Search results for: symbolic meaning of nature
1675 Linking Adaptation to Climate Change and Sustainable Development: The Case of ClimAdaPT.Local in Portugal
Authors: A. F. Alves, L. Schmidt, J. Ferrao
Abstract:
Portugal is one of the more vulnerable European countries to the impacts of climate change. These include: temperature increase; coastal sea level rise; desertification and drought in the countryside; and frequent and intense extreme weather events. Hence, adaptation strategies to climate change are of great importance. This is what was addressed by ClimAdaPT.Local. This policy-oriented project had the main goal of developing 26 Municipal Adaptation Strategies for Climate Change, through the identification of local specific present and future vulnerabilities, the training of municipal officials, and the engagement of local communities. It is intended to be replicated throughout the whole territory and to stimulate the creation of a national network of local adaptation in Portugal. Supported by methodologies and tools specifically developed for this project, our paper is based on the surveys, training and stakeholder engagement workshops implemented at municipal level. In an 'adaptation-as-learning' process, these tools functioned as a social-learning platform and an exercise in knowledge and policy co-production. The results allowed us to explore the nature of local vulnerabilities and the exposure of gaps in the context of reappraisal of both future climate change adaptation opportunities and possible dysfunctionalities in the governance arrangements of municipal Portugal. Development issues are highlighted when we address the sectors and social groups that are both more sensitive and more vulnerable to the impacts of climate change. We argue that a pluralistic dialogue and a common framing can be established between them, with great potential for transformational adaptation. Observed climate change, present-day climate variability and future expectations of change are great societal challenges which should be understood in the context of the sustainable development agenda.Keywords: adaptation, ClimAdaPT.Local, climate change, Portugal, sustainable development
Procedia PDF Downloads 2011674 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target
Authors: Lawan Ja’afar Tahir
Abstract:
This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.Keywords: border, insecurity, weapons, management
Procedia PDF Downloads 721673 The Hidden Role of Interest Rate Risks in Carry Trades
Authors: Jingwen Shi, Qi Wu
Abstract:
We study the role played interest rate risk in carry trade return in order to understand the forward premium puzzle. In this study, our goal is to investigate to what extent carry trade return is indeed due to compensation for risk taking and, more important, to reveal the nature of these risks. Using option data not only on exchange rates but also on interest rate swaps (swaptions), our first finding is that, besides the consensus currency risks, interest rate risks also contribute a non-negligible portion to the carry trade return. What strikes us is our second finding. We find that large downside risks of future exchange rate movements are, in fact, priced significantly in option market on interest rates. The role played by interest rate risk differs structurally from the currency risk. There is a unique premium associated with interest rate risk, though seemingly small in size, which compensates the tail risks, the left tail to be precise. On the technical front, our study relies on accurately retrieving implied distributions from currency options and interest rate swaptions simultaneously, especially the tail components of the two. For this purpose, our major modeling work is to build a new international asset pricing model where we use an orthogonal setup for pricing kernels and specify non-Gaussian dynamics in order to capture three sets of option skew accurately and consistently across currency options and interest rate swaptions, domestic and foreign, within one model. Our results open a door for studying forward premium anomaly through implied information from interest rate derivative market.Keywords: carry trade, forward premium anomaly, FX option, interest rate swaption, implied volatility skew, uncovered interest rate parity
Procedia PDF Downloads 4481672 Inverse Prediction of Thermal Parameters of an Annular Hyperbolic Fin Subjected to Thermal Stresses
Authors: Ashis Mallick, Rajeev Ranjan
Abstract:
The closed form solution for thermal stresses in an annular fin with hyperbolic profile is derived using Adomian decomposition method (ADM). The conductive-convective fin with variable thermal conductivity is considered in the analysis. The nonlinear heat transfer equation is efficiently solved by ADM considering insulated convective boundary conditions at the tip of fin. The constant of integration in the solution is to be estimated using minimum decomposition error method. The solution of temperature field is represented in a polynomial form for convenience to use in thermo-elasticity equation. The non-dimensional thermal stress fields are obtained using the ADM solution of temperature field coupled with the thermo-elasticity solution. The influence of the various thermal parameters in temperature field and stress fields are presented. In order to show the accuracy of the ADM solution, the present results are compared with the results available in literature. The stress fields in fin with hyperbolic profile are compared with those of uniform thickness profile. Result shows that hyperbolic fin profile is better choice for enhancing heat transfer. Moreover, less thermal stresses are developed in hyperbolic profile as compared to rectangular profile. Next, Nelder-Mead based simplex search method is employed for the inverse estimation of unknown non-dimensional thermal parameters in a given stress fields. Owing to the correlated nature of the unknowns, the best combinations of the model parameters which are satisfying the predefined stress field are to be estimated. The stress fields calculated using the inverse parameters give a very good agreement with the stress fields obtained from the forward solution. The estimated parameters are suitable to use for efficient and cost effective fin designing.Keywords: Adomian decomposition, inverse analysis, hyperbolic fin, variable thermal conductivity
Procedia PDF Downloads 3301671 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State
Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn
Abstract:
One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.Keywords: human security, illegal weapons, porous borders, development
Procedia PDF Downloads 1891670 Quest for Literary Past: A Study of Byatt’s Possession
Authors: Chen Jun
Abstract:
Antonia Susan Byatt’s Possession: A Romance has been misread as a postmodern pastiche novel since its publication because there are epics, epigraphs, lyrics, fairy tales, epistles, and even critical articles swollen in this work. The word ‘pastiche’ suggests messy, disorganized, and chaotic, which buries its artistic excellence while overlooking its subtitle, A Romance. The center of romance is the quest that the hero sets forth to conquer the adversity, hardship, and danger to accomplish a task to prove his identity or social worth. This paper argues that Byatt’s Possession is not a postmodern pastiche novel but rather a postmodern romance in which the characters in the academic world set forth their quest into the Victorian literary past that is nostalgically identified by Byatt as the Golden Age of English literature. In doing so, these five following issues are addressed: first, the origin of the protagonist Roland, and consequently, the nature of his quest; second, the central image of the dragon created by the fictional Victorian poet Henry Ash; third, Melusine as an image of female serpent created by the fictional Victorian poet Christabel LaMotte; fourth, the images of the two ladies; last, the image of water that links the dragon and the serpent. In Possession, the past is reinvented not as an unfortunate fall but as a Golden Age presented in the imaginative academic adventure. The dragon, a stereotypical symbol of evil, becomes the symbol of life in Byatt’s work, which parallels with the image of the mythical phoenix that can resurrect from its own ash. At the same time, the phoenix symbolizes Byatt’s efforts to revive the Victorian poetic art that is supposed to be dead in the post-capitalism society when the novel is the dominating literary genre and poetry becomes the minority. The fictional Victorian poet Ash is in fact Byatt’s own poetic mask through which she breathes life into the lost poetic artistry in the postmodern era.Keywords: Byatt, possession, postmodern romance, literary past
Procedia PDF Downloads 4191669 Breaking the Barriers: Exploring the Barriers to LGBTQ+ Accessing Palliative Care and the Hospice
Authors: Emma Worley, Mhairi De Sainte Croix, Savneet Lochab, Christopher Roberts, Mark Stroud, Mo Salehan, Kevin Jones
Abstract:
Awareness about the importance of teaching about diversity at medical school is growing. In the realm of diversity includes discussion around the LGBTQ+ community. At Bristol, diversity is taught in first or second year. However, echoing and expanding that teaching throughout the curriculum is needed. This feeds into the spiral curriculum but also highlights the relevance of the topic. It is well known that some people in the LGBTQ+ community struggle the access healthcare due to previous negative experiences. In 2019, 1 in 7 LGBTQ+ people avoided seeking medical care due to fears about discrimination. If people have fears about seeking medical help, then seeking help from Palliative care when they are at their most vulnerable situation can be even harder. To improve positive healthcare situations for people who identify as LGBTQ+ needs to start with talking. Along with some of our CTAs (clinical teaching assistants) we created a teaching session to explore the barriers faced by LGBTQ+ and incorporated communication stations into this. Our plan is to run this session as a three-hour session first discussing different topics: ethnical diversity, ‘coming out’, LGBTQ+ in the older generation, transgender. This will be followed by looking more closely at the barriers to accessing the hospice. The next part of the session will encompass two or three communication scenarios hopefully prompting further discussion and reflection on ways to improve our communication. The first scenario outline is a gay man/lesbian woman with lung cancer discussing options around the hospice. The second scenario is a transgender person with female genitalia who now has cervical cancer (as was not followed up on pap smears after the change of name). The third scenario is a HIV homosexual male patient who has been admitted with dementia. He has a partner but is not married. His next of kin is down as his parents but his parents do not know about his sexuality and HIV status. It allows discussion around confidentiality as well as broaching the meaning of ‘family’ in the LGBTQ+ community. We have chosen to pitch this teaching session to Bristol Year 4 students. They will be currently doing their 6-week Palliative care block, which fits in well. Each session will have four students attend. We have been lucky enough to have two CTAs (clinical teaching assistants) who identify as LGBTQ+ offer their experiences and help. They have been able to help us with the preparation and delivery of the session. Given anecdotal evidence and stories helps to highlight the importance and relevance of this session. The aim is to increase awareness of some factors that may contribute to people who identify as LGBTQ+ having a negative healthcare experience. By starting to talk about it allows awareness and only then will we be able to start to change and improve. Our aim, if the sessions run well, is to expand these sessions to different academy hospitals. Therefore, all Bristol 4th year students would have the opportunity to take part in the teaching session. We would like to expand our portfolio of case scenarios, to address so tricker topics such as a transgender person with dementia who reverts back to a different gender. We would also like to recruit a diverse range of actors, ideally people who identify as the patient in the scenario does. For example, a transgender person acts the transgender scenario. This would give authenticity and enhance the student’s learning experience.Keywords: communication skills, healthcare barriers, LGBTQ+, palliative care
Procedia PDF Downloads 1291668 Implementation of Project-Based Learning with Peer Assessment in Large Classes under Consideration of Faculty’s Scare Resources
Authors: Margit Kastner
Abstract:
To overcome the negative consequences associated with large class sizes and to support students in developing the necessary competences (e.g., critical thinking, problem-solving, or team-work skills) a marketing course has been redesigned by implementing project-based learning with peer assessment (PBL&PA). This means that students can voluntarily take advantage of this supplementary offer and explore -in addition to attending the lecture where clicker questions are asked- a real-world problem, find a solution, and assess the results of peers while working in small collaborative groups. In order to handle this with little further effort, the process is technically supported by the university’s e-learning system in such a way that students upload their solution in form of an assignment which is then automatically distributed to peer groups who have to assess the work of three other groups. Finally, students’ work is graded automatically considering both, students’ contribution to the project and the conformity of the peer assessment. The purpose of this study is to evaluate students’ perception of PBL&PA using an online-questionnaire to collect the data. More specifically, it aims to discover students’ motivations for (not) working on a project and the benefits and problems students encounter. In addition to the survey, students’ performance was analyzed by comparing the final grades of those who participated in PBL&PA with those who did not participate. Among the 260 students who filled out the questionnaire, 47% participated in PBL&PA. Besides extrinsic motivations (bonus credits), students’ participation was often motivated by learning and social benefits. Reasons for not working on a project were connected to students’ organization and management of their studies (e.g., time constraints, no/wrong information) and teamwork concerns (e.g., missing engagement of peers, prior negative experiences). In addition, high workload and insufficient extrinsic motivation (bonus credits) were mentioned. With regards to benefits and problems students encountered during the project, students provided more positive than negative comments. Positive aspects most often stated were learning and social benefits while negative ones were mainly attached to the technical implementation. Interestingly, bonus credits were hardly named as a positive aspect meaning that intrinsic motivations have become more important when working on the project. Team aspects generated mixed feelings. In addition, students who voluntarily participated in PBL&PA were, in general, more active and utilized further course offers such as clicker questions. Examining students’ performance at the final exam revealed that students without participating in any of the offered active learning tasks performed poorest in the exam while students who used all activities were best. In conclusion, the goals of the implementation were met in terms of students’ perceived benefits and the positive impact on students’ exam performance. Since the comparison of the automatic grading with faculty grading showed valid results, it is possible to rely only on automatic grading in the future. That way, the additional workload for faculty will be within limits. Thus, the implementation of project-based learning with peer assessment can be recommended for large classes.Keywords: automated grading, large classes, peer assessment, project-based learning
Procedia PDF Downloads 1701667 Assets Integrity Management in Oil and Gas Production Facilities through Corrosion Mitigation and Inspection Strategy: A Case Study of Sarir Oilfield
Authors: Iftikhar Ahmad, Youssef Elkezza
Abstract:
Sarir oilfield is in North Africa. It has facilities for oil and gas production. The assets of the Sarir oilfield can be divided into five following categories, namely: (i) well bore and wellheads; (ii) vessels such as separators, desalters, and gas processing facilities; (iii) pipelines including all flow lines, trunk lines, and shipping lines; (iv) storage tanks; (v) other assets such as turbines and compressors, etc. The nature of the petroleum industry recognizes the potential human, environmental and financial consequences that can result from failing to maintain the integrity of wellheads, vessels, tanks, pipelines, and other assets. The importance of effective asset integrity management increases as the industry infrastructure continues to age. The primary objective of assets integrity management (AIM) is to maintain assets in a fit-for-service condition while extending their remaining life in the most reliable, safe, and cost-effective manner. Corrosion management is one of the important aspects of successful asset integrity management. It covers corrosion mitigation, monitoring, inspection, and risk evaluation. External corrosion on pipelines, well bores, buried assets, and bottoms of tanks is controlled with a combination of coatings by cathodic protection, while the external corrosion on surface equipment, wellheads, and storage tanks is controlled by coatings. The periodic cleaning of the pipeline by pigging helps in the prevention of internal corrosion. Further, internal corrosion of pipelines is prevented by chemical treatment and controlled operations. This paper describes the integrity management system used in the Sarir oil field for its oil and gas production facilities based on standard practices of corrosion mitigation and inspection.Keywords: assets integrity management, corrosion prevention in oilfield assets, corrosion management in oilfield, corrosion prevention, inspection activities
Procedia PDF Downloads 931666 Unraveling the Complexity of Postpartum Distress: Examining the Influence of Alexithymia, Social Support, Partners' Support, and Birth Satisfaction on Postpartum Distress among Bulgarian Mothers
Authors: Stela Doncheva
Abstract:
Postpartum distress, encompassing depressive symptoms, obsessions, and anxiety, remains a subject of significant scientific interest due to its prevalence among individuals giving birth. This critical and transformative period presents a multitude of factors that impact women's health. On the one hand, variables such as social support, satisfaction in romantic relationships, shared newborn care, and birth satisfaction directly affect the mental well-being of new mothers. On the other hand, the interplay of hormonal changes, personality characteristics, emotional difficulties, and the profound life adjustments experienced by mothers can profoundly influence their self-esteem and overall physical and emotional well-being. This paper extensively explores the factors of alexithymia, social support, partners' support, and birth satisfaction to gain deeper insights into their impact on postpartum distress. Utilizing a qualitative survey consisting of six self-reflective questionnaires, this study collects valuable data regarding the individual postpartum experiences of Bulgarian mothers. The primary objective is to enrich our understanding of the complex factors involved in the development of postpartum distress during this crucial period. The results shed light on the intricate nature of the problem and highlight the significant influence of bio-psycho-social elements. By contributing to the existing knowledge in the field, this research provides valuable implications for the development of interventions and support systems tailored to the unique needs of mothers in the postpartum period. Ultimately, this study aims to improve the overall well-being of new mothers and promote optimal maternal health during the postpartum journey.Keywords: maternal mental health, postpartum distress, postpartum depression, postnatal mothers
Procedia PDF Downloads 711665 Trinary Affinity—Mathematic Verification and Application (1): Construction of Formulas for the Composite and Prime Numbers
Authors: Liang Ming Zhong, Yu Zhong, Wen Zhong, Fei Fei Yin
Abstract:
Trinary affinity is a description of existence: every object exists as it is known and spoken of, in a system of 2 differences (denoted dif1, dif₂) and 1 similarity (Sim), equivalently expressed as dif₁ / Sim / dif₂ and kn / 0 / tkn (kn = the known, tkn = the 'to be known', 0 = the zero point of knowing). They are mathematically verified and illustrated in this paper by the arrangement of all integers onto 3 columns, where each number exists as a difference in relation to another number as another difference, and the 2 difs as arbitrated by a third number as the Sim, resulting in a trinary affinity or trinity of 3 numbers, of which one is the known, the other the 'to be known', and the third the zero (0) from which both the kn and tkn are measured and specified. Consequently, any number is horizontally specified either as 3n, or as '3n – 1' or '3n + 1', and vertically as 'Cn + c', so that any number seems to occur at the intersection of its X and Y axes and represented by its X and Y coordinates, as any point on Earth’s surface by its latitude and longitude. Technically, i) primes are viewed and treated as progenitors, and composites as descending from them, forming families of composites, each capable of being measured and specified from its own zero called in this paper the realistic zero (denoted 0r, as contrasted to the mathematic zero, 0m), which corresponds to the constant c, and the nature of which separates the composite and prime numbers, and ii) any number is considered as having a magnitude as well as a position, so that a number is verified as a prime first by referring to its descriptive formula and then by making sure that no composite number can possibly occur on its position, by dividing it with factors provided by the composite number formulas. The paper consists of 3 parts: 1) a brief explanation of the trinary affinity of things, 2) the 8 formulas that represent ALL the primes, and 3) families of composite numbers, each represented by a formula. A composite number family is described as 3n + f₁‧f₂. Since there are an infinitely large number of composite number families, to verify the primality of a great probable prime, we have to have it divided with several or many a f₁ from a range of composite number formulas, a procedure that is as laborious as it is the surest way to verifying a great number’s primality. (So, it is possible to substitute planned division for trial division.)Keywords: trinary affinity, difference, similarity, realistic zero
Procedia PDF Downloads 2161664 A Framework for Auditing Multilevel Models Using Explainability Methods
Authors: Debarati Bhaumik, Diptish Dey
Abstract:
Multilevel models, increasingly deployed in industries such as insurance, food production, and entertainment within functions such as marketing and supply chain management, need to be transparent and ethical. Applications usually result in binary classification within groups or hierarchies based on a set of input features. Using open-source datasets, we demonstrate that popular explainability methods, such as SHAP and LIME, consistently underperform inaccuracy when interpreting these models. They fail to predict the order of feature importance, the magnitudes, and occasionally even the nature of the feature contribution (negative versus positive contribution to the outcome). Besides accuracy, the computational intractability of SHAP for binomial classification is a cause of concern. For transparent and ethical applications of these hierarchical statistical models, sound audit frameworks need to be developed. In this paper, we propose an audit framework for technical assessment of multilevel regression models focusing on three aspects: (i) model assumptions & statistical properties, (ii) model transparency using different explainability methods, and (iii) discrimination assessment. To this end, we undertake a quantitative approach and compare intrinsic model methods with SHAP and LIME. The framework comprises a shortlist of KPIs, such as PoCE (Percentage of Correct Explanations) and MDG (Mean Discriminatory Gap) per feature, for each of these three aspects. A traffic light risk assessment method is furthermore coupled to these KPIs. The audit framework will assist regulatory bodies in performing conformity assessments of AI systems using multilevel binomial classification models at businesses. It will also benefit businesses deploying multilevel models to be future-proof and aligned with the European Commission’s proposed Regulation on Artificial Intelligence.Keywords: audit, multilevel model, model transparency, model explainability, discrimination, ethics
Procedia PDF Downloads 991663 Economic Analysis of Coffee Cultivation in Kodagu District of Karnataka State, India
Authors: P. S. Dhananjaya Swamy, B. Chinnappa, G. B. Ramesh, Naveen P. Kumar
Abstract:
Kodagu district is one of the most densely forested districts in the India as around sixty five per cent of geographical areas under tree cover. Nearly 53 per cent of the flora of Kodagu is endemic. The district is also a hotspot of endemic orchids found mainly in the Thadiandamol. Shade grown, eco-friendly coffee farms are perhaps a selected few places on this planet where nature runs wild. The Kodagu accounts for more than 8.8 per cent of floral diversity of Karnataka state. Estimation of unit cost of cultivation plays a vital role in determining the governmental program their market intervention policies. On an average, planters incurred around Rs. 17041 per acre. The extent of production risk was highest among small category of planters (66 %) compared to other two exhibiting production instability. The result shows that, the coffee productivity in medium plantations was 1051.2 kg per acre as against 758.5 and 789.2 kg in the case of small and large plantations. An annual net return per acre was highest in the case of medium planters (Rs. 26109.3) as against Rs. 20566.7 and Rs. 18572.7 in the case of small and large planters. Cost of production was lowest in the case of small planters (Rs. 18.9 per kg of output) followed by medium planters (Rs. 21.2 per kg of output) and large planters (Rs. 22.5 per kg of output). The productivity of coffee is less whenever it is grown under high shade and native tree cover; it is around 6 quintals per acre when compared with low shade conditions, which is around 8.9 quintals per acre, without a significant difference in the amount invested for growing coffee. Net gain was lower by Rs. 15.5 per kg for the planters growing under high shade and native trees cover when compared with low shade and exotic trees cover.Keywords: coffee, cultivation, economics, Kodagu
Procedia PDF Downloads 1961662 Transdermal Medicated- Layered Extended-Release Patches for Co-delivery of Carbamazepine and Pyridoxine
Authors: Sarah K. Amer, Walaa Alaa
Abstract:
Epilepsy is an important cause of mortality and morbidity, according to WHO statistics. It is characterized by the presence of frequent seizures occurring more than 24 hours apart. Carbamazepine (CBZ) is considered first-line treatment for epilepsy. However, reports have shown that CBZ oral formulations failed to achieve optimum systemic delivery, minimize side effects, and enhance patient compliance. Besides, the literature has signified the lack of therapeutically efficient CBZ transdermal formulation and the urge for its existence owing to its ease and convenient method of application and highlighted capability to attain higher bioavailability and more extended-release profiles compared to conventional oral CBZ tablets. This work aims to prepare CBZ microspheres (MS) that are embedded in a transdermal gel containing Vitamin B to be co-delivered. MS were prepared by emulsion-solvent diffusion method using Eudragit S as core forming polymer and hydroxypropyl methylcellulose (HPMC) polymer. The MS appeared to be spherical and porous in nature, offering a large surface area and high entrapment efficiency of CBZ. The transdermal gel was prepared by solvent-evaporation technique using HPMC that, offered high entrapment efficiency and Eudragit S that provided an extended-release profile. Polyethylene glycol, Span 80 and Pyridoxine were also added. Data indicated that combinations of CBZ with pyridoxine can reduce epileptic seizures without affecting motor coordination. Extended-release profiles were evident for this system. The patches were furthermore tested for thickness, moisture content, folding endurance, spreadability and viscosity measurements. This novel pharmaceutical formulation would be of great influence on seizure control, offering better therapeutic effects.Keywords: epilepsy, carbamazepine, pyridoxine, transdermal
Procedia PDF Downloads 631661 Women as Victims of Land Grabbing: Implications for Household Food Security and Livelihoods in Cameroon
Authors: Valentine Ndi
Abstract:
This multi-sited research will make use of primary and secondary data to understand the multiple implications of land grabbing for local food production and rural livelihoods in Cameroon. Amidst restricted access to land and forest resources, this study will demonstrate how land previously accessed by communities to grow crops and to harvest forest resources is being acquired and transformed into commercial oil palm plantations by Herakles Farms, a US-based company, with Sithe Global Sustainable Oils Cameroon as its local subsidiary. Focusing on selected land grabbing communities in Cameroon, the study uses a feminist political ecology lens to examine the gendered nature in resources access and its impacts for women’s food production in particular, and rural livelihoods in general. The paper will argue that the change in land use particularly erodes women’s rights to access land and forest resources, and in turn negatively affects local food production and rural livelihood in the region. It will show how women in the region play instrumental and dominant roles in ensuring local food production through subsistence and semi-subsistence agriculture but are unfortunately the main losers of territory that the state considers as ‘empty’ or underutilized - and is subjected to appropriation. The paper will conclude that, rural women’s active participation in the decision-making processes concerning the use of and/or allotment of land to foreign investors is indispensable to guarantee local, national and global food security, but also to ensure that alternative livelihood options are provided, particularly to those rural women facing dispossession or at risk of being dispossessed.Keywords: land grabbing, feminst political ecology, gender, access to resources, rural livelihoods, Cameroon
Procedia PDF Downloads 2711660 WhatsApp Application and Challenges of Radio Broadcasting in Northern Nigeria: Special Interest on FRCN Kaduna
Authors: Aliyu Damri
Abstract:
This study analyzed the emergence of WhatsApp and how employees at the Federal Radio Corporation of Nigeria, Kaduna defined the concept base on their vast broadcasting experiences for over five decades and application of the phenomenon to the radio station. It also analyzed the nature, patterns, dimensions, features, challenges as well as the effects of WhatsApp as a social networking site with specific interest on the radio outlet. Also, the study identified how the radio organization responded to the challenges in an attempt to adapt to the new pattern of broadcasting characterized by many technological transformations. The study further explained in details such skills journalists need to function optimally using WhatsApp as well as the impacts of the WhatsApp on radio broadcasting. It used a combination of published materials, focus group discussion, in depth interviews and participant observation on the activities of the radio stations to address the research questions. The data generated provided insight to better understand the challenges posed to FRCN Kaduna as a result of WhatsApp application and how FRCN Kaduna responded to the challenges. It also provided information on the skills journalists need to function optimally in using WhatsApp application in the radio station. The interview and focus group discussion’s transcripts and the published materials were analyzed along thematic pattern related to the research questions in the study. The dominant response relied heavily on change in the radio station’s organizational and technical integration of newsrooms, the use of a multiskilled workforce, application of a flexible and user-friendly technology in all aspects of production, expansion of the station’s services in to new media such as internet and mobile phones as well as sharing of ideas across different units in the radio outfit.Keywords: broadcasting, challenge, northern Nigeria, radio, WhatsApp application
Procedia PDF Downloads 1351659 Probabilistic Analysis of Bearing Capacity of Isolated Footing using Monte Carlo Simulation
Authors: Sameer Jung Karki, Gokhan Saygili
Abstract:
The allowable bearing capacity of foundation systems is determined by applying a factor of safety to the ultimate bearing capacity. Conventional ultimate bearing capacity calculations routines are based on deterministic input parameters where the nonuniformity and inhomogeneity of soil and site properties are not accounted for. Hence, the laws of mathematics like probability calculus and statistical analysis cannot be directly applied to foundation engineering. It’s assumed that the Factor of Safety, typically as high as 3.0, incorporates the uncertainty of the input parameters. This factor of safety is estimated based on subjective judgement rather than objective facts. It is an ambiguous term. Hence, a probabilistic analysis of the bearing capacity of an isolated footing on a clayey soil is carried out by using the Monte Carlo Simulation method. This simulated model was compared with the traditional discrete model. It was found out that the bearing capacity of soil was found higher for the simulated model compared with the discrete model. This was verified by doing the sensitivity analysis. As the number of simulations was increased, there was a significant % increase of the bearing capacity compared with discrete bearing capacity. The bearing capacity values obtained by simulation was found to follow a normal distribution. While using the traditional value of Factor of safety 3, the allowable bearing capacity had lower probability (0.03717) of occurring in the field compared to a higher probability (0.15866), while using the simulation derived factor of safety of 1.5. This means the traditional factor of safety is giving us bearing capacity that is less likely occurring/available in the field. This shows the subjective nature of factor of safety, and hence probability method is suggested to address the variability of the input parameters in bearing capacity equations.Keywords: bearing capacity, factor of safety, isolated footing, montecarlo simulation
Procedia PDF Downloads 1911658 Socio-Psychological Significance of Vandalism in the Urban Environment: Destruction, Modernization, Communication
Authors: Olga Kruzhkova, Irina Vorobyeva, Roman Porozov
Abstract:
Vandalism is a common phenomenon, but its definition is still not clearly defined. In the public sense, vandalism is the blatant cases of pogroms in cemeteries, destruction of public places (regardless of whether these actions are authorized), damage to significant objects of culture and history (monuments, religious buildings). From a legal point of view, only such an act can be called vandalism, which is aimed at 'desecrating buildings or other structures, damaging property on public transport or in other public places'. The key here is the notion of public property that is being damaged. In addition, the principal is the semantics of messages, expressed in a kind of sign system (drawing, inscription, symbol), which initially threatens public order, the calmness of citizens, public morality. Because of this, the legal qualification of vandalism doesn’t include a sufficiently wide layer of environmental destructions that are common in modern urban space (graffiti and other damage to private property, broken shop windows, damage to entrances and elevator cabins), which in ordinary consciousness are seen as obvious facts of vandalism. At the same time, the understanding of vandalism from the position of psychology implies an appeal to the question of the limits of the activity of the subject of vandalism and his motivational basis. Also recently, the discourse on the positive meaning of some forms of vandalism (graffiti, street-art, etc.) has been activated. But there is no discussion of the role and significance of vandalism in public and individual life, although, like any socio-cultural and socio-psychological phenomenon, vandalism is not groundless and meaningless. Our aim of the study was to identify and describe the functions of vandalism as a socio-cultural and socio-psychological phenomenon of the life of the urban community, as well as personal determinants of its manifestations. The study was conducted in the spatial environment of the Russian megalopolis (Ekaterinburg) by photographing visual results of vandal acts (6217 photos) with subsequent trace-assessment and image content analysis, as well as diagnostics of personal characteristics and motivational basis of vandal activity of possible subjects of vandalism among youth. The results of the study allowed to identify the functions of vandalism at the socio-environmental and individual-subjective levels. The socio-environmental functions of vandalism include the signaling function, the function of preparing of social changes, the constructing function, and the function of managing public moods. The demonstrative-protest function, the response function, the refund function, and the self-expression function are assigned to the individual-subjective functions of vandalism. A two-dimensional model of vandal functions has been formed, where functions are distributed in the spaces 'construction reconstruction', 'emotional regulation/moral regulation'. It is noted that any function of vandal activity at the individual level becomes a kind of marker of 'points of tension' at the social and environmental level. Acknowledgment: The research was supported financially by Russian Science Foundation, (Project No. 17-18-01278).Keywords: destruction, urban environment, vandal behavior, vandalism, vandalism functions
Procedia PDF Downloads 2091657 Islamic Banking Recovery Process and Its Parameters: A Practitioner’s Viewpoints in the Light of Humanising Financial Services
Authors: Muhammad Izzam Bin Mohd Khazar, Nur Adibah Binti Zainudin
Abstract:
Islamic banking as one of the financial institutions is highly required to maintain a prudent approach to ensure that any financing given is able to generate income to their respective shareholders. As the default payment of customers is probably occurred in the financing, having a prudent approach in the recovery process is a must to ensure that financing losses are within acceptable limits. The objective of this research is to provide the best practice of recovery which is anticipated to benefit both bank and customers. This study will address arising issue on the current practice of recovery process and followed by providing humanising recovery solutions in the light of the Maqasid Shariah. The study identified main issues pertaining to Islamic recovery process which can be categorized into knowledge crisis, process issues, specific treatment cases and system issues. Knowledge crisis is related to direct parties including judges, solicitors and salesperson, while the recovery process issues include the process of issuance of reminder, foreclosure and repossession of asset. Furthermore, special treatment for particular cases also should be observed since different contracts in Islamic banking products will need different treatment. Finally, issues in the system used in the recovery process are still unresolved since the existing technology is still young in this area to embraced Islamic finance requirements and nature of calculation. In order to humanize the financial services in Islamic banking recovery process, we have highlighted four main recommendation to be implemented by Islamic Financial Institutions namely; 1) early deterrent by improving the awareness, 2) improvement of the internal process, 3) reward mechanism, and 4) creative penalty to provide awareness to all stakeholders.Keywords: humanizing financial services, Islamic Finance, Maqasid Syariah, recovery process
Procedia PDF Downloads 2121656 Effect of Dimensional Reinforcement Probability on Discrimination of Visual Compound Stimuli by Pigeons
Authors: O. V. Vyazovska
Abstract:
Behavioral efficiency is one of the main principles to be successful in nature. Accuracy of visual discrimination is determined by the attention, learning experience, and memory. In the experimental condition, pigeons’ responses to visual stimuli presented on the screen of the monitor are behaviorally manifested by pecking or not pecking the stimulus, by the number of pecking, reaction time, etc. The higher the probability of rewarding is, the more likely pigeons will respond to the stimulus. We trained 8 pigeons (Columba livia) on a stagewise go/no-go visual discrimination task.16 visual stimuli were created from all possible combinations of four binary dimensions: brightness (dark/bright), size (large/small), line orientation (vertical/horizontal), and shape (circle/square). In the first stage, we presented S+ and 4 S-stimuli: the first that differed in all 4-dimensional values from S+, the second with brightness dimension sharing with S+, the third sharing brightness and orientation with S+, the fourth sharing brightness, orientation and size. Then all 16 stimuli were added. Pigeons rejected correctly 6-8 of 11 new added S-stimuli at the beginning of the second stage. The results revealed that pigeons’ behavior at the beginning of the second stage was controlled by probabilities of rewarding for 4 dimensions learned in the first stage. More or fewer mistakes with dimension discrimination at the beginning of the second stage depended on the number S- stimuli sharing the dimension with S+ in the first stage. A significant inverse correlation between the number of S- stimuli sharing dimension values with S+ in the first stage and the dimensional learning rate at the beginning of the second stage was found. Pigeons were more confident in discrimination of shape and size dimensions. They made mistakes at the beginning of the second stage, which were not associated with these dimensions. Thus, the received results help elucidate the principles of dimensional stimulus control during learning compound multidimensional visual stimuli.Keywords: visual go/no go discrimination, selective attention, dimensional stimulus control, pigeon
Procedia PDF Downloads 1461655 Simultaneous Removal of Phosphate and Ammonium from Eutrophic Water Using Dolochar Based Media Filter
Authors: Prangya Ranjan Rout, Rajesh Roshan Dash, Puspendu Bhunia
Abstract:
With the aim of enhancing the nutrient (ammonium and phosphate) removal from eutrophic wastewater with reduced cost, a novel media based multistage bio filter with drop aeration facility was developed in this work. The bio filter was packed with a discarded sponge iron industry by product, ‘dolochar’ primarily to remove phosphate via physicochemical approach. In the multi stage bio-filter drop, aeration was achieved by the process of percolation of the gravity-fed wastewater through the filter media and dropping down of wastewater from stage to stage. Ammonium present in wastewater got adsorbed by the filter media and biomass grown on the filter media and subsequently, got converted to nitrate through biological nitrification in the aerobic condition, as realized by drop aeration. The performance of the bio-filter in treating real eutrophic wastewater was monitored for a period of about 2 months. The influent phosphate concentration was in the range of 16-19 mg/L, and ammonium concentration was in the range of 65-78 mg/L. The average nutrient removal efficiency observed during the study period were 95.2% for phosphate and 88.7% for ammonium, with mean final effluent concentration of 0.91, and 8.74 mg/L, respectively. Furthermore, the subsequent release of nutrient from the saturated filter media, after completion of treatment process has been undertaken in this study and thin layer funnel analytical test results reveal the slow nutrient release nature of spent dolochar, thereby, recommending its potential agricultural application. Thus, the bio-filter displays immense prospective for treating real eutrophic wastewater, significantly decreasing the level of nutrients and keeping the effluent nutrient concentrations at par with the permissible limit and more importantly, facilitating the conversion of the waste materials into usable ones.Keywords: ammonium removal, phosphate removal, multi-stage bio-filter, dolochar
Procedia PDF Downloads 1981654 Artificial Intelligence Techniques for Enhancing Supply Chain Resilience: A Systematic Literature Review, Holistic Framework, and Future Research
Authors: Adane Kassa Shikur
Abstract:
Today’s supply chains (SC) have become vulnerable to unexpected and ever-intensifying disruptions from myriad sources. Consequently, the concept of supply chain resilience (SCRes) has become crucial to complement the conventional risk management paradigm, which has failed to cope with unexpected SC disruptions, resulting in severe consequences affecting SC performances and making business continuity questionable. Advancements in cutting-edge technologies like artificial intelligence (AI) and their potential to enhance SCRes by improving critical antecedents in the different phases have attracted the attention of scholars and practitioners. The research from academia and the practical interest of the industry have yielded significant publications at the nexus of AI and SCRes during the last two decades. However, the applications and examinations have been primarily conducted independently, and the extant literature is dispersed into research streams despite the complex nature of SCRes. To close this research gap, this study conducts a systematic literature review of 106 peer-reviewed articles by curating, synthesizing, and consolidating up-to-date literature and presents the state-of-the-art development from 2010 to 2022. Bayesian networks are the most topical ones among the 13 AI techniques evaluated. Concerning the critical antecedents, visibility is the first ranking to be realized by the techniques. The study revealed that AI techniques support only the first 3 phases of SCRes (readiness, response, and recovery), and readiness is the most popular one, while no evidence has been found for the growth phase. The study proposed an AI-SCRes framework to inform research and practice to approach SCRes holistically. It also provided implications for practice, policy, and theory as well as gaps for impactful future research.Keywords: ANNs, risk, Bauesian networks, vulnerability, resilience
Procedia PDF Downloads 1071653 Killing Your Children to Hurt Your Partner: Motivations for Revenge Filicide
Authors: Melanie Moen, Christiaan Bezuidenhout
Abstract:
Cases of parents murdering their offspring are incomprehensible but sadly as old as humanity itself. The act of killing your own child is known as filicide. Revenge filicide is an act where one parent kills their own offspring for retribution for hurting and upsetting the other parent. The true extent of filicide in South Africa is unknown, but in the United States, filicide constitutes more or less 2.5% of all murders. The focus of this contribution is to extend the knowledge of revenge filicide. Data was collected through court documents and newspaper articles. Newspapers that cover murder cases are between 75% to 100% accurate compared to official sources. Often family-related murders are violent in nature, and for this reason, these crimes receive extensive media coverage. The cases of twenty revenge filicide murderers (14 male and 6 female) were qualitatively analyzed to determine the motivations and offense characteristics of revenge filicide offenders. Findings related to a loss of social identity due to rejection; extreme rage-type anger; external locus of control; sadism; a desire to cause pain, and a need to inflict harm. The initial emotional response may escalate from mild anger to a level of narcissistic rage which eventually culminates in the murdering of the child to punish and hurt the other parent and to restore control. To our knowledge, our study is the first to systematically examine the motivations related to revenge filicides from a South African perspective. Filicide is a complex phenomenon with diverse possibilities and reasons why it occurs. However, it was apparent in this study that the motivations for revenge filicides were often linked to complex personal and interpersonal relationship problems. Further research within this field is imperative.Keywords: revenge filicide, child murder, rage, anger, narcissistic rage, parent kills child
Procedia PDF Downloads 841652 Risks in the Islamic Banking Model and Methods Adopted to Manage Them
Authors: K. P. Fasalu Rahman
Abstract:
The financial services industry of Islam include large number of institutions, such as investment banks and commercial banks, investment companies and mutual insurance companies. All types of these financial institutions should have to deal with many issues and risks in their field of work. Islamic banks should expect to face two types of risks: risks that are similar to those faced by conventional financial intermediaries and risks that are unique to the Islamic Banks due to their compliance with the Shariah. The use of financial services and products that comply with the Shariah principles cause special issues for supervision and risk management. Risks are uncertain future events that could influence the achievement of the bank’s objectives, including strategic, operational, financial and compliance objectives. In Islamic banks, effective risk management deserves special attention. As an operational problem, risk management is the classification and identification of methods, processes, and risks in banks to supervise, monitor and measure them. In comparison to conventional banks, Islamic banks face big difficulties in identifying and managing risks due to bigger complexities emerging from the profit loss sharing (PLS) concept and nature of particular risks of Islamic financing. As the developing of managing risks tool becomes very essential, especially in Islamic banking as most of the products are depending on PLS principle, identifying and measuring each type of risk is highly important and critical in any Islamic finance based systems. This paper highlights the special and general risks surrounding Islamic banking. And it investigates in detail the need for risk management in Islamic banks. In addition to analyzing the effectiveness of risk management strategies adopted by Islamic financial institutions at present, this research is also suggesting strategies for improving risk management process of Islamic banks in future.Keywords: Islamic banking, management, risk, risk management
Procedia PDF Downloads 1451651 Geometrical Analysis of an Atheroma Plaque in Left Anterior Descending Coronary Artery
Authors: Sohrab Jafarpour, Hamed Farokhi, Mohammad Rahmati, Alireza Gholipour
Abstract:
In the current study, a nonlinear fluid-structure interaction (FSI) biomechanical model of atherosclerosis in the left anterior descending (LAD) coronary artery is developed to perform a detailed sensitivity analysis of the geometrical features of an atheroma plaque. In the development of the numerical model, first, a 3D geometry of the diseased artery is developed based on patient-specific dimensions obtained from the experimental studies. The geometry includes four influential geometric characteristics: stenosis ratio, plaque shoulder-length, fibrous cap thickness, and eccentricity intensity. Then, a suitable strain energy density function (SEDF) is proposed based on the detailed material stability analysis to accurately model the hyperelasticity of the arterial walls. The time-varying inlet velocity and outlet pressure profiles are adopted from experimental measurements to incorporate the pulsatile nature of the blood flow. In addition, a computationally efficient type of structural boundary condition is imposed on the arterial walls. Finally, a non-Newtonian viscosity model is implemented to model the shear-thinning behaviour of the blood flow. According to the results, the structural responses in terms of the maximum principal stress (MPS) are affected more compared to the fluid responses in terms of wall shear stress (WSS) as the geometrical characteristics are varying. The extent of these changes is critical in the vulnerability assessment of an atheroma plaque.Keywords: atherosclerosis, fluid-Structure interaction modeling, material stability analysis, and nonlinear biomechanics
Procedia PDF Downloads 921650 Ferromagnetic Potts Models with Multi Site Interaction
Authors: Nir Schreiber, Reuven Cohen, Simi Haber
Abstract:
The Potts model has been widely explored in the literature for the last few decades. While many analytical and numerical results concern with the traditional two site interaction model in various geometries and dimensions, little is yet known about models where more than two spins simultaneously interact. We consider a ferromagnetic four site interaction Potts model on the square lattice (FFPS), where the four spins reside in the corners of an elementary square. Each spin can take an integer value 1,2,...,q. We write the partition function as a sum over clusters consisting of monochromatic faces. When the number of faces becomes large, tracing out spin configurations is equivalent to enumerating large lattice animals. It is known that the asymptotic number of animals with k faces is governed by λᵏ, with λ ≈ 4.0626. Based on this observation, systems with q < 4 and q > 4 exhibit a second and first order phase transitions, respectively. The transition nature of the q = 4 case is borderline. For any q, a critical giant component (GC) is formed. In the finite order case, GC is simple, while it is fractal when the transition is continuous. Using simple equilibrium arguments, we obtain a (zero order) bound on the transition point. It is claimed that this bound should apply for other lattices as well. Next, taking into account higher order sites contributions, the critical bound becomes tighter. Moreover, for q > 4, if corrections due to contributions from small clusters are negligible in the thermodynamic limit, the improved bound should be exact. The improved bound is used to relate the critical point to the finite correlation length. Our analytical predictions are confirmed by an extensive numerical study of FFPS, using the Wang-Landau method. In particular, the q=4 marginal case is supported by a very ambiguous pseudo-critical finite size behavior.Keywords: entropic sampling, lattice animals, phase transitions, Potts model
Procedia PDF Downloads 1611649 Quoting Jobshops Due Dates Subject to Exogenous Factors in Developing Nations
Authors: Idris M. Olatunde, Kareem B.
Abstract:
In manufacturing systems, especially job shops, service performance is a key factor that determines customer satisfaction. Service performance depends not only on the quality of the output but on the delivery lead times as well. Besides product quality enhancement, delivery lead time must be minimized for optimal patronage. Quoting accurate due dates is sine quo non for job shop operational survival in a global competitive environment. Quoting accurate due dates in job shops has been a herculean task that nearly defiled solutions from many methods employed due to complex jobs routing nature of the system. This class of NP-hard problems possessed no rigid algorithms that can give an optimal solution. Jobshop operational problem is more complex in developing nations due to some peculiar factors. Operational complexity in job shops emanated from political instability, poor economy, technological know-how, and the non-promising socio-political environment. The mentioned exogenous factors were hardly considered in the previous studies on scheduling problem related to due date determination in job shops. This study has filled the gap created in the past studies by developing a dynamic model that incorporated the exogenous factors for accurate determination of due dates for varying jobs complexity. Real data from six job shops selected from the different part of Nigeria, were used to test the efficacy of the model, and the outcomes were analyzed statistically. The results of the analyzes showed that the model is more promising in determining accurate due dates than the traditional models deployed by many job shops in terms of patronage and lead times minimization.Keywords: due dates prediction, improved performance, customer satisfaction, dynamic model, exogenous factors, job shops
Procedia PDF Downloads 4191648 Ethnic Entrepreneurships: Minority Ethnic Students in UiTM Sabah and UMS Perceptions towards Entrepreneurialism Business Interest
Authors: Lizinis Cassendra Frederick Dony, Dewi Binti Tajuddin, Jirom Jeremy Frederick Dony, Andrew Nicholas
Abstract:
Unemployed graduates have become among the world major concerns lately. 70% of Malaysian graduates are jobless. Due to this concerns, this paper aims to identify major factors influencing Sabah minority ethnic favorable in the entrepreneurialism business interest. Hence, extensive introductory entrepreneurship syllabus clusters development beginning from the early childhood, primary, secondary and university students. This may induce interest appeal and to develop focus group of self-employment. The study focus on 7 indicators consist of demographic profiles variable (DP), social norms (SN), attitude (A), self-efficacy (SE) and business management skills (BMS) with reference to university students’ entrepreneurial intention. This study also partially mediates the relationship between product attractiveness (PA) and the minority ethnic entrepreneurialism business interest (MEEBI), by testifying their direct and indirect relationships. Hence, this study provides new perception towards improving the graduates’ characteristic, capabilities to exploit the business opportunities in the market. Furthermore, this paper will assess the relationship with the product attractiveness(PA) as a mediator. The study encompasses on the type of Sabah minority ethnic (ME) and nature of family own business (FOB) background with the 280 samples students in UiTM Sabah and UMS. The descriptive and random sampling method of research which revealed that majority of the respondents agreed that FOB and entrepreneurship education had positively influenced the ethnic students’ involvement in the entrepreneurial process and career development either full-time or part-time basis.Keywords: Demographic profile (DP), soci, unemployed graduates, Malaysian minority
Procedia PDF Downloads 4271647 A Systematic Review of Prevalence, Gender and Age Differences in Cyberbullying Studies in Croatia
Authors: Stjepka Popović, Lucija Vejmelka
Abstract:
Background: Cyberbullying has become a prevalent issue worldwide, including in Croatia. However, a comprehensive understanding of the extent and nature of cyberbullying in the Croatian context is lacking. Objective: The objective of this systematic review is to evaluate the quality of current research conducted in Croatia on the subject of cyberbullying, identify any gaps in the research, and provide suggestions for future investigations. It examines the prevalence gender and age differences of cyberbullying in Croatia. Participants and Setting: Research is done on secondary data resources (published studies) of cyberbullying in Croatia. The participants in these studies that were included in systematic review are children and youth of all ages residing in Croatia who have been involved in cyberbullying incidents. The setting includes various environments where cyberbullying may occur, such as social media platforms and educational institutions. Methods: To identify pertinent studies on cyberbullying in Croatia, a comprehensive exploration of both international and domestic electronic databases was systematically undertaken. Relevant studies were chosen according to predefined criteria that determined inclusion and exclusion. Key findings from the selected studies were extracted and synthesized, enabling the identification of patterns in the data. Results: A total of 43 studies that fulfilled the inclusion criteria were identified in the review. The prevalence of cyberbullying victimization in Croatia ranged from 7% - 55.3%, with adolescents being the most affected group. The prevalence of cyberbullying perpetration was ranging from 3.2% - 30.3%. The most prevalent form of cyberbullying included gossiping and mocking others. Gender and age differences are highlighted. Conclusions: The outcomes of this systematic review highlight the pressing need for targeted interventions and preventative measures to address cyberbullying in Croatia. Additionally, it is crucial to conduct further research to investigate the long-term impacts and potential factors that can help mitigate cyberbullying in the context of Croatia.Keywords: cyberbullying, online risky behavior, Croatia, systematic review
Procedia PDF Downloads 891646 Fused Deposition Modelling as the Manufacturing Method of Fully Bio-Based Water Purification Filters
Authors: Natalia Fijol, Aji P. Mathew
Abstract:
We present the processing and characterisation of three-dimensional (3D) monolith filters based on polylactic acid (PLA) reinforced with various nature-derived nanospecies such as hydroxyapatite, modified cellulose fibers and chitin fibers. The nanospecies of choice were dispersed in PLA through Thermally Induced Phase Separation (TIPS) method. The biocomposites were developed via solvent-assisted blending and the obtained pellets were further single-screw extruded into 3D-printing filaments and processed into various geometries using Fused Deposition Modelling (FDM) technique. The printed prototypes included cubic, cylindrical and hour-glass shapes with diverse patterns of printing infill as well as varying pore structure including uniform and multiple level gradual pore structure. The pores and channel structure as well as overall shape of the prototypes were designed in attempt to optimize the flux and maximize the adsorption-active time. FDM is a cost and energy-efficient method, which does not require expensive tools and elaborated post-processing maintenance. Therefore, FDM offers the possibility to produce customized, highly functional water purification filters with tuned porous structures suitable for removal of wide range of common water pollutants. Moreover, as 3D printing becomes more and more available worldwide, it allows producing portable filters at the place and time where they are most needed. The study demonstrates preparation route for the PLA-based, fully biobased composite and their processing via FDM technique into water purification filters, addressing water treatment challenges on an industrial scale.Keywords: fused deposition modelling, water treatment, biomaterials, 3D printing, nanocellulose, nanochitin, polylactic acid
Procedia PDF Downloads 119