Search results for: network society
3189 Explorative Approach to the Evolving Administrative Landscape of South Africa
Authors: Z. I Jeeva
Abstract:
The establishment of municipalities in South Africa has been a long and difficult process; 25 years later, it still appears to be evolving. In 1994, the new democratic government undertook to restructure the country’s racially segregated administrative structure by integrating areas to form cohesive municipal entities that would allow for the more efficient administration management of the regions. It planned to achieve this within a short seven-year period from 1993 to 2000, which was to be divided into three phases, namely, the pre-interim phase from 1994 to1995, the interim phase from 1996 to 1999, and the post-interim phase from 2000 onwards. However, the extensive integrated municipal approach was easier to pen on paper than to implement in practice. This paper seeks to explore the South African spatial reform process from 1993 to 2020, by analyzing policy documents and literature in order to determine how exactly the government attempted to achieve this. The study found that the spatial restructuring process was particularly complex since the democratic government inherited an unequal society located on a fragmented spatial landscape of which there was limited knowledge with many unresolved issues. Furthermore, the study found that there is a lack of literature on the topic from an urban planning perspective and calls for further research to ensure the formation of more efficient administrative regions.Keywords: categorization, demarcation, municipalities, racial integration, spatial reform
Procedia PDF Downloads 1083188 Legal Status Of Children Living With Albinism In Nigeria
Authors: Ibhade Oluwabunlola Adisa Ibojo, Tolulope Funmilola Aladetan
Abstract:
Children living with albinism in Nigeria face significant legal and social challenges that threaten their rights and well-being. Despite existing laws aimed at protecting the rights of children, including the Child Rights Act of 2003, the unique vulnerabilities of children with albinism often go unaddressed. This abstract explores the legal status of these children, highlighting the gaps in legal protection and the prevalence of discrimination and violence against them. In many Nigerian communities, deep-seated myths and superstitions regarding albinism contribute to the marginalization and stigmatization of individuals with this condition. Consequently, children with albinism are at a heightened risk of violence, including abduction and ritualistic killings, often with impunity for the perpetrators. This situation is exacerbated by inadequate legal frameworks, ineffective enforcement of existing laws, and a lack of awareness among law enforcement officials and the general public. The paper also examines the implications of these challenges on the rights of children with albinism to life, education, and healthcare. Recommendations are proposed for improving the legal framework and implementing targeted awareness campaigns to protect these vulnerable children. By addressing these issues, the Nigerian legal system can better safeguard the rights and dignity of children living with albinism, ensuring they can lead safe and fulfilling lives. This research aims to raise awareness of the plight of these children and advocate for stronger legal protections to promote their rights and well-being in Nigerian society.Keywords: Albinism, vulnerable, children, laws
Procedia PDF Downloads 153187 The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel
Authors: Toufik Karech, Abderahmen Benseghir, Tayeb Bouzid
Abstract:
This work presents a 2D numerical simulation of an earth dam to assess the behavior of its foundation after a treatment by stone columns. This treatment aims to improve the bearing capacity, to increase the mechanical properties of the soil, to accelerate the consolidation, to reduce the settlements and to eliminate the liquefaction phenomenon in case of seismic excitation. For the evaluation of the pore pressures, the position of the phreatic line and the flow network was defined, and a seepage analysis was performed with the software MIDAS Soil Works. The consolidation calculation is performed through a simulation of the actual construction stages of the dam. These analyzes were performed using the Mohr-Coulomb soil model and the results are compared with the actual measurements of settlement gauges implanted in the dam. An analysis of the bearing capacity was conducted to show the role of stone columns in improving the bearing capacity of the foundation.Keywords: earth dam, dam foundation, numerical simulation, stone columns, seepage analysis, consolidation, bearing capacity
Procedia PDF Downloads 1903186 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1133185 Domestic Violence against Rural Women in Haryana State of India
Authors: Jatesh Kathpalia, Subhash Chander
Abstract:
Violence against women has spread into a global epidemic. This has debilitating effect over the performance of women. Due to deep-rooted values, traditional Indian culture women fear the consequences of reporting violence and declare an unwillingness to subject themselves to the shame of being identified as battered women. Main interest was to study types of domestic violence which women face and to encourage them to report the matter. The study involved understanding the nature, extent and types of domestic violence. Two hundred rural women respondents were selected at random, interview schedule was prepared, and victims afflicted with domestic violence were identified. Data were collected and analyzed for different forms of domestic violence faced by women. 60% of the respondents faced domestic violence in different forms. Out of 120 women who were affected, 92.5% faced emotional, 90.8% faced verbal, 49.1% faced economic and 58.3% faced physical violence. 45.0% faced violence within three months of the marriage. Out of these, only 6.6% reported the violence to the police. Frequently faced forms of violence were slapping (27.1%), beating (24.3%) and starvation (25.7%). Number of women who were not allowed to spend money of their own stood at 30.5%. About 50% victims of emotional violence were facing constant criticism by their in-laws. Significant association was found between age, education and socio-economic status of the respondents and domestic violence. Rural women in Haryana face grave problem of domestic violence which need to be curbed for improving condition of women in society.Keywords: domestic violence against women, economic, emotional, physical and verbal violence, marriage, rural women
Procedia PDF Downloads 3893184 Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-Existence with Non-Muslims
Authors: Saheed Biodun Qaasim-Badmusi
Abstract:
A lot has been written on peaceful co-existence with non-Muslims in Islam, but little attention is paid to the conflict between Ahadith relating to dissociation from non-Muslims as a kernel of Islamic faith, and the one indicating peaceful co-existence with them. Undoubtedly, proper understanding of seemingly contradictory prophetic traditions is an antidote to the bane of pervasive extremism in our society. This is what calls for need to shed light on ‘Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-existence with Non-Muslims. It is in view of the above that efforts are made in this paper to collate Ahadith pertaining to dissociation from non-Muslims as well as co-existence with them. Consequently, a critical study of their authenticity is briefly explained before proceeding to analysis of their linguistic and contextual meanings. To arrive at the accurate interpretation, harmonization is graphically applied. The result shows that dissociation from non –Muslims as a bedrock of Islamic faith could be explained in Sunnah by prohibition of participating or getting satisfaction from their religious matters, and anti-Islamic activities. Also, freedom of apostasy, ignoring da`wah with wisdom and seeking non-Muslims support against Muslims are frowned upon in Sunnah as phenomenon of dissociation from non –Muslims. All the aforementioned are strictly prohibited in Sunnah whether under the pretext of enhancing peaceful co-existence with non-Muslims or not. While peaceful co-existence with non-Muslims is evidenced in Sunnah by permissibility of visiting the sick among them, exchange of gift with them, forgiving the wrong among them, having good relationship with non-Muslim neighbours, ties of non-Muslim kinship, legal business transaction with them and the like. Finally, the degree of peaceful co-existence with non-Muslims is determined by their attitude towards Islam and Muslims.Keywords: Ahadith, conflict, co-existence, non-Muslims
Procedia PDF Downloads 1453183 Optimal Reactive Power Dispatch under Various Contingency Conditions Using Whale Optimization Algorithm
Authors: Khaled Ben Oualid Medani, Samir Sayah
Abstract:
The Optimal Reactive Power Dispatch (ORPD) problem has been solved and analysed usually in the normal conditions. However, network collapses appear in contingency conditions. In this paper, ORPD under several contingencies is presented using the proposed method WOA. To ensure viability of the power system in contingency conditions, several critical cases are simulated in order to prevent and prepare the power system to face such situations. The results obtained are carried out in IEEE 30 bus test system for the solution of ORPD problem in which control of bus voltages, tap position of transformers and reactive power sources are involved. Moreover, another method, namely, Particle Swarm Optimization with Time Varying Acceleration Coefficient (PSO-TVAC) has been compared with the proposed technique. Simulation results indicate that the proposed WOA gives remarkable solution in terms of effectiveness in case of outages.Keywords: optimal reactive power dispatch, power system analysis, real power loss minimization, contingency condition, metaheuristic technique, whale optimization algorithm
Procedia PDF Downloads 1213182 The Value and Role of Higher Education in the Police Profession
Authors: Habib Ahmadi, Mohamad Ali Ameri
Abstract:
In this research, the perception and understanding of police officers about the value of higher education have been investigated. A qualitative research approach and phenomenological method were used, and in data analysis, the Claizi method was used. In this research, 17 people with different degrees and occupations were selected by purposive sampling method until saturation and were investigated using a semi-structured interview tool. After the data was collected, recorded, and coded in the Atlas T software, it was formulated in the form of main categories and concepts. The general views of police officers participating in this research show the importance of university education in police jobs(76%). The analysis of participants' experiences led to the identification of seven main categories of the value and role of higher education, including; 1- Improvement of behavior and social skills, 2- Opportunities to improve and improve job performance, 3- Professionalization of police work, 4- Financial motivation, 5- People's satisfaction with police services, 6- Improvement of writing and technical skills Statement, 7- Raising the level of expectation and expectations was misplaced (negative perception). The findings of this study support the positive attitude and professionalism of the educated police. Therefore, considering the change of paradigm in society as well as the change of technologies, more complex organizational designs, and the perception of police officers, it is concluded that the police field needs officers with higher education to enable them to understand the new global environment.Keywords: lived experience, higher education, police professionalization, perceptions of police officers
Procedia PDF Downloads 833181 Sufism as Therapy of Terrorism and Extremism with Special Reference to the Teaching of Khawaja Ghulam Fareed and Bulleh Shah
Authors: Arshad Munir, Naseem Akhtar
Abstract:
The determination of the Sufi is to effort towards unity. His main purpose is to bring humanity, separated as it is into so many different units, closer together in the deeper understanding of life. His mission is to bring about brotherhood among races, nations and faiths and to respect one another's faith, scripture and teacher. Sufi is to confer sympathy on these lives, to impart love, compassion and kindheartedness on all creations. The Sufi message is the resonance of the same Divine message which has always come and will always come to inform humanity. It is the continuation of all the pronounced religions which have come at several times and it is amalgamation of them all, which was the wish of all the prophets. Pakistan, who came into being in the name of Islam unfortunately, have linked with terrorism. It is a disgrace that in contemporary day Pakistan, mullahism and the recent cancer of Talibanisation are gradually eating into what had kept us integral as a society. Terrorism has grown-up to develop a prime safety pressure to the area. The terrorism has deadly caused decrease in overseas and local investment, exports, physical infrastructure, and wealth stock ultimately leading to damage of the socio-economic status of Pakistan. Main reasons are ignorance about the actual teaching of Islam both by Muslim and non-Muslim, exploitation by the religious and political influential, sectarianism and extremism, lack of tolerance and broadmindedness and reaction and retortion by the sufferer. The key treatment and therapy of the abovementioned illnesses exist in the messages of Sufism.Keywords: sufism, love, Pakistan, terrorism
Procedia PDF Downloads 3023180 Social Discussion Networks during the Covid-19 Pandemic: A Study of College Students Core Discussion Groups
Authors: Regan Harper, Song Yang, Douglas Adams
Abstract:
During the historically unprecedent time of Covid-19 pandemic, we survey college students with social issue generators to measure their core discussion groups. For the total 191 students, we elicit 847 conversation partners (alters) with our five social issue generators such as school closing, facemasks, collegiate sports, race and policing, and social inequality, producing an average of 4.43 alters per respondent. The core discussion groups of our sample are very gender balanced, with female alters slightly outnumbering male alters. However, the core discussion groups are racially homogenous, consisting of mostly white students (around or above 80 percent). Explanatory analyses reveal that gender and race of respondents significantly impact the size, gender composition, and racial composition of their core discussion networks. We discuss those major findings and implications of future studies in our conclusion section.Keywords: core discussion groups, social issue generators, ego-centric network, Covid-19 pandemic
Procedia PDF Downloads 913179 Prosodic Characteristics of Post Traumatic Stress Disorder Induced Speech Changes
Authors: Jarek Krajewski, Andre Wittenborn, Martin Sauerland
Abstract:
This abstract describes a promising approach for estimating post-traumatic stress disorder (PTSD) based on prosodic speech characteristics. It illustrates the validity of this method by briefly discussing results from an Arabic refugee sample (N= 47, 32 m, 15 f). A well-established standardized self-report scale “Reaction of Adolescents to Traumatic Stress” (RATS) was used to determine the ground truth level of PTSD. The speech material was prompted by telling about autobiographical related sadness inducing experiences (sampling rate 16 kHz, 8 bit resolution). In order to investigate PTSD-induced speech changes, a self-developed set of 136 prosodic speech features was extracted from the .wav files. This set was adapted to capture traumatization related speech phenomena. An artificial neural network (ANN) machine learning model was applied to determine the PTSD level and reached a correlation of r = .37. These results indicate that our classifiers can achieve similar results to those seen in speech-based stress research.Keywords: speech prosody, PTSD, machine learning, feature extraction
Procedia PDF Downloads 903178 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education
Authors: Yu Cheng-Yu
Abstract:
‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.Keywords: social construction, heterogeneity, new media, big data, visual culture art education
Procedia PDF Downloads 2483177 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis
Authors: Mhaned Oubounyt, Jan Baumbach
Abstract:
Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks
Procedia PDF Downloads 1503176 Estimating the Effect of Fluid in Pressing Process
Authors: A. Movaghar, R. A. Mahdavinejad
Abstract:
To analyze the effect of various parameters of fluid on the material properties such as surface and depth defects and/or cracks, it is possible to determine the affection of pressure field on these specifications. Stress tensor analysis is also able to determine the points in which the probability of defection creation is more. Besides, from pressure field, it is possible to analyze the affection of various fluid specifications such as viscosity and density on defect created in the material. In this research, the concerned boundary conditions are analyzed first. Then the solution network and stencil used are mentioned. With the determination of relevant equation on the fluid flow between notch and matrix and their discretion according to the governed boundary conditions, these equations can be solved. Finally, with the variation creations on fluid parameters such as density and viscosity, the affection of these variations can be determined on pressure field. In this direction, the flowchart and solution algorithm with their results as vortex and current function contours for two conditions with most applications in pressing process are introduced and discussed.Keywords: pressing, notch, matrix, flow function, vortex
Procedia PDF Downloads 2903175 Spectrum Assignment Algorithms in Optical Networks with Protection
Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad
Abstract:
In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks
Procedia PDF Downloads 1693174 Being Your Own First Responder: A Training to Identify and Respond to Mental Health
Authors: Joe Voshall, Leigha Shoup
Abstract:
In 2022, the Ohio Peace Officer Training Council and the Attorney General required officers to complete a minimum of 24 hours of continued professional training for the year. Much of the training was based on Mental Health or similarly related topics. This includes Officer Wellness and Officer Mental Health. It is becoming clearer that the stigma of Officer / First Responder Mental Health is a topic that is becoming more prevalently faced. To assist officers and first responders in facing mental health issues, we are developing new training. This training will aid in recognizing mental health-related issues in officers/first responders and citizens, as well as further using the same information to better respond and interact with one another and the public. In general, society has many varying views of mental health, much of which is largely over-sensationalized by television, movies, and other forms of entertainment. There has also been a stigma in law enforcement / first responders related to mental health and being weak as a result of on-the-job-related trauma-induced struggles. It is our hope this new training will assist officers and first responders in not only positively facing and addressing their mental health but using their own experience and education to recognize signs and symptoms of mental health within individuals in the community. Further, we hope that through this recognition, officers and first responders can use their experiences and more in-depth understanding to better interact within the field and with the public. Through recognition and better understanding of mental health issues and more positive interaction with the public, additional achievements are likely to result. This includes in the removal of bias and stigma for everyone.Keywords: law enforcement, mental health, officer related mental health, trauma
Procedia PDF Downloads 1653173 The Effects of Adlerian Supervision on Enhancing Career Consultants’ Case Conceptualization
Authors: Lin Shang Neng
Abstract:
Due to rapid changes in the societal environment, career development and planning have become increasingly crucial, leading more individuals to seek the assistance of career consultations. However, the training process for career consultants often emphasizes the application of assessment tools and guidance in job-seeking behavior. The abilities of case conceptualization and consulting skills require further in-service supervision. This study aims to inquire about the supervised experiences of employment specialists at the Employment Service Center of the Taiwan Ministry of Labor or career consultants who held private clinics for at least three years. The research participants were continuously supervised by the Adlerian approach twice a month for at least one year, helping them integrate the whole picture of the client through Lifestyle Assessment (the qualitative way, specific diagnosis) and other Adlerian assessment tools (the quantitative way, general diagnosis.) The supervisor was familiar with Adlerian Psychology and certified by the North American Society of Adlerian Psychology. The research method involves semi-structured interviews and qualitative analysis. For the ethical considerations, the participants were invited to interview after the supervision sessions finished. The findings of this research were discussed with possible implications, like how they applied Adlerian Psychology to their career consultations, especially to case conceptualizations and consulting skills. Recommendations for further research and training for career consultants are also discussed.Keywords: supervision, Adlerian psychology, case conceptualization, career consultant
Procedia PDF Downloads 793172 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things
Authors: James Kaweesa
Abstract:
The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.Keywords: cyber-threats, iot, intrusion detection system, networks
Procedia PDF Downloads 803171 Knowledge Representation Based on Interval Type-2 CFCM Clustering
Authors: Lee Myung-Won, Kwak Keun-Chang
Abstract:
This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation
Procedia PDF Downloads 3223170 The Significance of Awareness about Gender Diversity for the Future of Work: A Multi-Method Study of Organizational Structures and Policies Considering Trans and Gender Diversity
Authors: Robin C. Ladwig
Abstract:
The future of work becomes less predictable, which requires increasing the adaptability of organizations to social and work changes. Society is transforming regarding gender identity in the sense that more people come forward to identify as trans and gender diverse (TGD). Organizations are ill-equipped to provide a safe and encouraging work environment by lacking inclusive organizational structures. The qualitative multi-method research about TGD inclusivity in the workplace explores the enablers and barriers for TGD individuals to satisfactory engage in the work environment and organizational culture. Furthermore, these TGD insights are analyzed about their organizational implications and awareness from a leadership and management perspective. The semi-structured online interviews with TGD individuals and the photo-elicit open-ended questionnaire addressed to leadership and management in diversity, career development, and human resources have been analyzed with a critical grounded theory approach. Findings demonstrated the significance of TGD voices, the support of leadership and management, as well as the synergy between voices and leadership. Hence, it indicates practical implications such as the revision of exclusive language used in policies, data collection, or communication and reconsideration of organizational decision-making by leaders to include TGD voices.Keywords: future of work, occupational identity, organisational decision-making, trans and gender diverse identity
Procedia PDF Downloads 1273169 Kauffman Model on a Network of Containers
Authors: Johannes J. Schneider, Mathias S. Weyland, Peter Eggenberger Hotz, William D. Jamieson, Oliver Castell, Alessia Faggian, Rudolf M. Füchslin
Abstract:
In the description of the origin of life, there are still some open gaps, e.g., the formation of macromolecules cannot be fully explained so far. The Kauffman model proposes the existence of autocatalytic sets of macromolecules which mutually catalyze reactions leading to each other’s formation. Usually, this model is simulated in one well-stirred pot only, with a continuous inflow of small building blocks, from which larger molecules are created by a set of catalyzed ligation and cleavage reactions. This approach represents the picture of the primordial soup. However, the conditions on the early Earth must have differed geographically, leading to spatially different outcomes whether a specific reaction could be performed or not. Guided by this picture, the Kauffman model is simulated in a large number of containers in parallel, with neighboring containers being connected by diffusion. In each container, only a subset of the overall reaction set can be performed. Under specific conditions, this approach leads to a larger probability for the existence of an autocatalytic metabolism than in the original Kauffman model.Keywords: agglomeration, autocatalytic set, differential equation, Kauffman model
Procedia PDF Downloads 583168 Negotiating Story Telling: Rhetoric and Reality of Rural Marginalization in the Era of Visual Culture
Authors: Vishnu Satya
Abstract:
Rural communities form the backbone of our society. These communities are self-contained, for the most part, in how they can sustain themselves. Except for the essentials, they are primarily dependent on the state for their development and prosperity. The state claims to provide these through policies and agencies which are designed to guide their livelihood and future. It is assumed that the state-run policies are effective and are reaching the intended audience. Though in reality, there is an ever-widening gap between the two. The interviews conducted with farmers suggests that the support provided by the state to this marginalized community falls far short of their expectations, leaving them helpless. This paper discusses the methods used in bringing the status quo of the marginalized farmers to the forefront by comparing-and-contrasting the existing rhetoric and reality of the rural diaspora. It is seen from the hands-on oral accounts of farmers that they are left hanging between the state and their farms. Unrepresented, this community's progress and future stand severely affected. The paper presents how the visual medium acts as a catalyst for social advocacy by bridging the gap between administrative services and the marginalized rural communities. The finding was that there exists a disconnect between policymakers and the farming community, which has hindered the progress of the farmers. These two communities live exclusively from each other. In conclusion, it is seen that when the gaps between administrators and farmers are plugged through grass-root efforts utilizing visual medium, the farmer's economic situation got better, and the community prospered.Keywords: farmers, social advocacy, marginalized, story telling
Procedia PDF Downloads 1533167 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Authors: Haowei Chen, Kaiqi Xiong
Abstract:
This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis
Procedia PDF Downloads 983166 Selection of Intensity Measure in Probabilistic Seismic Risk Assessment of a Turkish Railway Bridge
Authors: M. F. Yilmaz, B. Ö. Çağlayan
Abstract:
Fragility curve is an effective common used tool to determine the earthquake performance of structural and nonstructural components. Also, it is used to determine the nonlinear behavior of bridges. There are many historical bridges in the Turkish railway network; the earthquake performances of these bridges are needed to be investigated. To derive fragility curve Intensity measures (IMs) and Engineering demand parameters (EDP) are needed to be determined. And the relation between IMs and EDP are needed to be derived. In this study, a typical simply supported steel girder riveted railway bridge is studied. Fragility curves of this bridge are derived by two parameters lognormal distribution. Time history analyses are done for selected 60 real earthquake data to determine the relation between IMs and EDP. Moreover, efficiency, practicality, and sufficiency of three different IMs are discussed. PGA, Sa(0.2s) and Sa(1s), the most common used IMs parameters for fragility curve in the literature, are taken into consideration in terms of efficiency, practicality and sufficiency.Keywords: railway bridges, earthquake performance, fragility analyses, selection of intensity measures
Procedia PDF Downloads 3573165 Limiting Factors to Gender Identity in the Irene Salami-Agunloye’s Emotan
Authors: Adebayo John Badeji
Abstract:
This study examines some limiting factors in the dramaturgy of Irene Salami- Agunloye's Emotan. These factors are cultural, socio-political, and religious beliefs that play significant roles in gender balance, such that it establishes inequality between the sexes, giving male attributes greater value than that female ones subconsciously. This work draws its findings from the textual analysis method, and Stiwanism was employed as our theoretical framework. The theory is further discussed in the body of the work. By analysis, we subject this work to critical content analysis. Our findings revealed that most African feminist ideologies employ the ideology of revolt, which may not work on African soil. The play projects women's and men's issues in politics. This study exposes us to the fact that gender inequality is created by the male’s dominance in society. Also, the African women’s imitation of the cultural dictates of their fellow counterparts abroad is also affecting their own perspective on African soil. The study concludes that the African woman is looking at her freedom from the view of her counterparts in Europe and America, which is not right. As argued by Irene salami, women were active in societal development in Africa. This study, therefore, recommends that she should look at African women from the African perspective. This is because Queen Amina of Zazzau, Queen Idia of Benin, and Queen Moremi of Ife ruled when there were men, and they excelled.Keywords: gender, identity, Emotan, factors
Procedia PDF Downloads 1273164 Seismic Response and Sensitivity Analysis of Circular Shallow Tunnels
Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed
Abstract:
Underground tunnels are one of the most popular public facilities for various applications such as transportation, water transfer, network utilities and etc. Experience from the past earthquake reveals that the underground tunnels also become vulnerable components and may damage at certain percentage depending on the level of ground shaking and induced phenomena. In this paper a numerical analysis is conducted in evaluating the sensitivity of two types of circular shallow tunnel lining models to wide ranging changes in the geotechnical design parameter. Critical analysis has been presented about the current methods of analysis, structural typology, ground motion characteristics, effect of soil conditions and associated uncertainties on the tunnel integrity. The response of the tunnel is evaluated through 2D non-linear finite element analysis, which critically assesses the impact of increasing levels of seismic loads. The finding from this study offer significant information on improving methods to assess the vulnerability of underground structures.Keywords: geotechnical design parameter, seismic response, sensitivity analysis, shallow tunnel
Procedia PDF Downloads 4413163 Embedded Hw-Sw Reconfigurable Techniques For Wireless Sensor Network Applications
Authors: B. Kirubakaran, C. Rajasekaran
Abstract:
Reconfigurable techniques are used in many engineering and industrial applications for the efficient data transmissions through the wireless sensor networks. Nowadays most of the industrial applications are work for try to minimize the size and cost. During runtime the reconfigurable technique avoid the unwanted hang and delay in the system performance. In recent world Field Programmable Gate Array (FPGA) as one of the most efficient reconfigurable device and widely used for most of the hardware and software reconfiguration applications. In this paper, the work deals with whatever going to make changes in the hardware and software during runtime it’s should not affect the current running process that’s the main objective of the paper our changes be done in a parallel manner at the same time concentrating the cost and power transmission problems during data trans-receiving. Analog sensor (Temperature) as an input for the controller (PIC) through that control the FPGA digital sensors in generalized manner.Keywords: field programmable gate array, peripheral interrupt controller, runtime reconfigurable techniques, wireless sensor networks
Procedia PDF Downloads 4073162 Environmental Strategies Towards Sustainable Development in Nigeria
Authors: Sirajoddeen Al-Ameen
Abstract:
Researchers seek to introduce development leading to technologies that address environmental problems and learn how to interact with stakeholders, managers, and policymakers for appropriate actions. One of the greatest strategies that African countries need to consider in realizing sustainable development is effective, efficient, credible, and lasting environmental sustainability and ensuring that future generations have access to natural resources to live in a better way. Therefore the coordinated set of participatory and continuously improving processes of analysis, capacity, planning, and investment seeks to integrate the social and environmental objectives of society, and this is not given priority in Nigeria. Environmental sustainability is a field where people can understand the natural environment and public works for sustainable development. Sustainable development requires shifts from ordinary ways of doing things to modern ways of executing activities ranging from low to high productivity, the creation and adoption of new strategies, new skills, and knowledge. It ensures a developed world with a secure and healthy environment for all; human beings, animals, and plants alike. This paper is to carry out a review of various literature sources to ascertain the potential strategy of environment and sustainable development reform using the content analysis method to discuss the environmental strategies towards sustainable development in Nigeria. The objective of this paper is to enable Nigerians to understand and have an orientation on how to manage environmental resources and avoid environmental impact on the ecosystem, and also to find sustainable solutions for environmental issues without compromising economic development.Keywords: development, environment, strategies, sustainable
Procedia PDF Downloads 1073161 Study of Structural Health Monitoring System for Vam Cong Cable-Stayed Bridge
Authors: L. M. Chinh
Abstract:
Vam Cong Bridge beside Can Tho Bridge is the next cable-stayed bridge spanning the Hau River, connecting Lap Vo district with Thot Not district. After construction by the end of 2018, the Vam Cong Bridge with Cao Lanh Bridge will help to improve the road network in this region of Mekong Delta. For this bridge, the SHM system also had designed for two stages – construction stage and exploitation stage. At the moment over 65% of the bridge construction had completed, and the bridge will be completed at the end of 2018. During the construction stage, the SHM system had been install to monitor behaviors of the bridge. Based on the study of the design documentation of the SHM system of the Vam Cong Bridge and site visit during construction work, many designs and installation errors have been detected. In this paper author thoroughly analyzed the pros and cons of this SHM system, simultaneously make conclusions and recommendations for this system. Specially concentrated on the possibility of implementing the acoustic emission method (AE) into this SHM system, which is an alternative to the further development of the system, enabling a full and cost-effective solution for the bridge management, which is of utmost importance for the service life and safe operation of the bridge.Keywords: SHM system, design and installation, Vam Cong bridge, construction stage, acoustic emission method (AE)
Procedia PDF Downloads 2373160 Defective Autophagy Disturbs Neural Migration and Network Activity in hiPSC-Derived Cockayne Syndrome B Disease Models
Authors: Julia Kapr, Andrea Rossi, Haribaskar Ramachandran, Marius Pollet, Ilka Egger, Selina Dangeleit, Katharina Koch, Jean Krutmann, Ellen Fritsche
Abstract:
It is widely acknowledged that animal models do not always represent human disease. Especially human brain development is difficult to model in animals due to a variety of structural and functional species-specificities. This causes significant discrepancies between predicted and apparent drug efficacies in clinical trials and their subsequent failure. Emerging alternatives based on 3D in vitro approaches, such as human brain spheres or organoids, may in the future reduce and ultimately replace animal models. Here, we present a human induced pluripotent stem cell (hiPSC)-based 3D neural in a vitro disease model for the Cockayne Syndrome B (CSB). CSB is a rare hereditary disease and is accompanied by severe neurologic defects, such as microcephaly, ataxia and intellectual disability, with currently no treatment options. Therefore, the aim of this study is to investigate the molecular and cellular defects found in neural hiPSC-derived CSB models. Understanding the underlying pathology of CSB enables the development of treatment options. The two CSB models used in this study comprise a patient-derived hiPSC line and its isogenic control as well as a CSB-deficient cell line based on a healthy hiPSC line (IMR90-4) background thereby excluding genetic background-related effects. Neurally induced and differentiated brain sphere cultures were characterized via RNA Sequencing, western blot (WB), immunocytochemistry (ICC) and multielectrode arrays (MEAs). CSB-deficiency leads to an altered gene expression of markers for autophagy, focal adhesion and neural network formation. Cell migration was significantly reduced and electrical activity was significantly increased in the disease cell lines. These data hint that the cellular pathologies is possibly underlying CSB. By induction of autophagy, the migration phenotype could be partially rescued, suggesting a crucial role of disturbed autophagy in defective neural migration of the disease lines. Altered autophagy may also lead to inefficient mitophagy. Accordingly, disease cell lines were shown to have a lower mitochondrial base activity and a higher susceptibility to mitochondrial stress induced by rotenone. Since mitochondria play an important role in neurotransmitter cycling, we suggest that defective mitochondria may lead to altered electrical activity in the disease cell lines. Failure to clear the defective mitochondria by mitophagy and thus missing initiation cues for new mitochondrial production could potentiate this problem. With our data, we aim at establishing a disease adverse outcome pathway (AOP), thereby adding to the in-depth understanding of this multi-faced disorder and subsequently contributing to alternative drug development.Keywords: autophagy, disease modeling, in vitro, pluripotent stem cells
Procedia PDF Downloads 120