Search results for: design with nature
11606 Capability of a Single Antigen to Induce Both Protective and Disease Enhancing Antibody: An Obstacle in the Creation of Vaccines and Passive Immunotherapies
Authors: Parul Kulshreshtha, Subrata Sinha, Rakesh Bhatnagar
Abstract:
This study was conducted by taking B. anthracis as a model pathogen. On infecting a host, B. anthracis secretes three proteins, namely, protective antigen (PA, 83kDa), edema factor (EF, 89 kDa) and lethal factor (LF, 90 kDa). These three proteins are the components of two anthrax toxins. PA binds to the cell surface receptors, namely, tumor endothelial marker (TEM) 8 and capillary morphogenesis protein (CMG) 2. TEM8 and CMG2 interact with LDL-receptor related protein (LRP) 6 for endocytosis of EF and LF. On entering the cell, EF acts as a calmodulin-dependent adenylate cyclase that causes a prolonged increase of cytosolic cyclic adenosine monophosphate (cAMP). LF is a metalloprotease that cleaves most isoforms of mitogen-activated protein kinase kinases (MAPKK/MEK) close to their N-terminus. By secreting these two toxins, B.anthracis ascertains death of the host. Once the systemic levels of the toxins rise, antibiotics alone cannot save the host. Therefore, toxin-specific inhibitors have to be developed. In this wake, monoclonal antibodies have been developed for the neutralization of toxic effects of anthrax toxins. We created hybridomas by using spleen of mice that were actively immunized with rLFn (recombinant N-terminal domain of lethal factor of B. anthracis) to obtain anti-toxin antibodies. Later on, separate group of mice were immunized with rLFn to obtain a polyclonal control for passive immunization studies of monoclonal antibodies. This led to the identification of one cohort of rLFn-immunized mice that harboured disease-enhancing polyclonal antibodies. At the same time, the monoclonal antibodies from all the hybridomas were being tested. Two hybridomas secreted monoclonal antibodies (H8 and H10) that were cross-reactive with EF (edema factor) and LF (lethal factor), while the other two hybridomas secreted LF-specific antibodies (H7 and H11). The protective efficacy of H7, H8, H10 and H11 was investigated. H7, H8 and H10 were found to be protective. H11 was found to have disease enhancing characteristics in-vitro and in mouse model of challenge with B. anthracis. In this study the disease enhancing character of H11 monoclonal antibody and anti-rLFn polyclonal sera was investigated. Combination of H11 with protective monoclonal antibodies (H8 and H10) reduced its disease enhancing nature both in-vitro and in-vivo. But combination of H11 with LETscFv (an scFv with VH and VL identical to H10 but lacking Fc region) could not abrogate the disease-enhancing character of H11 mAb. Therefore it was concluded that for suppression of disease enhancement, Fc portion was absolutely essential for interaction of H10 with H11. Our study indicates that the protective potential of an antibody depends equally on its idiotype/ antigen specificity and its isotype. A number of monoclonal and engineered antibodies are being explored as immunotherapeutics but it is absolutely essential to characterize each one for their individual and combined protective potential. Although new in the sphere of toxin-based diseases, it is extremely important to characterize the disease-enhancing nature of polyclonal as well as monoclonal antibodies. This is because several anti-viral therapeutics and vaccines have failed in the face of this phenomenon. The passive –immunotherapy thus needs to be well formulated to avoid any contraindications.Keywords: immunotherapy, polyclonal, monoclonal, antibody-dependent disease enhancement
Procedia PDF Downloads 38611605 A Method for Consensus Building between Teachers and Learners in a Value Co-Creative Learning Service
Authors: Ryota Sugino, Satoshi Mizoguchi, Koji Kimita, Keiichi Muramatsu, Tatsunori Matsui, Yoshiki Shimomura
Abstract:
Improving added value and productivity of services entails improving both value-in-exchange and value-in-use. Value-in-use is realized by value co-creation, where providers and receivers create value together. In higher education services, value-in-use comes from learners achieving learning outcomes (e.g., knowledge and skills) that are consistent with their learning goals. To enhance the learning outcomes of a learner, it is necessary to enhance and utilize the abilities of the teacher along with the abilities of the learner. To do this, however, the learner and the teacher need to build a consensus about their respective roles. Teachers need to provide effective learning content; learners need to choose the appropriate learning strategies by using the learning content through consensus building. This makes consensus building an important factor in value co-creation. However, methods to build a consensus about their respective roles may not be clearly established, making such consensus difficult. In this paper, we propose some strategies for consensus building between a teacher and a learner in value co-creation. We focus on a teacher and learner co-design and propose an analysis method to clarify a collaborative design process to realize value co-creation. We then analyze some counseling data obtained from a university class. This counseling aimed to build a consensus for value-in-use, learning outcomes, and learning strategies between the teacher and the learner.Keywords: consensus building, value co-creation, higher education, learning service
Procedia PDF Downloads 30311604 The Effects of Consistently Reading Whole Novels on the Reading Comprehension of Adolescents with Developmental Disabilities
Authors: Pierre Brocas, Konstantinos Rizos
Abstract:
This study was conducted to test the effects of introducing a consistent pace and volume of reading whole narratives on adolescents' reading comprehension with a diagnosis of autism spectrum disorder (ASD). The study was inspired by previous studies conducted on poorer adolescent readers in English schools. The setting was a Free Special Education Needs school in England. Nine male and one female student, between 11-13 years old, across two classrooms participated in the study. All students had a diagnosis of ASD, and all were classified as advanced learners. The classroom teachers introduced reading a whole challenging novel in 12 weeks with consistency as the independent variable. The study used a before-and-after design of testing the participants’ reading comprehension using standardised tests. The participants made a remarkable 1.8 years’ mean progress on the standardised tests of reading comprehension, with three participants making 4+ years progress. The researchers hypothesise that reading novels aloud and at a fast pace in each lesson, that are challenging but appropriate to the participants’ learning level, may have a beneficial effect on the reading comprehension of adolescents with learning difficulties, giving them a more engaged uninterrupted reading experience over a sustained period. However, more studies need to be conducted to test the independent variable across a bigger and more diverse population with a stronger design.Keywords: autism, reading comprehension, developmental disabilities, narratives
Procedia PDF Downloads 20111603 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks
Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid
Abstract:
Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.Keywords: WSN, routing, cluster based, meme, memetic algorithm
Procedia PDF Downloads 48111602 Attention Treatment for People With Aphasia: Language-Specific vs. Domain-General Neurofeedback
Authors: Yael Neumann
Abstract:
Attention deficits are common in people with aphasia (PWA). Two treatment approaches address these deficits: domain-general methods like Play Attention, which focus on cognitive functioning, and domain-specific methods like Language-Specific Attention Treatment (L-SAT), which use linguistically based tasks. Research indicates that L-SAT can improve both attentional deficits and functional language skills, while Play Attention has shown success in enhancing attentional capabilities among school-aged children with attention issues compared to standard cognitive training. This study employed a randomized controlled cross-over single-subject design to evaluate the effectiveness of these two attention treatments over 25 weeks. Four PWA participated, undergoing a battery of eight standardized tests measuring language and cognitive skills. The treatments were counterbalanced. Play Attention used EEG sensors to detect brainwaves, enabling participants to manipulate items in a computer game while learning to suppress theta activity and increase beta activity. An algorithm tracked changes in the theta-to-beta ratio, allowing points to be earned during the games. L-SAT, on the other hand, involved hierarchical language tasks that increased in complexity, requiring greater attention from participants. Results showed that for language tests, Participant 1 (moderate aphasia) aligned with existing literature, showing L-SAT was more effective than Play Attention. However, Participants 2 (very severe) and 3 and 4 (mild) did not conform to this pattern; both treatments yielded similar outcomes. This may be due to the extremes of aphasia severity: the very severe participant faced significant overall deficits, making both approaches equally challenging, while the mild participant performed well initially, leaving limited room for improvement. In attention tests, Participants 1 and 4 exhibited results consistent with prior research, indicating Play Attention was superior to L-SAT. Participant 2, however, showed no significant improvement with either program, although L-SAT had a slight edge on the Visual Elevator task, measuring switching and mental flexibility. This advantage was not sustained at the one-month follow-up, likely due to the participant’s struggles with complex attention tasks. Participant 3's results similarly did not align with prior studies, revealing no difference between the two treatments, possibly due to the challenging nature of the attention measures used. Regarding participation and ecological tests, all participants showed similar mild improvements with both treatments. This limited progress could stem from the short study duration, with only five weeks allocated for each treatment, which may not have been enough time to achieve meaningful changes affecting life participation. In conclusion, the performance of participants appeared influenced by their level of aphasia severity. The moderate PWA’s results were most aligned with existing literature, indicating better attention improvement from the domain-general approach (Play Attention) and better language improvement from the domain-specific approach (L-SAT).Keywords: attention, language, cognitive rehabilitation, neurofeedback
Procedia PDF Downloads 1711601 Design of a Lumbar Interspinous Process Fixation Device for Minimizing Soft Tissue Removal and Operation Time
Authors: Minhyuk Heo, Jihwan Yun, Seonghun Park
Abstract:
It has been reported that intervertebral fusion surgery, which removes most of the ligaments and muscles of the spine, increases the degenerative disease in adjacent spinal segments. Therefore, it is required to develop a lumbar interspinous process fixation device that minimizes the risks and side effects from the surgery. The objective of the current study is to design an interspinous process fixation device with simple structures in order to minimize soft tissue removal and operation time during intervertebral fusion surgery. For the design concepts of a lumbar fixation device, the principle of the ratchet was first applied on the joining parts of the device in order to shorten the operation time. The coil spring structure was selected for connecting parts between the spinous processes so that a normal range of motion in spinal segments is preserved and degenerative spinal diseases are not developed in the adjacent spinal segments. The stiffness of the spring was determined not to interrupt the motion of a lumbar spine. The designed value of the spring stiffness allows the upper part of the spring to move ~10° which is higher than the range of flexion and extension for normal lumbar spine (6°-8°), when a moment of 10Nm is applied on the upper face of L1. A finite element (FE) model composed of L1 to L5 lumbar spines was generated to verify the mechanical integrity and the dynamic stability of the designed lumbar fixation device and to further optimize the lumbar fixation device. The FE model generated above produced the same pressure value on intervertebral disc and dynamic behavior as the normal intact model reported in the literature. The consistent results from this comparison validates the accuracy in the modeling of the current FE model. Currently, we are trying to generate an abnormal model with defects in one or more components of the normal FE model above. Then, the mechanical integrity and the dynamic stability of the designed lumbar fixation device will be analyzed after being installed in the abnormal model and then the lumbar fixation device will be further optimized.Keywords: lumbar interspinous process fixation device, finite element method, lumbar spine, kinematics
Procedia PDF Downloads 22811600 Coping Strategies and Characterization of Vulnerability in the Perspective of Climate Change
Authors: Muhammad Umer Mehmood, Muhammad Luqman, Muhammad Yaseen, Imtiaz Hussain
Abstract:
Climate change is an arduous fact, which could not be unheeded easily. It is a phenomenon which has brought a collection of challenges for the mankind. Scientists have found many of its negative impacts on the life of human being and the resources on which the life of humanity is dependent. There are many issues which are associated with the factor of prime importance in this study, 'climate change'. Whenever changes happen in nature, they strike the whole globe. Effects of these changes vary from region to region. Climate of every region of this globe is different from the other. Even within a state, country or the province has different climatic conditions. So it is mandatory that the response in that specific region and the coping strategy of this specific region should be according to the prevailing risk. In the present study, the objective was to assess the coping strategies and vulnerability of small landholders. So that a professional suggestion could be made to cope with the vulnerability factor of small farmers. The cross-sectional research design was used with the intervention of quantitative approach. The study was conducted in the Khanewal district, of Punjab, Pakistan. 120 small farmers were interviewed after randomized sampling from the population of respective area. All respondents were above the age of 15 years. A questionnaire was developed after keen observation of facts in the respective area. Content and face validity of the instrument was assessed with SPSS and experts in the field. Data were analyzed through SPSS using descriptive statistics. From the sample of 120, 81.67% of the respondents claimed that the environment is getting warmer and not fit for their present agricultural practices. 84.17% of the sample expressed serious concern that they are disturbed due to change in rainfall pattern and vulnerability towards the climatic effects. On the other hand, they expressed that they are not good at tackling the effects of climate change. Adaptation of coping strategies like change in cropping pattern, use of resistant varieties, varieties with minimum water requirement, intercropping and tree planting was low by more than half of the sample. From the sample 63.33% small farmers said that the coping strategies they adopt are not effective enough. The present study showed that subsistence farming, lack of marketing and overall infrastructure, lack of access to social security networks, limited access to agriculture extension services, inappropriate access to agrometeorological system, unawareness and access to scientific development and low crop yield are the prominent factors which are responsible for the vulnerability of small farmers. A comprehensive study should be conducted at national level so that a national policy could be formulated to cope with the dilemma in future with relevance to climate change. Mainstreaming and collaboration among the researchers and academicians could prove beneficiary in this regard the interest of national leaders’ does matter. Proper policies to avoid the vulnerability factors should be the top priority. The world is taking up this issue with full responsibility as should we, keeping in view the local situation.Keywords: adaptation, coping strategies, climate change, Pakistan, small farmers, vulnerability
Procedia PDF Downloads 14211599 Investigation on Mesh Sensitivity of a Transient Model for Nozzle Clogging
Authors: H. Barati, M. Wu, A. Kharicha, A. Ludwig
Abstract:
A transient model for nozzle clogging has been developed and successfully validated against a laboratory experiment. Key steps of clogging are considered: transport of particles by turbulent flow towards the nozzle wall; interactions between fluid flow and nozzle wall, and the adhesion of the particle on the wall; the growth of the clog layer and its interaction with the flow. The current paper is to investigate the mesh (size and type) sensitivity of the model in both two and three dimensions. It is found that the algorithm for clog growth alone excluding the flow effect is insensitive to the mesh type and size, but the calculation including flow becomes sensitive to the mesh quality. The use of 2D meshes leads to overestimation of the clog growth because the 3D nature of flow in the boundary layer cannot be properly solved by 2D calculation. 3D simulation with tetrahedron mesh can also lead to an error estimation of the clog growth. A mesh-independent result can be achieved with hexahedral mesh, or at least with triangular prism (inflation layer) for near-wall regions.Keywords: clogging, continuous casting, inclusion, simulation, submerged entry nozzle
Procedia PDF Downloads 28311598 Geostatistical and Geochemical Study of the Aquifer System Waters Complex Terminal in the Valley of Oued Righ-Arid Area Algeria
Authors: Asma Bettahar, Imed Eddine Nezli, Sameh Habes
Abstract:
Groundwater resources in the Oued Righ valley are represented like the parts of the eastern basin of the Algerian Sahara, superposed by two major aquifers: the Intercalary Continental (IC) and the Terminal Complex (TC). From a qualitative point of view, various studies have highlighted that the waters of this region showed excessive mineralization, including the waters of the terminal complex (EC Avg equal 5854.61 S/cm) .The present article is a statistical approach by two multi methods various complementary (ACP, CAH), applied to the analytical data of multilayered aquifer waters Terminal Complex of the Oued Righ valley. The approach is to establish a correlation between the chemical composition of water and the lithological nature of different aquifer levels formations, and predict possible connection between groundwater’s layers. The results show that the mineralization of water is from geological origin. They concern the composition of the layers that make up the complex terminal.Keywords: complex terminal, mineralization, oued righ, statistical approach
Procedia PDF Downloads 38711597 GIS for Simulating Air Traffic by Applying Different Multi-radar Positioning Techniques
Authors: Amara Rafik, Bougherara Maamar, Belhadj Aissa Mostefa
Abstract:
Radar data is one of the many data sources used by ATM Air Traffic Management systems. These data come from air navigation radar antennas. These radars intercept signals emitted by the various aircraft crossing the controlled airspace and calculate the position of these aircraft and retransmit their positions to the Air Traffic Management System. For greater reliability, these radars are positioned in such a way as to allow their coverage areas to overlap. An aircraft will therefore be detected by at least one of these radars. However, the position coordinates of the same aircraft and sent by these different radars are not necessarily identical. Therefore, the ATM system must calculate a single position (radar track) which will ultimately be sent to the control position and displayed on the air traffic controller's monitor. There are several techniques for calculating the radar track. Furthermore, the geographical nature of the problem requires the use of a Geographic Information System (GIS), i.e. a geographical database on the one hand and geographical processing. The objective of this work is to propose a GIS for traffic simulation which reconstructs the evolution over time of aircraft positions from a multi-source radar data set and by applying these different techniques.Keywords: ATM, GIS, radar data, air traffic simulation
Procedia PDF Downloads 8511596 Risk Prioritization in Tunneling Construction Projects
Authors: David Nantes, George Gilbert
Abstract:
There are a lot of risks that might crop up as a tunneling project develops, and it's crucial to be aware of them. Due to the unexpected nature of tunneling projects and the interconnectedness of risk occurrences, the risk assessment approach presents a significant challenge. The purpose of this study is to provide a hybrid FDEMATEL-ANP model to help prioritize risks during tunnel construction projects. The ambiguity in expert judgments and the relative severity of interdependencies across risk occurrences are both taken into consideration by this model, thanks to the Fuzzy Decision-Making Trial and Evaluation Laboratory (FDEMATEL). The Analytic Network Process (ANP) method is used to rank priorities and assess project risks. The authors provide a case study of a subway tunneling construction project to back up the validity of their methodology. The results showed that the proposed method successfully isolated key risk factors and elucidated their interplay in the case study. The proposed method has the potential to become a helpful resource for evaluating dangers associated with tunnel construction projects.Keywords: risk, prioritization, FDEMATEL, ANP, tunneling construction projects
Procedia PDF Downloads 9211595 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator
Authors: Amin Zabihinejad, Philippe Viarouge
Abstract:
In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.Keywords: direct power control, three level rectifier, real time simulator, high power application
Procedia PDF Downloads 51711594 Parallel Tracking and Mapping of a Fleet of Quad-Rotor
Authors: M. Bazin, I. Bouguir, D. Combe, V. Germain, G. Lassade
Abstract:
The problem of managing a fleet of quad-rotor drones in a completely unknown environment is analyzed in the present paper. This work is following the footsteps of other studies about how should be managed the movements of a swarm of elements that have to stay gathered throughout their activities. In this paper we aim to demonstrate the limitations of a system where absolutely all the calculations and physical movements of our elements are done by one single external element. The strategy of control is an adaptive approach which takes into account the explored environment. This is made possible thanks to a set of command rules which can guide the drones through various missions with defined goal. The result of the mission is independent of the nature of environment and the number of drones in the fleet. This strategy is based on a simultaneous usage of different data: obstacles positions, real-time positions of all drones and relative positions between the different drones. The present work is made with the Robot Operating System and used several open-source projects on localization and usage of drones.Keywords: cooperative guidance, distributed control, unmanned aerial vehicle, obstacle avoidance
Procedia PDF Downloads 30411593 Group Sequential Covariate-Adjusted Response Adaptive Designs for Survival Outcomes
Authors: Yaxian Chen, Yeonhee Park
Abstract:
Driven by evolving FDA recommendations, modern clinical trials demand innovative designs that strike a balance between statistical rigor and ethical considerations. Covariate-adjusted response-adaptive (CARA) designs bridge this gap by utilizing patient attributes and responses to skew treatment allocation in favor of the treatment that is best for an individual patient’s profile. However, existing CARA designs for survival outcomes often hinge on specific parametric models, constraining their applicability in clinical practice. In this article, we address this limitation by introducing a CARA design for survival outcomes (CARAS) based on the Cox model and a variance estimator. This method addresses issues of model misspecification and enhances the flexibility of the design. We also propose a group sequential overlapweighted log-rank test to preserve type I error rate in the context of group sequential trials using extensive simulation studies to demonstrate the clinical benefit, statistical efficiency, and robustness to model misspecification of the proposed method compared to traditional randomized controlled trial designs and response-adaptive randomization designs.Keywords: cox model, log-rank test, optimal allocation ratio, overlap weight, survival outcome
Procedia PDF Downloads 6411592 The Effects of a Mathematics Remedial Program on Mathematics Success and Achievement among Beginning Mathematics Major Students: A Regression Discontinuity Analysis
Authors: Kuixi Du, Thomas J. Lipscomb
Abstract:
The proficiency in Mathematics skills is fundamental to success in the STEM disciplines. In the US, beginning college students who are placed in remedial/developmental Mathematics courses frequently struggle to achieve academic success. Therefore, Mathematics remediation in college has become an important concern, and providing Mathematics remediation is a prevalent way to help the students who may not be fully prepared for college-level courses. Programs vary, however, and the effectiveness of a particular remedial Mathematics program must be empirically demonstrated. The purpose of this study was to apply the sharp regression discontinuity (RD) technique to determine the effectiveness of the Jack Leaps Summer (JLS) Mathematic remediation program in supporting improved Mathematics learning outcomes among newly admitted Mathematics students in the South Dakota State University. The researchers studied the newly admitted Fall 2019 cohort of Mathematics majors (n=423). The results indicated that students whose pretest score was lower than the cut-off point and who were assigned to the JLS program experienced significantly higher scores on the post-test (Math 101 final score). Based on these results, there is evidence that the JLS program is effective in meeting its primary objective.Keywords: causal inference, mathematisc remedial program evaluation, quasi-experimental research design, regression discontinuity design, cohort studies
Procedia PDF Downloads 9711591 Numerical Analysis of Rainfall-Induced Roadside Slope Failures and Their Stabilizing Solution
Authors: Muhammad Suradi, Sugiarto, Abdullah Latip
Abstract:
Many roadside slope failures occur during the rainy season, particularly in the period of extreme rainfall along Connecting National Road of Salubatu-Mambi, West Sulawesi, Indonesia. These occurrences cause traffic obstacles and endanger people along and around the road. Research collaboration between P2JN (National Road Construction Board) West Sulawesi Province, who authorize to supervise the road condition, and Ujung Pandang State Polytechnic (Applied University) was established to cope with the landslide problem. This research aims to determine factors triggering roadside slope failures and their optimum stabilizing solution. To achieve this objective, site observation and soil investigation were carried out to obtain parameters for analyses of rainfall-induced slope instability and reinforcement design using the SV Flux and SV Slope software. The result of this analysis will be taken into account for the next analysis to get an optimum design of the slope reinforcement. The result indicates some factors such as steep slopes, sandy soils, and unvegetated slope surface mainly contribute to the slope failures during intense rainfall. With respect to the contributing factors as well as construction material and technology, cantilever/butressing retaining wall becomes the optimum solution for the roadside slope reinforcement.Keywords: roadside slope, failure, rainfall, slope reinforcement, optimum solution
Procedia PDF Downloads 10611590 The Role of Artificial Intelligence Algorithms in Decision-Making Policies
Authors: Marisa Almeida AraúJo
Abstract:
Artificial intelligence (AI) tools are being used (including in the criminal justice system) and becomingincreasingly popular. The many questions that these (future) super-beings pose the neuralgic center is rooted in the (old) problematic between rationality and morality. For instance, if we follow a Kantian perspective in which morality derives from AI, rationality will also surpass man in ethical and moral standards, questioning the nature of mind, the conscience of self and others, and moral. The recognition of superior intelligence in a non-human being puts us in the contingency of having to recognize a pair in a form of new coexistence and social relationship. Just think of the humanoid robot Sophia, capable of reasoning and conversation (and who has been recognized for Saudi citizenship; a fact that symbolically demonstrates our empathy with the being). Machines having a more intelligent mind, and even, eventually, with higher ethical standards to which, in the alluded categorical imperative, we would have to subject ourselves under penalty of contradiction with the universal Kantian law. Recognizing the complex ethical and legal issues and the significant impact on human rights and democratic functioning itself is the goal of our work.Keywords: ethics, artificial intelligence, legal rules, principles, philosophy
Procedia PDF Downloads 19811589 Exploring Digital Media’s Impact on Sports Sponsorship: A Global Perspective
Authors: Sylvia Chan-Olmsted, Lisa-Charlotte Wolter
Abstract:
With the continuous proliferation of media platforms, there have been tremendous changes in media consumption behaviors. From the perspective of sports sponsorship, while there is now a multitude of platforms to create brand associations, the changing media landscape and shift of message control also mean that sports sponsors will have to take into account the nature of and consumer responses toward these emerging digital media to devise effective marketing strategies. Utilizing the personal interview methodology, this study is qualitative and exploratory in nature. A total of 18 experts from European and American academics, sports marketing industry, and sports leagues/teams were interviewed to address three main research questions: 1) What are the major changes in digital technologies that are relevant to sports sponsorship; 2) How have digital media influenced the channels and platforms of sports sponsorship; and 3) How have these technologies affected the goals, strategies, and measurement of sports sponsorship. The study found that sports sponsorship has moved from consumer engagement, engagement measurement, and consequences of engagement on brand behaviors to micro-targeting one on one, engagement by context, time, and space, and activation and leveraging based on tracking and databases. From the perspective of platforms and channels, the use of mobile devices is prominent during sports content consumption. Increasing multiscreen media consumption means that sports sponsors need to optimize their investment decisions in leagues, teams, or game-related content sources, as they need to go where the fans are most engaged in. The study observed an imbalanced strategic leveraging of technology and digital infrastructure. While sports leagues have had less emphasis on brand value management via technology, sports sponsors have been much more active in utilizing technologies like mobile/LBS tools, big data/user info, real-time marketing and programmatic, and social media activation. Regardless of the new media/platforms, the study found that integration and contextualization are the two essential means of improving sports sponsorship effectiveness through technology. That is, how sponsors effectively integrate social media/mobile/second screen into their existing legacy media sponsorship plan so technology works for the experience/message instead of distracting fans. Additionally, technological advancement and attention economy amplify the importance of consumer data gathering, but sports consumer data does not mean loyalty or engagement. This study also affirms the benefit of digital media as they offer viral and pre-event activations through storytelling way before the actual event, which is critical for leveraging brand association before and after. That is, sponsors now have multiple opportunities and platforms to tell stories about their brands for longer time period. In summary, digital media facilitate fan experience, access to the brand message, multiplatform/channel presentations, storytelling, and content sharing. Nevertheless, rather than focusing on technology and media, today’s sponsors need to define what they want to focus on in terms of content themes that connect with their brands and then identify the channels/platforms. The big challenge for sponsors is to play to the venues/media’s specificity and its fit with the target audience and not uniformly deliver the same message in the same format on different platforms/channels.Keywords: digital media, mobile media, social media, technology, sports sponsorship
Procedia PDF Downloads 29411588 Open Source Software in Higher Education: Oman SQU Case Study
Authors: Amal S. Al-Badi, Ali H. Al-Badi
Abstract:
Many organizations are opting to adopt Open Source Software (OSS) as it is the current trend to rely on each other rather than on companies (Software vendors). It is a clear shift from organizations to individuals, the concept being to rely on collective participation rather than companies/vendors. The main objectives of this research are 1) to identify the current level of OSS usage in Sultan Qaboos University; 2) to identify the potential benefits of using OSS in educational institutes; 3) to identify the OSS applications that are most likely to be used within an educational institute; 4) to identify the existing and potential barriers to the successful adoption of OSS in education. To achieve these objectives a two-stage research method was conducted. First a rigorous literature review of previously published material was performed (interpretive/descriptive approach), and then a set of interviews were conducted with the IT professionals at Sultan Qaboos University in Oman in order to explore the extent and nature of their usage of OSS.Keywords: open source software, social software, e-learning 2.0, Web 2.0, connectivism, personal learning environment (PLE), OpenCourseWare
Procedia PDF Downloads 30511587 In vivo Protective Effects of Ginger Extract on Cyclophosphamide Induced Chromosomal Aberrations in Bone Marrow Cells of Swiss Mice
Authors: K. Yadamma, K. Rudrama Devi
Abstract:
The protective effect of Ginger Extract against cyclophosphamide induced cytotoxicity was evaluated in in vivo animal model using analysis of chromosomal aberrations in somatic cells of mice. Three doses of Ginger Extract (150mg/kg, 200mg/kg, and 250mg/kg body weight) were selected for modulation and given to animals after priming. The animals were sacrificed 24, 48, 72 hrs after the treatment and slides were prepared for the incidence of chromosomal aberrations in bone marrow cells of mice. When animals were treated with cyclophosphamide 50mg/kg, showed cytogenetic damage in somatic cells. However, a significant decrease was observed in the percentage of chromosomal aberrations when animals were primed with various doses of Ginger Extract. The present results clearly indicate the protective nature of Ginger Extract against cyclophosphamide induced genetic damage in mouse bone marrow cells.Keywords: ginger extract, protection, bone marrow cells, swiss albino mice
Procedia PDF Downloads 43711586 The Effect of Bacteria on Mercury's Biological Removal
Authors: Nastaran Soltani
Abstract:
Heavy metals such as Mercury are toxic elements that enter the environment through different ways and endanger the environment, plants, animals, and humans’ health. Microbial activities reduce the amount of heavy metals. Therefore, an effective mechanism to eliminate heavy metals in the nature and factory slops, is using bacteria living in polluted areas. Karun River in Khuzestan Province in Iran has been always polluted by heavy metals as it is located among different industries in the region. This study was performed based on the data from sampling water and sediments of four stations across the river during the four seasons of a year. The isolation of resistant bacteria was performed through enrichment and direct cultivation in a solid medium containing mercury. Various bacteria such as Pseudomonas sp., Serratia Marcescens, and E.coli were identified as mercury-resistant bacteria. The power of these bacteria to remove mercury varied from 28% to 86%, with strongest power belonging to Pseudomonas sp. isolated in spring making a good candidate to be used for mercury biological removal from factory slops.Keywords: bacteria, Karun River, mercury, biological removal, mercury-resistant
Procedia PDF Downloads 28611585 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication
Authors: Aishwarya Shekhar, Himanshu Sharma
Abstract:
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.Keywords: confidentiality, deduplication, data compression, hybridity of cloud
Procedia PDF Downloads 38311584 Towards Appreciating Knowing Body in the Future Schools: Developing Methods for School Teachers to Understand the Role of the Body in Teaching and Learning
Authors: Johanna Aromaa
Abstract:
This paper presents a development project aimed at enhancing student-teachers' awareness of the role of the body in teaching and learning. In this project, theory and practice are brought into dialogue through workshops of body work that utilize art-based and somatic methods. They are carried out in a special course for educating teachers in a Finnish University. Expected results from the project include: 1) the participants become aware of the multiple roles that the body has in educational encounters, and with it, develop a more holistic approach to teaching and learning, 2) the participants gain access to and learn to form bodily knowledge, 3) a working model on enhancing student-teachers' awareness of the role of bodily knowledge in teacher’s work is developed. Innovative methods as well as a radical rethinking of the nature of teaching and learning are needed if we are to appreciate knowing body in the future schools.Keywords: bodily knowledge, the body, somatic methods, teacher education
Procedia PDF Downloads 43611583 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script
Authors: Yash Goyal, Manish Korde, Juned Siddiqui
Abstract:
Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.Keywords: responsive, accessible, attractive, interface, objective, security.
Procedia PDF Downloads 10211582 A Simplified, Low-Cost Mechanical Design for an Automated Motorized Mechanism to Clean Large Diameter Pipes
Authors: Imad Khan, Imran Shafi, Sarmad Farooq
Abstract:
Large diameter pipes, barrels, tubes, and ducts are used in a variety of applications covering civil and defense-related technologies. This may include heating/cooling networks, sign poles, bracing, casing, and artillery and tank gun barrels. These large diameter assemblies require regular inspection and cleaning to increase their life and reduce replacement costs. This paper describes the design, development, and testing results of an efficient yet simplified, low maintenance mechanical design controlled with minimal essential electronics using an electric motor for a non-technical staff. The proposed solution provides a simplified user interface and an automated cleaning mechanism that requires a single user to optimally clean pipes and barrels in the range of 105 mm to 203 mm caliber. The proposed system employs linear motion of specially designed brush along the barrel using a chain of specific strength and a pulley anchor attached to both ends of the barrel. A specially designed and manufactured gearbox is coupled with an AC motor to allow movement of contact brush with high torque to allow efficient cleaning. A suitably powered AC motor is fixed to the front adapter mounted on the muzzle side whereas the rear adapter has a pulley-based anchor mounted towards the breach block in case of a gun barrel. A mix of soft nylon and hard copper bristles-based large surface brush is connected through a strong steel chain to motor and anchor pulley. The system is equipped with limit switches to auto switch the direction when one end is reached on its operation. The testing results based on carefully established performance indicators indicate the superiority of the proposed user-friendly cleaning mechanism vis-à-vis its life cycle cost.Keywords: pipe cleaning mechanism, limiting switch, pipe cleaning robot, large pipes
Procedia PDF Downloads 11011581 Proposing a Failure Criterion for Cohesionless Media Considering Cyclic Fabric Anisotropy
Authors: Ali Noorzad, Ehsan Badakhshan, Shima Zameni
Abstract:
The present paper is focused on a generalized failure criterion for geomaterials with cross-anisotropy. The cyclic behavior of granular material primarily depends on the nature and arrangement of constituent particles, particle size, and shape that affect fabric anisotropy. To account for the influence of loading directions on strength variations, an anisotropic variable in terms of the invariants of the stress tensor and fabric into the failure criterion is proposed. In an extension to original CANAsand constitutive model two concepts namely critical state and compact state play paramount roles as all of the moduli and coefficients are related to these states. The applicability of the present model is evaluated through comparisons between the predicted and the measured results. All simulations have demonstrated that the proposed constitutive model is capable of modeling the cyclic behavior of sand with inherent anisotropy.Keywords: fabric, cohesionless media, cyclic loading, critical state, compact state, CANAsand constitutive model
Procedia PDF Downloads 21911580 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 6111579 Numerical Solution of a Mathematical Model of Vortex Using Projection Method: Applications to Tornado Dynamics
Authors: Jagdish Prasad Maurya, Sanjay Kumar Pandey
Abstract:
Inadequate understanding of the complex nature of flow features in tornado vortex is a major problem in modelling tornadoes. Tornadoes are violent atmospheric phenomenon that appear all over the world. Modelling tornadoes aim to reduce the loss of the human lives and material damage caused by the tornadoes. Dynamics of tornado is investigated by a numerical technique, the improved version of the projection method. In this paper, authors solve the problem for axisymmetric tornado vortex by the said method that uses a finite difference approach for getting an accurate and stable solution. The conclusions drawn are that large radial inflow velocity occurs near the ground that leads to increase the tangential velocity. The increased velocity phenomenon occurs close to the boundary and absolute maximum wind is obtained near the vortex core. The results validate previous numerical and theoretical models.Keywords: computational fluid dynamics, mathematical model, Navier-Stokes equations, tornado
Procedia PDF Downloads 35311578 Approach for Demonstrating Reliability Targets for Rail Transport during Low Mileage Accumulation in the Field: Methodology and Case Study
Authors: Nipun Manirajan, Heeralal Gargama, Sushil Guhe, Manoj Prabhakaran
Abstract:
In railway industry, train sets are designed based on contractual requirements (mission profile), where reliability targets are measured in terms of mean distance between failures (MDBF). However, during the beginning of revenue services, trains do not achieve the designed mission profile distance (mileage) within the timeframe due to infrastructure constraints, scarcity of commuters or other operational challenges thereby not respecting the original design inputs. Since trains do not run sufficiently and do not achieve the designed mileage within the specified time, car builder has a risk of not achieving the contractual MDBF target. This paper proposes a constant failure rate based model to deal with the situations where mileage accumulation is not a part of the design mission profile. The model provides appropriate MDBF target to be demonstrated based on actual accumulated mileage. A case study of rolling stock running in the field is undertaken to analyze the failure data and MDBF target demonstration during low mileage accumulation. The results of case study prove that with the proposed method, reliability targets are achieved under low mileage accumulation.Keywords: mean distance between failures, mileage-based reliability, reliability target appropriations, rolling stock reliability
Procedia PDF Downloads 26711577 A Review of Attractor Neural Networks and Their Use in Cognitive Science
Authors: Makenzy Lee Gilbert
Abstract:
This literature review explores the role of attractor neural networks (ANNs) in modeling psychological processes in artificial and biological systems. By synthesizing research from dynamical systems theory, psychology, and computational neuroscience, the review provides an overview of the current understanding of ANN function in memory formation, reinforcement, retrieval, and forgetting. Key mathematical foundations, including dynamical systems theory and energy functions, are discussed to explain the behavior and stability of these networks. The review also examines empirical applications of ANNs in cognitive processes such as semantic memory and episodic recall, as well as highlighting the hippocampus's role in pattern separation and completion. The review addresses challenges like catastrophic forgetting and noise effects on memory retrieval. By identifying gaps between theoretical models and empirical findings, it highlights the interdisciplinary nature of ANN research and suggests future exploration areas.Keywords: attractor neural networks, connectionism, computational modeling, cognitive neuroscience
Procedia PDF Downloads 28