Search results for: duration of internet usage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4798

Search results for: duration of internet usage

1588 Model Evaluation of Thermal Effects Created by Cell Membrane Electroporation

Authors: Jiahui Song

Abstract:

The use of very high electric fields (~ 100kV/cm or higher) with pulse durations in the nanosecond range has been a recent development. The electric pulses have been used as tools to generate electroporation which has many biomedical applications. Most of the studies of electroporation have ignored possible thermal effects because of the small duration of the applied voltage pulses. However, it has been predicted membrane temperature gradients ranging from 0.2×109 to 109 K/m. This research focuses on thermal gradients that drives for electroporative enhancements, even though the actual temperature values might not have changed appreciably from their equilibrium levels. The dynamics of pore formation with the application of an externally applied electric field is studied on the basis of molecular dynamics (MD) simulations using the GROMACS package. Different temperatures are assigned to various regions to simulate the appropriate temperature gradients. The GROMACS provides the force fields for the lipid membranes, which is taken to comprise of dipalmitoyl-phosphatidyl-choline (DPPC) molecules. The water model mimicks the aqueous environment surrounding the membrane. Velocities of water and membrane molecules are generated randomly at each simulation run according to a Maxwellian distribution. For statistical significance, a total of eight MD simulations are carried out with different starting molecular velocities for each simulation. MD simulation shows no pore is formed in a 10-ns snapshot for a DPPC membrane set at a uniform temperature of 295 K after a 0.4 V/nm electric field is applied. A nano-sized pore is clearly seen in a 10-ns snapshot on the same geometry but with the top and bottom membrane surfaces kept at temperatures of 300 and 295 K, respectively. For the same applied electric field, the formation of nanopores is clearly demonstrated, but only in the presence of a temperature gradient. MD simulation results show enhanced electroporative effects arising from thermal gradients. The study suggests the temperature gradient is a secondary driver, with the electric field being the primary cause for electroporation.

Keywords: nanosecond, electroporation, thermal effects, molecular dynamics

Procedia PDF Downloads 63
1587 Manual Pit Emptiers and Their Heath: Profiles, Determinants and Interventions

Authors: Ivy Chumo, Sheillah Simiyu, Hellen Gitau, Isaac Kisiangani, Caroline Kabaria Kanyiva Muindi, Blessing Mberu

Abstract:

The global sanitation workforce bridges the gap between sanitation infrastructure and the provision of sanitation services through essential public service work. Manual pit emptiers often perform the work at the cost of their dignity, safety, and health as their work requires repeated heavy physical activities such as lifting, carrying, pulling, and pushing. This exposes them to occupational and environmental health hazards and risking illness, injury, and death. The study will extend the studies by presenting occupational health risks and suggestions for improvement in informal settlements of Nairobi, Kenya. This is a qualitative study conducted among sanitation stakeholders in Korogocho, Mukuru and Kibera informal settlements in Nairobi. Data were captured using digital voice recorders, transcribed and thematically analysed. The discussion notes were further supported by observational notes made during the interviews. These formed the basis for a robust picture of occupational health of manual pit emptiers; a lack or inappropriate use of protective clothing, and prolonged duration of working hours were described to contribute to the occupational health hazard. To continue working, manual pit emptiers had devised coping strategies which include working in groups, improvised protective clothing, sharing the available protective clothing, working at night and consuming alcohol drinks while at work. Many of these strategies are detrimental to their health. Occupational health hazards among pit emptiers are key for effective working and is as a result of a lack of collaboration amongst stakeholders linked to health, safety and lack of PPE of pit emptiers. Collaborations amongst sanitation stakeholders is paramount for health, safety, and in ensuring the provision and use of personal protective devices.

Keywords: sanitation, occupational health, manual emptiers, informal settlements

Procedia PDF Downloads 178
1586 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 386
1585 Comparative Study Between Two Different Techniques for Postoperative Analgesia in Cesarean Section Delivery

Authors: Nermeen Elbeltagy, Sara Hassan, Tamer Hosny, Mostafa Abdelaziz

Abstract:

Introduction: Adequate postoperative analgesia after caesarean section (CS) is crucial as it impacts the distinct surgical recovery needs of the parturient. Over recent years, there has been increased interest in regional nerve block techniques with promising results on efficacy. These techniques reduce the need for additional analgesia, thereby lowering the incidence of drug-related side effects. As postoperative pain after cesarean is mainly due to abdominal incision, the transverses abdomenis plane ( TAP ) block is a relatively new abdominal nerve block with excellent efficacy after different abdominal surgeries, including cesarean section. Objective: The main objective is to compare ultrasound-guided TAP block provided by the anesthesiologist with TAP provided by the surgeon through a caesarean incision regarding the duration of postoperative analgesia, intensity of analgesia, timing of mobilization, and easiness of the procedure. Method: Ninety pregnant females at term who were scheduled for delivery by elective cesarean section were randomly distributed into two groups. The first group (45) received spinal anesthesia and postoperative ultrasound guided TAP block using 20ml on each side of 0.25% bupivacaine which was provided by the anesthesiologist. The second group (45) received spinal anesthesia plus a TAP block using 20ml on each side of 0.25% bupivacaine, which was provided by the surgeon through the cesarean incision. Visual Analogue Scale (VAS) was used for the comparison between the two groups. Results: VAS score after four hours was higher among the TAP block group provided by the surgeon through the surgical incision than the postoperative analgesic profile using ultrasound-guided TAP block provided by the anesthesiologist (P=0.011). On the contrary, there was no statistical difference in the patient’s dose of analgesia after four hours of the TAP block (P=0.228). Conclusion: TAP block provided through the surgical incision is safe and enhances early patient’s mobilization.

Keywords: TAP block, CS, VAS, analgesia

Procedia PDF Downloads 31
1584 Track and Evaluate Cortical Responses Evoked by Electrical Stimulation

Authors: Kyosuke Kamada, Christoph Kapeller, Michael Jordan, Mostafa Mohammadpour, Christy Li, Christoph Guger

Abstract:

Cortico-cortical evoked potentials (CCEP) refer to responses generated by cortical electrical stimulation at distant brain sites. These responses provide insights into the functional networks associated with language or motor functions, and in the context of epilepsy, they can reveal pathological networks. Locating the origin and spread of seizures within the cortex is crucial for pre-surgical planning. This process can be enhanced by employing cortical stimulation at the seizure onset zone (SOZ), leading to the generation of CCEPs in remote brain regions that may be targeted for disconnection. In the case of a 24-year-old male patient suffering from intractable epilepsy, corpus callosotomy was performed as part of the treatment. DTI-MRI imaging, conducted using a 3T MRI scanner for fiber tracking, along with CCEP, is used as part of an assessment for surgical planning. Stimulation of the SOZ, with alternating monophasic pulses of 300µs duration and 15mA current intensity, resulted in CCEPs on the contralateral frontal cortex, reaching a peak amplitude of 206µV with a latency of 31ms, specifically in the left pars triangularis. The related fiber tracts were identified with a two-tensor unscented Kalman filter (UKF) technique, showing transversal fibers through the corpus callosum. The CCEPs were monitored through the progress of the surgery. Notably, the SOZ-associated CCEPs exhibited a reduction following the resection of the anterior portion of the corpus callosum, reaching the identified connecting fibers. This intervention demonstrated a potential strategy for mitigating the impact of intractable epilepsy through targeted disconnection of identified cortical regions.

Keywords: CCEP, SOZ, Corpus callosotomy, DTI

Procedia PDF Downloads 40
1583 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 231
1582 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 375
1581 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 264
1580 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 110
1579 'Typical' Criminals: A Schutzian Influenced Theoretical Framework Exploring Type and Stereotype Formation

Authors: Mariam Shah

Abstract:

The way the human mind interprets and comprehends the world it occupies has long been a topic of discussion amongst philosophers and phenomenologists. This paper will focus predominantly on the ideologies espoused by the phenomenologist Alfred Schutz and will investigate how we attribute meaning to an event through the process of typification, and the production and usage of ‘types' and ‘stereotypes.' This paper will then discuss how subjective ideologies innate within us result in unique and subjective decision outcomes, based on a phenomenologically influenced theoretical framework which will illustrate how we form ‘types’ in order to ‘typecast’ and form judgements of everything and everyone we experience. The framework used will be founded in theory espoused by Alfred Schutz, and will review the different types of knowledge we rely on innately to inform our judgements, the relevance we attribute to the information which we acquire, and how we consciously and unconsciously apply this framework to everyday situations. An assessment will then be made of the potential impact that these subjective meaning structures can present when dispensing justice in criminal courts. This paper will investigate how these subjective meaning structures can influence our consciousness on both a conscious and unconscious level, and how this could potentially result in bias judicial outcomes due to negative ‘types’ or ‘stereotypes.' This paper will ultimately illustrate that we unconsciously and unreflexively use pre-formed types and stereotypes to inform our judgements and give meaning to what we have just experienced.

Keywords: Alfred Schutz, criminal courts, decision making, judicial decision making, phenomenology, Schutzian stereotypes, types, typification

Procedia PDF Downloads 211
1578 Injury Patterns and Outcomes in Alcohol Intoxicated Trauma Patients Admitted at Level I Apex Trauma Centre of a Developing Nation

Authors: G. Kaushik, A. Gupta, S. Lalwani, K. D. Soni, S. Kumar, S. Sagar

Abstract:

Objective: Alcohol is a leading risk factor associated with the disability and death due to RTI. Present study aims to demonstrate the demographic profile, injury pattern, physiological parameters of victims of trauma following alcohol consumption arriving in the emergency department (ED) and mortality in alcohol intoxicated trauma patients admitted to Apex Trauma Center in Delhi. Design and Methods: Present study was performed in randomly selected 182 alcohol breath analyzer tested RTI patients from the emergency department of Jai Prakash Narayan Apex Trauma Center (JPNATC), All India Institute of Medical Sciences, New Delhi for over a period of 3 months started from September 2013 to November 2013. Results: A total 182 RTI patients with blunt injury were selected between 30-40 years of age and equally distributed to male and female group. Of these, 93 (51%) were alcohol negative and 89 (49%) were alcohol positive. In 89 alcohol positive patients, 47 (53%) had Artificial Airway as compared to 17 (18%), (p < 0.001) in the other group. The Glasgow Coma Scale (GCS) score was lower (p < 0.001) and higher Injury Severity Score (ISS) was observed in alcohol positive group as compared to other group (p < 0.03). Increased number of patients (58%) were admitted to Intensive Care Unit (ICU), in alcohol positive group (p < 0.001) and they were in ICU for longer time compare to other group (p < 0.001). The alcohol positive patients were on ventilator support for longer duration as compared to non-alcoholic group (p < 0.001). Mortality rate was higher in alcohol intoxicated patients as compared to non-alcoholic RTI patients, however, the difference was not statistically significant. Conclusion: This study revealed that GCS, mean ISS, ICU stay, ventilation time etc. might have considerable impact on mortality in alcohol intoxicated patients as compared to non-alcoholic group.

Keywords: road traffic injuries, alcohol, trauma, emergency department

Procedia PDF Downloads 304
1577 Sustainable Management of Water and Soil Resources for Agriculture in Dry Areas

Authors: Alireza Nejadmohammad Namaghi

Abstract:

Investigators have reported that mulches increase production potential in arid and semi arid lands. Mulches are covering materials that are used on soil surface for efficiency irrigation, erosion control, weed control, evaporation decrease and improvement of water perpetration. Our aim and local situation determine the kind of material that we can use. In this research we used different mulches including chemical mulch (M1), Aquasorb polymer, manure mulch (M2), Residue mulch (M3) and polyethylene mulch (M4), with control treatment (M0), without usage of mulch, on germination, biomass dry matter and cottonseed yield (Varamin variety) in Kashan area. Randomized complete block (RCB) design have measured the cotton yield with 3 replications for measuring the biomass dry matter and 4 replication in tow irrigation periods as 7 and 14 days. Germination percentage for M0, M1, M2, M3 and M4 treatment were receptivity 64, 65, 76, 57 and 72% Biomass dry matter average for M0, M1, M2, M3 and M4 treatment were receptivity 276, 306, 426, 403 and 476 gram per plot. M4 treatment (polyethylene Mulch) had the most effect, M2 and M3 had no significant as well as M0 and M1. Total yield average with respect to 7 days irrigation for M0, M1, M2, M3 and M4 treatment were receptivity 700, 725, 857, 1057 and 1273 gram per plot. Dunken ne multiple showed no significant different among M0, M1, M2, and M3, but M4 ahs the most effect on yield. Total yield average with respect to 14 days irrigation for M0, M1, M2, M3 and M4 treatment were receptivity 535, 507, 690, 957 and 1047 gram per plot. These were significant difference between all treatments and control treatment. Results showed that used different mulches with water decrease in dry situation can increase the yield significantly.

Keywords: mulch, cotton, arid land management, irrigation systems

Procedia PDF Downloads 62
1576 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 92
1575 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 258
1574 Development of Hydrophilic Materials for Nanofiltration Membrane Achieving Dual Resistance to Fouling and Chlorine

Authors: Xi Quan Cheng, Yan Chao Xu, Xu Jiang, Lu Shao, Cher Hon Lau

Abstract:

A hydrophilic thin-film-composite (TFC) nanofiltration (NF) membrane has been developed through the interfacial polymerization (IP) of amino-functional polyethylene glycol (PEG) and trimesoyl chloride. The selective layer is formed on a polyethersulfone (PES) support that is characterized using FTIR, XPS and SEM, and is dependent on monomer immersion duration, and the concentration of monomers and additives. The higher hydrophilicity alongside the larger pore size of the PEG-based selective layer is the key to a high water flux of 66.0 L m-2 h-1 at 5.0 bar. With mean pore radius of 0.42 nm and narrow pore size distribution, the MgSO4 rejections of the PEG based PA TFC NF membranes can reach up to 80.2 %. The hydrophilic PEG based membranes shows positive charged since the isoelectric points range from pH=8.9 to pH=9.1 and the rejection rates for different salts of the novel membranes are in the order of R(MgCl2)>R(MgSO4)>R(NaCl)>R(Na2SO4). The pore sizes and water permeability of these membranes are tailored by varying the molecular weight and molecular architecture of amino-functional PEG. Due to the unique structure of the selective layer of the PEG based membranes consisting of saturated aliphatic construction unit (CH2-CH2-O), the membranes demonstrate dual resistance to fouling and chlorine. The membranes maintain good salt rejections and high water flux of PEG based membranes after treatment by 2000 ppm NaClO for 24 hours. Interestingly, the PEG based membranes exhibit excellent fouling resistance with a water flux recovery of 90.2 % using BSA as a model molecule. More importantly, the hydrophilic PEG based NF membranes have been exploited to separate several water soluble antibiotics (such as tobramycin, an aminoglycoside antibiotic applied in the treatment of various types of bacterial infections), showing excellent performance in concentration or removal of antibioics.

Keywords: nanofiltration, antibiotic separation, hydrophilic membrane, high flux

Procedia PDF Downloads 304
1573 Ultra-High Voltage Energization of Electrostatic Precipitators for Coal Fired Boilers

Authors: Mads Kirk Larsen

Abstract:

Strict air pollution control is today high on the agenda world-wide. By reducing the particular emission, not only the mg/Nm3 will be reduced – also parts of mercury and other hazardous matters attached to the particles will be reduced. Furthermore, it is possible to catch the fine particles (PM2.5). For particulate control, the precipitators are still the preferred choice and much efforts have been done to improve the efficiencies. Many ESP’s have seen electrical upgrading by changing the traditional 1 phase power system into either 3 phase or SMPS (High Frequency) units. However, there exist a 4th type of power supply – the pulse type. This is unfortunately widely unknown, but may be of great benefit to power plants. The FLSmidth type is called COROMAX® and it is a high voltage pulse generator for precipitators using a semiconductor switch operating at medium potential. The generated high voltage pulses have rated amplitude of 80 kV and duration of 75 μs and are superimposed on a variable base voltage of 60 kV rated voltage. Hereby, achieving a peak voltage of 140 kV. COROMAX® has the ability to increase the voltage beyond the natural spark limit inside the precipitator. Voltage levels may often be twice as high after installation of COROMAX®. Hereby also the migration velocity increases and thereby the efficiency. As the collection efficiency is proportional to the voltage peak and mean values, this also increases the collection efficiency of the fine particles where test has shown 80% removal of particles less than 0.07 micron. Another great advantage is the indifference to back-corona. Simultaneously with emission reduction, the power consumption will also be reduced. Another great advantage of the COROMAX® system is that the emission can be improved without the need to change the internal parts or enlarge the ESP. Recently, more than 150 units have been installed in China, where emissions have been reduced to ultra-low levels.

Keywords: eleectrostatic precipitator, high resistivity dust, micropulse energization, particulate removal

Procedia PDF Downloads 283
1572 Effect of Summer Training Volunteering Practices in Healthcare on Self-Confidence of Nursing Students in Riyadh

Authors: Alyaa Farouk Abdelfattah Ibrahim, Samah Mohamed, Huda Jrady, Mashail Alrashidi, Alaa Mohammad, Fatimah Alotaibi, Maram Almutiri

Abstract:

Participation in volunteering was associated with better mental and physical health, self-esteem, and life satisfaction. The main motivator for students in particular is the chance to gain work-related experiences, improve skills, and build on qualifications that may help them achieve their educational goals and further their careers. This study aimed to assess the effect of summer training volunteering practices in healthcare on self-confidence of nursing students in Riyadh. In a crossectional study design, 150 nursing students at King Saud bin Abdul-Aziz University for health sciences in Riyadh were included in the study. Bio-socio-demographic, self-confidence, patients’ care and skills questionnaires were used for data collection. Results: Participants’ age ranged between 20 and 26 years. The majority were from the educational level seven (80%). 40.7 % of them reported volunteering in summer training programs; 70.37% of them volunteered at least once and for a duration of at least one month. Nursing students from level 6 were less likely to have self-confidence in their patients’ care skills than those in level 7. Students who volunteered were more likely to be more interested in becoming social, professional, and independent healthcare workers. There was no difference regarding experience in clinical skills and education by volunteering status. Clinical skills improved by a level of education in this group. Conclusion: Professional self-confidence and clinical performance are related in this group of nursing students. Monitoring, arranging, and encouraging volunteering activities for nursing students are important to help them broaden their interests, their self-confidence in their capabilities, and advancement in their chosen profession. Mostly, volunteering enhanced knowledge in patient safety and quality of care and attempts to secure volunteering opportunities should be a priority on the nursing education agenda.

Keywords: volunteering, health care volunteering, nursing students, summer training

Procedia PDF Downloads 194
1571 Variability of Covariance of Selected Skeletal Diameters of Female in a Longitudinal Physical Training Programme

Authors: Dhananjoy Shaw, Seema Sharma (Kaushik)

Abstract:

Anthropometry helps in associating the physical properties of an individual with their racial, cultural, and psychological attributes. Numerous research studies have included different skeletal diameters as a variable. However, most of the studies suggest their inclusion describing specific characteristics/traits of the body. However, there seems to be a scarcity of literature related to the effect of any kind of longitudinal physical training on human skeletal diameters. Hence, the present investigation was conducted to study the variability of covariance of selected skeletal diameters of females in a longitudinal physical training programme. The sample for the study was 78 college going students of the University of Delhi, classified equally in three groups, i.e. viz. (a) Progressive load of training or conditioning group coded as PLT; (b) Constant load of training or non-conditioning group coded as CLT; and (c) No-load or control or sedentary group coded as NL. Collectively, mean age of the sample was 19.54±1.79 years. The randomly selected samples were given maximum consideration to maintain their homogeneity. The variables included biacromial diameter, biiliocristal diameter, bitrochantaerion diameter, humeral bicondylar, femoral bicondylar, wrist diameter, ankle diameter, and foot breadth. Multi-group repeated measure design was adopted for the experimentation. Each group was measured four times after completion of each of the three meso-cycles of six-weeks duration. The measurements were taken following the standard landmarks and procedures. Mean, standard deviation, analysis of co-variance and its post-hoc analysis were computed to analyze the data statistically. The study concluded that both the progressive and constant load of physical training bring changes in the selected skeletal diameters of females. It also reflected the increase due to growth also along with training.

Keywords: longitudinal, physical training, skeletal diameters, step progression load

Procedia PDF Downloads 113
1570 Site Analysis’ Importance as a Valid Factor in Building Design

Authors: Mekwa Eme, Anya chukwuma

Abstract:

The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.

Keywords: analysis, climate, statistics, design

Procedia PDF Downloads 227
1569 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 18
1568 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 214
1567 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 217
1566 Optimal Trajectory Finding of IDP Ventilation Control with Outdoor Air Information and Indoor Health Risk Index

Authors: Minjeong Kim, Seungchul Lee, Iman Janghorban Esfahani, Jeong Tai Kim, ChangKyoo Yoo

Abstract:

A trajectory of set-point of ventilation control systems plays an important role for efficient ventilation inside subway stations since it affects the level of indoor air pollutants and ventilation energy consumption. To maintain indoor air quality (IAQ) at a comfortable range with lower ventilation energy consumption, the optimal trajectory of the ventilation control system needs to be determined. The concentration of air pollutants inside the station shows a diurnal variation in accordance with the variations in the number of passengers and subway frequency. To consider the diurnal variation of IAQ, an iterative dynamic programming (IDP) that searches for a piecewise control policy by separating whole duration into several stages is used. When outdoor air is contaminated by pollutants, it enters the subway station through the ventilation system, which results in the deteriorated IAQ and adverse effects on passenger health. In this study, to consider the influence of outdoor air quality (OAQ), a new performance index of the IDP with the passenger health risk and OAQ is proposed. This study was carried out for an underground subway station at Seoul Metro, Korea. The optimal set-points of the ventilation control system are determined every 3 hours, then, the ventilation controller adjusts the ventilation fan speed according to the optimal set-point changes. Compared to manual ventilation system which is operated irrespective of the OAQ, the IDP-based ventilation control system saves 3.7% of the energy consumption. Compared to the fixed set-point controller which is operated irrespective of the IAQ diurnal variation, the IDP-based controller shows better performance with a 2% decrease in energy consumption, maintaining the comfortable IAQ range inside the station.

Keywords: indoor air quality, iterative dynamic algorithm, outdoor air information, ventilation control system

Procedia PDF Downloads 487
1565 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 359
1564 Comparison of Methods of Estimation for Use in Goodness of Fit Tests for Binary Multilevel Models

Authors: I. V. Pinto, M. R. Sooriyarachchi

Abstract:

It can be frequently observed that the data arising in our environment have a hierarchical or a nested structure attached with the data. Multilevel modelling is a modern approach to handle this kind of data. When multilevel modelling is combined with a binary response, the estimation methods get complex in nature and the usual techniques are derived from quasi-likelihood method. The estimation methods which are compared in this study are, marginal quasi-likelihood (order 1 & order 2) (MQL1, MQL2) and penalized quasi-likelihood (order 1 & order 2) (PQL1, PQL2). A statistical model is of no use if it does not reflect the given dataset. Therefore, checking the adequacy of the fitted model through a goodness-of-fit (GOF) test is an essential stage in any modelling procedure. However, prior to usage, it is also equally important to confirm that the GOF test performs well and is suitable for the given model. This study assesses the suitability of the GOF test developed for binary response multilevel models with respect to the method used in model estimation. An extensive set of simulations was conducted using MLwiN (v 2.19) with varying number of clusters, cluster sizes and intra cluster correlations. The test maintained the desirable Type-I error for models estimated using PQL2 and it failed for almost all the combinations of MQL. Power of the test was adequate for most of the combinations in all estimation methods except MQL1. Moreover, models were fitted using the four methods to a real-life dataset and performance of the test was compared for each model.

Keywords: goodness-of-fit test, marginal quasi-likelihood, multilevel modelling, penalized quasi-likelihood, power, quasi-likelihood, type-I error

Procedia PDF Downloads 126
1563 Oral Administration of Azithromycin Ameliorates Trypanosomosis in Trypanosoma congolense and T. Brucei Brucei Infected Mice

Authors: Nthatisi I. Molefe-Nyembe, Keisuke Suganuma, Oriel M. M. Thekisoe, Xuan Xuenan, Noboru Inoue

Abstract:

African trypanosomosis is a devastating disease of animals caused by parasites of the genus Trypanosoma negatively affecting the economic status of more than 36 African countries. Few available drugs for the treatment of trypanosomosis remain inaccessible in remote areas, are associated with severe toxicity and most importantly, resistance has widely developed against their usage. Therefore, safe, effective and easily administrable drugs are urgently in need. The objective of the current study was to determine efficacy of azithromycin (AZM), on T. congolense, T. brucei brucei in vitro and in vivo. A 96 well luciferase assay was conducted to determine the trypanocidal effect of AZM on T. congolense, T. b. brucei and T. evansi as well as the cytotoxicity effect on the MDBK and NIH 3T3 cells. Additionally, TEM analysis was conducted to determine the morphological alteration on the AZM treated samples. Mice were infected with T. congolense and T. b. brucei and orally treated with AZM for 7 and 28 days referred to as the short and the long-term treatment. The in vitro IC50 values of AZM on T. congolense, T. b. brucei and T. evansi was 0.19 ± 0.17; 3.69 ± 2.26 and 1.81 ± 1.82 μg/mL, respectively, while the cytotoxicity effects values were greater than 25 μg/mL. A vacuole-like structure was observed in the TEM imaging of AZM treated T. congolense, while the presence of glycosomes and acidocalcisome-like structured were detected in T. b. brucei samples. In vivo, AZM was more effective against T. congolense infected mice than T. b. brucei. In conclusion, AZM exhibited the trypanocidal effects on T. congolense and T. b. brucei infected mice. However, further studies are necessary to determine the metabolic pathway responsible for the observed efficacy.

Keywords: animal trypanosomosis, azithromycin, oral administration, trypanosoma congolense

Procedia PDF Downloads 53
1562 Action Potential of Lateral Geniculate Neurons at Low Threshold Currents: Simulation Study

Authors: Faris Tarlochan, Siva Mahesh Tangutooru

Abstract:

Lateral Geniculate Nucleus (LGN) is the relay center in the visual pathway as it receives most of the input information from retinal ganglion cells (RGC) and sends to visual cortex. Low threshold calcium currents (IT) at the membrane are the unique indicator to characterize this firing functionality of the LGN neurons gained by the RGC input. According to the LGN functional requirements such as functional mapping of RGC to LGN, the morphologies of the LGN neurons were developed. During the neurological disorders like glaucoma, the mapping between RGC and LGN is disconnected and hence stimulating LGN electrically using deep brain electrodes can restore the functionalities of LGN. A computational model was developed for simulating the LGN neurons with three predominant morphologies, each representing different functional mapping of RGC to LGN. The firings of action potentials at LGN neuron due to IT were characterized by varying the stimulation parameters, morphological parameters and orientation. A wide range of stimulation parameters (stimulus amplitude, duration and frequency) represents the various strengths of the electrical stimulation with different morphological parameters (soma size, dendrites size and structure). The orientation (0-1800) of LGN neuron with respect to the stimulating electrode represents the angle at which the extracellular deep brain stimulation towards LGN neuron is performed. A reduced dendrite structure was used in the model using Bush–Sejnowski algorithm to decrease the computational time while conserving its input resistance and total surface area. The major finding is that an input potential of 0.4 V is required to produce the action potential in the LGN neuron which is placed at 100 µm distance from the electrode. From this study, it can be concluded that the neuroprostheses under design would need to consider the capability of inducing at least 0.4V to produce action potentials in LGN.

Keywords: Lateral Geniculate Nucleus, visual cortex, finite element, glaucoma, neuroprostheses

Procedia PDF Downloads 260
1561 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress

Authors: Zhiyong Li, Hiroshi Katayama

Abstract:

Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.

Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)

Procedia PDF Downloads 310
1560 Social Media Factor in Security Environment

Authors: Cetin Arslan, Senol Tayan

Abstract:

Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.

Keywords: democracy, disorder, security, Social Media

Procedia PDF Downloads 347
1559 History of Textiles and Fashion: Gender Symbolism in the Context of Colour

Authors: Damayanthie Eluwawalage

Abstract:

Historically, the color-coded attire demarcated differences, for example, differences in social position and differences in gender, etc. Distinctive colors are worn by different classes in medieval England. By the twentieth-century Western society, certain colors were firmly associated with the specific gender; as pink for girls, and blue for boys. The color-coded gender phenomenon was a novelty at the turn of the twentieth-century and became widely practiced after World War II. Prior to that era, there were no distinctions or differences in the dress of younger children, in relation to their gender. In the nineteenth century, pink suits were highly acceptable for gentlemen’s attire. Frenchmen in the eighteenth-century wore colors with an infinite range of hues like pink, plum, white, cream, blue, yellow, puce and sea green. Nineteenth-century European male austerity, primarily caused by the usage of sombre colors such as black, white and grey, has been described as an element for dignity, control and morality. In the nineteenth century, there were many color-associated distinctions, as certain colors were reserved for the unmarried, the single or the aged. Two luminous colors in one dress was ‘vulgar’ and yellow was generally regarded as unladylike. Yellow was the color utilised for most correctional attire. Orange was prohibited for the unmarried. Fashionable dressing in the nineteenth century was more gender-differentiated than in previous centuries. Masculine austerity, emphasized a shift in class relations. As a result of that shift, male attire became more uniform, homogeneous and integrated (amongst the classes), than its traditional hierarchal approach.

Keywords: textiles, fashion, gender symbolism, color

Procedia PDF Downloads 471