Search results for: communication patterns
2730 The Analysis of Language Shift, Accommodation, Attrition and Effects On Minority Languages In Pakistan
Authors: Afsheen Kashifa, Muhammad Saad Khan
Abstract:
The present study examines the linguistic use of English as a permanent part of the regional languages of Pakistan. This research has delimited its investigation to the language used by the students of English language who speak different regional languages. It deals with the attitudes, causes, and effects of the language shift from regional and minority languages to English. It further gets insights from the feedback provided by the students as respondents that English is replacing the minority languages for being the language of prestige, convenience, and rich vocabulary. These concepts have been achieved through the use of questionnaires and semi-structured interviews. The findings of this research exhibit that the respondents speak English because of its vocabulary and easy way of communication; therefore, they enjoy a high place in society. This research also shows that the speakers of the regional languages are encouraged by their parents to speak English. Eventually, the words and expressions of English, the dominant language, have become a permanent part of the minority languages. Therefore, the minority languages are becoming endangered languages.Keywords: language shift, language accommodation, language attrition, effects on minority languages
Procedia PDF Downloads 1972729 Location Management in Wireless Sensor Networks with Mobility
Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar
Abstract:
Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.Keywords: mobility management, motes, multihop, wireless sensor networks
Procedia PDF Downloads 4232728 Customers’ Intention to Use Electronic Payment System for Purchasing
Authors: Wanida Suwunniponth
Abstract:
The purpose of this research was to study the factors of characteristic of business, website quality and trust affected intention to use electronic payment systems for online purchasing. This survey research used questionnaire as a tool to collect the data of 300 customers who purchased online products and used an electronic payment system. The descriptive statistics and multiple regression analysis were used to analyze data. The results revealed that customers had a good opinion towards the characteristic of the business and website quality. However, they have a moderate opinion towards trust and intention to repurchase. In addition, the characteristics of the business affected the purchase intention the most, followed by website quality and the trust with statistical significance at 0.05 level. For particular, the terms of reputation, communication, information quality, perceived risk and word of mouth affected the intention to use the electronic payment system. In contrast, the terms of size, system quality and service quality did not affect intention to use an electronic payment system.Keywords: electronic payment, intention, online purchasing, trust
Procedia PDF Downloads 2502727 Exploring the Applications of Modular Forms in Cryptography
Authors: Berhane Tewelday Weldhiwot
Abstract:
This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory
Procedia PDF Downloads 272726 Navigating Safety Horizons: A Qualitative Exploration of Jobsite Safety Orientations in the US Construction Industry
Authors: Roxana Poushang Baghery, Matthew D. Reyes
Abstract:
This paper presents a comprehensive investigation into jobsite safety orientation programs within the US construction industry. Through interviews with industry professionals, this paper explores the domains of safety roles, daily safety practices, safety culture, and experts’ insights. This study underscores the pivotal significance of safety orientation programs, addressing their content, coordination, technology integration, and emergency procedures. Key findings emphasize the influential roles of leadership, language, and technology in the enhancement of these programs. Advocating for a paradigm shift, this paper calls for a multifaceted approach rooted in engagement, leadership commitment, clear communication, technological integration, simplicity, and a persistent pursuit of improvement in safety orientations. This study significantly contributes to the ongoing evolution and enhancement of safety practices, ensuring the safety and success of construction projects and, above all, the safeguarding of its workforce.Keywords: jobsite safety orientation, construction industry, safety culture, workplace incidents
Procedia PDF Downloads 792725 Multimodal Database of Emotional Speech, Video and Gestures
Authors: Tomasz Sapiński, Dorota Kamińska, Adam Pelikant, Egils Avots, Cagri Ozcinar, Gholamreza Anbarjafari
Abstract:
People express emotions through different modalities. Integration of verbal and non-verbal communication channels creates a system in which the message is easier to understand. Expanding the focus to several expression forms can facilitate research on emotion recognition as well as human-machine interaction. In this article, the authors present a Polish emotional database composed of three modalities: facial expressions, body movement and gestures, and speech. The corpora contains recordings registered in studio conditions, acted out by 16 professional actors (8 male and 8 female). The data is labeled with six basic emotions categories, according to Ekman’s emotion categories. To check the quality of performance, all recordings are evaluated by experts and volunteers. The database is available to academic community and might be useful in the study on audio-visual emotion recognition.Keywords: body movement, emotion recognition, emotional corpus, facial expressions, gestures, multimodal database, speech
Procedia PDF Downloads 3522724 Modern Spectrum Sensing Techniques for Cognitive Radio Networks: Practical Implementation and Performance Evaluation
Authors: Antoni Ivanov, Nikolay Dandanov, Nicole Christoff, Vladimir Poulkov
Abstract:
Spectrum underutilization has made cognitive radio a promising technology both for current and future telecommunications. This is due to the ability to exploit the unused spectrum in the bands dedicated to other wireless communication systems, and thus, increase their occupancy. The essential function, which allows the cognitive radio device to perceive the occupancy of the spectrum, is spectrum sensing. In this paper, the performance of modern adaptations of the four most widely used spectrum sensing techniques namely, energy detection (ED), cyclostationary feature detection (CSFD), matched filter (MF) and eigenvalues-based detection (EBD) is compared. The implementation has been accomplished through the PlutoSDR hardware platform and the GNU Radio software package in very low Signal-to-Noise Ratio (SNR) conditions. The optimal detection performance of the examined methods in a realistic implementation-oriented model is found for the common relevant parameters (number of observed samples, sensing time and required probability of false alarm).Keywords: cognitive radio, dynamic spectrum access, GNU Radio, spectrum sensing
Procedia PDF Downloads 2502723 Women with Invisible Wounds: A Qualitative Exploration of Emotional Abuse
Authors: Mehar Pruthi, Manjula V.
Abstract:
For the longest time, Indian households have been hosts to a variety of domestic evils such as intimate partner violence, physical abuse, sexual assaults, and more commonly gender-based violence. The prevalence of such heinous acts against women is often swept under the carpet of patriarchy and leaves women scarred. Many times, these wounds are caused by more insidious and subtle acts of violence. For this study, the choice of term for these acts is Emotional Abuse. The ill effects of emotional abuse on the victim’s sense of self and psychological health have been widely established. The current study takes a qualitative approach to explore women’s experiences at the brunt of emotional abuse. To this end, six participants (N=6) were identified using purposive and snowball sampling which was followed by a pre-screening form to assess for the presence of emotional abuse. A semi-structured interview guide was employed to investigate the victim’s perception of emotional abuse, the manifestation of emotional abuse in a patriarchal society, and the reasons women remain in abusive relationships. Each interview lasted about 50-60 mins and was accompanied by extensive note-making. A preliminary analysis of the interviews was done using the Interpretative Phenomenological Approach. Initial findings reveal the emergence of themes such as feelings of loneliness, intergenerational transmission of violence, denial, justifying the partner’s behavior, staying because of children, hoping things would change, and faith in God. The study is instrumental in conceptualizing the patterns of emotional abuse keeping in mind the patriarchal context of the Indian society. It has implications for professionals in the mental health field who work with this population so they can better understand their plight. Future research could focus on rebuilding relationships for those partners who decide to sustain such relationships and focus on various coping mechanisms with special emphasis on religious beliefs.Keywords: emotional abuse, gender-based violence, intimate partner violence, marriage, patriarchy
Procedia PDF Downloads 942722 Design and Implementation of a Bluetooth-Based Misplaced Object Finder Using DFRobot Arduino Interfaced with Led and Buzzer
Authors: Bright Emeni
Abstract:
The project is a system that allows users to locate their misplaced or lost devices by using Bluetooth technology. It utilizes the DFRobot Bettle BLE Arduino microcontroller as its main component for communication and control. By interfacing it with an LED and a buzzer, the system provides visual and auditory signals to assist in locating the target device. The search process can be initiated through an Android application, by which the system creates a Bluetooth connection between the microcontroller and the target device, permitting the exchange of signals for tracking purposes. When the device is within range, the LED indicator illuminates, and the buzzer produces audible alerts, guiding the user to the device's location. The application also provides an estimated distance of the object using Bluetooth signal strength. The project’s goal is to offer a practical and efficient solution for finding misplaced devices, leveraging the capabilities of Bluetooth technology and microcontroller-based control systems.Keywords: Bluetooth finder, object finder, Bluetooth tracking, tracker
Procedia PDF Downloads 682721 Mobile Device Applications in Physical Education: Investigating New Pedagogical Possibilities
Authors: Danica Vidotto
Abstract:
Digital technology is continuing to disrupt and challenge local conventions of teaching and education. As mobile devices continue to make their way into contemporary classrooms, educators need new pedagogies incorporating information communication technology to help reform the learning environment. In physical education, however, this can seem controversial as physical inactivity is often related to an excess of screen-time. This qualitative research project is an investigation on how physical educators use mobile device applications (apps) in their pedagogy and to what end. A comprehensive literature review is included to examine and engage current academic research of new pedagogies and technology, and their relevance to physical activity. Data were collected through five semi-structured interviews resulting in three overarching themes; i) changing pedagogies in physical education; ii) the perceived benefits and experienced challenges of using apps; and iii) apps, physical activity, and physical education. This study concludes with a discussion of the findings engaging the literature, discussing the implications of findings, and recommendations for future research.Keywords: applications (apps), mobile devices, new pedagogies, physical education
Procedia PDF Downloads 1962720 A Study on the Impacts of Computer Aided Design on the Architectural Design Process
Authors: Halleh Nejadriahi, Kamyar Arab
Abstract:
Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.Keywords: architecture, architectural practice, computer aided design (CAD), design process
Procedia PDF Downloads 3632719 Bridge Construction and Type of Bridges and Their Construction Methods
Authors: Mokhtar Nikgoo
Abstract:
Definition of bridge: A bridge is a structure that allows people to pass through the communication road with two points. There are many different types of bridges, each of which is designed to perform a specific function. This article introduces the concept, history, components, uses, types, construction methods, selected factors, damage factors and principles of bridge maintenance. A bridge is a structure to cross a passage such as a water, valley or road without blocking another path underneath. This structure makes it possible to pass obstacles that are difficult or impossible to pass. There are different designs for bridge construction, each of which is used for a particular function and condition. In the old definition, a bridge is an arch over a river, valley, or any type of passage that makes traffic possible. But today, in the topic of urban management, the bridge is considered as a structure to cross physical barriers, so that while using space (not just the surface of the earth), it can facilitate the passage and access to places. The useful life of bridges may be between 30 and 80 years depending on the location and the materials used. But with proper maintenance and improvement, their life may last for hundreds of years.Keywords: bridge, road construction, surveying, transportation
Procedia PDF Downloads 5162718 Sense of Involvement and Support in Persons with Cognitive Decline in Ordinary Dwelling
Authors: Annika Kjallman Alm, Ove Hellzen, Malin Rising-Holmstrom
Abstract:
Worldwide, the number of people who are living with dementia is increasing because of an aging population, which leads to increased financial and social costs, including reduced quality of life for people with dementia and their care partners. Most people who have dementia reside in the community. Aging in place could be described as having the health and social supports and services you need to live safely and independently in your home or your society for as long as you wish and are able. People with dementia are not different than people without dementia where they want to remain at home, if possible, with a sense of familiarity and engagement in typical everyday activities. So how do persons with dementia or cognitive decline see their possibilities to be socially involved and experience support? The aim of this study was to explore persons with cognitive decline's sense of involvement and support living in the ordinary dwelling. The study was approved by the Ethical Review Authority in Sweden prior to the interviews. Interviews were conducted with 20 persons living at home, either alone or in a relationship. The persons had perceived cognitive decline; some were under investigation or already had a diagnose of early dementia. Thematic analysis was used to identify, analyze, and report patterns within the data. Researchers extracted three main themes through participants’ interviews: a) Importance of social involvement with family and friends. b) Hindrances for social involvement. c) Struggling mentally with a new life situation. Results found that going to activity centers, staying involved, and meeting friends and family enhanced the sense of involvement and support. There were also hindrances to a sense of involvement and support as they struggled with the diagnose and the changes in daily life, such as physical problems, mental problems, or economic issues. The mental struggle of accepting the cognitive decline and the changes in daily life it brought was also an issue for some of the participants. A multidimensional support should be provided by the community to enable persons with cognitive decline to stay involved in family and community in the comfort of their own homes.Keywords: aging in place, cognitive decline, dementia, sense of involvement
Procedia PDF Downloads 1452717 Investing in Minds: A Financial Framework for Mental Health and Well-Being in the Workplace
Authors: Abdelrahman A. Elsehsah, Nada A. El-Kordy
Abstract:
The "Investing in Minds: A Financial Framework for Mental Health and Well-Being in the Workplace" project is designed to enhance employee mental health and well-being through a structured and comprehensive approach that includes program development, implementation, and evaluation. This initiative acknowledges the growing importance of mental health in workplace settings, particularly in light of rising stress levels and the prevalence of mental health issues among employees. Research indicates that mental health challenges can significantly impact workforce productivity and overall employee engagement. To effectively address these challenges, the project will commence with a detailed needs assessment aimed at identifying the specific mental health issues faced by employees across various organizational contexts. This assessment will provide critical insights into the unique challenges within different sectors, enabling the development of targeted training and support programs tailored to meet these needs. The importance of understanding the specific mental health landscape within an organization cannot be overstated, as it lays the groundwork for effective interventions. Implementation of the project will feature several key components, including the introduction of Employee Assistance Programs (EAPs), wellness initiatives, and strategies for enhancing the workplace environment to foster a supportive atmosphere for mental health. EAPs have been shown to provide valuable resources and support for employees dealing with personal and professional challenges, thereby improving their overall well-being and j7ob satisfaction. Moreover, wellness initiatives can promote healthy behaviors and resilience among employees, contributing to a more positive workplace culture. A robust communication strategy will also be integral to the project's success. By ensuring that all employees are aware of the available resources and programs, the project aims to foster a culture of openness and support regarding mental health issues. Effective communication has been highlighted as a critical factor in the successful implementation of workplace mental health initiatives. This aspect of the project will involve not only disseminating information but also creating avenues for employees to engage in discussions about mental health, thereby reducing stigma and promoting a more accepting environment. The project's impact will be rigorously evaluated using both quantitative and qualitative measures. This comprehensive evaluation framework will allow for a deeper understanding of the effectiveness of the initiatives and will provide valuable feedback for continuous improvement by establishing clear metrics for success, organizations can monitor progress and make adjustments as needed to ensure that mental health support remains relevant and effective over time. The anticipated benefits of the "Investing in Minds" project include reduced healthcare costs, improved employee retention, and enhanced organizational performance. By prioritizing mental health, organizations can create a healthier workplace culture that not only improves employee morale but also contributes to better business outcomes. Ultimately, this project seeks not only to address immediate mental health needs but also to establish a sustainable framework for ongoing mental health support within the organization, ensuring that mental well-being becomes an integral part of the workplace ethos.Keywords: mental health, workplace well-being, employee assistance programs, evaluation framework
Procedia PDF Downloads 132716 Machine Learning Automatic Detection on Twitter Cyberbullying
Authors: Raghad A. Altowairgi
Abstract:
With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost
Procedia PDF Downloads 1372715 Attributes of Ethical Leadership and Ethical Guidelines in Malaysian Public Sector
Authors: M. Norazamina, A. Azizah, Y. Najihah Marha, A. Suraya
Abstract:
Malaysian Public Sector departments or agencies are responsible to provide efficient public services with zero corruption. However, corruption continues to occur due to the absence of ethical leadership and well-execution of ethical guidelines. Thus, the objective of this paper is to explore the attributes of ethical leadership and ethical guidelines. This study employs a qualitative research by analyzing data from interviews with key informers of public sector using conceptual content analysis (NVivo11). The study reveals eight attributes of ethical leadership which are role model, attachment, ethical support, knowledgeable, discipline, leaders’ spirituality encouragement, virtue values and shared values. Meanwhile, five attributes (guidelines, communication, check and balance, concern on stakeholders and compliance) of ethical guidelines are identified. These identified attributes should become the ethical identity and ethical direction of Malaysian Public Sector. This could enhance the public trust as well as the international community trust towards the public sector.Keywords: check and balance, ethical guidelines, ethical leadership, public sector, spirituality encouragement
Procedia PDF Downloads 2632714 Quantitative Risk Analysis for Major Subsystems and Project Success of a Highthrouput Satellite
Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Babadoko Dantala Mohammed, Moshood Kareem Olawole
Abstract:
This paper dwells on the risk management required for High throughput Satellite (HTS) project, and major subsystems that pertains to the improved performance and reliability of the spacecraft. The paper gives a clear picture of high‐throughput satellites (HTS) and the associated technologies with performances as they align and differ with the traditional geostationary orbit or Geosynchronous Equatorial Orbit (GEO) Communication Satellites. The paper also highlights critical subsystems and processes in project conceptualization and execution. The paper discusses the configuration of the payload. The need for optimization of resources for the HTS project and successful integration of critical subsystems for spacecraft requires implementation of risk analysis and mitigation from the preliminary design stage; Assembly, Integration and Test (AIT); Launch and in-orbit- Management stage.Keywords: AIT, HTS, in-orbit management, optimization
Procedia PDF Downloads 1062713 Studying the Schema of Afghan Immigrants about Iranians; A Case Study of Immigrants in Tehran Province
Authors: Mohammad Ayobi
Abstract:
Afghans have been immigrating to Iran for many years; The re-establishment of the Taliban in Afghanistan caused a flood of Afghan immigrants to Iran. One of the important issues related to the arrival of Afghan immigrants is the view that Afghan immigrants have toward Iranians. In this research, we seek to identify the schema of Afghan immigrants living in Iran about Iranians. A schema is a set of data or generalized knowledge that is formed in connection with a particular group or a particular person, or even a particular nationality to identify a person with pre-determined judgments about certain matters. The schemata between certain nationalities have a direct impact on the formation of interactions between them and can be effective in establishing or not establishing proper communication between the Afghan immigrant nationality and Iranians. For the scientific understanding of research, we use the theory of “schemata.” The method of this study is qualitative, and its data will be collected through semi-structured deep interviews, and data will be analyzed by thematic analysis. The expected findings in this study are that the schemata of Afghan immigrants are more negative than Iranians because Iranians are self-centered and fanatical about Afghans, and Afghans are only workers to them.Keywords: schema study, Afghan immigrants, Iranians, in-depth interview
Procedia PDF Downloads 892712 Simultaneous Interpreting in the European Parliament: Linguistic Quality of the Political Discourse: An Empirical Analysis
Authors: Alicja Zapolnik-Plachetka
Abstract:
The paper examines the impact of the Members’ of the European Parliament (MEPs) language choice on the linguistic quality of their political discourse as delivered by the interpreters. The study, designed by the author, who is an EU interpreter herself, consisted of three phases. First, a number of speeches of Polish and Spanish MEPs were analyzed to determine whether the incidence of use of certain figures of speech depending on whether the speech had been delivered in English or their respective mother tongue. Then the use of figures of speech was also analyzed based on speeches by some British MEPs, in order to determine what was the incidence for the native users of English. Subsequently, the speeches were compared with their interpretations to find out whether the interpreters managed to convey accurately the means of oratory used by the MEPs. The final result shows that in case of institutional environments dependant on simultaneous interpretation the speakers’ choices can, in fact, influence the linguistic quality of the political communication.Keywords: content accuracy, European Parliament, political discourse, simultaneous interpreting
Procedia PDF Downloads 1332711 A Coupled Model for Two-Phase Simulation of a Heavy Water Pressure Vessel Reactor
Authors: D. Ramajo, S. Corzo, M. Nigro
Abstract:
A Multi-dimensional computational fluid dynamics (CFD) two-phase model was developed with the aim to simulate the in-core coolant circuit of a pressurized heavy water reactor (PHWR) of a commercial nuclear power plant (NPP). Due to the fact that this PHWR is a Reactor Pressure Vessel type (RPV), three-dimensional (3D) detailed modelling of the large reservoirs of the RPV (the upper and lower plenums and the downcomer) were coupled with an in-house finite volume one-dimensional (1D) code in order to model the 451 coolant channels housing the nuclear fuel. Regarding the 1D code, suitable empirical correlations for taking into account the in-channel distributed (friction losses) and concentrated (spacer grids, inlet and outlet throttles) pressure losses were used. A local power distribution at each one of the coolant channels was also taken into account. The heat transfer between the coolant and the surrounding moderator was accurately calculated using a two-dimensional theoretical model. The implementation of subcooled boiling and condensation models in the 1D code along with the use of functions for representing the thermal and dynamic properties of the coolant and moderator (heavy water) allow to have estimations of the in-core steam generation under nominal flow conditions for a generic fission power distribution. The in-core mass flow distribution results for steady state nominal conditions are in agreement with the expected from design, thus getting a first assessment of the coupled 1/3D model. Results for nominal condition were compared with those obtained with a previous 1/3D single-phase model getting more realistic temperature patterns, also allowing visualize low values of void fraction inside the upper plenum. It must be mentioned that the current results were obtained by imposing prescribed fission power functions from literature. Therefore, results are showed with the aim of point out the potentiality of the developed model.Keywords: PHWR, CFD, thermo-hydraulic, two-phase flow
Procedia PDF Downloads 4722710 Microbial Phylogenetic Divergence between Surface-Water and Sedimentary Ecosystems Drove the Resistome Profiles
Authors: Okugbe Ebiotubo Ohore, Jingli Zhang, Binessi Edouard Ifon, Mathieu Nsenga Kumwimba, Xiaoying Mu, Dai Kuang, Zhen Wang, Ji-Dong Gu, Guojing Yang
Abstract:
Antibiotic pollution and the evolution of antibiotic resistance genes (ARGs) are increasingly viewed as major threats to both ecosystem security and human health, and has drawn attention. This study investigated the fate of antibiotics in aqueous and sedimentary substrates and the impact of ecosystem shifts between water and sedimentary phases on resistome profiles. The findings indicated notable variations in the concentration and distribution patterns of antibiotics across various environmental phases. Based on the partition coefficient (Kd), the total antibiotic concentration was significantly greater in the surface water (1405.45 ng/L; 49.5%) compared to the suspended particulate matter (Kd =0.64; 892.59 ng/g; 31.4%) and sediment (Kd=0.4; 542.64 ng/g; 19.1%). However, the relative abundance of ARGs in surface water and sediment was disproportionate to the abundance of antibiotics concentration, and sediments were the predominant ARGs reservoirs. Phylogenetic divergence of the microbial communities between the surface water and the sedimentary ecosystems potentially played important roles in driving the ARGs profiles between the two distinctive ecosystems. ARGs of Clinical importance; including blaGES, MCR-7.1, ermB, tet(34), tet36, tetG-01, and sul2 were significantly increased in the surface water, while blaCTX-M-01, blaTEM, blaOXA10-01, blaVIM, tet(W/N/W), tetM02, and ermX were amplified in the sediments. cfxA was an endemic ARG in surface-water ecosystems while the endemic ARGs of the sedimentary ecosystems included aacC4, aadA9-02, blaCTX-M-04, blaIMP-01, blaIMP-02, bla-L1, penA, erm(36), ermC, ermT-01, msrA-01, pikR2, vgb-01, mexA, oprD, ttgB, and aac. These findings offer a valuable information for the identification of ARGs-specific high-risk reservoirs.Keywords: antibiotic resistance genes, microbial diversity, suspended particulate matter, sediment, surface water
Procedia PDF Downloads 332709 The Importance of Patenting and Technology Exports as Indicators of Economic Development
Authors: Hugo Rodríguez
Abstract:
The patenting of inventions is the result of an organized effort to achieve technological improvement and its consequent positive impact on the population's standard of living. Technology exports, either of high-tech goods or of Information and Communication Technology (ICT) services, represent the level of acceptance that world markets have of that technology acquired or developed by a country, either in public or private settings. A quantitative measure of the above variables is expected to have a positive and relevant impact on the level of economic development of the countries, measured on this first occasion through their level of Gross Domestic Product (GDP). And in that sense, it not only explains the performance of an economy but the difference between nations. We present an econometric model where we seek to explain the difference between the GDP levels of 178 countries through their different performance in the outputs of the technological production process. We take the variables of Patenting, ICT Exports and High Technology Exports as results of the innovation process. This model achieves an explanatory power for four annual cuts (2000, 2005, 2010 and 2015) equivalent to an adjusted r2 of 0.91, 0.87, 0.91 and 0.96, respectively.Keywords: Development, exports, patents, technology
Procedia PDF Downloads 1152708 Key Performance Indicators and the Model for Achieving Digital Inclusion for Smart Cities
Authors: Khalid Obaed Mahmod, Mesut Cevik
Abstract:
The term smart city has appeared recently and was accompanied by many definitions and concepts, but as a simplified and clear definition, it can be said that the smart city is a geographical location that has gained efficiency and flexibility in providing public services to citizens through its use of technological and communication technologies, and this is what distinguishes it from other cities. Smart cities connect the various components of the city through the main and sub-networks in addition to a set of applications and thus be able to collect data that is the basis for providing technological solutions to manage resources and provide services. The basis of the work of the smart city is the use of artificial intelligence and the technology of the Internet of Things. The work presents the concept of smart cities, the pillars, standards, and evaluation indicators on which smart cities depend, and the reasons that prompted the world to move towards its establishment. It also provides a simplified hypothetical way to measure the ideal smart city model by defining some indicators and key pillars, simulating them with logic circuits, and testing them to determine if the city can be considered an ideal smart city or not.Keywords: factors, indicators, logic gates, pillars, smart city
Procedia PDF Downloads 1562707 Optimization of an Electro-Submersible Pump for Crude Oil Extraction Processes
Authors: Deisy Becerra, Nicolas Rios, Miguel Asuaje
Abstract:
The Electrical Submersible Pump (ESP) is one of the most artificial lifting methods used in the last years, which consists of a serial arrangement of centrifugal pumps. One of the main concerns when handling crude oil is the formation of O/W or W/O (oil/water or water/oil) emulsions inside the pump, due to the shear rate imparted and the presence of high molecular weight substances that act as natural surfactants. Therefore, it is important to perform an analysis of the flow patterns inside the pump to increase the percentage of oil recovered using the centrifugal force and the difference in density between the oil and the water to generate the separation of liquid phases. For this study, a Computational Fluid Dynamic (CFD) model was developed on STAR-CCM+ software based on 3D geometry of a Franklin Electric 4400 4' four-stage ESP. In this case, the modification of the last stage was carried out to improve the centrifugal effect inside the pump, and a perforated double tube was designed with three different holes configurations disposed at the outlet section, through which the cut water flows. The arrangement of holes used has different geometrical configurations such as circles, rectangles, and irregular shapes determined as grating around the tube. The two-phase flow was modeled using an Eulerian approach with the Volume of Fluid (VOF) method, which predicts the distribution and movement of larger interfaces in immiscible phases. Different water-oil compositions were evaluated, such as 70-30% v/v, 80-20% v/v and 90-10% v/v, respectively. Finally, greater recovery of oil was obtained. For the several compositions evaluated, the volumetric oil fraction was greater than 0.55 at the pump outlet. Similarly, it is possible to show an inversely proportional relationship between the Water/Oil rate (WOR) and the volumetric flow. The volumetric fractions evaluated, the oil flow increased approximately between 41%-10% for circular perforations and 49%-19% for rectangular shaped perforations, regarding the inlet flow. Besides, the elimination of the pump diffuser in the last stage of the pump reduced the head by approximately 20%.Keywords: computational fluid dynamic, CFD, electrical submersible pump, ESP, two phase flow, volume of fluid, VOF, water/oil rate, WOR
Procedia PDF Downloads 1612706 Investigation of Roll-Off Factor in Pulse Shaping Filter on Maximal Ratio Combining for CDMA 2000 System
Authors: G. S. Walia, H. P. Singh, D. Padma
Abstract:
The integration of wide variety of communication services is made possible with invention of 3G technology. Code Division Multiple Access 2000 operates on various RF channel bandwidths 1.2288 or 3.6864 Mcps (1x or 3x systems). It is a 3G system which offers high bandwidth and wireless broadband services but its efficiency is lowered due to various factors like fading, interference, scattering, absorption etc. This paper investigates the effect of diversity (MRC), roll off factor in Root Raised Cosine (RRC) filter for the BPSK and QPSK modulation schemes. It is possible to transmit data with minimum Inter symbol Interference and within limited bandwidth with proper pulse shaping technique. Bit error rate (BER) performance is analyzed by applying diversity technique by varying the roll off factor for BPSK and QPSK. Roll off factor reduces the ISI and diversity reduces the Fading.Keywords: CDMA2000, root raised cosine, roll-off factor, ISI, diversity, interference, fading
Procedia PDF Downloads 4102705 Adopting Structured Mini Writing Retreats as a Tool for Undergraduate Researchers
Authors: Clare Cunningham
Abstract:
Whilst there is a strong global research base on the benefits of structured writing retreats and similar provisions, such as Shut Up and Write events, for academic staff and postgraduate researchers, very little has been published about the worth of such events for undergraduate students. This is despite the fact that, internationally, undergraduate student researchers experience similar pressures, distractions and feelings towards writing as those who are at more senior levels within the academy. This paper reports on a mixed-methods study with cohorts of third-year undergraduate students over the course of four academic years. This involved a range of research instruments adopted over the four years of the study. They include the administration of four questionnaires across three academic years, a collection of ethnographic recordings in the second year, and the collation of reflective journal entries and evaluations from all four years. The final two years of data collection took place during the period of Covid-19 restrictions when writing retreats moved to the virtual space which adds an additional dimension of interest to the analysis. The analysis involved the collation of quantitative questionnaire data to observe patterns in expressions of attitudes towards writing. Qualitative data were analysed thematically and used to corroborate and support the quantitative data when appropriate. The resulting data confirmed that one of the biggest challenges for undergraduate students mirrors those reported in the findings of studies focused on more experienced researchers. This is not surprising, especially given the number of undergraduate students who now work alongside their studies, as well as the increasing number who have caring responsibilities, but it has, as yet, been under-reported. The data showed that the groups of writing retreat participants all had very positive experiences, with accountability, a sense of community and procrastination avoidance some of the key aspects. The analysis revealed the sometimes transformative power of these events for a number of these students in terms of changing the way they viewed writing and themselves as writers. The data presented in this talk will support the proposal that retreats should much more widely be offered to undergraduate students across the world.Keywords: academic writing, students, undergraduates, writing retreat
Procedia PDF Downloads 2062704 Integrated Risk Assessment of Storm Surge and Climate Change for the Coastal Infrastructure
Authors: Sergey V. Vinogradov
Abstract:
Coastal communities are presently facing increased vulnerabilities due to rising sea levels and shifts in global climate patterns, a trend expected to escalate in the long run. To address the needs of government entities, the public sector, and private enterprises, there is an urgent need to thoroughly investigate, assess, and manage the present and projected risks associated with coastal flooding, including storm surges, sea level rise, and nuisance flooding. In response to these challenges, a practical approach to evaluating storm surge inundation risks has been developed. This methodology offers an integrated assessment of potential flood risk in targeted coastal areas. The physical modeling framework involves simulating synthetic storms and utilizing hydrodynamic models that align with projected future climate and ocean conditions. Both publicly available and site-specific data form the basis for a risk assessment methodology designed to translate inundation model outputs into statistically significant projections of expected financial and operational consequences. This integrated approach produces measurable indicators of impacts stemming from floods, encompassing economic and other dimensions. By establishing connections between the frequency of modeled flood events and their consequences across a spectrum of potential future climate conditions, our methodology generates probabilistic risk assessments. These assessments not only account for future uncertainty but also yield comparable metrics, such as expected annual losses for each inundation event. These metrics furnish stakeholders with a dependable dataset to guide strategic planning and inform investments in mitigation. Importantly, the model's adaptability ensures its relevance across diverse coastal environments, even in instances where site-specific data for analysis may be limited.Keywords: climate, coastal, surge, risk
Procedia PDF Downloads 612703 Enhancement of Long Term Peak Demand Forecast in Peninsular Malaysia Using Hourly Load Profile
Authors: Nazaitul Idya Hamzah, Muhammad Syafiq Mazli, Maszatul Akmar Mustafa
Abstract:
The peak demand forecast is crucial to identify the future generation plant up needed in the long-term capacity planning analysis for Peninsular Malaysia as well as for the transmission and distribution network planning activities. Currently, peak demand forecast (in Mega Watt) is derived from the generation forecast by using load factor assumption. However, a forecast using this method has underperformed due to the structural changes in the economy, emerging trends and weather uncertainty. The dynamic changes of these drivers will result in many possible outcomes of peak demand for Peninsular Malaysia. This paper will look into the independent model of peak demand forecasting. The model begins with the selection of driver variables to capture long-term growth. This selection and construction of variables, which include econometric, emerging trend and energy variables, will have an impact on the peak forecast. The actual framework begins with the development of system energy and load shape forecast by using the system’s hourly data. The shape forecast represents the system shape assuming all embedded technology and use patterns to continue in the future. This is necessary to identify the movements in the peak hour or changes in the system load factor. The next step would be developing the peak forecast, which involves an iterative process to explore model structures and variables. The final step is combining the system energy, shape, and peak forecasts into the hourly system forecast then modifying it with the forecast adjustments. Forecast adjustments are among other sales forecasts for electric vehicles, solar and other adjustments. The framework will result in an hourly forecast that captures growth, peak usage and new technologies. The advantage of this approach as compared to the current methodology is that the peaks capture new technology impacts that change the load shape.Keywords: hourly load profile, load forecasting, long term peak demand forecasting, peak demand
Procedia PDF Downloads 1782702 The Use of Space Syntax in Urban Transportation Planning and Evaluation: Limits and Potentials
Authors: Chuan Yang, Jing Bie, Yueh-Lung Lin, Zhong Wang
Abstract:
Transportation planning is an academic integration discipline combining research and practice with the aim of mobility and accessibility improvements at both strategic-level policy-making and operational dimensions of practical planning. Transportation planning could build the linkage between traffic and social development goals, for instance, economic benefits and environmental sustainability. The transportation planning analysis and evaluation tend to apply empirical quantitative approaches with the guidance of the fundamental principles, such as efficiency, equity, safety, and sustainability. Space syntax theory has been applied in the spatial distribution of pedestrian movement or vehicle flow analysis, however rare has been written about its application in transportation planning. The correlated relationship between the variables of space syntax analysis and authentic observations have declared that the urban configurations have a significant effect on urban dynamics, for instance, land value, building density, traffic, crime. This research aims to explore the potentials of applying Space Syntax methodology to evaluate urban transportation planning through studying the effects of urban configuration on cities transportation performance. By literature review, this paper aims to discuss the effects that urban configuration with different degrees of integration and accessibility have on three elementary components of transportation planning - transportation efficiency, transportation safety, and economic agglomeration development - via intensifying and stabilising the nature movements generated by the street network. And then the potential and limits of Space Syntax theory to study the performance of urban transportation and transportation planning would be discussed in the paper. In practical terms, this research will help future research explore the effects of urban design on transportation performance, and identify which patterns of urban street networks would allow for most efficient and safe transportation performance with higher economic benefits.Keywords: transportation planning, space syntax, economic agglomeration, transportation efficiency, transportation safety
Procedia PDF Downloads 2012701 HPPDFIM-HD: Transaction Distortion and Connected Perturbation Approach for Hierarchical Privacy Preserving Distributed Frequent Itemset Mining over Horizontally-Partitioned Dataset
Authors: Fuad Ali Mohammed Al-Yarimi
Abstract:
Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the perturbation approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The perturbation approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new scalable protocol is proposed which combines the advantages of the perturbation and distortion along with cryptographic approach to perform privacy preserving in distributed frequent itemset mining on horizontally distributed data. Both the privacy and performance characteristics of the proposed protocol are studied empirically.Keywords: anonymity data, data mining, distributed frequent itemset mining, gaussian perturbation, perturbation approach, privacy preserving data mining
Procedia PDF Downloads 508