Search results for: massive concreting
137 Socio Economic Deprivation, Institutional Outlay and the Intent of Mobile Snatching and Street Assaults in Pakistan
Authors: Asad Salahuddin
Abstract:
Crime rates seem to be severely augmenting over the past several years in Pakistan which has perpetuated concerns as to what, when and how this upsurge will be eradicated. State institutions are posed to be in utmost perplexity, given the enormity of worsening law and order situation, compelling government on the flip side to expend more resources in strengthening institutions to confront crime, whereas, the economy has been confronted with massive energy crisis, mass unemployment and considerable inflation which has rendered most of the people into articulate apprehension as to how to satisfy basic necessities. A framework to investigate the variability in the rising street crimes, as affected by social and institutional outcomes, has been established using a cross-sectional study. Questionnaire, entailing 7 sections incorporating numerous patterns of behavior and history of involvement in different crimes for potential street criminals was observed as data collection instrument. In order to specifically explicate the intent of street crimes on micro level, various motivational and de-motivational factors that stimulate people to resort to street crimes were scrutinized. Intent of mobile snatching and intent of street assault as potential dependent variables were examined using numerous variables that influence the occurrence and intent of these crimes using ordered probit along with ordered logit and tobit as competing models. Model Estimates asserts that intent of mobile snatching has been significantly enhanced owing to perceived judicial inefficiency and lower ability of police reforms to operate effectively, which signifies the inefficiency of institutions that are entitled to deliver justice and maintaining law and order respectively. Whereas, intent of street assaults, as an outcome, affirms that people with lack of self-stability and severe childhood punishments were more tempted to be involved in violent acts. Hence, it is imperative for government to render better resources in form of training, equipment and improved salaries to police and judiciary in order to enhance their abilities and potential to curb inflating crime.Keywords: deprivation, street assault, self control, police reform
Procedia PDF Downloads 426136 Signal Processing Techniques for Adaptive Beamforming with Robustness
Authors: Ju-Hong Lee, Ching-Wei Liao
Abstract:
Adaptive beamforming using antenna array of sensors is useful in the process of adaptively detecting and preserving the presence of the desired signal while suppressing the interference and the background noise. For conventional adaptive array beamforming, we require a prior information of either the impinging direction or the waveform of the desired signal to adapt the weights. The adaptive weights of an antenna array beamformer under a steered-beam constraint are calculated by minimizing the output power of the beamformer subject to the constraint that forces the beamformer to make a constant response in the steering direction. Hence, the performance of the beamformer is very sensitive to the accuracy of the steering operation. In the literature, it is well known that the performance of an adaptive beamformer will be deteriorated by any steering angle error encountered in many practical applications, e.g., the wireless communication systems with massive antennas deployed at the base station and user equipment. Hence, developing effective signal processing techniques to deal with the problem due to steering angle error for array beamforming systems has become an important research work. In this paper, we present an effective signal processing technique for constructing an adaptive beamformer against the steering angle error. The proposed array beamformer adaptively estimates the actual direction of the desired signal by using the presumed steering vector and the received array data snapshots. Based on the presumed steering vector and a preset angle range for steering mismatch tolerance, we first create a matrix related to the direction vector of signal sources. Two projection matrices are generated from the matrix. The projection matrix associated with the desired signal information and the received array data are utilized to iteratively estimate the actual direction vector of the desired signal. The estimated direction vector of the desired signal is then used for appropriately finding the quiescent weight vector. The other projection matrix is set to be the signal blocking matrix required for performing adaptive beamforming. Accordingly, the proposed beamformer consists of adaptive quiescent weights and partially adaptive weights. Several computer simulation examples are provided for evaluating and comparing the proposed technique with the existing robust techniques.Keywords: adaptive beamforming, robustness, signal blocking, steering angle error
Procedia PDF Downloads 122135 A Semantic and Concise Structure to Represent Human Actions
Authors: Tobias Strübing, Fatemeh Ziaeetabar
Abstract:
Humans usually manipulate objects with their hands. To represent these actions in a simple and understandable way, we need to use a semantic framework. For this purpose, the Semantic Event Chain (SEC) method has already been presented which is done by consideration of touching and non-touching relations between manipulated objects in a scene. This method was improved by a computational model, the so-called enriched Semantic Event Chain (eSEC), which incorporates the information of static (e.g. top, bottom) and dynamic spatial relations (e.g. moving apart, getting closer) between objects in an action scene. This leads to a better action prediction as well as the ability to distinguish between more actions. Each eSEC manipulation descriptor is a huge matrix with thirty rows and a massive set of the spatial relations between each pair of manipulated objects. The current eSEC framework has so far only been used in the category of manipulation actions, which eventually involve two hands. Here, we would like to extend this approach to a whole body action descriptor and make a conjoint activity representation structure. For this purpose, we need to do a statistical analysis to modify the current eSEC by summarizing while preserving its features, and introduce a new version called Enhanced eSEC or (e2SEC). This summarization can be done from two points of the view: 1) reducing the number of rows in an eSEC matrix, 2) shrinking the set of possible semantic spatial relations. To achieve these, we computed the importance of each matrix row in an statistical way, to see if it is possible to remove a particular one while all manipulations are still distinguishable from each other. On the other hand, we examined which semantic spatial relations can be merged without compromising the unity of the predefined manipulation actions. Therefore by performing the above analyses, we made the new e2SEC framework which has 20% fewer rows, 16.7% less static spatial and 11.1% less dynamic spatial relations. This simplification, while preserving the salient features of a semantic structure in representing actions, has a tremendous impact on the recognition and prediction of complex actions, as well as the interactions between humans and robots. It also creates a comprehensive platform to integrate with the body limbs descriptors and dramatically increases system performance, especially in complex real time applications such as human-robot interaction prediction.Keywords: enriched semantic event chain, semantic action representation, spatial relations, statistical analysis
Procedia PDF Downloads 124134 Exploring an Exome Target Capture Method for Cross-Species Population Genetic Studies
Authors: Benjamin A. Ha, Marco Morselli, Xinhui Paige Zhang, Elizabeth A. C. Heath-Heckman, Jonathan B. Puritz, David K. Jacobs
Abstract:
Next-generation sequencing has enhanced the ability to acquire massive amounts of sequence data to address classic population genetic questions for non-model organisms. Targeted approaches allow for cost effective or more precise analyses of relevant sequences; although, many such techniques require a known genome and it can be costly to purchase probes from a company. This is challenging for non-model organisms with no published genome and can be expensive for large population genetic studies. Expressed exome capture sequencing (EecSeq) synthesizes probes in the lab from expressed mRNA, which is used to capture and sequence the coding regions of genomic DNA from a pooled suite of samples. A normalization step produces probes to recover transcripts from a wide range of expression levels. This approach offers low cost recovery of a broad range of genes in the genome. This research project expands on EecSeq to investigate if mRNA from one taxon may be used to capture relevant sequences from a series of increasingly less closely related taxa. For this purpose, we propose to use the endangered Northern Tidewater goby, Eucyclogobius newberryi, a non-model organism that inhabits California coastal lagoons. mRNA will be extracted from E. newberryi to create probes and capture exomes from eight other taxa, including the more at-risk Southern Tidewater goby, E. kristinae, and more divergent species. Captured exomes will be sequenced, analyzed bioinformatically and phylogenetically, then compared to previously generated phylogenies across this group of gobies. This will provide an assessment of the utility of the technique in cross-species studies and for analyzing low genetic variation within species as is the case for E. kristinae. This method has potential applications to provide economical ways to expand population genetic and evolutionary biology studies for non-model organisms.Keywords: coastal lagoons, endangered species, non-model organism, target capture method
Procedia PDF Downloads 188133 Discontinuous Spacetime with Vacuum Holes as Explanation for Gravitation, Quantum Mechanics and Teleportation
Authors: Constantin Z. Leshan
Abstract:
Hole Vacuum theory is based on discontinuous spacetime that contains vacuum holes. Vacuum holes can explain gravitation, some laws of quantum mechanics and allow teleportation of matter. All massive bodies emit a flux of holes which curve the spacetime; if we increase the concentration of holes, it leads to length contraction and time dilation because the holes do not have the properties of extension and duration. In the limited case when space consists of holes only, the distance between every two points is equal to zero and time stops - outside of the Universe, the extension and duration properties do not exist. For this reason, the vacuum hole is the only particle in physics capable of describing gravitation using its own properties only. All microscopic particles must 'jump' continually and 'vibrate' due to the appearance of holes (impassable microscopic 'walls' in space), and it is the cause of the quantum behavior. Vacuum holes can explain the entanglement, non-locality, wave properties of matter, tunneling, uncertainty principle and so on. Particles do not have trajectories because spacetime is discontinuous and has impassable microscopic 'walls' due to the simple mechanical motion is impossible at small scale distances; it is impossible to 'trace' a straight line in the discontinuous spacetime because it contains the impassable holes. Spacetime 'boils' continually due to the appearance of the vacuum holes. For teleportation to be possible, we must send a body outside of the Universe by enveloping it with a closed surface consisting of vacuum holes. Since a material body cannot exist outside of the Universe, it reappears instantaneously in a random point of the Universe. Since a body disappears in one volume and reappears in another random volume without traversing the physical space between them, such a transportation method can be called teleportation (or Hole Teleportation). It is shown that Hole Teleportation does not violate causality and special relativity due to its random nature and other properties. Although Hole Teleportation has a random nature, it can be used for colonization of extrasolar planets by the help of the method called 'random jumps': after a large number of random teleportation jumps, there is a probability that the spaceship may appear near a habitable planet. We can create vacuum holes experimentally using the method proposed by Descartes: we must remove a body from the vessel without permitting another body to occupy this volume.Keywords: border of the Universe, causality violation, perfect isolation, quantum jumps
Procedia PDF Downloads 422132 Development of an Implicit Coupled Partitioned Model for the Prediction of the Behavior of a Flexible Slender Shaped Membrane in Interaction with Free Surface Flow under the Influence of a Moving Flotsam
Authors: Mahtab Makaremi Masouleh, Günter Wozniak
Abstract:
This research is part of an interdisciplinary project, promoting the design of a light temporary installable textile defence system against flood. In case river water levels increase abruptly especially in winter time, one can expect massive extra load on a textile protective structure in term of impact as a result of floating debris and even tree trunks. Estimation of this impulsive force on such structures is of a great importance, as it can ensure the reliability of the design in critical cases. This fact provides the motivation for the numerical analysis of a fluid structure interaction application, comprising flexible slender shaped and free-surface water flow, where an accelerated heavy flotsam tends to approach the membrane. In this context, the analysis on both the behavior of the flexible membrane and its interaction with moving flotsam is conducted by finite elements based solvers of the explicit solver and implicit Abacus solver available as products of SIMULIA software. On the other hand, a study on how free surface water flow behaves in response to moving structures, has been investigated using the finite volume solver of Star CCM+ from Siemens PLM Software. An automatic communication tool (CSE, SIMULIA Co-Simulation Engine) and the implementation of an effective partitioned strategy in form of an implicit coupling algorithm makes it possible for partitioned domains to be interconnected powerfully. The applied procedure ensures stability and convergence in the solution of these complicated issues, albeit with high computational cost; however, the other complexity of this study stems from mesh criterion in the fluid domain, where the two structures approach each other. This contribution presents the approaches for the establishment of a convergent numerical solution and compares the results with experimental findings.Keywords: co-simulation, flexible thin structure, fluid-structure interaction, implicit coupling algorithm, moving flotsam
Procedia PDF Downloads 388131 Microbiota Associated With the Larval Culture of Red Cusk Eel Genipterus Chilensis in Chile
Authors: Luz Hurtado, Rodrigo Rojas, Jaime Romero, Christopher Concha
Abstract:
The culture of the marine fish red cusk eel Genypterus chilensis is currently considered a priority for Chilean aquaculture which is a Chilean native species of high gastronomic demand and market value. The microbiota was analyzed in terms of diversity and structure using massive Illumina sequencing. The analysis of alpha diversity was performed in samples of G. chilensis larvae of 6, 18 and 32 dph (days post-hatching) and it was observed that there were significant differences (P = 0.05) between the days of culture for the Chao1 index, being the larvae of 18 dph the one with the highest index followed by the larvae of 6 dph, The lowest value for this index was presented in larvae of 32 dph. There were no significant differences in larvae between the days of culture for the Shannon (P=0.0857) and Simpson (P=0.0714) indices. In general, the larvae of G. chilensis have high rates of diversity. When analyzing the beta diversity, a differentiation between the bacterial communities is observed depending on the day of the culture of the larvae. Considering the PCoA elaborated from the unweighted UniFrac statistic, the explained variance was 46.2% (PC1 29.2% and PC2 17.0%) and in the case of the PCoA elaborated with the weighted UniFrac statistic; the explained variance was 65.5% (PC1 41.8% and PC2 23.7%) these differences were significant based on the Permanova statistical analysis (P= 0.002 and 0.037 respectively). When analyzing the taxonomic composition of the microbiota of the larvae in the different days of culture it was observed that at the phyla level the most abundant in the larvae of 6 dph were Proteobacteria (57%) Verrucomicrobia (24%) and Firmicutes (14%), for the larvae of 18 dph the predominant phyla were Proteobacteria (90%), Dependientiae (5%), Actinobacteria (2%) and Plactomyces (2%), for the larvae of 32 dph the phyla that presented the highest relative abundance were Proteobacteria (57%), Firmicutes (29%), Verrucomicrobia (5%) and Actinobacteria (5%), when comparing the larvae between the days it was observed that the phylum Proteobacteria was the most abundant in the samples of larvae of 6, 18 and 32 dph being the larvae of 18 dph those that present the highest relative abundance, the larvae of 6 dph were those that presented the highest relative abundance for the phylum Verrucomicrobia and in the larvae of 32 dph was observed greater abundance of the phylum Firmicutes compared to the other days of larval culture. At the level of genera, those with the highest relative abundance in larvae of 6 dph were Rubritalea (30%), Psychrobacter (28%), staphylococcus (17%) and Ralstonia (10%), for the larvae of 18 dph the genera with the highest abundance were Psychrobacter (47%), Litoreibacter (13%), Nautella (9%) and Cohesibacter (8%), for the larvae of 32 dph the most abundant genera were Alloiococcus (25%), Dialister (14%), Neptunomonas (13%) and Piscirickettsia (11%). When observing the taxonomic composition of the larvae between the days of larval culture, it is observed that there are differences between them.Keywords: microbiota, diversity, G. Chilensis, larvae
Procedia PDF Downloads 71130 Insight into Enhancement of CO2 Capture by Clay Minerals
Authors: Mardin Abdalqadir, Paul Adzakro, Tannaz Pak, Sina Rezaei Gomari
Abstract:
Climate change and global warming recently became significant concerns due to the massive emissions of greenhouse gases into the atmosphere, predominantly CO2 gases. Therefore, it is necessary to find sustainable and inexpensive methods to capture the greenhouse gasses and protect the environment for live species. The application of naturally available and cheap adsorbents of carbon such as clay minerals became a great interest. However, the minerals prone to low storage capacity despite their high affinity to adsorb carbon. This paper aims to explore ways to improve the pore volume and surface area of two selected clay minerals, ‘montmorillonite and kaolinite’ by acid treatment to overcome their low storage capacity. Montmorillonite and kaolinite samples were treated with different sulfuric acid concentrations (0.5, 1.2 and 2.5 M) at 40 °C for 8 hours to achieve the above aim. The grain size distribution and morphology of clay minerals before and after acid treatment were explored with Scanning Electron Microscope to evaluate surface area improvement. The ImageJ software was used to find the porosity and pore volume of treated and untreated clay samples. The structure of the clay minerals was also analyzed using an X-ray Diffraction machine. The results showed that the pore volume and surface area were increased substantially through acid treatment, which speeded up the rate of carbon dioxide adsorption. XRD pattern of kaolinite did not change after sulfuric acid treatment, which indicates that acid treatment would not affect the structure of kaolinite. It was also discovered that kaolinite had a higher pore volume and porosity than montmorillonite before and after acid treatment. For example, the pore volume of untreated kaolinite was equal to 30.498 um3 with a porosity of 23.49%. Raising the concentration of acid from 0.5 M to 2.5 M in 8 hours’ time reaction led to increased pore volume from 30.498 um3 to 34.73 um3. The pore volume of raw montmorillonite was equal to 15.610 um3 with a porosity of 12.7%. When the acid concentration was raised from 0.5 M to 2.5 M for the same reaction time, pore volume also increased from 15.610 um3 to 20.538 um3. However, montmorillonite had a higher specific surface area than kaolinite. This study concludes that clay minerals are inexpensive and available material sources to model the realistic conditions and apply the results of carbon capture to prevent global warming, which is one of the most critical and urgent problems in the world.Keywords: acid treatment, kaolinite, montmorillonite, pore volume, porosity, surface area
Procedia PDF Downloads 166129 Evaluation of Percutaneous Tube Thoracostomy Performed by Trainee in Both Trauma and Non-Trauma Patients
Authors: Kulsum Maula, Md Kamrul Alam, Md Ibrahim Khalil, Md Nazmul Hasan, Mohammad Omar Faruq
Abstract:
Background: Percutaneous Tube Thoracostomy (PTT) is an invasive procedure that can save a life now and then in different traumatic and non-traumatic conditions. But still, it is an enigma; how our trainee surgeons are at home in this procedure. Objectives: To evaluate the outcome of the percutaneous tube thoracostomy performed by trainees in both trauma and non-trauma patients. Study design: Prospective, Observational Study. The duration of the study was September 2018 to February 2019. Methods: All patients who need PTT in traumatic and non-traumatic conditions were selected by purposive sampling. Thereafter, they were scrutinized according to eligibility criteria and 96 patients were finalized. A pre-tested, observation-based, peer-reviewed data collection sheet was prepared before the study. Data regarding clinical and surgical outcome profiles were recorded. Data were compiled, edited, and analyzed. Results: Among 96 patients, the highest 32.29% belonged to age group 31-40 years and the lowest 9.37% belonged to the age group ≤20. The mean age of the respondents was 29.19±9.81. We found out of 96 patients, 70(72.91%) were indicated PTT for traumatic conditions and the rest 26(27.08%) were indicated PTT for non-traumatic chest conditions, where 36(37.5%) had simple penumothorax, 21(21.87%) haemothorax, 14(14.58%) massive pleural effusion, 13(13.54%) tension pneumothorax, 10(10.41%) haemopneumothorax, and 2(2.08%) had pyothorax respectively. In 53.12% of patients had right-sided intercostal chest tube (ICT) insertion, whereas 46.87% had left-sided ICT insertion. In our study, 89.55 % of the tube was placed at the normal anatomical position. Besides, 10.41% of tube thoracostomy were performed deviated from anatomical site. Among 96 patients 62.5% patients had length of incision 2-3cm, 35.41% had >3cm and 2.08% had <2cm respectively. Out of 96 patients, 75(78.13%) showed uneventful outcomes, whereas 21(21.87%) had complications, including 11.15%(11) each had wound infection, 4.46%(4) subcutaneous emphysema, 4.28%(3) drain auto expulsion, 2.85%(2) hemorrhage, 1.45%(1) had a non-functioning drain and empyema with ascending infection respectively (p=<0.05). Conclusion: PTT is a life-saving procedure that is most frequently implemented in chest trauma patients in our country. In the majority of cases, the outcome of PTT was uneventful (78.13). Besides this, more than one-third of patients had a length of incision more than 3 cm that needed extra stitches and 10.41% of cases of PTT were placed other than the normal anatomical site. Trainees of Dhaka Medical College Hospitals are doing well in their performance of PTT insertion, but still, some anatomical orientations are necessary to avoid operative and post-operative complications.Keywords: PTT, trainee, trauma, non-chest trauma patients
Procedia PDF Downloads 120128 Application of a Theoretical framework as a Context for a Travel Behavior Change Policy Intervention
Authors: F. Moghtaderi, M. Burke, J. Troelsen
Abstract:
There has been a significant decline in active travel as well as the massive increase use of car-dependent travel mode in many countries during past two decades. Evidential risks for people’s physical and mental health problems are followed by this increased use of motorized travel mode. These problems range from overweight and obesity to increasing air pollution. In response to these rising concerns, local councils and other interested organizations around the world have introduced a variety of initiatives regarding reduce the dominance of cars for the daily journeys. However, the nature of these kinds of interventions, which related to the human behavior, make lots of complexities. People’s travel behavior and changing this behavior, has two different aspects. People’s attitudes and perceptions toward the sustainable and healthy modes of travel, and motorized travel modes (especially private car use) is one these two aspects. The other one related to people’s behavior change processes. There are no comprehensive model in order to guide policy interventions to increase the level of succeed of such interventions. A comprehensive theoretical framework is required in accordance to facilitate and guide the processes of data collection and analysis to achieve the best possible guidelines for policy makers. Regarding this gaps in the travel behavior change research, this paper attempted to identify and suggest a multidimensional framework in order to facilitate planning interventions. A structured mixed-method is suggested regarding the expand the scope and improve the analytic power of the result according to the complexity of human behavior. In order to recognize people’s attitudes, a theory with the focus on people’s attitudes towards a particular travel behavior was needed. The literature around the theory of planned behavior (TPB) was the most useful, and had been proven to be a good predictor of behavior change. Another aspect of the research, related to the people’s decision-making process regarding explore guidelines for the further interventions. Therefore, a theory was needed to facilitate and direct the interventions’ design. The concept of the transtheoretical model of behavior change (TTM) was used regarding reach a set of useful guidelines for the further interventions with the aim to increase active travel and sustainable modes of travel. Consequently, a combination of these two theories (TTM and TPB) had presented as an appropriate concept to identify and design implemented travel behavior change interventions.Keywords: behavior change theories, theoretical framework, travel behavior change interventions, urban research
Procedia PDF Downloads 371127 Organic Fertilizers Mitigate Microplastics Toxicity in Agricultural Soil
Authors: Ghulam Abbas Shah, Maqsood Sadiq, Ahsan Yasin
Abstract:
Massive global plastic production, combined with poor degradation and recycling, leads to significant environmental pollution from microplastics, whose effects on plants in the soil remain understudied. Besides, effective mitigation strategies and their impact on ammonia (NH₃) emissions under varying fertilizer management practices remains sketchy. Therefore, the objectives of the study were (i) to determine the impact of organic fertilizers on the toxicity of microplastics in sorghum and physicochemical characteristics of microplastics-contaminated soil and (ii) to assess the impacts of these fertilizers on NH₃ emissions from this soil. A field experiment was conducted using sorghum as a test crop. Treatments were: (i) Control (C), (ii) Microplastics (MP), (iii) Inorganic fertilizer (IF), (iv) MPIF, (v) Farmyard manure (FM), (vi) MPFM, (vii) Biochar (BC), and (viii) MPBC, arranged in a randomized complete block design (RCBD) with three replicates. Microplastics of polyvinyl chloride (PVC) were applied at a rate of 1.5 tons ha-¹, and all fertilizers were applied at the recommended dose of 90 kg N ha-¹. Soil sampling was done before sowing and after harvesting the sorghum, with samples analyzed for chemical properties and microbial biomass. Crop growth and yield attributes were measured. In a parallel pot experiment, NH₃ emissions were measured using passive flux samplers over 72 hours following the application of treatments similar to those used in the field experiment. Application of MPFM, MPBC and MPIF reduced soil mineral nitrogen by 8, 20 and 38% compared to their sole treatments, respectively. Microbial biomass carbon (MBC) was reduced by 19, 25 and 59% in MPIF, MPBC and MPFM as compared to their sole application, respectively. Similarly, the respective reduction in microbial biomass nitrogen (MBN) was 10, 27 and 66%. The toxicity of microplastics was mitigated by MPFM and MPBC, each with only a 5% reduction in grain yield of sorghum relative to their sole treatments. The differences in nitrogen uptake between BC vs. MPBC, FM vs. MPFM, and IF vs. MPIF were 8, 10, and 12 kg N ha-¹, respectively, indicating that organic fertilizers mitigate microplastic toxicity in the soil. NH₃ emission was reduced by 5, 11 and 20% after application of MPFM, MPBC and MPIF than their sole treatments, respectively. The study concludes that organic fertilizers such as FM and BC can effectively mitigate the toxicity of microplastics in soil, leading to improved crop growth and yield.Keywords: microplastics, soil characteristics, crop n uptake, biochar, NH₃ emissions
Procedia PDF Downloads 38126 The Development of a Precision Irrigation System for Durian
Authors: Chatrabhuti Pipop, Visessri Supattra, Charinpanitkul Tawatchai
Abstract:
Durian is one of the top agricultural products exported by Thailand. There is the massive market potential for the durian industry. While the global demand for Thai durians, especially the demand from China, is very high, Thailand's durian supply is far from satisfying strong demand. Poor agricultural practices result in low yields and poor quality of fruit. Most irrigation systems currently used by the farmers are fixed schedule or fixed rates that ignore actual weather conditions and crop water requirements. In addition, the technologies emerging are too difficult and complex and prices are too high for the farmers to adopt and afford. Many farmers leave the durian trees to grow naturally. With improper irrigation and nutrient management system, durians are vulnerable to a variety of issues, including stunted growth, not flowering, diseases, and death. Technical development or research for durian is much needed to support the wellbeing of the farmers and the economic development of the country. However, there are a limited number of studies or development projects for durian because durian is a perennial crop requiring a long time to obtain the results to report. This study, therefore, aims to address the problem of durian production by developing an autonomous and precision irrigation system. The system is designed and equipped with an industrial programmable controller, a weather station, and a digital flow meter. Daily water requirements are computed based on weather data such as rainfall and evapotranspiration for daily irrigation with variable flow rates. A prediction model is also designed as a part of the system to enhance the irrigation schedule. Before the system was installed in the field, a simulation model was built and tested in a laboratory setting to ensure its accuracy. Water consumption was measured daily before and after the experiment for further analysis. With this system, the crop water requirement is precisely estimated and optimized based on the data from the weather station. Durian will be irrigated at the right amount and at the right time, offering the opportunity for higher yield and higher income to the farmers.Keywords: Durian, precision irrigation, precision agriculture, smart farm
Procedia PDF Downloads 117125 Of Digital Games and Dignity: Rationalizing E-Sports Amidst Stereotypes Associated with Gamers
Authors: Sarthak Mohapatra, Ajith Babu, Shyam Prasad Ghosh
Abstract:
The community of gamers has been at the crux of stigmatization and marginalization by the larger society, resulting in dignity erosion. India presents a unique context where e-sports have recently seen large-scale investments, a massive userbase, and appreciable demand for gaming as a career option. Yet the apprehension towards gaming is salient among parents and non-gamers who engage in the de-dignification of gamers, by advocating the discourse of violence promotion via video games. Even the government is relentless in banning games due to data privacy issues. Thus, the current study explores the experiences of gamers and how they navigate these de-dignifying circumstances. The study follows an exploratory qualitative approach where in-depth interviews are used as data collection tools guided by a semi-structured questionnaire. A total of 25 individuals were interviewed comprising casual gamers, professional gamers, and individuals who are indirectly impacted by gaming including parents, relatives, and friends of gamers. Thematic analysis via three-level coding is used to arrive at broad themes (categories) and their sub-themes. The results indicate that the de-dignification of gamers results from attaching stereotypes of introversion, aggression, low intelligence, and low aspirations to them. It is interesting to note that the intensity of de-dignification varies and is more salient in violent shooting games which are perceived to require low cognitive resources to master. The moral disengagement of gamers while playing violent video games becomes the basis for de-dignification. Findings reveal that circumventing de-dignification required gamers to engage in several tactics that included playing behind closed doors, consciously hiding the gamer identity, rationalizing behavior by idolizing professionals, bragging about achievements within the game, and so on. Theoretically, it contributes to dignity and social identity literature by focusing on stereotyping and stigmatization. From a policy perspective, improving legitimacy toward gaming is expected to improve the social standing of gamers and professionals. For practitioners, it is important that proper channels of promotion and communication are used to educate the non-gamers so that the stereotypes blur away.Keywords: dignity, social identity, stereotyping, video games
Procedia PDF Downloads 97124 Activities for Increasing Childhood Vaccination Coverage of the Refugee and Migrant Population, Greece, European Program PHILOS, 2017
Authors: C. Silvestros, K. Mellou, T. Georgakopoulou, A. Koustenis, E. Kokkinou, C. Botsi, A. Terzidis
Abstract:
'PHILOS – Emergency health response to refugee crisis' is a programme of the Greek Ministry of Health, implemented by the Hellenic Center for Disease Control and Prevention (HCDCP) funded by the Asylum, Migration and Integration Fund (AMIF) of EU’s DG Migration and Home Affairs. One of the main objectives of the program is the immunization coverage of the target – population to assure the prevention of vaccine-preventable diseases. The program foresees vaccination needs assessment of children hosted at camps at the mainland and implementation of interventions to cover the vaccination gaps in co-operation with the Ministry of Health. The National Immunization Advisory Committee in Greece recommended that MMR (Measles, Mumps, and Rubella), PCV (Pneumococcal conjugate vaccine) and HEXA (diphtheria, tetanus, pertussis, polio, hepatitis B and Haemophilus influenzae type b) vaccines should be performed in priority. Recording was completed at 24 camps (May - June 2017); 3381 children (0-18 years) were recorded. The median number of children hosted at each camp was 95 (range: 5-553). For 68% of the children, the WHO vaccination booklet was available. 44%, 48.5% and 61% of the children were vaccinated with at least one dose of PCV, HEXA, and MMR, respectively. The proportion of vaccinated children for the three vaccines mentioned above is significantly lower for the remaining doses; PCV (second dose 8%, third dose 1.3%), HEXA (second dose 13%, third dose 2.7%, forth dose 0.1%) and MMR (second dose 23%). None of the 37 (10 from Afghanistan, 3 from Bangladesh, 23 from Pakistan, 1 from Syria) recorded unaccompanied children did not have a WHO vaccination booklet and were considered unvaccinated. There is no differentiation in vaccination coverage among different ethnicities. Massive catch up vaccination was performed at 4 camps, and 671 vaccinations were performed (245 PCV, 307 HEXA, and 119 MMR). Similar interventions are planned for all camps of the country. Recording reveled gaps in vaccination coverage of the population, mainly because of the mobility of the population, the influx of refugees- which is still ongoing- and new births. Mass vaccination campaigns are considered vital in order to increase vaccination coverage, and continuous efforts are needed in order all children living at the camps to have full access to the National Childhood Immunization Program.Keywords: vaccine preventable, refugee–migrants camps, vaccination coverage, PCV, MMR, HEXA
Procedia PDF Downloads 183123 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 65122 Mathematical Study of CO₂ Dispersion in Carbonated Water Injection Enhanced Oil Recovery Using Non-Equilibrium 2D Simulator
Authors: Ahmed Abdulrahman, Jalal Foroozesh
Abstract:
CO₂ based enhanced oil recovery (EOR) techniques have gained massive attention from major oil firms since they resolve the industry's two main concerns of CO₂ contribution to the greenhouse effect and the declined oil production. Carbonated water injection (CWI) is a promising EOR technique that promotes safe and economic CO₂ storage; moreover, it mitigates the pitfalls of CO₂ injection, which include low sweep efficiency, early CO₂ breakthrough, and the risk of CO₂ leakage in fractured formations. One of the main challenges that hinder the wide adoption of this EOR technique is the complexity of accurate modeling of the kinetics of CO₂ mass transfer. The mechanisms of CO₂ mass transfer during CWI include the slow and gradual cross-phase CO₂ diffusion from carbonated water (CW) to the oil phase and the CO₂ dispersion (within phase diffusion and mechanical mixing), which affects the oil physical properties and the spatial spreading of CO₂ inside the reservoir. A 2D non-equilibrium compositional simulator has been developed using a fully implicit finite difference approximation. The material balance term (k) was added to the governing equation to account for the slow cross-phase diffusion of CO₂ from CW to the oil within the gird cell. Also, longitudinal and transverse dispersion coefficients have been added to account for CO₂ spatial distribution inside the oil phase. The CO₂-oil diffusion coefficient was calculated using the Sigmund correlation, while a scale-dependent dispersivity was used to calculate CO₂ mechanical mixing. It was found that the CO₂-oil diffusion mechanism has a minor impact on oil recovery, but it tends to increase the amount of CO₂ stored inside the formation and slightly alters the residual oil properties. On the other hand, the mechanical mixing mechanism has a huge impact on CO₂ spatial spreading (accurate prediction of CO₂ production) and the noticeable change in oil physical properties tends to increase the recovery factor. A sensitivity analysis has been done to investigate the effect of formation heterogeneity (porosity, permeability) and injection rate, it was found that the formation heterogeneity tends to increase CO₂ dispersion coefficients, and a low injection rate should be implemented during CWI.Keywords: CO₂ mass transfer, carbonated water injection, CO₂ dispersion, CO₂ diffusion, cross phase CO₂ diffusion, within phase CO2 diffusion, CO₂ mechanical mixing, non-equilibrium simulation
Procedia PDF Downloads 173121 Hearing Threshold Levels among Steel Industry Workers in Samut Prakan Province, Thailand
Authors: Petcharat Kerdonfag, Surasak Taneepanichskul, Winai Wadwongtham
Abstract:
Industrial noise is usually considered as the main impact of the environmental health and safety because its exposure can cause permanently serious hearing damage. Despite providing strictly hearing protection standards and campaigning extensively encouraging public health awareness among industrial workers in Thailand, hazard noise-induced hearing loss has dramatically been massive obstacles for workers’ health. The aims of the study were to explore and specify the hearing threshold levels among steel industrial workers responsible in which higher noise levels of work zone and to examine the relationships of hearing loss and workers’ age and the length of employment in Samut Prakan province, Thailand. Cross-sectional study design was done. Ninety-three steel industrial workers in the designated zone of higher noise (> 85dBA) with more than 1 year of employment from two factories by simple random sampling and available to participate in were assessed by the audiometric screening at regional Samut Prakan hospital. Data of doing screening were collected from October to December, 2016 by the occupational medicine physician and a qualified occupational nurse. All participants were examined by the same examiners for the validity. An Audiometric testing was performed at least 14 hours after the last noise exposure from the workplace. Workers’ age and the length of employment were gathered by the developed occupational record form. Results: The range of workers’ age was from 23 to 59 years, (Mean = 41.67, SD = 9.69) and the length of employment was from 1 to 39 years, (Mean = 13.99, SD = 9.88). Fifty three (60.0%) out of all participants have been exposing to the hazard of noise in the workplace for more than 10 years. Twenty-three (24.7%) of them have been exposing to the hazard of noise less than or equal to 5 years. Seventeen (18.3%) of them have been exposing to the hazard of noise for 5 to 10 years. Using the cut point of less than or equal to 25 dBA of hearing thresholds, the average means of hearing thresholds for participants at 4, 6, and 8 kHz were 31.34, 29.62, and 25.64 dB, respectively for the right ear and 40.15, 32.20, and 25.48 dB for the left ear, respectively. The more developing age of workers in the work zone with hazard of noise, the more the hearing thresholds would be increasing at frequencies of 4, 6, and 8 kHz (p =.012, p =.026, p =.024) for the right ear, respectively and for the left ear only at the frequency 4 kHz (p =.009). Conclusion: The participants’ age in the hazard of noise work zone was significantly associated with the hearing loss in different levels while the length of participants’ employment was not significantly associated with the hearing loss. Thus hearing threshold levels among industrial workers would be regularly assessed and needed to be protected at the beginning of working.Keywords: hearing threshold levels, hazard of noise, hearing loss, audiometric testing
Procedia PDF Downloads 226120 Factors of Non-Conformity Behavior and the Emergence of a Ponzi Game in the Riba-Free (Interest-Free) Banking System of Iran
Authors: Amir Hossein Ghaffari Nejad, Forouhar Ferdowsi, Reza Mashhadi
Abstract:
In the interest-free banking system of Iran, the savings of society are in the form of bank deposits, and banks using the Islamic contracts, allocate the resources to applicants for obtaining facilities and credit. In the meantime, the central bank, with the aim of introducing monetary policy, determines the maximum interest rate on bank deposits in terms of macroeconomic requirements. But in recent years, the country's economic constraints with the stagflation and the consequence of the institutional weaknesses of the financial market of Iran have resulted in massive disturbances in the balance sheet of the banking system, resulting in a period of mismatch maturity in the banks' assets and liabilities and the implementation of a Ponzi game. This issue caused determination of the interest rate in long-term bank deposit contracts to be associated with non-observance of the maximum rate set by the central bank. The result of this condition was in the allocation of new sources of equipment to meet past commitments towards the old depositors and, as a result, a significant part of the supply of equipment was leaked out of the facilitating cycle and credit crunch emerged. The purpose of this study is to identify the most important factors affecting the occurrence of non-confirmatory financial banking behavior using data from 19 public and private banks of Iran. For this purpose, the causes of this non-confirmatory behavior of banks have been investigated using the panel vector autoregression method (PVAR) for the period of 2007-2015. Granger's causality test results suggest that the return of parallel markets for bank deposits, non-performing loans and the high share of the ratio of facilities to banks' deposits are all a cause of the formation of non-confirmatory behavior. Also, according to the results of impulse response functions and variance decomposition, NPL and the ratio of facilities to deposits have the highest long-term effect and also have a high contribution to explaining the changes in banks' non-confirmatory behavior in determining the interest rate on deposits.Keywords: non-conformity behavior, Ponzi Game, panel vector autoregression, nonperforming loans
Procedia PDF Downloads 216119 A Local Tensor Clustering Algorithm to Annotate Uncharacterized Genes with Many Biological Networks
Authors: Paul Shize Li, Frank Alber
Abstract:
A fundamental task of clinical genomics is to unravel the functions of genes and their associations with disorders. Although experimental biology has made efforts to discover and elucidate the molecular mechanisms of individual genes in the past decades, still about 40% of human genes have unknown functions, not to mention the diseases they may be related to. For those biologists who are interested in a particular gene with unknown functions, a powerful computational method tailored for inferring the functions and disease relevance of uncharacterized genes is strongly needed. Studies have shown that genes strongly linked to each other in multiple biological networks are more likely to have similar functions. This indicates that the densely connected subgraphs in multiple biological networks are useful in the functional and phenotypic annotation of uncharacterized genes. Therefore, in this work, we have developed an integrative network approach to identify the frequent local clusters, which are defined as those densely connected subgraphs that frequently occur in multiple biological networks and consist of the query gene that has few or no disease or function annotations. This is a local clustering algorithm that models multiple biological networks sharing the same gene set as a three-dimensional matrix, the so-called tensor, and employs the tensor-based optimization method to efficiently find the frequent local clusters. Specifically, massive public gene expression data sets that comprehensively cover dynamic, physiological, and environmental conditions are used to generate hundreds of gene co-expression networks. By integrating these gene co-expression networks, for a given uncharacterized gene that is of biologist’s interest, the proposed method can be applied to identify the frequent local clusters that consist of this uncharacterized gene. Finally, those frequent local clusters are used for function and disease annotation of this uncharacterized gene. This local tensor clustering algorithm outperformed the competing tensor-based algorithm in both module discovery and running time. We also demonstrated the use of the proposed method on real data of hundreds of gene co-expression data and showed that it can comprehensively characterize the query gene. Therefore, this study provides a new tool for annotating the uncharacterized genes and has great potential to assist clinical genomic diagnostics.Keywords: local tensor clustering, query gene, gene co-expression network, gene annotation
Procedia PDF Downloads 162118 International Retirement Migration of Westerners to Thailand: Well-Being and Future Migration Plans
Authors: Kanokwan Tangchitnusorn, Patcharawalai Wongboonsin
Abstract:
Following the ‘Golden Age of Welfare’ which enabled post-war prosperity to European citizens in 1950s, the world has witnessed the increasing mobility across borders of older citizens of First World countries. Then, in 1990s, the international retirement migration (IRM) of older persons has become a prominent trend, in which, it requires the integration of several fields of knowledge to explain, i.e. migration studies, tourism studies, as well as, social gerontology. However, while the studies of the IRM to developed destinations in Europe (e.g. Spain, Malta, Portugal, Italy), and the IRM to developing countries like Mexico, Panama, and Morocco have been largely studied in recent decades due to their massive migration volume, the study of the IRM to remoter destinations has been far more relatively sparse and incomplete. Developing countries in Southeast Asia have noticed the increasing number of retired expats, particularly to Thailand, where the number of foreigners applying for retirement visa increased from 10,709 in 2005 to 60,046 in 2014. Additionally, it was evident that the majority of Thailand’s retirement visa applicants were Westerners, i.e. citizens of the United Kingdom, the United States, Germany, and the Nordic countries, respectively. As such trend just becoming popular in Thailand in recent decades, little is known about the IRM populations, their well-being, and their future migration plans. This study aimed to examine the subjective wellbeing or the self-evaluations of own well-being among Western retirees in Thailand, as well as, their future migration plans as whether they planned to stay here for life or otherwise. The author employed a mixed method to obtain both quantitative and qualitative data during October 2015 – May 2016, including 330 self-administered questionnaires (246 online and 84 hard-copied responses), and 21 in-depth interviews of the Western residents in Nan (2), Pattaya (4), and Chiang Mai (15). As derived from the integration of previous subjective well-being measurements (i.e. Personal Wellbeing Index (PWI), Global AgeWatch Index, and OECD guideline on measuring subjective wellbeing), this study would measure the subjective well-being of Western retirees in Thailand in 7 dimensions, including standard of living, health status, personal relationships, social connections, environmental quality, personal security and local infrastructure.Keywords: international retirement migration, ageing, mobility, wellbeing, Western, Thailand
Procedia PDF Downloads 342117 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts
Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter
Abstract:
Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings
Procedia PDF Downloads 119116 Failing Regeneration, Displacement, and Continued Consequences on Future Urban Planning Processes in Distressed Neighborhoods in Tehran
Authors: Razieh Rezabeigi Sani, Alireza Farahani, Mahdi Haghi
Abstract:
Displacement, local discontent, and forced exclusion have become prominent parts of urban regeneration activities in the Global North and South. This paper discusses the processes of massive displacement and neighborhood alteration as the consequences of a large-scale political/ideological placemaking project in central Tehran that transformed people's daily lives in surrounding neighborhoods. The conversion of Imam Hussein Square and connecting 17-Shahrivar Street to a pedestrian plaza in 2016 resulted in adjacent neighborhoods' physical, social, and economic degradation. The project has downgraded the economic and social characteristics of urban life in surrounding neighborhoods, commercialized residential land uses, displaced local people and businesses, and created unprecedented housing modes. This research has been conducted in two stages; first, after the project's implementation between 2017-2018, and second, when the street was reopened after local protests in 2021. In the first phase, 50+ on-site interviews were organized with planners, managers, and dwellers about the decision-making processes, design, and project implementation. We find that the project was based on the immediate political objectives and top-down power exertion of the local government in creating exclusive spaces (for religious ceremonies) without considering locals' knowledge, preferences, lifestyles, and everyday interactions. In the continued research in 2021, we utilized data gathered in facilitation activities and several meetings and interviews with local inhabitants and businesses to explore, design, and implement initiatives for bottom-up planning in these neighborhoods. The top-down and product-oriented (rather than process-oriented) planning, dependency on municipal financing rather than local partnerships, and lack of public participation proved to have continued effects on local participation. The paper concludes that urban regeneration projects must be based on the participation of different private/public actors, sustainable financial resources, and overall social and spatial analysis of the peripheral area before interventions.Keywords: displacement, urban regeneration, distressed neighborhoods, ideological placemaking, Tehran
Procedia PDF Downloads 99115 Sedimentological and Petrographical Studies on the Cored samples from Bentiu Formation Muglad Basin
Authors: Yousif M. Makeen
Abstract:
This study presents the results of the sedimentological and petrographical analyses on the cored samples from the Bentiu Formation. The cored intervals consist of thick beds of sandstone, which are sometimes intercalated with beds of fine-grained sandstone and, in a minor case, with a siltstone bed. Detailed sedimentological facies analysis revealed the presence of six facies types, which can be clarified in order of their great percentage occurrences as follows: (i) Massive sandstone, (ii) Planar cross-bedded sandstone, (iii) Trough cross-bedded sandstone, (iv) Fine laminated sandstone (v) Fine laminated siltstone and (vi) Horizontally parted sandstone. The petrographical analyses under the plane polarized microscope and the scanning electron microscope (SEM) for the sandstone lithofacies types that exist within the cored intervals allowed classifying these lithofacies into Kaolinitic Subfeldspathic Arenites. Among the detrital components, quartz grains are the most abundant (mainly monocrystalline quartz), followed by feldspars, micas, detrital and authigenic clays, and carbonaceous debris. However, traces of lithic fragments, iron oxides and heavy minerals were observed in some of the analyzed samples, where they occur in minor amounts. Kaolinite is present mainly as an authigenic component in most of the analyzed samples, while quartz overgrowths occur in variable amounts in most of the investigated samples. Carbonates (calcite & siderite) are present in considerable amounts. The grain roundness in most of the investigated sandstone samples ranges from well-rounded to round, and, in fewer samples, is sub-angular to angular. Most of the sandstone samples are moderately compacted and display point, concavo-convex and long grain contacts, whereas the sutured grain contacts, which reflect a higher degree of compaction, are relatively observed in lesser amounts, while the float grain contact has also been observed in minor quantity. Pore types in the analyzed samples are dominantly primary and secondary interparticle forms. Point-counted porosity values range from 19.6% to 30%. Average pore sizes are highly variable and range from 20 to 350 microns. Pore interconnectivity ranges from good to very good.Keywords: sandstone, sedimentological facies, porosity, quartz overgrowths
Procedia PDF Downloads 47114 Machine Translation Analysis of Chinese Dish Names
Authors: Xinyu Zhang, Olga Torres-Hostench
Abstract:
This article presents a comparative study evaluating and comparing the quality of machine translation (MT) output of Chinese gastronomy nomenclature. Chinese gastronomic culture is experiencing an increased international acknowledgment nowadays. The nomenclature of Chinese gastronomy not only reflects a specific aspect of culture, but it is related to other areas of society such as philosophy, traditional medicine, etc. Chinese dish names are composed of several types of cultural references, such as ingredients, colors, flavors, culinary techniques, cooking utensils, toponyms, anthroponyms, metaphors, historical tales, among others. These cultural references act as one of the biggest difficulties in translation, in which the use of translation techniques is usually required. Regarding the lack of Chinese food-related translation studies, especially in Chinese-Spanish translation, and the current massive use of MT, the quality of the MT output of Chinese dish names is questioned. Fifty Chinese dish names with different types of cultural components were selected in order to complete this study. First, all of these dish names were translated by three different MT tools (Google Translate, Baidu Translate and Bing Translator). Second, a questionnaire was designed and completed by 12 Chinese online users (Chinese graduates of a Hispanic Philology major) in order to find out user preferences regarding the collected MT output. Finally, human translation techniques were observed and analyzed to identify what translation techniques would be observed more often in the preferred MT proposals. The result reveals that the MT output of the Chinese gastronomy nomenclature is not of high quality. It would be recommended not to trust the MT in occasions like restaurant menus, TV culinary shows, etc. However, the MT output could be used as an aid for tourists to have a general idea of a dish (the main ingredients, for example). Literal translation turned out to be the most observed technique, followed by borrowing, generalization and adaptation, while amplification, particularization and transposition were infrequently observed. Possibly because that the MT engines at present are limited to relate equivalent terms and offer literal translations without taking into account the whole context meaning of the dish name, which is essential to the application of those less observed techniques. This could give insight into the post-editing of the Chinese dish name translation. By observing and analyzing translation techniques in the proposals of the machine translators, the post-editors could better decide which techniques to apply in each case so as to correct mistakes and improve the quality of the translation.Keywords: Chinese dish names, cultural references, machine translation, translation techniques
Procedia PDF Downloads 135113 Relationship of Sexually Abusive Behavior of Male Coach and Motivation of Female Athletes at Public Sector Universities, Sindh, Pakistan
Authors: Shireen Bhatti, M. Asif Shaikh, Atif Khan
Abstract:
Sexually abusive behavior is seen as a social phenomenon across different societies and different territories. An institution of sport has its own uniqueness. It is different from other workplaces and academia. The challenges in sports raised are different, which require a call to action for specific sexual harassment policies and practices. Many sportswomen who are members of team games or individual games experience sexually abusive behavior from their male counterparts, including trainers, coaches, and lower staff. The power of the coach over the athlete is massive due to the coach’s position. The power can be disguised for possible abuse, whether physical or emotional. Female athletes are victims in most offensive situations that occur in collegiate settings by male coaches. The objective of the study is to identify the relationship between the sexually abusive behavior of male coaches and the motivation of female athletes at public sector universities in Sindh, Pakistan. The descriptive approach was used, whereas The cross-sectional survey design was used to support the study. Intercollegiate, intervarsity, provincial, and national level female athletes of public sector universities of Sindh province were the subject of this study. The tool of research was a self-developed scale that encompassed the relationship between the sexually abusive behaviors of coaches and the motivation of female athletes. Frequency, percentage, and mean and Pearson Correlation, chi square, and ANOVA were used. The results indicate that there is a strong negative relationship between the sexually abusive behavior of male coaches and female athletes’ sports motivation. The Pearson correlation shows that there is a strong negative relation between the sexually abusive behavior of male athletes and female athletes’ sports motivation. The significant level is (r = -.741); however, The findings confirmed that the coach’s power, authority, decision-making position, the threat of rejection on the refusal of sexual cooperation, the ready availability of inexperienced female athletes, and lack of implication of policies regarding sexual misconducts in public sector universities decline motivation of female athletes witnessed. Based on the findings, the study recommended that the family background, career history, and participation record of coaches should be investigated to ensure that they have ever been involved in any criminal activity or sexual misconduct during their career or participation.Keywords: abusive, athlete, coach, motivation
Procedia PDF Downloads 330112 RA-Apriori: An Efficient and Faster MapReduce-Based Algorithm for Frequent Itemset Mining on Apache Flink
Authors: Sanjay Rathee, Arti Kashyap
Abstract:
Extraction of useful information from large datasets is one of the most important research problems. Association rule mining is one of the best methods for this purpose. Finding possible associations between items in large transaction based datasets (finding frequent patterns) is most important part of the association rule mining. There exist many algorithms to find frequent patterns but Apriori algorithm always remains a preferred choice due to its ease of implementation and natural tendency to be parallelized. Many single-machine based Apriori variants exist but massive amount of data available these days is above capacity of a single machine. Therefore, to meet the demands of this ever-growing huge data, there is a need of multiple machines based Apriori algorithm. For these types of distributed applications, MapReduce is a popular fault-tolerant framework. Hadoop is one of the best open-source software frameworks with MapReduce approach for distributed storage and distributed processing of huge datasets using clusters built from commodity hardware. However, heavy disk I/O operation at each iteration of a highly iterative algorithm like Apriori makes Hadoop inefficient. A number of MapReduce-based platforms are being developed for parallel computing in recent years. Among them, two platforms, namely, Spark and Flink have attracted a lot of attention because of their inbuilt support to distributed computations. Earlier we proposed a reduced- Apriori algorithm on Spark platform which outperforms parallel Apriori, one because of use of Spark and secondly because of the improvement we proposed in standard Apriori. Therefore, this work is a natural sequel of our work and targets on implementing, testing and benchmarking Apriori and Reduced-Apriori and our new algorithm ReducedAll-Apriori on Apache Flink and compares it with Spark implementation. Flink, a streaming dataflow engine, overcomes disk I/O bottlenecks in MapReduce, providing an ideal platform for distributed Apriori. Flink's pipelining based structure allows starting a next iteration as soon as partial results of earlier iteration are available. Therefore, there is no need to wait for all reducers result to start a next iteration. We conduct in-depth experiments to gain insight into the effectiveness, efficiency and scalability of the Apriori and RA-Apriori algorithm on Flink.Keywords: apriori, apache flink, Mapreduce, spark, Hadoop, R-Apriori, frequent itemset mining
Procedia PDF Downloads 293111 From Abraham to Average Man: Game Theoretic Analysis of Divine Social Relationships
Authors: Elizabeth Latham
Abstract:
Billions of people worldwide profess some feeling of psychological or spiritual connection with the divine. The majority of them attribute this personal connection to the God of the Christian Bible. The objective of this research was to discover what could be known about the exact social nature of these relationships and to see if they mimic the interactions recounted in the bible; if a worldwide majority believes that the Christian Bible is a true account of God’s interactions with mankind, it is reasonable to assume that the interactions between God and the aforementioned people would be similar to the ones in the bible. This analysis required the employment of an unusual method of biblical analysis: Game Theory. Because the research focused on documented social interaction between God and man in scripture, it was important to go beyond text-analysis methods. We used stories from the New Revised Standard Version of the bible to set up “games” using economics-style matrices featuring each player’s motivations and possible courses of action, modeled after interactions in the Old and New Testaments between the Judeo-Christian God and some mortal person. We examined all relevant interactions for the objectives held by each party and their strategies for obtaining them. These findings were then compared to similar “games” created based on interviews with people subscribing to different levels of Christianity who ranged from barely-practicing to clergymen. The range was broad so as to look for a correlation between scriptural knowledge and game-similarity to the bible. Each interview described a personal experience someone believed they had with God and matrices were developed to describe each one as social interaction: a “game” to be analyzed quantitively. The data showed that in most cases, the social features of God-man interactions in the modern lives of people were like those present in the “games” between God and man in the bible. This similarity was referred to in the study as “biblical faith” and it alone was a fascinating finding with many implications. The even more notable finding, however, was that the amount of game-similarity present did not correlate with the amount of scriptural knowledge. Each participant was also surveyed on family background, political stances, general education, scriptural knowledge, and those who had biblical faith were not necessarily the ones that knew the bible best. Instead, there was a high degree of correlation between biblical faith and family religious observance. It seems that to have a biblical psychological relationship with God, it is more important to have a religious family than to have studied scripture, a surprising insight with massive implications on the practice and preservation of religion.Keywords: bible, Christianity, game theory, social psychology
Procedia PDF Downloads 153110 Wind Energy Harvester Based on Triboelectricity: Large-Scale Energy Nanogenerator
Authors: Aravind Ravichandran, Marc Ramuz, Sylvain Blayac
Abstract:
With the rapid development of wearable electronics and sensor networks, batteries cannot meet the sustainable energy requirement due to their limited lifetime, size and degradation. Ambient energies such as wind have been considered as an attractive energy source due to its copious, ubiquity, and feasibility in nature. With miniaturization leading to high-power and robustness, triboelectric nanogenerator (TENG) have been conceived as a promising technology by harvesting mechanical energy for powering small electronics. TENG integration in large-scale applications is still unexplored considering its attractive properties. In this work, a state of the art design TENG based on wind venturi system is demonstrated for use in any complex environment. When wind introduces into the air gap of the homemade TENG venturi system, a thin flexible polymer repeatedly contacts with and separates from electrodes. This device structure makes the TENG suitable for large scale harvesting without massive volume. Multiple stacking not only amplifies the output power but also enables multi-directional wind utilization. The system converts ambient mechanical energy to electricity with 400V peak voltage by charging of a 1000mF super capacitor super rapidly. Its future implementation in an array of applications aids in environment friendly clean energy production in large scale medium and the proposed design performs with an exhaustive material testing. The relation between the interfacial micro-and nano structures and the electrical performance enhancement is comparatively studied. Nanostructures are more beneficial for the effective contact area, but they are not suitable for the anti-adhesion property due to the smaller restoring force. Considering these issues, the nano-patterning is proposed for further enhancement of the effective contact area. By considering these merits of simple fabrication, outstanding performance, robust characteristic and low-cost technology, we believe that TENG can open up great opportunities not only for powering small electronics, but can contribute to large-scale energy harvesting through engineering design being complementary to solar energy in remote areas.Keywords: triboelectric nanogenerator, wind energy, vortex design, large scale energy
Procedia PDF Downloads 212109 The Incidence of Postoperative Atrial Fibrillation after Coronary Artery Bypass Grafting in Patients with Local and Diffuse Coronary Artery Disease
Authors: Kamil Ganaev, Elina Vlasova, Andrei Shiryaev, Renat Akchurin
Abstract:
De novo atrial fibrillation (AF) after coronary artery bypass grafting (CABG) is a common complication. To date, there are no data on the possible effect of diffuse lesions of coronary arteries on the incidence of postoperative AF complications. Methods. Patients operated on-pump under hypothermic conditions during the calendar year (2020) were studied. Inclusion criteria - isolated CABG and achievement of complete myocardial revascularization. Patients with a history of AF moderate and severe valve dysfunction, hormonal thyroid pathology, initial CHF(Congestive heart failure), as well as patients with developed perioperative complications (IM, acute heart failure, massive blood loss) and deceased were excluded. Thus 227 patients were included; mean age 65±9 years; 69% were men. 89% of patients had a 3-vessel lesion of the coronary artery; the remainder had a 2-vessel lesion. Mean LV size: 3.9±0.3 cm, indexed LV volume: 29.4±5.3 mL/m2. Two groups were considered: D (n=98), patients with diffuse coronary heart disease, and L (n=129), patients with local coronary heart disease. Clinical and demographic characteristics in the groups were comparable. Rhythm assessment: continuous bedside ECG monitoring up to 5 days; ECG CT at 5-7 days after CABG; daily routine ECG registration. Follow-up period - postoperative hospital period. Results. The Median follow-up period was 9 (7;11) days. POFP (Postoperative atrial fibrillation) was detected in 61/227 (27%) patients: 34/98 (35%) in group D versus 27/129 (21%) in group L; p<0.05. Moreover, the values of revascularization index in groups D and L (3.9±0.7 and 3.8±0.5, respectively) were equal, and the mean time Cardiopulmonary bypass (CPB) (107±27 and 80±13min), as well as the mean ischemic time (67±17 and 55±11min) were significantly longer in group D (p<0.05). However, a separate analysis of these parameters in patients with and without developed AF did not reveal any significant differences in group D (CPB time 99±21.2 min, ischemic time 63±12.2 min), or in group L (CPB time 88±13.1 min, ischemic time 58.7±13.2 min). Conclusion. With the diffuse nature of coronary lesions, the incidence of AF in the hospital period after isolated CABG definitely increases. To better understand the role of severe coronary atherosclerosis in the development of POAF, it is necessary to distinguish the influence of organic features of atrial and ventricular myocardium (as a consequence of chronic coronary disease) from the features of surgical correction in diffuse coronary lesions.Keywords: atrial fibrillation, diffuse coronary artery disease, coronary artery bypass grafting, local coronary artery disease
Procedia PDF Downloads 211108 Interventions for Children with Autism Using Interactive Technologies
Authors: Maria Hopkins, Sarah Koch, Fred Biasini
Abstract:
Autism is lifelong disorder that affects one out of every 110 Americans. The deficits that accompany Autism Spectrum Disorders (ASD), such as abnormal behaviors and social incompetence, often make it extremely difficult for these individuals to gain functional independence from caregivers. These long-term implications necessitate an immediate effort to improve social skills among children with an ASD. Any technology that could teach individuals with ASD necessary social skills would not only be invaluable for the individuals affected, but could also effect a massive saving to society in treatment programs. The overall purpose of the first study was to develop, implement, and evaluate an avatar tutor for social skills training in children with ASD. “Face Say” was developed as a colorful computer program that contains several different activities designed to teach children specific social skills, such as eye gaze, joint attention, and facial recognition. The children with ASD were asked to attend to FaceSay or a control painting computer game for six weeks. Children with ASD who received the training had an increase in emotion recognition, F(1, 48) = 23.04, p < 0.001 (adjusted Ms 8.70 and 6.79, respectively) compared to the control group. In addition, children who received the FaceSay training had higher post-test scored in facial recognition, F(1, 48) = 5.09, p < 0.05 (adjusted Ms: 38.11 and 33.37, respectively) compared to controls. The findings provide information about the benefits of computer-based training for children with ASD. Recent research suggests the value of also using socially assistive robots with children who have an ASD. Researchers investigating robots as tools for therapy in ASD have reported increased engagement, increased levels of attention, and novel social behaviors when robots are part of the social interaction. The overall goal of the second study was to develop a social robot designed to teach children specific social skills such as emotion recognition. The robot is approachable, with both an animal-like appearance and features of a human face (i.e., eyes, eyebrows, mouth). The feasibility of the robot is being investigated in children ages 7-12 to explore whether the social robot is capable of forming different facial expressions to accurately display emotions similar to those observed in the human face. The findings of this study will be used to create a potentially effective and cost efficient therapy for improving the cognitive-emotional skills of children with autism. Implications and study findings using the robot as an intervention tool will be discussed.Keywords: autism, intervention, technology, emotions
Procedia PDF Downloads 380