol campaigns, and digitalisation of their buying decision process need to be better understood to understand the wine market in the future. The purpose of this study is to clarify the sensory perception gap between Port Wine descriptors promotion and the new generation's perceptions to help wineries to align their strategies. Based on the interpretivist approach - multiple methods and techniques (mixed-methods), different world views and different assumptions, and different data collection methods and analysis, this research integrated qualitative semi-structured interviews, Port Wine promotion contents, and social media perceptions mined by Sentiment Analysis Enginius algorithm. Findings confirm that Port Wine CEOs' strategies, brands' promotional content, and social perceptions are not sufficiently aligned. The central insight for Port Wine brands' managers is that there is a long and continuous work of understanding and associating their descriptors with the most relevant perceptual values and criteria of their targets to reposition (when necessary) and sustainably revitalise their brands. Finally, this study hypothesised a sensory gap that leads to a decrease in consumption, trying to find recommendations on how to transform it into an advantage for a better attraction towards the young age group (18-25).Keywords: port wine, consumer habits, sensory gap analysis, wine marketing
Procedia PDF Downloads 2461020 Study of Contrast Induced Nephropathy in Patients Undergoing Cardiac Catheterization: Upper Egypt Experience
Authors: Ali Kassem, Sharf Eldeen-Shazly, Alshemaa Lotfy
Abstract:
Introduction: Contrast-induced nephropathy (CIN) has been the third leading cause of hospital-acquired renal failure. Patients with cardiac diseases are particularly at risk especially with repeated injections of contrast media. CIN is generally defined as an increase in serum creatinine concentration of > 0.5 mg/dL or 25% above baseline within 48 hours after contrast administration. Aim of work: To examine the frequency of CIN for patients undergoing cardiac catheterization at Sohag University Hospital (Upper Egypt) and to identify possible risk factors for CIN in these patients. Material and methods: The study included 104 patients with mean age 56.11 ±10.03, 64(61.5%) are males while 40(38.5%) are females. 44(42.3%) patients are diabetics, 43(41%) patients are hypertensive, 6(5.7%) patients have congestive heart failure, 69(66.3%) patients on statins, 74 (71.2 %) are on ACEIs or ARBs, 19(15.4%) are on metformin, 6 (5.8%) are on NSAIDs, 30(28.8%) are on diuretics. RESULTS: Patients were classified at the end of the study into two groups: Group A: Included 91 patients who did not develop CIN. Group B: Included 13 patients who developed CIN, of which serum creatinine raised > 0.5mg/dl in 6 patients and raised > 25% from the baseline after the procedure in 13 patients. The overall incidence of CIN was 12.5%. CIN increased with older age. There was an increase in the incidence of CIN in diabetic versus non-diabetic patients (20.5% and 6.7%) respectively. (p< 0.03). There was a highly significant increase in the incidence of CIN in patients with CHF versus those without CHF (100% and 71%) respectively, (P<0001). Patients on diuretics showed a significant increase in the incidence of CIN representing 61.5% of all patients who developed CIN. Conclusion: Older patients, diabetic patients, patients with CHF and patients on diuretics have higher risk of developing CIN during coronary catheterization and should receive reno-protective measures before contrast exposure.Keywords: cardiac diseases, contrast-induced nephropathy, coronary catheterization, CIN
Procedia PDF Downloads 3131019 Valence and Arousal-Based Sentiment Analysis: A Comparative Study
Authors: Usama Shahid, Muhammad Zunnurain Hussain
Abstract:
This research paper presents a comprehensive analysis of a sentiment analysis approach that employs valence and arousal as its foundational pillars, in comparison to traditional techniques. Sentiment analysis is an indispensable task in natural language processing that involves the extraction of opinions and emotions from textual data. The valence and arousal dimensions, representing the intensity and positivity/negativity of emotions, respectively, enable the creation of four quadrants, each representing a specific emotional state. The study seeks to determine the impact of utilizing these quadrants to identify distinct emotional states on the accuracy and efficiency of sentiment analysis, in comparison to traditional techniques. The results reveal that the valence and arousal-based approach outperforms other approaches, particularly in identifying nuanced emotions that may be missed by conventional methods. The study's findings are crucial for applications such as social media monitoring and market research, where the accurate classification of emotions and opinions is paramount. Overall, this research highlights the potential of using valence and arousal as a framework for sentiment analysis and offers invaluable insights into the benefits of incorporating specific types of emotions into the analysis. These findings have significant implications for researchers and practitioners in the field of natural language processing, as they provide a basis for the development of more accurate and effective sentiment analysis tools.Keywords: sentiment analysis, valence and arousal, emotional states, natural language processing, machine learning, text analysis, sentiment classification, opinion mining
Procedia PDF Downloads 1011018 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2271017 Patients’ Perspective on Early Discharge with Drain in situ after Breast Cancer Surgery
Authors: Laila Al-Balushi, Suad Al-Kharosui
Abstract:
Due to the increasing number of breast cancer cases in Oman and the impact of the novel coronavirus disease 2019 (COVID-19 on bed situation in the hospital, a policy of early discharge (ED) with drain after breast cancer surgery was initiated at one of the tertiary hospitals in Oman. The uniqueness of this policy is no home visit follow-up, conducted after discharge and the main mode of communication was Instagram media. This policy then was evaluated by conducting a quasi-experimental study using a questionnaire with ten open and closed-ended questions, five questions to explore patient experience using a five-point Likert scale. A total of 41 female patients responded to the questionnaire. Almost 96% of the participants stated being well informed about drain care pre- and post-surgery at home. 9% of the participants developed early sign of infection and was managed at out-patient clinics. Participants with bilateral drains expressed more pain than those with single drain. 90% stated satisfied being discharged with breast drain whereas 10% preferred to stay in the hospital until the drains were removed. This study found that the policy of ED with a drain after BC surgery is practical and well-accepted by most patients. The role of breast nurse and presence of family and institutional support enhanced the success of the policy implementation. To optimize patient care, conducting a training program by breast nurse for nurses at local health centres about care management of patients with drain could improve care and enhance patient satisfaction.Keywords: breast cancer, surgery, early discharge, surgical drain
Procedia PDF Downloads 951016 War and the Battle of Lebanese Television over Gender
Authors: Natalie M. Khazaal
Abstract:
The effects of the civil war on Lebanese women have been challenging to conceptualize. For some, war is a liberating and empowering force for women, while for others it is one that subjugates women and disempowers them in new ways. Scholars have explored the impact on the Lebanese civil war (1975-1990) on women in the fields of labor history, political activism and literary production. In all these arenas, women’s role and visibility were contested and negotiated in diverse ways. But probably the most visible arena where this contestation took place was television. Dramatized entertainment series were crucial sites where fictional women battled out the gender question, and which reflected and participated in the negotiations of gender politics. Even more stunningly, actual television stations became part of this battle through the plots and portrayals of women that they created. The state-backed Tele-Liban (TL) peddled patriarchal articulations of gender that directly competed with the edgy vision of liberated, independent women on the pirate Lebanese Broadcasting Corporation (LBC). This presentation explores how LBC used gender to distinguish its brand against the retrograde TL programing. Television series are an important medium for creating, testing and reenacting gender politics. They are even more consequential in another way. They are the sites where a dramatic shift in the relationship between Arab television and Arab publics—from benign neglect of public concerns towards engagement with audiences—took place for the first time. As this shift is at the heart of why Arab media was seen as a participant in the Arab uprisings, it is important to explore the roots of the shift in the dramas and comedy series of the mid-1980s Lebanese television. This presentation argues that television battles over gender were consequential and need serious consideration as sites of unexpected meaning.Keywords: gender, Lebanon, television, war, women
Procedia PDF Downloads 6371015 Insect Cell-Based Models: Asutralian Sheep bBlowfly Lucilia Cuprina Embryo Primary Cell line Establishment and Transfection
Authors: Yunjia Yang, Peng Li, Gordon Xu, Timothy Mahony, Bing Zhang, Neena Mitter, Karishma Mody
Abstract:
Sheep flystrike is one of the most economically important diseases affecting the Australian sheep and wool industry (>356M/annually). Currently, control of Lucillia cuprina relies almost exclusively on chemicals controls, and the parasite has developed resistance to nearly all control chemicals used in the past. It is, therefore, critical to develop an alternative solution for the sustainable control and management of flystrike. RNA interference (RNAi) technologies have been successfully explored in multiple animal industries for developing parasites controls. This research project aims to develop a RNAi based biological control for sheep blowfly. Double-stranded RNA (dsRNA) has already proven successful against viruses, fungi, and insects. However, the environmental instability of dsRNA is a major bottleneck for successful RNAi. Bentonite polymer (BenPol) technology can overcome this problem, as it can be tuned for the controlled release of dsRNA in the gut challenging pH environment of the blowfly larvae, prolonging its exposure time to and uptake by target cells. To investigate the potential of BenPol technology for dsRNA delivery, four different BenPol carriers were tested for their dsRNA loading capabilities, and three of them were found to be capable of affording dsRNA stability under multiple temperatures (4°C, 22°C, 40°C, 55°C) in sheep serum. Based on stability results, dsRNA from potential targeted genes was loaded onto BenPol carriers and tested in larvae feeding assays, three genes resulting in knockdowns. Meanwhile, a primary blowfly embryo cell line (BFEC) derived from L. cuprina embryos was successfully established, aim for an effective insect cell model for testing RNAi efficacy for preliminary assessments and screening. The results of this study establish that the dsRNA is stable when loaded on BenPol particles, unlike naked dsRNA rapidly degraded in sheep serum. The stable nanoparticle delivery system offered by BenPol technology can protect and increase the inherent stability of dsRNA molecules at higher temperatures in a complex biological fluid like serum, providing promise for its future use in enhancing animal protection.Keywords: lucilia cuprina, primary cell line establishment, RNA interference, insect cell transfection
Procedia PDF Downloads 731014 Android-Based Edugame Application for Earthquakes Disaster Mitigation Education
Authors: Endina P. Purwandari, Yolanda Hervianti, Feri Noperman, Endang W. Winarni
Abstract:
The earthquakes disaster is an event that can threaten at any moment and cause damage and loss of life. Game earthquake disaster mitigation is a useful educational game to enhance children insight, knowledge, and understanding in the response to the impact of the earthquake. This study aims to build an educational games application on the Android platform as a learning media for earthquake mitigation education and to determine the effect of the application toward children understanding of the earthquake disaster mitigation. The methods were research and development. The development was to develop edugame application for earthquakes mitigation education. The research involved elementary students as a research sample to test the developed application. The research results were valid android-based edugame application, and its the effect of application toward children understanding. The application contains an earthquake simulation video, an earthquake mitigation video, and a game consisting three stages, namely before the earthquake, when the earthquake occur, and after the earthquake. The results of the feasibility test application showed that this application was included in the category of 'Excellent' which the average percentage of the operation of applications by 76%, view application by 67% and contents of application by 74%. The test results of students' responses were 80% that showed that a positive their responses toward the application. The student understanding test results show that the average score of children understanding pretest was 71,33, and post-test was 97,00. T-test result showed that t value by 8,02 more than table t by 2,001. This indicated that the earthquakes disaster mitigation edugame application based on Android platform affects the children understanding about disaster earthquake mitigation.Keywords: android, edugame, mitigation, earthquakes
Procedia PDF Downloads 3641013 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare
Authors: Piret Pernik
Abstract:
Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts
Procedia PDF Downloads 1021012 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack
Authors: Vincent Andrew Cappellano
Abstract:
In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.Keywords: architecture, resiliency, availability, cyber-attack
Procedia PDF Downloads 1091011 Enhancing Large Language Models' Data Analysis Capability with Planning-and-Execution and Code Generation Agents: A Use Case for Southeast Asia Real Estate Market Analytics
Authors: Kien Vu, Jien Min Soh, Mohamed Jahangir Abubacker, Piyawut Pattamanon, Soojin Lee, Suvro Banerjee
Abstract:
Recent advances in Generative Artificial Intelligence (GenAI), in particular Large Language Models (LLMs) have shown promise to disrupt multiple industries at scale. However, LLMs also present unique challenges, notably, these so-called "hallucination" which is the generation of outputs that are not grounded in the input data that hinders its adoption into production. Common practice to mitigate hallucination problem is utilizing Retrieval Agmented Generation (RAG) system to ground LLMs'response to ground truth. RAG converts the grounding documents into embeddings, retrieve the relevant parts with vector similarity between user's query and documents, then generates a response that is not only based on its pre-trained knowledge but also on the specific information from the retrieved documents. However, the RAG system is not suitable for tabular data and subsequent data analysis tasks due to multiple reasons such as information loss, data format, and retrieval mechanism. In this study, we have explored a novel methodology that combines planning-and-execution and code generation agents to enhance LLMs' data analysis capabilities. The approach enables LLMs to autonomously dissect a complex analytical task into simpler sub-tasks and requirements, then convert them into executable segments of code. In the final step, it generates the complete response from output of the executed code. When deployed beta version on DataSense, the property insight tool of PropertyGuru, the approach yielded promising results, as it was able to provide market insights and data visualization needs with high accuracy and extensive coverage by abstracting the complexities for real-estate agents and developers from non-programming background. In essence, the methodology not only refines the analytical process but also serves as a strategic tool for real estate professionals, aiding in market understanding and enhancement without the need for programming skills. The implication extends beyond immediate analytics, paving the way for a new era in the real estate industry characterized by efficiency and advanced data utilization.Keywords: large language model, reasoning, planning and execution, code generation, natural language processing, prompt engineering, data analysis, real estate, data sense, PropertyGuru
Procedia PDF Downloads 871010 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood
Authors: Chuang Bing-Kai, Shih Hsiang-Ju
Abstract:
Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology
Procedia PDF Downloads 491009 The Friction of Oil Contaminated Granular Soils; Experimental Study
Authors: Miron A., Tadmor R., Pinkert S.
Abstract:
Soil contamination is a pressing environmental concern, drawing considerable focus due to its adverse ecological and health outcomes, and the frequent occurrence of contamination incidents in recent years. The interaction between the oil pollutant and the host soil can alter the mechanical properties of the soil in a manner that can crucially affect engineering challenges associated with the stability of soil systems. The geotechnical investigation of contaminated soils has gained momentum since the Gulf War in the 1990s, when a massive amount of oil was spilled into the ocean. Over recent years, various types of soil contaminations have been studied to understand the impact of pollution type, uncovering the mechanical complexity that arises not just from the pollutant type but also from the properties of the host soil and the interplay between them. This complexity is associated with diametrically opposite effects in different soil types. For instance, while certain oils may enhance the frictional properties of cohesive soils, they can reduce the friction in granular soils. This striking difference can be attributed to the different mechanisms at play: physico-chemical interactions predominate in the former case, whereas lubrication effects are more significant in the latter. this study introduces an empirical law designed to quantify the mechanical effect of oil contamination in granular soils, factoring the properties of both the contaminating oil and the host soil. This law is achieved by comprehensive experimental research that spans a wide array of oil types and soils with unique configurations and morphologies. By integrating these diverse data points, our law facilitates accurate predictions of how oil contamination modifies the frictional characteristics of general granular soils.Keywords: contaminated soils, lubrication, friction, granular media
Procedia PDF Downloads 551008 Bangladesh’s July Revolution: Analyzing the 2024 Movement for Free Speech and Democracy
Authors: Abu Bakar Siddik
Abstract:
The July Movement in Bangladesh marked a pivotal moment in the nation’s struggle for democratic freedom and the right to free speech. This movement, driven by citizens, intellectuals, and activists, opposed authoritarian governance and the violation of civil liberties. By encouraging support for democratic reforms, it significantly changed the political landscape and highlighted the importance of grassroots activism for human rights. This essay examines the sociopolitical dynamics of the July Movement and its roots in popular resistance to authoritarian rule. It explores the movement's beginnings, emphasizing how citizens, scholars, and activists united to challenge the regime that restricted freedom of speech. In order to show how the movement gathered support for democratic reforms and ultimately helped bring about the overthrow of the regime, the article examines significant demonstrations, speeches, and government acts. This book offers a thorough examination of how the July Movement changed Bangladesh's political landscape by acting as a revolution for free speech and a trigger for the overthrow of autocratic authority, using historical documents, media coverage, and firsthand recollections. This study provides insightful information about how grassroots activism advances human rights.Keywords: July movement, Bangladesh, free speech, democracy, authoritarianism, civil liberties, political change, human rights, social movements, protests, political landscape, regime change, activism, socio-political dynamics
Procedia PDF Downloads 151007 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools
Abstract:
Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.Keywords: block matching, digital evidence, hash list, evaluation of digital evidence
Procedia PDF Downloads 2551006 Like a Bridge over Troubled Waters: The Value of Joint Learning Programs in Intergroup Identity-Based Conflict in Israel
Authors: Rachelly Ashwall, Ephraim Tabory
Abstract:
In an attempt to reduce the level of a major identity-based conflict in Israel between Ultra-orthodox and secular Jews, several initiatives in recent years have tried to bring members of the two societies together in facilitated joint discussion forums. Our study analyzes the impact of two types of such programs: joint mediation training classes and confrontation-based learning programs that are designed to facilitate discussions over controversial issues. These issues include claims about an unequal shouldering of national obligations such as military service, laws requiring public observance of the Sabbath, and discrimination against women, among others. The study examines the factors that enabled the two groups to reduce their social distance, and increase their understanding of each other, and develop a recognition and tolerance of the other group's particular social identity. The research conducted over a course of two years involved observations of the activities of the groups, interviews with the participants, and analysis of the social media used by the groups. The findings demonstrate the progression from a mutual initial lack of knowledge about habits, norms, and attitudes of the out-group to an increasing desire to know, understand and more readily accept the identity of a previously rejected outsider. Participants manifested more respect, concern for and even affection for those whose identity initially led them to reject them out of hand. We discuss the implications for seemingly intractable identity-based conflict in fragile societies.Keywords: identity-based conflict, intergroup relations, joint mediation learning, out-group recognition, social identity
Procedia PDF Downloads 2521005 Analyzing the Untenable Corruption Intricate Patterns in Africa and Combating Strategies for the Efficiency of Public Sector Supply Chains
Authors: Charles Mazhazhate
Abstract:
This study interrogates and analyses the intricate kin- and- kith network patterns of corruption and mismanagement of resources prevalent in public sector supply chains bedeviling the developing economies of Sub-Saharan Africa with particular reference to Zimbabwe. This is forcing governments to resort to harsh fiscal policies that see their citizens paying high taxes against a backdrop of incomes below the poverty datum line, and this negatively affects their quality of life. The corporate world is also affected by the various tax-regime instituted. Mismanagement of resources and corrupt practices are rampant in state-owned enterprises to the extent that institutional policies, procedures, and practices are often flouted for the benefit of a clique of individuals. This interwoven in kith and kin blood human relations in organizations where appointments to critical positions are based on ascribed status. People no longer place value in their systems to make them work thereby violating corporate governance principles. Greediness and ‘unholy friendship connections’ are instrumental in fueling the employment of people who know each other from their discrete backgrounds. Such employments or socio-metric unions are meant to protect those at the top by giving them intelligent information through spying on what other subordinates are doing inside and outside the organization. This practice has led to the underperforming of organizations as those employees with connections and their upper echelons favorites connive to abuse resources for their own benefit. Even if culprits are known, no draconian measures are employed as a deterrence measure. Public value along public sector supply chains is lost. The study used a descriptive case study research design on fifty organizations in Zimbabwe mainly state-owned enterprises. Both qualitative and quantitative instrumentations were used. Both Snowball and random sampling techniques were used. The study found out that in all the fifty SOEs, there were employees in key positions related to top management, with tentacles feeding into the law enforcement agents, judiciary, security systems, and the executive. Such employees in public seem not to know each other with but would be involved in dirty scams and then share the proceeds with top people behind the scenes. The study also established that the same employees do not have the necessary competencies, qualifications, abilities, and capabilities to be in those positions. This culture is now strong that it is difficult to bust. The study recommends recruitment of all employees through an independent employment bureau to ensure strategic fit.Keywords: corruption, state owned enterprises, strategic fit, public sector supply chains, efficiency
Procedia PDF Downloads 1601004 Conceptual Solution and Thermal Analysis of the Final Cooling Process of Biscuits in One Confectionary Factory in Serbia
Authors: Duško Salemović, Aleksandar Dedić, Matilda Lazić, Dragan Halas
Abstract:
The paper presents the conceptual solution for the final cooling of the chocolate dressing of biscuits in one confectionary factory in Serbia. The proposed concept solution was derived from the desired technological process of final cooling of biscuits and the required process parameters that were to be achieved, and which were an integral part of the project task. The desired process parameters for achieving proper hardening and coating formation are the exchanged amount of heat in the time unit between the two media (air and chocolate dressing), the speed of air inside the tunnel cooler, and the surface of all biscuits in contact with the air. These parameters were calculated in the paper. The final cooling of chocolate dressing on biscuits could be optimized by changing process parameters and dimensions of the tunnel cooler and looking for the appropriate values for them. The accurate temperature predictions and fluid flow analysis could be conducted by using heat balance and flow balance equations, having in mind the theory of similarity. Furthermore, some parameters were adopted from previous technology processes, such as the inlet temperature of biscuits and input air temperature. A thermal calculation was carried out, and it was demonstrated that the percentage error between the contact surface of the air and the chocolate biscuit topping, which is obtained from the heat balance and geometrically through the proposed conceptual solution, does not exceed 0.67%, which is a very good agreement. This enabled the quality of the cooling process of chocolate dressing applied on the biscuit and the hardness of its coating.Keywords: chocolate dressing, air, cooling, heat balance
Procedia PDF Downloads 791003 Findings: Impact of a Sustained Health Promoting Workplace on Stock Price Performance and Beta; A Singapore Case
Authors: Wee Tong Liaw, Elaine Wong Yee Sing
Abstract:
The main objective and focus of this study are to establish the significance of a sustained health promoting workplace on stock and portfolio returns focusing on companies listed on the Singapore stock exchange, using a two-factor model comprising of the single factor CAPM and a 'health promoting workplace' factor. The 'health promoting workplace' factor represents the excess returns derived between two portfolios of component stocks that, when combined, would represent a top tier stock market index in Singapore, namely the STI index. The first portfolio represents companies that are independently assessed by the Singapore’s Health Award, SHA, to have a sustained and comprehensive health promoting workplace (SHA-STI portfolio) and the second portfolio represents companies that had not been independently assessed (Non-SHA STI portfolio). Since 2001, many companies in Singapore have voluntarily participated in the bi-annual Singapore HEALTH Award initiated by the Health Promotion Board of Singapore (HPB). The Singapore HEALTH Award (SHA), is an industry-wide award and assessment process. SHA assesses and recognizes employers in Singapore for implementing a comprehensive and sustainable health promotion programme at their workplaces. When using a ten year holding period instead of a one year holding period, excess returns in the SHA-STI portfolio over Non-SHA STI portfolio were consistently being observed over all test periods, during 2001 to 2013. In addition, when applied to the SHA-STI portfolio, results from the Two Factor Model consistently revealed higher explanatory powers across all test periods for the portfolio as well as all the individual component stocks in SHA-STI portfolio, than the single factor CAPM model. However, with respect to attaining higher level of achievement in the Singapore Health Award, this study did not show any incentive for selecting listed companies that have achieved a higher level of award. Results from this study would give further insights to investors and fund managers alike who intend to consider health promoting workplace as a risk factor in their stock or portfolio selection process, in particular for investors who have a preference for STI’s component stocks and with a longer investment horizon. Key micro factors like management abilities, business development strategies and production capabilities that meet the needs of market would create the demand for a company’s product(s) or service(s) and consequently contribute to its top line and profitability. Thereafter, the existence of a sustainable health promoting workplace would be a key catalytic factor in sustaining a productive workforce needed to support the continued success of a profitable business.Keywords: asset pricing model, company's performance, stock returns, financial risk factor, sustained health promoting workplace
Procedia PDF Downloads 1691002 Critical Analysis of International Protections for Children from Sexual Abuse and Examination of Indian Legal Approach
Authors: Ankita Singh
Abstract:
Sex trafficking and child pornography are those kinds of borderless crimes which can not be effectively prevented only through the laws and efforts of one country because it requires a proper and smooth collaboration among countries. Eradication of international human trafficking syndicates, criminalisation of international cyber offenders, and effective ban on child pornography is not possible without applying effective universal laws; hence, continuous collaboration of all countries is much needed to adopt and routinely update these universal laws. Congregation of countries on an international platform is very necessary from time to time, where they can simultaneously adopt international agendas and create powerful universal laws to prevent sex trafficking and child pornography in this modern digital era. In the past, some international steps have been taken through The Convention on the Rights of the Child (CRC) and through The Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography, but in reality, these measures are quite weak and are not capable in effectively protecting children from sexual abuse in this modern & highly advanced digital era. The uncontrolled growth of artificial intelligence (AI) and its misuse, lack of proper legal jurisdiction over foreign child abusers and difficulties in their extradition, improper control over international trade of digital child pornographic content, etc., are some prominent issues which can only be controlled through some new, effective and powerful universal laws. Due to a lack of effective international standards and a lack of improper collaboration among countries, Indian laws are also not capable of taking effective actions against child abusers. This research will be conducted through both doctrinal as well as empirical methods. Various literary sources will be examined, and a questionnaire survey will be conducted to analyse the effectiveness of international standards and Indian laws against child pornography. Participants in this survey will be Indian University students. In this work, the existing international norms made for protecting children from sexual abuse will be critically analysed. It will explore why effective and strong collaboration between countries is required in modern times. It will be analysed whether existing international steps are enough to protect children from getting trafficked or being subjected to pornography, and if these steps are not found to be sufficient enough, then suggestions will be given on how international standards and protections can be made more effective and powerful in this digital era. The approach of India towards the existing international standards, the Indian laws to protect children from being subjected to pornography, and the contributions & capabilities of India in strengthening the international standards will also be analysed.Keywords: child pornography, prevention of children from sexual offences act, the optional protocol to the convention on the rights of the child on the sale of children, child prostitution and child pornography, the convention on the rights of the child
Procedia PDF Downloads 391001 The Impact of Neuroscience Knowledge on the Field of Education
Authors: Paula Andrea Segura Delgado, Martha Helena Ramírez-Bahena
Abstract:
Research on how the brain learns has a transcendental application in the educational context. It is crucial for teacher training to understand the nature of brain changes and their direct influence on learning processes. This communication is based on a literature review focused on neuroscience, neuroeducation, and the impact of digital technology on the human brain. Information was gathered from both English and Spanish language sources, using online journals, books and reports. The general objective was to analyze the role of neuroscience knowledge in enriching our understanding of the learning process. In fact, the authors have focused on the impact of digital technology on the human brain as well as its influence in the field of education..Neuroscience knowledge can contribute significantly to improving the training of educators and therefore educational practices. Education as an instrument of change and school as an agent of socialization, it is necessary to understand what it aims to transform: the human brain. Understanding the functioning of the human brain has important repercussions on education: this elucidates cognitive skills, psychological processes and elements that influence the learning process (memory, executive functions, emotions and the circadian cycle); helps identify psychological and neurological deficits that can impede learning processes (dyslexia, autism, hyperactivity); It allows creating environments that promote brain development and contribute to the advancement of brain capabilities in alignment with the stages of neurobiological development. The digital age presents diverse opportunities to every social environment. The frequent use of digital technology (DT) has had a significant and abrupt impact on both the cognitive abilities and physico-chemical properties of the brain, significantly influencing educational processes. Hence, educational community, with the insights from advances in neuroscience, aspire to identify the positive and negative effects of digital technology on the human brain. This knowledge helps ensure the alignment of teacher training and practices with these findings. The knowledge of neuroscience enables teachers to develop teaching methods that are aligned with the way the brain works. For example, neuroscience research has shown that digital technology is having a significant impact on the human brain (addition, anxiety, high levels of dopamine, circadian cycle disorder, decrease in attention, memory, concentration, problems with their social relationships). Therefore, it is important to understand the nature of these changes, their impact on the learning process, and how educators should effectively adapt their approaches based on these brain's changes.Keywords: digital technology, learn process, neuroscience knowledge, neuroeducation, training proffesors
Procedia PDF Downloads 621000 Antimicrobial Evaluation of Polyphenon 60 and Ciprofloxacin Loaded Nano Emulsion against Uropathogenic Escherichia coli Bacteria and Its in vivo Analysis
Authors: Atinderpal Kaur, Shweta Dang
Abstract:
Our aim is to develop a nanoemulsion-based delivery system containing polyphenon 60 (P60) and ciprofloxacin (Cipro) for intravaginal delivery to treat urinary tract infection. In the present study Polyphenon 60 (P60) and ciprofloxacin (Cipro) were loaded in a single nano emulsion (NE) system via ultra-sonication technique and characterized for particle size, in vitro release and antibacterial efficacy against Bcl-2 level Escherichia coli bacteria. To determine in vivo pharmacokinetic parameters and intravaginal transportation of NE, gamma scintigraphy and biodistribution study was conducted by radiolabelling NE with technetium pertechnetate (99mTc). The preliminary antibacterial investigation showed synergy between these compounds with FICindex of 0.42. The developed formulation showed zeta potential +55.3 and particle size of 151.7 nm, with PDI of 0.196. The in vitro release percentage of P60 at the end of 7th hours was 94.8 ± 0.9 % whereas the release for Cipro was 75.1± 0.15 % in simulated vaginal media. MBC was identified and the findings demonstrated that in both ESBL (Extended Spectrum β- lactamase) and MBL (Metallo β- lactamase) cultures the P60+Cipro NE showed inhibition of growth of all the isolates at 2 mg/ml dilutions. The percentage per gram of radiolabelled drug was found (3.50±0.26) and (3.81±0.30) in kidney and urinary bladder, respectively at 3 h. From the findings, it was concluded that the developed P60+Cipro NE was transported efficiently throughout the target organs, had long duration of action and high biocompatibility via intravaginal administration as compared to oral administration.Keywords: ciprofloxacin, gamma scintigraphy, intravaginal drug delivery, Polyphenon 60
Procedia PDF Downloads 320999 Technology Changing Senior Care
Authors: John Kosmeh
Abstract:
Introduction – For years, senior health care and skilled nursing facilities have been plagued with the dilemma of not having the necessary tools and equipment to adequately care for senior residents in their communities. This has led to high transport rates to emergency departments and high 30-day readmission rates, costing billions of unnecessary dollars each year, as well as quality assurance issues. Our Senior care telemedicine program is designed to solve this issue. Methods – We conducted a 1-year pilot program using our technology coupled with our 24/7 telemedicine program with skilled nursing facilities in different parts of the United States. We then compared transports rates and 30-day readmission rates to previous years before the use of our program, as well as transport rates of other communities of similar size not using our program. This data was able to give us a clear and concise look at the success rate of reducing unnecessary transport and readmissions as well as cost savings. Results – A 94% reduction nationally of unnecessary out-of-facility transports, and to date, complete elimination of 30-day readmissions. Our virtual platform allowed us to instruct facility staff on the utilization of our tools and system as well as deliver treatment by our ER-trained providers. Delay waiting for PCP callbacks was eliminated. We were able to obtain lung, heart, and abdominal ultrasound imaging, 12 lead EKG, blood labs, auscultate lung and heart sounds, and collect other diagnostic tests at the bedside within minutes, providing immediate care and allowing us to treat residents within the SNF. Are virtual capabilities allowed for loved ones, family members, and others who had medical power of attorney to virtually connect with us at the time of visit, to speak directly with the medical provider, providing increased confidence in the decision to treat the resident in-house. The decline in transports and readmissions will greatly reduce governmental cost burdens, as well as fines imposed on SNF for high 30-day readmissions, reduce the cost of Medicare A readmissions, and significantly impact the number of patients visiting overcrowded ERs. Discussion – By utilizing our program, SNF can effectively reduce the number of unnecessary transports of residents, as well as create significant savings from loss of day rates, transportation costs, and high CMS fines. The cost saving is in the thousands monthly, but more importantly, these facilities can create a higher quality of life and medical care for residents by providing definitive care instantly with ER-trained personnel.Keywords: senior care, long term care, telemedicine, technology, senior care communities
Procedia PDF Downloads 94998 CSR and Its Internal Communication – Effects on the Employee Commitment
Authors: Silke Bustamante, Andrea Pelzeter, Andreas Deckmann, Rudi Ehlscheidt, Franziska Freudenberger
Abstract:
CSR is associated with a great number of positive effects. This also includes the positive impact of CSR on the commitment of its employees. The internal CSR communication here takes the essential function as a mediator of the CSR performance of a company to the employees. The importance of CSR communication is, therefore, essential. Employees can usually only perceive the CSR efforts of a company if it is also communicated to them. Only if the employees perceive the CSR of their employer positively, the employer-CSR can also have a positive impact on their affective commitment. Therefore, organizational and individual factors are crucial and thus need to consider. This relationship between the organizational and individual factors was investigated in a qualitative case study in six companies of the German service sector. Expert interviews and focus group interviews were conducted and questionnaire-based ratings by company representatives were raised. Among the individual factors, in terms of CSR, the expectations and relevance of its employees, as well as the perception of CSR by the staff, are included. The organizational factors include the actual CSR performance and its communication. Ultimately, the impact of CSR on the commitment is examined with this holistic approach. The results show that the individual CSR perception does not always match the corporate CSR performance and its depiction in internal communication. Furthermore, employees have given suggestions on how CSR should be communicated by their employer. Knowledge memory systems (e.g. wiki) on the on hand and media-based information, on the other hand, were highlighted. Primarily the employee-related CSR is most important for the employees, whereas ecological CSR activities hardly play a role. The findings indicate the importance of CSR communication in the CSR concept as it provides the missing link between CSR performance and appreciation by an increase in commitment. It should only be communicated, what is done. CSR communication should also be carried out in a plausible and transparent way.Keywords: CSR, employee commitment, employer brand, internal communication
Procedia PDF Downloads 265997 Smart BIM Documents - the Development of the Ontology-Based Tool for Employer Information Requirements (OntEIR), and its Transformation into SmartEIR
Authors: Shadan Dwairi
Abstract:
Defining proper requirements is one of the key factors for a successful construction projects. Although there have been many attempts put forward in assist in identifying requirements, but still this area is under developed. In Buildings Information Modelling (BIM) projects. The Employer Information Requirements (EIR) is the fundamental requirements document and a necessary ingredient in achieving a successful BIM project. The provision on full and clear EIR is essential to achieving BIM Level-2. As Defined by PAS 1192-2, EIR is a “pre-tender document that sets out the information to be delivered and the standards and processes to be adopted by the supplier as part of the project delivery process”. It also notes that “EIR should be incorporated into tender documentation to enable suppliers to produce an initial BIM Execution Plan (BEP)”. The importance of effective definition of EIR lies in its contribution to a better productivity during the construction process in terms of cost and time, in addition to improving the quality of the built asset. Proper and clear information is a key aspect of the EIR, in terms of the information it contains and more importantly the information the client receives at the end of the project that will enable the effective management and operation of the asset, where typically about 60%-80% of the cost is spent. This paper reports on the research done in developing the Ontology-based tool for Employer Information Requirements (OntEIR). OntEIR has proven the ability to produce a full and complete set of EIRs, which ensures that the clients’ information needs for the final model delivered by BIM is clearly defined from the beginning of the process. It also reports on the work being done into transforming OntEIR into a smart tool for Defining Employer Information Requirements (smartEIR). smartEIR transforms the OntEIR tool into enabling it to develop custom EIR- tailored for the: Project Type, Project Requirements, and the Client Capabilities. The initial idea behind smartEIR is moving away from the notion “One EIR fits All”. smartEIR utilizes the links made in OntEIR and creating a 3D matrix that transforms it into a smart tool. The OntEIR tool is based on the OntEIR framework that utilizes both Ontology and the Decomposition of Goals to elicit and extract the complete set of requirements needed for a full and comprehensive EIR. A new ctaegorisation system for requirements is also introduced in the framework and tool, which facilitates the understanding and enhances the clarification of the requirements especially for novice clients. Findings of the evaluation of the tool that was done with experts in the industry, showed that the OntEIR tool contributes towards effective and efficient development of EIRs that provide a better understanding of the information requirements as requested by BIM, and support the production of a complete BIM Execution Plan (BEP) and a Master Information Delivery Plan (MIDP).Keywords: building information modelling, employer information requirements, ontology, web-based, tool
Procedia PDF Downloads 127996 Heavy Metal Adsorption from Synthetic Wastewater Using Agro Waste-Based Nanoparticles: A Comparative Study
Authors: Nomthandazo Precious Sibiya, Thembisile Patience Mahlangu, Sudesh Rathilal
Abstract:
Heavy metal removal is critical in the wastewater treatment process due to its numerous harmful effects on human and aquatic life. There are several chemical and physical techniques for removing heavy metals from wastewater, including ion exchange, reverse osmosis, adsorption, electrodialysis, and ultrafiltration. However, adsorption technology has captivated researchers for years due to its low cost, high efficiency, and compatible with the environment. In this study, the adsorption effectiveness of three modified agro-waste materials was explored for the removal of lead from synthetic wastewater: banana peels (BP), orange peels (OP), and sugarcane bagasse (SB). The magnetite (Fe₃O₄) is incorporated with BP, OP, and SB at a ratio of 1:1 to create magnetic biosorbents. Characterization of biosorbents was carried out using and scanning electron microscopy (SEM) combined with energy-dispersive X-ray (EDX) to investigate surface morphology and elemental compositions, respectively. A series of batch experiments were carried out to investigate the effects of adsorbent mass, agitation time, and initial pH concentration on adsorption behaviour, as well as adsorption isotherms and kinetics. The removal efficiency of lead by the modified agro-waste materials proved to be superior to that of non-modified agro-waste materials. The proof of concept was achieved, and agro-waste materials can be paired with adsorption technology to effectively remove lead from aqueous media. The use of agricultural waste as biosorbents will aid in waste reduction and management.Keywords: adsorption, isotherms, kinetics, agro waste, nanoparticles, batch
Procedia PDF Downloads 67995 Innovating Electronics Engineering for Smart Materials Marketing
Authors: Muhammad Awais Kiani
Abstract:
The field of electronics engineering plays a vital role in the marketing of smart materials. Smart materials are innovative, adaptive materials that can respond to external stimuli, such as temperature, light, or pressure, in order to enhance performance or functionality. As the demand for smart materials continues to grow, it is crucial to understand how electronics engineering can contribute to their marketing strategies. This abstract presents an overview of the role of electronics engineering in the marketing of smart materials. It explores the various ways in which electronics engineering enables the development and integration of smart features within materials, enhancing their marketability. Firstly, electronics engineering facilitates the design and development of sensing and actuating systems for smart materials. These systems enable the detection and response to external stimuli, providing valuable data and feedback to users. By integrating sensors and actuators into materials, their functionality and performance can be significantly enhanced, making them more appealing to potential customers. Secondly, electronics engineering enables the creation of smart materials with wireless communication capabilities. By incorporating wireless technologies such as Bluetooth or Wi-Fi, smart materials can seamlessly interact with other devices, providing real-time data and enabling remote control and monitoring. This connectivity enhances the marketability of smart materials by offering convenience, efficiency, and improved user experience. Furthermore, electronics engineering plays a crucial role in power management for smart materials. Implementing energy-efficient systems and power harvesting techniques ensures that smart materials can operate autonomously for extended periods. This aspect not only increases their market appeal but also reduces the need for constant maintenance or battery replacements, thus enhancing customer satisfaction. Lastly, electronics engineering contributes to the marketing of smart materials through innovative user interfaces and intuitive control mechanisms. By designing user-friendly interfaces and integrating advanced control systems, smart materials become more accessible to a broader range of users. Clear and intuitive controls enhance the user experience and encourage wider adoption of smart materials in various industries. In conclusion, electronics engineering significantly influences the marketing of smart materials by enabling the design of sensing and actuating systems, wireless connectivity, efficient power management, and user-friendly interfaces. The integration of electronics engineering principles enhances the functionality, performance, and marketability of smart materials, making them more adaptable to the growing demand for innovative and connected materials in diverse industries.Keywords: electronics engineering, smart materials, marketing, power management
Procedia PDF Downloads 59994 Effects of Opuntia ficus-indica var. Saboten on Glucose Uptake and Insulin Sensitivity in Pancreatic β Cell
Authors: Kang-Hyun Leem, Myung-Gyou Kim, Hye Kyung Kim
Abstract:
The prickly pear cactus (Opuntia ficus-indica) has a global distribution and have been used for medicinal benefits such as artherosclerosis, diabetes, gastritis, and hyperglycemia. However, very little information is currently available for their mechanism. The prikly pear variety Opuntia ficus-indica var. Saboten (OFS) is widely cultivated in Cheju Island, southwestern region of Korea, and used as a functional food. Present study investigated the effects of OFS on pancreatic β-cell function using pancreatic islet β cells (HIT cell). Alpha-glucosidase inhibition, glucose uptake, insulin secretion, insulin sensitivity, and pancreatic β cell proliferation were determined. The inhibitory effect of ethanol extract of OFS stem on α-glucosidase enzyme was measured in a cell free system. Glucose uptake was determined using fluorescent glucose analogue, 2-NBDG. Insulin secretion was measured by ELISA assay. Cell proliferation was measured by MTT assay. Ethanol extracts of OFS dose-dependently inhibited α-glucosidase activity as well as glucose uptake. Insulinotrophic effect of OFS extract was observed at high glucose media in pancreatic β-islet cells. Furthermore, pancreatic β cell regeneration was also observed.These results suggest that OFS mediates the antidiabetic activity mainly via α-glucosidase inhibition, glucose uptake, and improved insulin sensitivity.Keywords: prickly pear cactus, Opuntia ficus-indica var. Saboten, pancreatic islet HIT cells, α-glucosidase, glucose uptake, insulinotrophic
Procedia PDF Downloads 465