Search results for: open spaces
874 Carbon Pool Assessment in Two Community Forest in Nepal
Authors: Khemnath Kharel
Abstract:
Forest itself is a factory as well as product. It supplies tangible and intangible goods and services. It supplies timber, fuel wood, fodder, grass leaf litter as well as non timber edible goods and medicinal and aromatic products additionally provides environmental services. These environmental services are of local, national, or even global importance. In Nepal more than 19 thousands community forests are providing environmental service in less economic benefit than actual efficiency. There is a risk of cost of management of those forest exceeds benefits and forests get converted to open access resources in future. Most of the environmental goods and services don’t have markets which mean no prices at which they are available to the consumers therefore the valuation of these services goods and services establishment of paying mechanism for such services and insure the benefit to community is more relevant in local as well as global scale. There are few examples of carbon trading in domestic level to meet the country wide emission goal. In this contest the study aims to explore the public attitude towards carbon offsetting and their responsibility over service providers. This study helps in promotion of environment service awareness among general people and service provider; community forest. The research helps to unveil the carbon pool scenario in community forest and willingness to pay for carbon offsetting of people who are consuming more energy than general people and emitting relatively more carbon in atmosphere. The study has assessed the carbon pool status in two community forest. In the study in two community forests carbon pools were assessed following the guideline “Forest Carbon Inventory Guideline 2010” prescribed by Ministry of Forest and soil Conservation, Nepal. Final out comes of analysis in intensively managed area of Hokse CF recorded as 103.58 tons C /ha with 6173.30 tons carbon stock. Similarly in Hariyali CF carbon density was recorded 251.72 mg C /ha. The total carbon stock of intensively managed blocks in Hariyali CF is 35839.62 tons carbon.Keywords: carbon, offsetting, sequestration, valuation
Procedia PDF Downloads 321873 The Academic Importance of the Arts in Fostering Belonging
Authors: Ana Handel, Jamal Ellerbe, Sarah Kanzaki, Natalie White, Nathan Ousey, Sean Gallagher
Abstract:
A sense of belonging is the ability for individuals to feel they are a necessary part of whatever organization or community they find themselves in. In an academic setting, a sense of belonging is key to a student’s success. The collected research points to this sense of belonging in academic settings as a significant contributor of students’ levels of engagement and trust. When universities leverage the arts, students are provided with more opportunities to engage and feel confident in their surroundings. This allows for greater potential to develop within academic and social settings. The arts also call for the promotion of diversity, equity, and inclusion by showcasing works of artists from all different backgrounds, thus allowing students to gain cultural knowledge and be able to embrace differences. Equity, diversity, and inclusion are all emotional facets of belonging. Equity relates to the concept of making the conscious choice to recognize opportunities to incorporate inclusive and diverse ideals into different thought processes and collaboration. Inclusion involves providing equal access to opportunities and resources for people of all ‘ingroups. In an inclusive culture, individuals are able to maximize their potential with the confidence they have gained through an accepting environment. A variety of members in academic communities have noted it may be beneficial to make certain events surrounding the arts to be built into course requirements in order to ensure students are expanding their horizons and exposing themselves to the arts. These academics also recommend incorporating the arts into extracurricular activities, such as Greek life, in order to appeal to large groups of students. Once students have an understanding of the rich knowledge cultivated through exploring the arts, they will feel more comfortable in their surroundings and thus more confident to become involved in other areas of their university. A number of universities, including West Chester and Carnegie Mellon, have instituted programs aiming to provide students with the necessary tools and resources to feel comfortable in their educational settings. Different programs include references to hotlines for discrimination and office for diversity, equity, and inclusion. Staff members have also been provided with means of combating biases and increasing feelings of belongingness in order to properly support and communicate with students. These tools have successfully allowed universities to foster inviting environments for students of all backgrounds to feel belong as well as strengthening the community’s diversity, equity, and inclusion. Through demonstrating concepts of diversity, equity, and inclusion by introducing the arts into learning spaces, students can find a sense of belonging within their academic environments. It is essential to understand these topics and how they work together to achieve a common goal. The efforts of universities have made much progress in shedding light on different cultures and ideas to show students their full potential and opportunities. Once students feel more comfortable within their organizations, engagement will increase substantially.Keywords: arts, belonging, engagement, inclusion
Procedia PDF Downloads 165872 The Opinions of Nursing Students Regarding Humanized Care through Volunteer Activities at Boromrajonani College of Nursing, Chonburi
Authors: P. Phenpun, S. Wareewan
Abstract:
This qualitative study aimed to describe the opinions in relation to humanized care emerging from the volunteer activities of nursing students at Boromarajonani College of Nursing, Chonburi, Thailand. One hundred and twenty-seven second-year nursing students participated in this study. The volunteer activity model was composed of preparation, implementation, and evaluation through a learning log, in which students were encouraged to write their daily activities after completing practical training at the healthcare center. The preparation content included three main categories: service minded, analytical thinking, and client participation. The preparation process took over three days that accumulates up to 20 hours only. The implementation process was held over 10 days, but with a total of 70 hours only, with participants taking part in volunteer work activities at a healthcare center. A learning log was used for evaluation and data were analyzed using content analysis. The findings were as follows. With service minded, there were two subcategories that emerged from volunteer activities, which were service minded towards patients and within themselves. There were three categories under service minded towards patients, which were rapport, compassion, and empathy service behaviors, and there were four categories under service minded within themselves, which were self-esteem, self-value, management potential, and preparedness in providing good healthcare services. In line with analytical thinking, there were two components of analytical thinking, which were analytical skill for their works and analytical thinking for themselves. There were four subcategories under analytical thinking for their works, which were evidence based thinking, real situational thinking, cause analysis thinking, and systematic thinking, respectively. There were four subcategories under analytical thinking for themselves, which were comparative between themselves, towards their clients that leads to the changing of their service behaviors, open-minded thinking, modernized thinking, and verifying both verbal and non-verbal cues. Lastly, there were three categories under participation, which were mutual rapport relationship; reconsidering client’s needs services and providing useful health care information.Keywords: humanized care service, volunteer activity, nursing student, learning log
Procedia PDF Downloads 307871 Comparison of Storage Facilities on Different Varieties of Orange Fleshed Sweet Potato Grown in Rwanda
Authors: Jean Paul Hategekimana, Dukuzumuremyi Yvonne, Mukeshimana Marthe, Alexandre Niyonshima
Abstract:
Sweet potato (Ipomoea batatas) is a very important staple food crop in Rwanda due to its high growth and consumption in all parts of the country. The effect of seven different storage conditions on the quality and nutritional composition of the three most grown and consumed varieties of orange-fleshed sweet potato (OFSP), namely Kabode, Terimbere, and Vita, were studied over a period of six weeks at Postharvest Service and Training Center of University Rwanda, Busogo Campus. The potato stored under the following conditions (zero energy cooling chamber, ground washed sweet potato, ground unwashed sweet potato, perforated washed sweet potato, perforated unwashed sweet potato, non-perforated washed sweet potato, and non-perforated unwashed sweet potato) were assessed in this study. These storage conditions are the modifications of existing methods currently used in Rwanda for suitable local climatic conditions. Hence, 30kgs of freshly harvested OFSP for each variety were bought from farmers of Gakenke and Rulindo districts and then transported to the postharvest training and service center UR-CAVM, Busogo Campus. 2.5kg of each potato sample was selected and stored under the above-mentioned storage conditions after pretreatment. Data were collected for six weeks on percent weight loss, shrinkability and the general appearance at interval of three days. The stored samples were also analyzed for moisture, crude ash, crude fiber, and reduced sugar levels during the entire storage period. Results showed the difference among the various storage conditions. It was shown that ZECC and non-perforated sacs (in the open air) storage techniques had good potential for storage of orange flesh sweet potato for up to six weeks without considerable change in physical and nutritional parameters compared to other considered conditions and, therefore, can be recommended as more useful for OSFP at farm level and during transport and market storage.Keywords: ZECC, orange fleshed sweet potato, perforated sacs, storage conditions
Procedia PDF Downloads 68870 A Comprehensive Methodology for Voice Segmentation of Large Sets of Speech Files Recorded in Naturalistic Environments
Authors: Ana Londral, Burcu Demiray, Marcus Cheetham
Abstract:
Speech recording is a methodology used in many different studies related to cognitive and behaviour research. Modern advances in digital equipment brought the possibility of continuously recording hours of speech in naturalistic environments and building rich sets of sound files. Speech analysis can then extract from these files multiple features for different scopes of research in Language and Communication. However, tools for analysing a large set of sound files and automatically extract relevant features from these files are often inaccessible to researchers that are not familiar with programming languages. Manual analysis is a common alternative, with a high time and efficiency cost. In the analysis of long sound files, the first step is the voice segmentation, i.e. to detect and label segments containing speech. We present a comprehensive methodology aiming to support researchers on voice segmentation, as the first step for data analysis of a big set of sound files. Praat, an open source software, is suggested as a tool to run a voice detection algorithm, label segments and files and extract other quantitative features on a structure of folders containing a large number of sound files. We present the validation of our methodology with a set of 5000 sound files that were collected in the daily life of a group of voluntary participants with age over 65. A smartphone device was used to collect sound using the Electronically Activated Recorder (EAR): an app programmed to record 30-second sound samples that were randomly distributed throughout the day. Results demonstrated that automatic segmentation and labelling of files containing speech segments was 74% faster when compared to a manual analysis performed with two independent coders. Furthermore, the methodology presented allows manual adjustments of voiced segments with visualisation of the sound signal and the automatic extraction of quantitative information on speech. In conclusion, we propose a comprehensive methodology for voice segmentation, to be used by researchers that have to work with large sets of sound files and are not familiar with programming tools.Keywords: automatic speech analysis, behavior analysis, naturalistic environments, voice segmentation
Procedia PDF Downloads 281869 Intentions and Willingness of Marketing Professionals to Adopt Neuromarketing
Authors: Anka Gorgiev, Chris Martin, Nikolaos Dimitriadis, Dimitrios V. Nikolaidis
Abstract:
This paper is part of a doctoral research study aimed to identify behavioral indicators for the existence of the new marketing paradigm. Neuromarketing is becoming a growing trend in the marketing industry worldwide and it is capturing a lot of interest among the members of academia and the practitioner community. However, it is still not very clear how big of an impact neuromarketing might have in the following years. In an effort to get closer to an answer, this study investigates behavioral intentions and willingness to adopt neuromarketing and its practices by the marketing professionals, including academics, practitioners, students, researchers, experts and journal editors. The participants in the study include marketing professionals at different levels of neuromarketing fluency with residency in the United States of America and the South East Europe. The total of 19 participants participated in the interviews, all of whom belong to more than one group of marketing professionals. The authors use qualitative research approach and open-ended interview questions specifically developed to assess ideas, beliefs and opinions that marketing professionals hold towards neuromarketing. In constructing the interview questions, the authors have used the theory of planned behavior, the prototype willingness model and the technology acceptance model as a theoretical framework. Previous studies have not explicitly investigated the behavioral intentions of marketing professionals to engage in neuromarketing behavior, which is described here as a tendency to apply neuromarketing assumptions and tools in usual marketing practices. This study suggests that the marketing professionals believe that neuromarketing can contribute to the business in a positive way and outlines the main advantages and disadvantages of adopting neuromarketing as identified by the participants. In addition, the study reveals an emerging image of an exemplar company that is perceived to be using neuromarketing, including the most common characteristics and attributes. These findings are believed to be crucial in facilitating a way for neuromarketing field to have a broader impact than it currently does by recognizing and understanding the limitations that such exemplars imply and how that has an effect on the decision-making of marketing professionals.Keywords: behavioral intentions, marketing paradigm, neuromarketing adoption, theory of planned behavior
Procedia PDF Downloads 172868 Criteria for Good Governance in Georgian Defense Sector:Standards and Principles
Authors: Vephkhvia Grigalashvili
Abstract:
This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community.Keywords: anti-corruption policy within Georgian defense governance, conflict of interests within Georgian defense governance, good governance in Georgian defense sector, principles of integrity in Georgian defense management
Procedia PDF Downloads 162867 Impact of Social Media in Shaping Perceptions on Filipino Muslim Identity
Authors: Anna Rhodora A. Solar, Jan Emil N. Langomez
Abstract:
Social Media plays a crucial role in influencing Philippine public opinion with regard to a variety of socio-political issues. This became evident in the massacre of 44 members of the Special Action Force (SAF 44) tasked by the Philippine government to capture one of the US Federal Bureau of Investigation’s most wanted terrorists. The incident was said to be perpetrated by members of the Moro Islamic Liberation Front and the Bangsamoro Islamic Freedom Fighters. Part of the online discourse within Philippine cyberspace sparked intense debates on Filipino Muslim identity, with several Facebook viral posts linking Islam as a factor to the tragic event. Facebook is considered to be the most popular social media platform in the Philippines. As such, this begs the question of the extent to which social media, specifically Facebook, shape the perceptions of Filipinos on Filipino Muslims. This study utilizes Habermas’ theory of communicative action as it offers an explanation on how public sphere such as social media could be a network for communicating information and points of view through free and open dialogue among equal citizens to come to an understanding or common perception. However, the paper argues that communicative action which is aimed at reaching understanding free from force, and strategic action which is aimed at convincing someone through argumentation may not necessarily be mutually exclusive since reaching an understanding can also be considered as a result of convincing someone through argumentation. Moreover, actors may clash one another in their ideas before reaching common understanding, hence the presence of force. Utilizing content analysis on the Facebook posts with Islamic component that went viral after the massacre of the SAF 44, this paper argues that framing the image of Filipino Muslims through Facebook reflects both communicative and strategic actions. Moreover, comment threads on viral posts manifest force albeit implicit.Keywords: communication, Muslim, Philippines, social media
Procedia PDF Downloads 402866 Confidence Building Strategies Adopted in an EAP Speaking Course at METU and Their Effectiveness: A Case Study
Authors: Canan Duzan
Abstract:
For most language learners, mastery of the speaking skill is the proof of the mastery of the foreign language. On the other hand, the speaking skill is considered as the most difficult aspect of language learning to develop for both learners and teachers. Especially in countries like Turkey where exposure to the target language is minimum and resources and opportunities provided for language practice are scarce, teaching and learning to speak the language become a real struggle for teachers and learners alike. Data collected from students, instructors, faculty members and the business sector in needs analysis studies conducted previously at Middle East Technical University (METU) consistently revealed the need for addressing the problem of lack of confidence in speaking English. Action was taken during the design of the only EAP speaking course offered in Modern Languages Department since lack of confidence is considered to be a serious barrier for effective communication and causes learners to suffer from insecurity, uncertainty and fear. “Confidence building” served as the guiding principle in the syllabus design, nature of the tasks created for the course and the assessment procedures to help learners become more confident speakers of English. In order to see the effectiveness of the decisions made during the design phase of the course and whether students become more confident speakers upon completion of the course, a case study was carried out with 100 students at METU. A questionnaire including both Likert-Scale and open-ended items were administered to students to collect data and this data were analyzed using the SPSS program. Group interviews were also carried out to gain more insight into the effectiveness of the course in terms of building speaking confidence. This presentation will explore the specific actions taken to develop students’ confidence based on the findings of program evaluation studies and to what extent the students believe these actions to be effective in improving their confidence. The unique design of this course and strategies adopted for confidence building are highly applicable in other EAP contexts and may yield similar positive results.Keywords: confidence, EAP, speaking, strategy
Procedia PDF Downloads 401865 Effects of Indole on Aerobic Biodegradation of Butanoic Acid by Pseudomonas aeruginosa and Serratia marcescens
Authors: J. B. J. Njalam’mano, E. M. N. Chirwa
Abstract:
In low resource settings in Africa and other developing regions, pit latrines remain the dominant basic minimum acceptable form of sanitation. However, unpleasant smells-malodours emitted from faecal sludge in the pit latrines, which elicit disgusting or repulsive response, are one of the factors that thwart people to use latrines and instead opt for open defecation as an alternative. This provides an important but often overlooked major impediment, dissuading people from adopting and using the pit latrines hence affecting successful, effective sanitation promotion. The malodours are primarily attributed to four odorants: butanoic acid (C₄H₈O₂), dimethyl trisulphide (C₂H₆S₃), indole (C₈H₇N) and para-cresol (C₇H₈O). Several pit latrine deodorisation methods such as addition of carbonous materials, use of ventilation systems and urine separation are available, and they continue to occupy their niche, but social, economic, environmental and technological shortfalls remain. Bioremediation has been gaining popularity because it is inexpensive, simple to operate and environmentally friendly. Recently, the biodegradation of butanoic acid as individual odorant has been studied. However, to the best of our knowledge, there have been no kinetic studies of the butanoic acid in the presence of other key odorous compounds. In this study, a series of experiments were conducted to investigate the effects of indole on the removal of butanoic acid under aerobic conditions using indigenous bacteria strains, Pseudomonas aeruginosa, and Serratia marcescens isolated from faecal sludge as pure cultures as well as mixed cultures. In this purpose, butanoic acid removal was performed in a batch reactor containing the bacterial strains in mineral salt medium (MSM) amended with 3000 ppm of butanoic acid at the temperature of 30°C, under continuous stirring rate of 150 rpm and the concentration of indole was varied from 50-200 ppm. The initial pH of the solution was in the range of 6.0-7.2. Overall, there were significant differences in the bacterial growth rate and total butanoic acid removal dependent on the concentration of indole in the solution.Keywords: biodegradation, butanoic acid, indole, pit latrine
Procedia PDF Downloads 195864 The Rupture of Tendon Achilles During the Recreative and Sports Activities
Authors: Jasmin S. Nurkovic, Ljubisa Dj. Jovasevic, Zana C. Dolicanin, Zoran S. Bajin
Abstract:
Ruptured muscles and tendons very often must be repatriated by open operation in young persons. In young, muscles are ruptured more often than tendons, at the sane time in older persons are more exposed to rupture than muscles. Ruptured of the calcaneus are the most present of all ruptures. Sometime the rupture is complete, but very often the incomplete rupture can be noticed. During six years, from 2006 to 2012, we treated nineteen male patients and three female patients with the rupture of tendon Achilles. The youngest patient was aged thirty two, and the oldest was also managed sixty four. The youngest female patient was forty one and the oldest was forty six. One of our patients who was under corticosteroid treatment did not take any part in sport activities but she was, as she told us, going for a long walk, the same was with other two patients one man and one woman. We had nineteen male patients age 32 to 64 and three female patients age 41, 44 and 46. Conservative treatment by cast was applied in five patients and very good results were in three of them. In two patients surgical treatment failed in patient’s age 53 and 64. Only one of all patients treated by surgery had healing problems because of necrotic changes of the skin where incision was made. One of our female patients age 45 was under steroid treatment for almost 20 years because of asthmatic problems. We suggested her wearing boots with 8cm long heels by day and by night eight weeks. The final results were satisfactory and all the time she was able to work and to walk. It was the only case we had with bilateral tendon rupture. After eight weeks the cast is removed and psychiatric treatment started, patient is using crutches with partial weight bearing over a period of two weeks. Quite the same treatment conservative treatment, only the cast is not removed after two but after four weeks. Everyday activities after the surgical treatment started ten weeks and sport activities can start after fourteen to sixteen weeks. An increased activity of our patient without previous preparing for forces activity can result, as we already see, with tendon rupture. Treatment is very long and very often surgical. We find that surgical treatment resulted as safer and better solution for patients. We also had a patient with spontaneous rupture of tendon during longer walking but this patient was under prolonged corticosteroid treatment.Keywords: tendon, Achilles, rupture, sport
Procedia PDF Downloads 247863 Formulation of Hybrid Nanopowder-Molecular Ink for Fabricating Critical Material-Free Cu₂ZnSnS₄ Thin Film Solar Absorber
Authors: Anies Mutiari, Neha Bansal, Martin Artner, Veronika Mayer, Juergen Roth, Mathias Weil, Rachmat Adhi Wibowo
Abstract:
Cu₂ZnSnS₄ (CZTS) compound (mineral name kesterite) has attracted considerable interests for photovoltaic application owing to its optoelectrical properties. Moreover, its elemental abundance in Earth’s crust offers a comparative advantage for envisaged large-scale photovoltaic deployment without any material shortage issues. In this contribution, we present an innovative route to prepare CZTS solar absorber layer for photovoltaic application from low-cost and up-scalable process. CZTS layers were spin coated on the Molybdenum-coated glass from two inks composed of different solvents; dimethylsulfoxide (DMSO) and ultrapure water. Into each solvent; 0.57M CuCl₂, 0.39M ZnCl₂, 0.53M SnCl₂, and 1.85M Thiourea or Na₂S₂O₃, as well as pre-synthesized CZTS nanopowder, were added as sources of Cu, Zn, Sn and S in the ink. The crystallisation of ink into CZTS dense layers was carried out by firstly annealing the as-deposited CZTS layer in open air at 300°C for 1 minute, followed by sulfurisation at 560–620°C under atmospheric pressure for 120 minutes. Complementary electron microscopy, grazing incidence X-ray diffraction and Raman spectroscopy investigations suggest that both solvents can be used for preparing high quality and device relevant CZTS solar absorber layers. The sulphurisation crystallizes the as-deposited CZTS into highly polycrystalline CZTS layer with tetragonal structure demonstrated by the presence of tetrahedrally-shaped grains with the size of 1 µm. An advancement of the CZTS layer preparation was made by gradual substitution of volatile organic compound solvent of DMSO with ultrapure water. It is revealed that by using similar air annealing and sulphurisation process, dense and compact CZTS layers can also be fabricated from an ink with reduced volatile organic compound content.Keywords: kesterite, solar ink, spin coating, photovoltaics
Procedia PDF Downloads 171862 Exploring Emerging Viruses From a Protected Reserve
Authors: Nemat Sokhandan Bashir
Abstract:
Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.Keywords: wild, plant, novel, metagenomics
Procedia PDF Downloads 80861 Topography Effects on Wind Turbines Wake Flow
Authors: H. Daaou Nedjari, O. Guerri, M. Saighi
Abstract:
A numerical study was conducted to optimize the positioning of wind turbines over complex terrains. Thus, a two-dimensional disk model was used to calculate the flow velocity deficit in wind farms for both flat and complex configurations. The wind turbine wake was assessed using the hybrid methods that combine CFD (Computational Fluid Dynamics) with the actuator disc model. The wind turbine rotor has been defined with a thrust force, coupled with the Navier-Stokes equations that were resolved by an open source computational code (Code_Saturne V3.0 developed by EDF) The simulations were conducted in atmospheric boundary layer condition considering a two-dimensional region located at the north of Algeria at 36.74°N longitude, 02.97°E latitude. The topography elevation values were collected according to a longitudinal direction of 1km downwind. The wind turbine sited over topography was simulated for different elevation variations. The main of this study is to determine the topography effect on the behavior of wind farm wake flow. For this, the wake model applied in complex terrain needs to selects the singularity effects of topography on the vertical wind flow without rotor disc first. This step allows to determine the existence of mixing scales and friction forces zone near the ground. So, according to the ground relief the wind flow waS disturbed by turbulence and a significant speed variation. Thus, the singularities of the velocity field were thoroughly collected and thrust coefficient Ct was calculated using the specific speed. In addition, to evaluate the land effect on the wake shape, the flow field was also simulated considering different rotor hub heights. Indeed, the distance between the ground and the hub height of turbine (Hhub) was tested in a flat terrain for different locations as Hhub=1.125D, Hhub = 1.5D and Hhub=2D (D is rotor diameter) considering a roughness value of z0=0.01m. This study has demonstrated that topographical farm induce a significant effect on wind turbines wakes, compared to that on flat terrain.Keywords: CFD, wind turbine wake, k-epsilon model, turbulence, complex topography
Procedia PDF Downloads 563860 Refugee Job Seeking Opportunities: It's Not What You Know, It's Who You Know
Authors: Kimberley Kershaw, Denis Hyams-Ssekasi
Abstract:
Although there is a wealth of information about refugees and Asylum seekers, Refugee job opportunities continue to be one of the most hotly contested areas and less researched within the social sciences. Refugees are a vital asset in the society due to their experiences, skills, and competences. However, society perceives them differently, and as such, their prior lived experiences are often underutilised. This research study gleans from the work conducted during the Refugee Employment Support Clinic delivered for 12 weeks within a University setting in the North West of England. The study is conducted using three perspectives, refugees, students, and researchers, allowing for identification of the challenges encountered by the refugees concerning job opportunities. Through the utilisation of the qualitative research method, the study has found that refugees experience a wide range of issues unrelated to their skills, prior experience, and education but rather due to the red tapes connected to their legal identity labelling. Refugees struggle to build reliable employment networks that appreciate and acknowledge their capabilities and talents, impacting their ability to navigate the labour market and classism. Notably, refugees are misunderstood within their new societies, and little care is taken to understand the unique struggles they face with respect to securing paid work in their industry or field of work due to their lack of experience in the UK. Unlike other European countries, it is evident that the UK has no strategic approach to enhancing the chances of paid or voluntary work for refugees. A clinic like this provided lenses for comprehending how refugees can be better supported with employment related opportunities. By creating a safe and conducive platform for honest and open discussion about employment and through collaborative approaches with local community agencies, doors were opened for social and professional networks to be built. The study concluded that there is a need for local communities and education establishments to be more aware of the prevailing challenges and in a position to support at all stages of their asylum claim in order for the perceptions of distrust and uncertainty around refugees to be minimised.Keywords: refugees, employment, community, classism, education
Procedia PDF Downloads 95859 Ensuring Safety in Fire Evacuation by Facilitating Way-Finding in Complex Buildings
Authors: Atefeh Omidkhah, Mohammadreza Bemanian
Abstract:
The issue of way-finding earmarks a wide range of literature in architecture and despite the 50 year background of way-finding studies, it still lacks a comprehensive theory for indoor settings. Way-finding has a notable role in emergency evacuation as well. People in the panic situation of a fire emergency need to find the safe egress route correctly and in as minimum time as possible. In this regard the parameters of an appropriate way-finding are mentioned in the evacuation related researches albeit scattered. This study reviews the fire safety related literature to extract a way-finding related framework for architectural purposes of the design of a safe evacuation route. In this regard a research trend review in addition with applied methodological approaches review is conducted. Then by analyzing eight original researches related to way-finding parameters in fire evacuation, main parameters that affect way-finding in emergency situation of a fire incident are extracted and a framework was developed based on them. Results show that the issues related to exit route and emergency evacuation can be chased in task oriented studies of way-finding. This research trend aims to access a high-level framework and in the best condition a theory that has an explanatory capability to define differences in way-finding in indoor/outdoor settings, complex/simple buildings and different building types or transitional spaces. The methodological advances demonstrate the evacuation way-finding researches in line with three approaches that the latter one is the most up-to-date and precise method to research this subject: real actors and hypothetical stimuli as in evacuation experiments, hypothetical actors and stimuli as in agent-based simulations and real actors and semi-real stimuli as in virtual reality environment by adding multi-sensory simulation. Findings on data-mining of 8 sample of original researches in way-finding in evacuation indicate that emergency way-finding design of a building should consider two level of space cognition problems in the time of emergency and performance consequences of them in the built environment. So four major classes of problems in way-finding which are visual information deficiency, confusing layout configuration, improper navigating signage and demographic issues had been defined and discussed as the main parameters that should be provided with solutions in design and interior of a building. In the design phase of complex buildings, which face more reported problem in way-finding, it is important to consider the interior components regarding to the building type of occupancy and behavior of its occupants and determine components that tend to become landmarks and set the architectural features of egress route in line with the directions that they navigate people. Research on topological cognition of environmental and its effect on way-finding task in emergency evacuation is proposed for future.Keywords: architectural design, egress route, way-finding, fire safety, evacuation
Procedia PDF Downloads 174858 Exploring the Profiles of Militants in the SWAT Valley of Pakistan
Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali
Abstract:
In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants
Procedia PDF Downloads 155857 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 393856 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs
Authors: Aldona Guzik
Abstract:
Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.Keywords: experts, media, public discours, symbolic elites
Procedia PDF Downloads 129855 Simulation of a Control System for an Adaptive Suspension System for Passenger Vehicles
Authors: S. Gokul Prassad, S. Aakash, K. Malar Mohan
Abstract:
In the process to cope with the challenges faced by the automobile industry in providing ride comfort, the electronics and control systems play a vital role. The control systems in an automobile monitor various parameters, controls the performances of the systems, thereby providing better handling characteristics. The automobile suspension system is one of the main systems that ensure the safety, stability and comfort of the passengers. The system is solely responsible for the isolation of the entire automobile from harmful road vibrations. Thus, integration of the control systems in the automobile suspension system would enhance its performance. The diverse road conditions of India demand the need of an efficient suspension system which can provide optimum ride comfort in all road conditions. For any passenger vehicle, the design of the suspension system plays a very important role in assuring the ride comfort and handling characteristics. In recent years, the air suspension system is preferred over the conventional suspension systems to ensure ride comfort. In this article, the ride comfort of the adaptive suspension system is compared with that of the passive suspension system. The schema is created in MATLAB/Simulink environment. The system is controlled by a proportional integral differential controller. Tuning of the controller was done with the Particle Swarm Optimization (PSO) algorithm, since it suited the problem best. Ziegler-Nichols and Modified Ziegler-Nichols tuning methods were also tried and compared. Both the static responses and dynamic responses of the systems were calculated. Various random road profiles as per ISO 8608 standard are modelled in the MATLAB environment and their responses plotted. Open-loop and closed loop responses of the random roads, various bumps and pot holes are also plotted. The simulation results of the proposed design are compared with the available passive suspension system. The obtained results show that the proposed adaptive suspension system is efficient in controlling the maximum over shoot and the settling time of the system is reduced enormously.Keywords: automobile suspension, MATLAB, control system, PID, PSO
Procedia PDF Downloads 294854 Racial Distress in the Digital Age: A Mixed-Methods Exploration of the Effects of Social Media Exposure to Police Brutality on Black Students
Authors: Amanda M. McLeroy, Tiera Tanksley
Abstract:
The 2020 movement for Black Lives, ignited by anti-Black police brutality and exemplified by the public execution of George Floyd, underscored the dual potential of social media for political activism and perilous exposure to traumatic content for Black students. This study employs Critical Race Technology Theory (CRTT) to scrutinize algorithmic anti-blackness and its impact on Black youth's lives and educational experiences. The research investigates the consequences of vicarious exposure to police brutality on social media among Black adolescents through qualitative interviews and quantitative scale data. The findings reveal an unprecedented surge in exposure to viral police killings since 2020, resulting in profound physical, socioemotional, and educational effects on Black youth. CRTT forms the theoretical basis, challenging the notion of digital technologies as post-racial and neutral, aiming to dismantle systemic biases within digital systems. Black youth, averaging over 13 hours of daily social media use, face constant exposure to graphic images of Black individuals dying. The study connects this exposure to a range of physical, socioemotional, and mental health consequences, emphasizing the urgent need for understanding and support. The research proposes questions to explore the extent of police brutality exposure and its effects on Black youth. Qualitative interviews with high school and college students and quantitative scale data from undergraduates contribute to a nuanced understanding of the impact of police brutality exposure on Black youth. Themes of unprecedented exposure to viral police killings, physical and socioemotional effects, and educational consequences emerge from the analysis. The study uncovers how vicarious experiences of negative police encounters via social media lead to mistrust, fear, and psychosomatic symptoms among Black adolescents. Implications for educators and counselors are profound, emphasizing the cultivation of empathy, provision of mental health support, integration of media literacy education, and encouragement of activism. Recognizing family and community influences is crucial for comprehensive support. Professional development opportunities in culturally responsive teaching and trauma-informed approaches are recommended for educators. In conclusion, creating a supportive educational environment that addresses the emotional impact of social media exposure to police brutality is crucial for the well-being and development of Black adolescents. Counselors, through safe spaces and collaboration, play a vital role in supporting Black youth facing the distressing effects of social media exposure to police brutality.Keywords: black youth, mental health, police brutality, social media
Procedia PDF Downloads 54853 Efficient Computer-Aided Design-Based Multilevel Optimization of the LS89
Authors: A. Chatel, I. S. Torreguitart, T. Verstraete
Abstract:
The paper deals with a single point optimization of the LS89 turbine using an adjoint optimization and defining the design variables within a CAD system. The advantage of including the CAD model in the design system is that higher level constraints can be imposed on the shape, allowing the optimized model or component to be manufactured. However, CAD-based approaches restrict the design space compared to node-based approaches where every node is free to move. In order to preserve a rich design space, we develop a methodology to refine the CAD model during the optimization and to create the best parameterization to use at each time. This study presents a methodology to progressively refine the design space, which combines parametric effectiveness with a differential evolutionary algorithm in order to create an optimal parameterization. In this manuscript, we show that by doing the parameterization at the CAD level, we can impose higher level constraints on the shape, such as the axial chord length, the trailing edge radius and G2 geometric continuity between the suction side and pressure side at the leading edge. Additionally, the adjoint sensitivities are filtered out and only smooth shapes are produced during the optimization process. The use of algorithmic differentiation for the CAD kernel and grid generator allows computing the grid sensitivities to machine accuracy and avoid the limited arithmetic precision and the truncation error of finite differences. Then, the parametric effectiveness is computed to rate the ability of a set of CAD design parameters to produce the design shape change dictated by the adjoint sensitivities. During the optimization process, the design space is progressively enlarged using the knot insertion algorithm which allows introducing new control points whilst preserving the initial shape. The position of the inserted knots is generally assumed. However, this assumption can hinder the creation of better parameterizations that would allow producing more localized shape changes where the adjoint sensitivities dictate. To address this, we propose using a differential evolutionary algorithm to maximize the parametric effectiveness by optimizing the location of the inserted knots. This allows the optimizer to gradually explore larger design spaces and to use an optimal CAD-based parameterization during the course of the optimization. The method is tested on the LS89 turbine cascade and large aerodynamic improvements in the entropy generation are achieved whilst keeping the exit flow angle fixed. The trailing edge and axial chord length, which are kept fixed as manufacturing constraints. The optimization results show that the multilevel optimizations were more efficient than the single level optimization, even though they used the same number of design variables at the end of the multilevel optimizations. Furthermore, the multilevel optimization where the parameterization is created using the optimal knot positions results in a more efficient strategy to reach a better optimum than the multilevel optimization where the position of the knots is arbitrarily assumed.Keywords: adjoint, CAD, knots, multilevel, optimization, parametric effectiveness
Procedia PDF Downloads 110852 The Emergence of Construction Mafia in South Africa: The Implication on the Construction Industry
Authors: Thandokazi Nyangiwe, Christopher Amoah, Charles P. Mukumba
Abstract:
The South African construction sector is threatened by emerging black business forums called construction mafias. The emergence of the construction mafia has culminated in the disruptions and abandonment of construction sites resulting in the loss of jobs for construction workers. The paper examines the origin of construction mafias and their impact on the construction sector, including the potential ways to cope with their operations. A qualitative research approach was adopted for this study using open-ended interview questions to gather information from 30 key construction industry stakeholders, including contractors, subcontractors, consultants, and the construction project communities. Content and thematic analysis were used to analyse the data collected. The findings suggest that most participants do not fully understand the existence and operations of construction mafias in the construction industry. Construction mafias claim to be part of the local business forums. They disrupt construction projects and demand a certain amount, usually 30% of the construction value. Construction mafias frequently resort to intimidation and violence if their demands are unmet. Their operations have resulted in delayed completion of construction projects, abandonment of projects, and loss of income for the contractor and jobs for the construction workers. The interviews were limited to construction stakeholders. Because of the nature of the mafias’ operations, they could not be accessed for interviews for fear of being identified because of the connotation attached to their role as construction mafias. Construction project owners face disruptions of projects resulting in loss of equipment, materials, and income. Therefore, there is a need to sensitise the construction stakeholders in the construction industry regarding the existence and operations of the construction mafia and the implications on construction project performance and delivery. The findings will give insight into the operations of the construction mafias in the South African construction industry, which has caused disruptions in construction project sites. Stakeholders must find solutions to address the construction mafias’ disruptive actions on construction projects. The study presents an initial inquiry that will come up with how to manage and cope with the growing operations of construction mafias in the South African construction industry.Keywords: black business forums, construction mafia, emergence, implication
Procedia PDF Downloads 134851 A Radioprotective Effect of Nanoceria (CNPs), Magnetic Flower-Like Iron Oxide Microparticles (FIOMPs), and Vitamins C and E on Irradiated BSA Protein
Authors: Hajar Zarei, AliAkbar Zarenejadatashgah, Vuk Uskoković, Hiroshi Watabe
Abstract:
The reactive oxygen species (ROS) generated by radiation in nuclear diagnostic imaging and radiotherapy could damage the structure of the proteins in noncancerous cells surrounding the tumor. The critical factor in many age-related diseases, such as Alzheimer, Parkinson, or Huntington diseases, is the oxidation of proteins by the ROS as molecular triggers of the given pathologies. Our studies by spectroscopic experiments showed doses close to therapeutic ones (1 to 5 Gy) could lead to changes of secondary and tertiary structures in BSA protein macromolecule as a protein model as well as the aggregation of polypeptide chain but without the fragmentation. For this reason, we investigated the radioprotective effects of natural (vitamin C and E) and synthetic materials (CNPs and FIOMPs) on the structural changes in BSA protein induced by gamma irradiation at a therapeutic dose (3Gy). In the presence of both vitamins and synthetic materials, the spectroscopic studies revealed that irradiated BSA was protected from the structural changes caused by ROS, according to in vitro research. The radioprotective property of CNPs and FIOMPs arises from enzyme mimetic activities (catalase, superoxide dismutase, and peroxidase) and their antioxidant capability against hydroxyl radicals. In the case of FIOMPs, a porous structure also leads to increased ROS recombination with each other in the same radiolytic track and subsequently decreased encounters with BSA. The hydrophilicity of vitamin C resulted in the major scavenging of ROS in the solvent, whereas hydrophobic vitamin E localized on the nonpolar patches of the BSA surface, where it did not only neutralize them thanks to the moderate BSA binding constant but also formed a barrier for diffusing ROS. To the best of our knowledge, there has been a persistent lack of studies investigating the radioactive effect of mentioned materials on proteins. Therefore, the results of our studies can open a new widow for application of these common dietary ingredients and new synthetic NPs in improving the safety of radiotherapy.Keywords: reactive oxygen species, spectroscopy, bovine serum albumin, gamma radiation, radioprotection
Procedia PDF Downloads 86850 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.Keywords: cyber security, vulnerability detection, neural networks, feature extraction
Procedia PDF Downloads 89849 Investigating Legal Consciousness Among Migrants in Greece: A Study of Migrant’s Views of Hate Crime and their Legal Rights
Authors: Violeta Kapageorgiadou
Abstract:
Over the past decade, millions of individuals from middle-eastern and African countries have migrated to Europe to seek refuge. The majority of these refugees emigrate from Muslim majority countries and seek to integrate into European societies. Notably, Greece has hosted thousands of individuals seeking asylum since 2015. Many of these individuals have applied for asylum. They have sought to integrate into the Greek society and to navigate their way through the national and European legal systems with regard to their status. This paper, drawn from a PhD thesis project, focuses on the legal consciousness of migrants and the processes open to asylum seekers to assert their rights, notably with regard to incidents of hate crime and including their interactions with the legal authorities in Greece. The research seeks to capture the factors that influence the views and behaviors of migrants towards the law and their legal rights, using legal consciousness as a theoretical framework. The research findings indicate that asylum seekers have developed a multidimensional legal consciousness influenced by their religious and political background, legal knowledge, previous (negative) experiences with the legal system and their socio-economic status in Greece. Asylum seekers, while aware of the rights essential for their survival in the host country (such as applying for asylum to obtain a secure status, claiming for benefits and housing), were unaware of, and less willing to engage with, legal authorities and rights which they did not find essential for their survival. They viewed hate incidents against them as less important, not worth reporting and sometimes did not even consider these incidents as crimes. The research suggests that asylum seekers in Greece are a vulnerable population who need mechanisms to support them and raise their legal consciousness around their rights in order to better integrate, develop and thrive in the host society. Moving forwards, a better understanding of refugees' and asylum seekers’ reactions towards hate crime will help to create future policies and support mechanisms that could improve the lives of these individuals.Keywords: hate crime, legal consciousness, legal rights, migrations
Procedia PDF Downloads 222848 The Role of Middle Managers SBU's in Context of Change: Sense-Making Approach
Authors: Hala Alioua, Alberic Tellier
Abstract:
This paper is designed to spotlight the research on corporate strategic planning, by emphasizing the role of middle manager of SBU’s and related issues such as the context of vision change. Previous research on strategic vision has been focused principally at the SME, with relatively limited consideration given to the role of middle managers SBU’s in the context of change. This project of research has been done by using a single case study. We formulated through our immersion for 2.5 years on the ground and by a qualitative method and abduction approach. This entity that we analyze is a subsidiary of multinational companies headquartered in Germany, specialized in manufacturing automotive equipment. The "Delta Company" is a French manufacturing plant that has undergone numerous changes over the past three years. The two major strategic changes that have a significant impact on the Delta plant are the strengths of its core business through « lead plant strategy» in 2011 and the implementation of a new strategic vision in 2014. These consecutive changes impact the purpose of the mission of the middle managers. The plant managers ask the following questions: How the middle managers make sense of the corporate strategic planning imposed by the parent company? How they appropriate the new vision and decline it into actions on the ground? We chose the individual interview technique through open-ended questions as the source of data collection. We first of all carried out an exploratory approach by interviewing 8 members of the Management committee’s decision and 19 heads of services. The first findings and results show that exist a divergence of opinion and interpretations of the corporate strategic planning among organization members and there are difficulties to make sense and interpretations of the signals of the environment. The lead plant strategy enables new projects which insure the workload of Delta Company. Nevertheless, it creates a tension and stress among the middle managers because its provoke lack of resources to the detriment of their main jobs as manufacturer plant. The middle managers does not have a clear vision and they are wondering if the new strategic vision means more autonomy and less support from the group.Keywords: change, middle managers, vision, sensemaking
Procedia PDF Downloads 401847 Poly(L-Lactic Acid) Scaffolds for Bone Tissue Engineering
Authors: Aleksandra BužArovska, Gordana Bogoeva Gaceva
Abstract:
Biodegradable polymers have received significant scientific attention in tissue engineering (TE) application, in particular their composites consisting of inorganic nanoparticles. In the last 15 years, they are subject of intensive research by many groups, aiming to develop polymer scaffolds with defined biodegradability, porosity and adequate mechanical stability. The most important characteristic making these materials attractive for TE is their biodegradability, a process that could be time controlled and long enough to enable generation of a new tissue as a replacement for the degraded polymer scaffold. In this work poly(L-lactic acid) scaffolds, filled with TiO2 nanoparticles functionalized with oleic acid, have been prepared by thermally induced phase separation method (TIPS). The functionalization of TiO2 nanoparticles with oleic acid was performed in order to improve the nanoparticles dispersibility within the polymer matrix and at the same time to inhibit the cytotoxicity of the nanofiller. The oleic acid was chosen as amphiphilic molecule belonging to the fatty acid family because of its non-toxicity and possibility for mediation between the hydrophilic TiO2 nanoparticles and hydrophobic PLA matrix. The produced scaffolds were characterized with thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), scanning electron microscopy (SEM) and mechanical compression measurements. The bioactivity for bone tissue engineering application was tested in supersaturated simulated body fluid. The degradation process was followed by Fourier transform infrared spectroscopy (FTIR). The results showed anisotropic morphology with elongated open pores (100 µm), high porosity (around 92%) and perfectly dispersed nanofiller. The compression moduli up to 10 MPa were identified independent on the nanofiller content. Functionalized TiO2 nanoparticles induced formation of hydroxyapatite clusters as much as unfunctionalized TiO2. The prepared scaffolds showed properties ideal for scaffold vascularization, cell attachment, growth and proliferation.Keywords: biodegradation, bone tissue engineering, mineralization, PLA scaffolds
Procedia PDF Downloads 269846 Structural Correlates of Reduced Malicious Pleasure in Huntington's Disease
Authors: Sandra Baez, Mariana Pino, Mildred Berrio, Hernando Santamaria-Garcia, Lucas Sedeno, Adolfo Garcia, Sol Fittipaldi, Agustin Ibanez
Abstract:
Schadenfreude refers to the perceiver’s experience of pleasure at another’s misfortune. This is a multidetermined emotion which can be evoked by hostile feelings and envy. The experience of Schadenfreude engages mechanisms implicated in diverse social cognitive processes. For instance, Schadenfreude involves heightened reward processing, accompanied by increased striatal engagement and it interacts with mentalizing and perspective-taking abilities. Patients with Huntington's disease (HD) exhibit reductions of Schadenfreude experience, suggesting a role of striatal degeneration in such an impairment. However, no study has directly assessed the relationship between regional brain atrophy in HD and reduced Schadenfreude. This study investigated whether gray matter (GM) atrophy in HD patients correlates with ratings of Schadenfreude. First, we compared the performance of 20 HD patients and 23 controls on an experimental task designed to trigger Schadenfreude and envy (another social emotion acting as a control condition). Second, we compared GM volume between groups. Third, we examined brain regions where atrophy might be associated with specific impairments in the patients. Results showed that while both groups showed similar ratings of envy, HD patients reported lower Schadenfreude. The latter pattern was related to atrophy in regions of the reward system (ventral striatum) and the mentalizing network (precuneus and superior parietal lobule). Our results shed light on the intertwining of reward and socioemotional processes in Schadenfreude, while offering novel evidence about their neural correlates. In addition, our results open the door to future studies investigating social emotion processing in other clinical populations characterized by striatal or mentalizing network impairments (e.g., Parkinson’s disease, schizophrenia, autism spectrum disorders).Keywords: envy, Gray matter atrophy, Huntigton's disease, Schadenfreude, social emotions
Procedia PDF Downloads 335845 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 354