Search results for: security analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29098

Search results for: security analysis

25438 The Impact of Artificial Intelligence on Sustainable Architecture and Urban Design

Authors: Alfons Aziz Asaad Hozain

Abstract:

The goal of sustainable architecture is to design buildings that have the least negative impact on the environment and provide better conditions for people. What forms of development enhance the area? This question was asked at the Center for the Study of Spatial Development and Building Forms in Cambridge in the late 1960s. This has resulted in many influential articles that have had a profound impact on the practice of urban planning. This article focuses on the sustainability outcomes caused by the climatic conditions of traditional Iranian architecture in hot and dry regions. Since people spend a lot of time at home, it is very important that these homes meet their physical and spiritual needs as well as the cultural and religious aspects of their lifestyle. In a country as large as Iran with different climates, traditional builders have put forward a number of logical solutions to ensure human comfort. With these solutions, the environmental problems of the have long been solved. Taking into account the experiences of traditional architecture in Iran's hot and dry climate, sustainable architecture can be achieved.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 57
25437 Water Quality at a Ventilated Improved Pit Latrine Sludge Entrenchment Site

Authors: Babatunde Femi Bakare

Abstract:

Groundwater quality was evaluated at a site for three years after the site was used for entrenchment of Ventilated Improved Pit (VIP) latrine sludge. Analysis performed on the soil characteristics at the entrenchment site indicated that, the soils at the entrenchment site are predominantly sandy. Depth of the water table at the entrenchment site was found to be approximately five meters. Five monitoring boreholes were dug along the perimeter of the sludge trenches and water samples taken from these monitoring boreholes were analyzed for pH, conductivity, sodium ions, chloride ions, phosphate, nitrate, ammonia, and bacteriological analysis. The results obtained from the analysis conducted were compared with the South African Bureau of Standards for drinking water and it was found that the parameters analyzed falls below the specified range. The data obtained from this study indicate that, given the relatively high sludge loading rates, poor soil quality, and the duration of the groundwater quality monitoring, it is unlikely that contamination of groundwater at the entrenchment site will be a major concern. However, caution is advised in extrapolating these results to other locations.

Keywords: boreholes, contamination, entrenchment, groundwater quality, VIP latrines

Procedia PDF Downloads 398
25436 A Survey and Analysis on Inflammatory Pain Detection and Standard Protocol Selection Using Medical Infrared Thermography from Image Processing View Point

Authors: Mrinal Kanti Bhowmik, Shawli Bardhan Jr., Debotosh Bhattacharjee

Abstract:

Human skin containing temperature value more than absolute zero, discharges infrared radiation related to the frequency of the body temperature. The difference in infrared radiation from the skin surface reflects the abnormality present in human body. Considering the difference, detection and forecasting the temperature variation of the skin surface is the main objective of using Medical Infrared Thermography(MIT) as a diagnostic tool for pain detection. Medical Infrared Thermography(MIT) is a non-invasive imaging technique that records and monitors the temperature flow in the body by receiving the infrared radiated from the skin and represent it through thermogram. The intensity of the thermogram measures the inflammation from the skin surface related to pain in human body. Analysis of thermograms provides automated anomaly detection associated with suspicious pain regions by following several image processing steps. The paper represents a rigorous study based survey related to the processing and analysis of thermograms based on the previous works published in the area of infrared thermal imaging for detecting inflammatory pain diseases like arthritis, spondylosis, shoulder impingement, etc. The study also explores the performance analysis of thermogram processing accompanied by thermogram acquisition protocols, thermography camera specification and the types of pain detected by thermography in summarized tabular format. The tabular format provides a clear structural vision of the past works. The major contribution of the paper introduces a new thermogram acquisition standard associated with inflammatory pain detection in human body to enhance the performance rate. The FLIR T650sc infrared camera with high sensitivity and resolution is adopted to increase the accuracy of thermogram acquisition and analysis. The survey of previous research work highlights that intensity distribution based comparison of comparable and symmetric region of interest and their statistical analysis assigns adequate result in case of identifying and detecting physiological disorder related to inflammatory diseases.

Keywords: acquisition protocol, inflammatory pain detection, medical infrared thermography (MIT), statistical analysis

Procedia PDF Downloads 332
25435 Football Chants in Israel: Persistent Values and Changing Trends

Authors: Ilan Tamir

Abstract:

Fans’ chants in sports stadium have, over the years, become an integral part of the spectator experience. While chants add color, atmosphere, and a demonstration of fans’ support for their team, chants also play a significant role in defining fans’ perceptions of their team’s identity and its differentiation from other teams. An analysis of football chants may therefore shed light on fans’ deep-seated worldviews of their own role, their team, the sport in general, and even life itself. This study, based on an analysis of Israeli football chants over years, identifies key changing and stable perceptions of football fans. Overall 94 chants collected, over a period of five decades. After a pilot study, the chants organized in two groups (one covering 1970-1999 and the other 2000-2016). The chants analyzed through qualitative content analysis in order to understand fans values as a reflection of the society. Findings point to several values that have remained stable over years, including fans’ attitudes toward their team and its rivals, and their attitude toward God. On the other hand, recently emerging phenomena such as radicalization of hatred toward the commercialization of sport reflect social and cultural changes, both in and outside the world of sport.

Keywords: sport, fans, chants, soccer

Procedia PDF Downloads 157
25434 Potentials and Impediments in the Development of Ikeji Festival for Cultural Tourism

Authors: Ifegbo Lawrencia Ifegbo

Abstract:

Nigeria is a country with many ethnic groups and therefore endowed with festival of different types and nature, yet no concerted effort is committed towards their development for cultural tourism. This paper assessed the adequacy of tourism potential of the festivals, and most importantly investigated the impediments surrounding their non-development. Ikeji, a masquerade festival of the people of Arondizuogu clan in Imo State of Nigeria was selected for the study. Ethnographic research using observer-as-participant technique was used for conducting the study. This was supplemented by focused group discussion (FGD), key informant and unstructured interviews. The result revealed that there exist so much potentials like masquerading, cultural dances, native and highlife music, drumming, role reversals and traditional dishes in the festival. It was further deduced that poor supply of amenities and infrastructural facilities, insecurity of life, lack of trained indigenous experts in tourism, lack of awareness and publicity for the festival on the part of the host communities were responsible for the non-development into tourism destinations. The implication of this is that unless the government resolves to provide the needed resources for the development of the enormous festivals, and restores security and peace in the country, cultural tourism will rarely thrive in Nigeria.

Keywords: festivals, cultural tourism, tourism potential, cultural resources, tourism development

Procedia PDF Downloads 322
25433 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 595
25432 A Unified Approach for Digital Forensics Analysis

Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghite, Stavros Shiaeles

Abstract:

Digital forensics has become an essential tool in the investigation of cyber and computer-assisted crime. Arguably, given the prevalence of technology and the subsequent digital footprints that exist, it could have a significant role across almost all crimes. However, the variety of technology platforms (such as computers, mobiles, Closed-Circuit Television (CCTV), Internet of Things (IoT), databases, drones, cloud computing services), heterogeneity and volume of data, forensic tool capability, and the investigative cost make investigations both technically challenging and prohibitively expensive. Forensic tools also tend to be siloed into specific technologies, e.g., File System Forensic Analysis Tools (FS-FAT) and Network Forensic Analysis Tools (N-FAT), and a good deal of data sources has little to no specialist forensic tools. Increasingly it also becomes essential to compare and correlate evidence across data sources and to do so in an efficient and effective manner enabling an investigator to answer high-level questions of the data in a timely manner without having to trawl through data and perform the correlation manually. This paper proposes a Unified Forensic Analysis Tool (U-FAT), which aims to establish a common language for electronic information and permit multi-source forensic analysis. Core to this approach is the identification and development of forensic analyses that automate complex data correlations, enabling investigators to investigate cases more efficiently. The paper presents a systematic analysis of major crime categories and identifies what forensic analyses could be used. For example, in a child abduction, an investigation team might have evidence from a range of sources including computing devices (mobile phone, PC), CCTV (potentially a large number), ISP records, and mobile network cell tower data, in addition to third party databases such as the National Sex Offender registry and tax records, with the desire to auto-correlate and across sources and visualize in a cognitively effective manner. U-FAT provides a holistic, flexible, and extensible approach to providing digital forensics in technology, application, and data-agnostic manner, providing powerful and automated forensic analysis.

Keywords: digital forensics, evidence correlation, heterogeneous data, forensics tool

Procedia PDF Downloads 178
25431 Physicochemical Profile of Essential Oil of Daucus carota

Authors: Nassima Behidj-Benyounes, Thoraya Dahmene

Abstract:

Essential oils have a significant antimicrobial activity. These oils can successfully replace the antibiotics. So, the microorganisms show their inefficiencies resistant for the antibiotics. For this reason, we study the physic-chemical analysis and antimicrobial activity of the essential oil of Daucus carota. The extraction is done by steam distillation of water which brought us a very significant return of 4.65%. The analysis of the essential oil is performed by GC/MS and has allowed us to identify 32 compounds in the oil of D. carota flowering tops of Bouira. Three of which are in the majority are the α-pinene (22.3%), the carotol (21.7%) and the limonene (15.8%).

Keywords: daucus carota, essential oil, α-pinene, carotol, limonene

Procedia PDF Downloads 372
25430 Additive Weibull Model Using Warranty Claim and Finite Element Analysis Fatigue Analysis

Authors: Kanchan Mondal, Dasharath Koulage, Dattatray Manerikar, Asmita Ghate

Abstract:

This paper presents an additive reliability model using warranty data and Finite Element Analysis (FEA) data. Warranty data for any product gives insight to its underlying issues. This is often used by Reliability Engineers to build prediction model to forecast failure rate of parts. But there is one major limitation in using warranty data for prediction. Warranty periods constitute only a small fraction of total lifetime of a product, most of the time it covers only the infant mortality and useful life zone of a bathtub curve. Predicting with warranty data alone in these cases is not generally provide results with desired accuracy. Failure rate of a mechanical part is driven by random issues initially and wear-out or usage related issues at later stages of the lifetime. For better predictability of failure rate, one need to explore the failure rate behavior at wear out zone of a bathtub curve. Due to cost and time constraints, it is not always possible to test samples till failure, but FEA-Fatigue analysis can provide the failure rate behavior of a part much beyond warranty period in a quicker time and at lesser cost. In this work, the authors proposed an Additive Weibull Model, which make use of both warranty and FEA fatigue analysis data for predicting failure rates. It involves modeling of two data sets of a part, one with existing warranty claims and other with fatigue life data. Hazard rate base Weibull estimation has been used for the modeling the warranty data whereas S-N curved based Weibull parameter estimation is used for FEA data. Two separate Weibull models’ parameters are estimated and combined to form the proposed Additive Weibull Model for prediction.

Keywords: bathtub curve, fatigue, FEA, reliability, warranty, Weibull

Procedia PDF Downloads 59
25429 A Postcolonial View Analysis on the Structural Rationalism Influence in Indonesian Modern Architecture

Authors: Ryadi Adityavarman

Abstract:

The study is an analysis by using the postcolonial theoretical lens on the search for a distinctive architectural identity by architect Maclaine Pont in Indonesia in the early twentieth century. Influenced by progressive architectural thinking and enlightened humanism at the time, Pont applied the fundamental principles of Structural Rationalism by using a creative combination of traditional Indonesian architectural typology and innovative structural application. The interpretive design strategy also celebrated creative use of local building materials with sensible tropical climate design response. Moreover, his holistic architectural scheme, including inclusion of local custom of building construction, represents the notion of Gesamkunstwerk. By using such hybrid strategy, Maclaine Pont intended to preserve the essential cultural identity and vernacular architecture of the indigenous. The study will chronologically investigate the evolution of Structural Rationalism architecture philosophy of Viollet-le-Duc to Hendrik Berlage’s influential design thinking in the Dutch modern architecture, and subsequently to the Maclaine Pont’s innovative design in Indonesia. Consequently, the morphology analysis on his exemplary design works of ITB campus (1923) and Pohsarang Church (1936) is to understand the evolutionary influence of Structural Rationalism theory. The postmodern analysis method is to highlight the validity of Pont’s idea in the contemporary Indonesian architecture within the culture of globalism era.

Keywords: Indonesian modern architecture, postcolonial, structural rationalism, critical regionalism

Procedia PDF Downloads 319
25428 Sensitivity Analysis Optimization of a Horizontal Axis Wind Turbine from Its Aerodynamic Profiles

Authors: Kevin Molina, Daniel Ortega, Manuel Martinez, Andres Gonzalez-Estrada, William Pinto

Abstract:

Due to the increasing environmental impact, the wind energy is getting strong. This research studied the relationship between the power produced by a horizontal axis wind turbine (HAWT) and the aerodynamic profiles used for its construction. The analysis is studied using the Computational Fluid Dynamic (CFD), presenting the parallel between the energy generated by a turbine designed with selected profiles and another one optimized. For the study, a selection process was carried out from profile NACA 6 digits recommended by the National Renewable Energy Laboratory (NREL) for the construction of this type of turbines. The selection was taken into account different characteristics of the wind (speed and density) and the profiles (aerodynamic coefficients Cl and Cd to different Reynolds and incidence angles). From the selected profiles, was carried out a sensitivity analysis optimization process between its geometry and the aerodynamic forces that are induced on it. The 3D model of the turbines was realized using the Blade Element Momentum method (BEM) and both profiles. The flow fields on the turbines were simulated, obtaining the forces induced on the blade, the torques produced and an increase of 3% in power due to the optimized profiles. Therefore, the results show that the sensitivity analysis optimization process can assist to increment the wind turbine power.

Keywords: blade element momentum, blade, fluid structure interaction, horizontal axis wind turbine, profile design

Procedia PDF Downloads 249
25427 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 365
25426 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 195
25425 Structure Function and Violation of Scale Invariance in NCSM: Theory and Numerical Analysis

Authors: M. R. Bekli, N. Mebarki, I. Chadou

Abstract:

In this study, we focus on the structure functions and violation of scale invariance in the context of non-commutative standard model (NCSM). We find that this violation appears in the first order of perturbation theory and a non-commutative version of the DGLAP evolution equation is deduced. Numerical analysis and comparison with experimental data imposes a new bound on the non-commutative parameter.

Keywords: NCSM, structure function, DGLAP equation, standard model

Procedia PDF Downloads 604
25424 Finding Related Scientific Documents Using Formal Concept Analysis

Authors: Nadeem Akhtar, Hira Javed

Abstract:

An important aspect of research is literature survey. Availability of a large amount of literature across different domains triggers the need for optimized systems which provide relevant literature to researchers. We propose a search system based on keywords for text documents. This experimental approach provides a hierarchical structure to the document corpus. The documents are labelled with keywords using KEA (Keyword Extraction Algorithm) and are automatically organized in a lattice structure using Formal Concept Analysis (FCA). This groups the semantically related documents together. The hierarchical structure, based on keywords gives out only those documents which precisely contain them. This approach open doors for multi-domain research. The documents across multiple domains which are indexed by similar keywords are grouped together. A hierarchical relationship between keywords is obtained. To signify the effectiveness of the approach, we have carried out the experiment and evaluation on Semeval-2010 Dataset. Results depict that the presented method is considerably successful in indexing of scientific papers.

Keywords: formal concept analysis, keyword extraction algorithm, scientific documents, lattice

Procedia PDF Downloads 318
25423 Factor Analysis Based on Semantic Differential of the Public Perception of Public Art: A Case Study of the Malaysia National Monument

Authors: Yuhanis Ibrahim, Sung-Pil Lee

Abstract:

This study attempts to address factors that contribute to outline public art factors assessment, memorial monument specifically. Memorial monuments hold significant and rich message whether the intention of the art is to mark and commemorate important event or to inform younger generation about the past. Public monument should relate to the public and raise awareness about the significant issue. Therefore, by investigating the impact of the existing public memorial art will hopefully shed some lights to the upcoming public art projects’ stakeholders to ensure the lucid memorial message is delivered to the public directly. Public is the main actor as public is the fundamental purpose that the art was created. Perception is framed as one of the reliable evaluation tools to assess the public art impact factors. The Malaysia National Monument was selected to be the case study for the investigation. The public’s perceptions were gathered using a questionnaire that involved (n-115) participants to attain keywords, and next Semantical Differential Methodology (SDM) was adopted to evaluate the perceptions about the memorial monument. These perceptions were then measured with Reliability Factor and then were factorised using Factor Analysis of Principal Component Analysis (PCA) method to acquire concise factors for the monument assessment. The result revealed that there are four factors that influence public’s perception on the monument which are aesthetic, audience, topology, and public reception. The study concludes by proposing the factors for public memorial art assessment for the next future public memorial projects especially in Malaysia.

Keywords: factor analysis, public art, public perception, semantical differential methodology

Procedia PDF Downloads 490
25422 The Influence of the Vocational Teachers Empowerment toward the Vocational High Schools’ Performance Based on the Education National Standards of Indonesia

Authors: Abdul Haris Setiawan

Abstract:

Teachers empowerment is one of the important factors considered to contribute significantly to the achievement of the national education goals. This study was conducted to determine the influence on the vocational teachers empowerment toward the performance of the vocational high schools based on the Education National Standards of Indonesia. The population of the study was all vocational teachers at the State Vocational High schools in Surakarta, Central Java Province, Indonesia. The sampling technique used proportional random sampling technique. This study used a quantitative descriptive statistical analysis techniques. The data was collected using questionnaires. The data has been collected and then tested using analysis requirements test. Having tested using the requirements analysis and then the data processed using regression analysis between the independent and dependent variables to determine the effect and the regression equation. The results of the study found that the level of vocational high schools’ performance based on the Education National Standards of Indonesia was 74.29%, including in the high category; the level of vocational teachers empowerment was 76.20%, including in the high category; there was a positive influence of vocational teachers empowerment toward the vocational high schools’ performance based on the Education National Standards of Indonesia with a correlation coefficient of 0,886, and a contribution of 78.50% with the regression equation Y = 79.431 +0.534 X.

Keywords: vocational teachers, empowerment, vocational high school, the education national standards

Procedia PDF Downloads 386
25421 A Financial Analysis of the Current State of IKEA: A Case Study

Authors: Isabela Vieira, Leonor Carvalho Garcez, Adalmiro Pereira, Tânia Teixeira

Abstract:

In the present work, we aim to analyse IKEA as a company, by focusing on its development, financial analysis and future benchmarks, as well as applying some of the knowledge learned in class, namely hedging and other financial risk mitigation solutions, to understand how IKEA navigates and protects itself from risk. The decision that led us to choose IKEA for our casework has to do with the long history of the company since the 1940s and its high internationalization in 63 different markets. The company also has clear financial reports which aided us in the making of the present essay and naturally, was a factor that contributed to our decision.

Keywords: Ikea, financial risk, risk management, hedge

Procedia PDF Downloads 30
25420 Women Empowerment, Joint Income Ownership and Planning for Building Household Resilience on Climate Change: The Case of Kilimanjaro Region, Tanzania

Authors: S. I. Mwasha, Z. Robinson, M. Musgrave

Abstract:

Communities, especially in the global south, have been reported to have low adaptive capacity to cope with climate change impacts. As an attempt to improve adaptive capacity, most studies have focused on understanding the access of the household resources which can contribute to resilience against changes. However, little attention has been shown in uncovering how the household resources could be used and their implications to resilience against weather related shocks. By using a case study qualitative study, this project analyzed the trends in livelihoods practices and their implication to social equity. The study was done in three different villages within Kilimanjaro region. Each in different agro ecological zone. Two focus group discussions in two agro-ecological zones were done, one for women and another one for men except in the third zone where focus group participant were combined together (due to unforeseen circumstances). In the focus group discussion, several participatory rural appraisal tools were used to understand trend in crops and animal production and the use in which it is made: climate trends, soil fertility, trees and other livelihoods resources. Data were analyzed using thematic network analysis. Using an amalgam of magnitude (to note weather comments made were positive or negative) and descriptive coding (to note the topic), six basic themes were identified under social equity: individual ownership, family ownership, love and respect, women no education, women access to education as well as women access to loans. The results implied that despite mum and dad in the family providing labor in the agro pastoral activities, there were separations on who own what, as well as individual obligations in the family. Dad owned mostly income creating crops and mum, food crops. therefore, men controlled the economy which made some of them become arrogant and spend money to meet their interests sometimes not taking care of the family. Separation in ownership was reported to contribute to conflicts in the household as well as causing controversy on the use income is spent. Men were reported to use income to promote matriarchy system. However, as women were capacitated through access to education and loans they become closer to their husband and get access to own and plan the income together for the interest of the family. Joint ownership and planning on the household resources were reported to be important if families have to better adapt to climate change. The aim of this study is not to show women empowerment and joint ownership and planning as only remedy for low adaptive capacity. There is the need to understand other practices that either directly or indirectly impacts environmental integrity, food security and economic development for household resilience against changing climate.

Keywords: adaptive capacity, climate change, resilience, women empowerment

Procedia PDF Downloads 155
25419 Radium Equivalent and External Hazard Indices of Trace Elements Concentrations in Aquatic Species by Neutron Activation Analysis (NAA) and Inductively Coupled Plasma Mass Spectrometry (ICP-MS)

Authors: B. G. Muhammad, S. M. Jafar

Abstract:

Neutron Activation Analysis (NAA) and Inductively Coupled Plasma Mass Spectrometry (ICP-MS) were employed to analyze the level of trace elements concentrations in sediment samples and their bioaccumulation in some aquatic species selected randomly from surface water resources in the Northern peninsula of Malaysia. The NAA results of the sediment samples indicated a wide range in concentration of different elements were observed. Fe, K, and Na were found to have major concentration values that ranges between 61,000 ± 1400 to 4,500 ± 100 ppm, 20100±1000 to 3100±600 and 3,100±600 and 200±10 ppm, respectively. Traces of heavy metals with much more contamination health concern, such as Cr and As, were also identified in many of the samples analyzed. The average specific activities of 40K, 232Th and 226Ra in soil and the corresponding radium equivalent activity and the external hazard index were all found to be lower than the maximum permissible limits (370 Bq kg-1 and 1).

Keywords: external hazard index, Neutron Activation Analysis, radium equivalent, trace elements concentrations

Procedia PDF Downloads 410
25418 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 74
25417 Prevalence of Hepatitis B Virus Infection and Its Determinants among Pregnant Women in East Africa: Systematic Review and Meta-Analysis

Authors: Bantie Getnet Yirsaw, Muluken Chanie Agimas, Gebrie Getu Alemu, Tigabu Kidie Tesfie, Nebiyu Mekonnen Derseh, Habtamu Wagnew Abuhay, Meron Asmamaw Alemayehu, Getaneh Awoke Yismaw

Abstract:

Introduction: Hepatitis B virus (HBV) is one of the major public health problems globally and needs an urgent response. It is one of the most responsible causes of mortality among the five hepatitis viruses, and it affects almost every class of individuals. Thus, the main objective of this study was to determine the pooled prevalence and its determinants among pregnant women in East Africa. Methods: We searched studies using PubMed, Scopus, Embase, ScienceDirect, Google Scholar, and grey literature that were published between January 01/2020 to January 30/2024. The studies were assessed using the Newcastle Ottawa Scale (NOS) quality assessment scale. The random-effect (DerSimonian) model was used to determine the pooled prevalence and associated factors of HBV among pregnant women. Heterogeneity was assessed by I² statistic, sub-group analysis, and sensitivity analysis. Publication bias was assessed by the Egger test, and the analysis was done using STATA version 17. Result: A total of 45 studies with 35639 pregnant women were included in this systematic review and meta-analysis. The overall pooled prevalence of HBV among pregnant women in East Africa was 6.0% (95% CI: 6.0%−7.0%, I² = 89.7%). The highest prevalence of 8% ((95% CI: 6%, 10%), I² = 91.08%) was seen in 2021, and the lowest prevalence of 5% ((95% CI: 4%, 6%) I² = 52.52%) was observed in 2022. A pooled meta-analysis showed that history of surgical procedure (OR = 2.14 (95% CI: 1.27, 3.61)), having multiple sexual partners (OR = 3.87 (95% CI: 2.52, 5.95), history of body tattooing (OR = 2.55 (95% CI: 1.62, 4.01)), history of tooth extraction (OR = 2.09 (95% CI: 1.29, 3.39)), abortion history(OR = 2.20(95% CI: 1.38, 3.50)), history of sharing sharp material (OR = 1.88 (95% CI: 1.07, 3.31)), blood transfusion (OR = 2.41 (95% CI: 1.62, 3.57)), family history of HBV (OR = 4.87 (95% CI: 2.95, 8.05)) and history needle injury (OR = 2.62 (95% CI: 1.20, 5.72)) were significant risk factors associated with HBV infection among pregnant women. Conclusions: The pooled prevalence of HBV infection among pregnant women in East Africa was at an intermediate level and different across countries, ranging from 1.5% to 22.2%. The result of this pooled prevalence was an indication of the need for screening, prevention, and control of HBV infection among pregnant women in the region. Therefore, early identification of risk factors, awareness creation of the mode of transmission of HBV, and implementation of preventive measures are essential in reducing the burden of HBV infection among pregnant women.

Keywords: hepatitis B virus, prevalence, determinants, pregnant women, meta-analysis, East Africa

Procedia PDF Downloads 15
25416 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport

Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos

Abstract:

Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.

Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform

Procedia PDF Downloads 165
25415 Proteomic Analysis of 2,4-Epibrassinolide Alleviating Low Temperature Stress in Rice Seedling Leaves

Authors: Jiang Xu, Daoping Wang, Qun Li, Yinghong Pan

Abstract:

2,4-Epibrassinolide (EBR), which is a kind of plant hormone Brassinosteroids (BRs), is widely studied and applied in the global scale but the proteomic characteristics of EBR alleviating low temperature stress in rice seedling leaves are still not clear. In this study, seeding rice of Nipponbare were treated with EBR and distilled water, then stressed at 4℃ or 26 ℃, and analyzed by mass spectrometry analysis, verified by parallel reaction monitoring technique (PRM). The results showed that 5778 proteins were identified in total and 4834 proteins were identified with quantitative information. Among them, 401 up-regulated and 220 down-regulated proteins may be related to EBR alleviating low temperature stress in rice seedling leaves. The molecular functions of most of up-regulated proteins are RNA binding and hydrolase activity and are mainly enriched in the pathways of carbon metabolism, folic acid synthesis, and amino acid biosynthesis. The down-regulated proteins are mainly related to catalytic activity and oxidoreductase activity and are mainly enriched in the pathways of limonene and pinene degradation, riboflavin metabolism, porphyrin and chlorophyll metabolism, and other metabolic pathways. PRM validation and literature analysis showed that NADP-malic acidase, peroxidase, 3-phosphoglycerate dehydrogenase, enolase, glyceraldehyde-3- phosphate dehydrogenase and pyruvate kinase are closely related to the effect of EBR on low temperature stress. These results also suggested that BRs could relieve the effect of low temperature stress on rice seed germination in many ways.

Keywords: 2, 4-Epibrassinolid, low temperature stress, proteomic analysis, rice

Procedia PDF Downloads 147
25414 Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA

Authors: Felix O. Omosele

Abstract:

Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data.

Keywords: admissibility of computer evidence, electronic voting, qualitative legal analysis, voting machines in the USA

Procedia PDF Downloads 187
25413 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India

Authors: Sri Mahan Borah

Abstract:

The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.

Keywords: migration, displacement, North-East, India

Procedia PDF Downloads 390
25412 Detect Circles in Image: Using Statistical Image Analysis

Authors: Fathi M. O. Hamed, Salma F. Elkofhaifee

Abstract:

The aim of this work is to detect geometrical shape objects in an image. In this paper, the object is considered to be as a circle shape. The identification requires find three characteristics, which are number, size, and location of the object. To achieve the goal of this work, this paper presents an algorithm that combines from some of statistical approaches and image analysis techniques. This algorithm has been implemented to arrive at the major objectives in this paper. The algorithm has been evaluated by using simulated data, and yields good results, and then it has been applied to real data.

Keywords: image processing, median filter, projection, scale-space, segmentation, threshold

Procedia PDF Downloads 418
25411 A Smart Contract Project: Peer-to-Peer Energy Trading with Price Forecasting in Microgrid

Authors: Şakir Bingöl, Abdullah Emre Aydemir, Abdullah Saado, Ahmet Akıl, Elif Canbaz, Feyza Nur Bulgurcu, Gizem Uzun, Günsu Bilge Dal, Muhammedcan Pirinççi

Abstract:

Smart contracts, which can be applied in many different areas, from financial applications to the internet of things, come to the fore with their security, low cost, and self-executing features. In this paper, it is focused on peer-to-peer (P2P) energy trading and the implementation of the smart contract on the Ethereum blockchain. It is assumed a microgrid consists of consumers and prosumers that can produce solar and wind energy. The proposed architecture is a system where the prosumer makes the purchase or sale request in the smart contract and the maximum price obtained through the distribution system operator (DSO) by forecasting. It is aimed to forecast the hourly maximum unit price of energy by using deep learning instead of a fixed pricing. In this way, it will make the system more reliable as there will be more dynamic and accurate pricing. For this purpose, Istanbul's energy generation, energy consumption and market clearing price data were used. The consistency of the available data and forecasting results is observed and discussed with graphs.

Keywords: energy trading smart contract, deep learning, microgrid, forecasting, Ethereum, peer to peer

Procedia PDF Downloads 114
25410 Textile Based Physical Wearable Sensors for Healthcare Monitoring in Medical and Protective Garments

Authors: Sejuti Malakar

Abstract:

Textile sensors have gained a lot of interest in recent years as it is instrumental in monitoring physiological and environmental changes, for a better diagnosis that can be useful in various fields like medical textiles, sports textiles, protective textiles, agro textiles, and geo-textiles. Moreover, with the development of flexible textile-based wearable sensors, the functionality of smart clothing is augmented for a more improved user experience when it comes to technical textiles. In this context, conductive textiles using new composites and nanomaterials are being developed while considering its compatibility with the textile manufacturing processes. This review aims to provide a comprehensive and detailed overview of the contemporary advancements in textile-based wearable physical sensors, used in the field of medical, security, surveillance, and protection, from a global perspective. The methodology used is through analysing various examples of integration of wearable textile-based sensors with clothing for daily use, keeping in mind the technological advances in the same. By comparing various case studies, we come across various challenges textile sensors, in terms of stability, the comfort of movement, and reliable sensing components to enable accurate measurements, in spite of progress in the engineering of the wearable. Addressing such concerns is critical for the future success of wearable sensors.

Keywords: flexible textile-based wearable sensors, contemporary advancements, conductive textiles, body conformal design

Procedia PDF Downloads 166
25409 Solving Dimensionality Problem and Finding Statistical Constructs on Latent Regression Models: A Novel Methodology with Real Data Application

Authors: Sergio Paez Moncaleano, Alvaro Mauricio Montenegro

Abstract:

This paper presents a novel statistical methodology for measuring and founding constructs in Latent Regression Analysis. This approach uses the qualities of Factor Analysis in binary data with interpretations on Item Response Theory (IRT). In addition, based on the fundamentals of submodel theory and with a convergence of many ideas of IRT, we propose an algorithm not just to solve the dimensionality problem (nowadays an open discussion) but a new research field that promises more fear and realistic qualifications for examiners and a revolution on IRT and educational research. In the end, the methodology is applied to a set of real data set presenting impressive results for the coherence, speed and precision. Acknowledgments: This research was financed by Colciencias through the project: 'Multidimensional Item Response Theory Models for Practical Application in Large Test Designed to Measure Multiple Constructs' and both authors belong to SICS Research Group from Universidad Nacional de Colombia.

Keywords: item response theory, dimensionality, submodel theory, factorial analysis

Procedia PDF Downloads 353