Search results for: spread reshaping code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2629

Search results for: spread reshaping code

2149 Report of Candida Auris: An Emerging Fungal Pathogen in a Tertiary Healthcare Facility in Ekiti State, Nigeria

Authors: David Oluwole Moses, Odeyemi Adebowale Toba, Olawale Adetunji Kola

Abstract:

Candida auris, an emerging fungus, has been reported in more than 30 countries around the world since its first detection in 2009. Due to its several virulence factors, resistance to antifungals, and persistence in hospital settings, Candida auris has been reported to cause treatment-failure infections. This study was therefore carried out to determine the incidence of Candida auris in a tertiary hospital in Ekiti State, Nigeria. In this study, a total of 115 samples were screened for Candida species using cultural and molecular methods. The carriage of virulence factors and antifungal resistance among C. auris was detected using standard microbiological methods. Candida species isolated from the samples were 15 (30.0%) in clinical samples and 22 (33.85%) in hospital equipment screened. Non-albicans Candida accounted for 3 (20%) and 8 (36.36%) among the isolates from the clinical samples and equipment, respectively. Only five of the non-albicans Candida isolates were C. auris. All the isolates produced biofilm, gelatinase, and hemolysin, while none produced germ tubes. Two of the isolates were resistant to all the antifungals tested. Also, all the isolates were resistant to fluconazole and itraconazole. Nystatin appeared to be the most effective among the tested antifungals. The isolation of Candida auris is being reported for the second time in Nigeria, further confirming that the fungus has spread beyond Lagos and Ibadan, where it was first reported. The extent of the spread of the nosocomial fungus needed to be further investigated and curtailed in Nigeria before its outbreak in healthcare facilities.

Keywords: candida auris, virulence factors, antifungals, pathogen, hospital, infection

Procedia PDF Downloads 43
2148 The Challenges of Public Relations Practice in Developing Nations and the Way Forward: Ethiopian Perspective

Authors: Yared Pawlos Woldeyes

Abstract:

Public Relations often referred to as ‘PR’, is the practice of managing the spread of information between an individual or organization, such as a business, government agency, or a nonprofit organization, and the public. Public Relations are important because they help organizations or entities cultivate and maintain meaningful connections with society at large through platforms like print media and social media. Individuals that identify as public relation specialists establish and maintain relationships with an organization’s target audiences, relevant media sources, and opinion leaders. With regard to the challenges, when trying to practice public relations for government institutions, the priority for specialists is often to help members of society exercise a positive attitude and impression of a country’s political systems and practices. If you consider the case of public relations for government entities in Ethiopia there are several factors to consider. First, public relations in Ethiopia are very much driven by a desire to create a good image of the country and prevent the spread of any information that creates a bad image of Ethiopia. Also, the current ruling party dominates public relations in Ethiopia. Unfortunately, this means that more often than not, public relations specialists are forced by the government to spread and mass communicate false information to the public instead of the truth. Any opposition to government’s agenda will result in seriously negative repercussions for public relations specialists. Although public relations is supposed to create a positive and honest relationship between an organization or the government with the public, in Ethiopia, that is not the case. As a result, very few people express an interest in practicing public relations here. Despite this, there is an opportunity for the development of an accountable public relation affairs in developing nations, taking Ethiopian’s case. For instance, the fact that Public relations are provided as a field of study in college or university to produce competent and trained specialists, the enormous contribution of good communication to the public developmental efforts linking the government to the people, and the better payment to employees of public relation officers are some of them. Therefore, there is a need by the respective stakeholders to work in coalition in raising awareness of the youth regarding the importance of a responsible public relations officer to the country’s developmental efforts, encouragement of Civil Society Organizations working in promoting free press and expression of ideas, improving the governmental structure to be transparent and that allows independent officers, and hosting international conferences on public relations practice so that the specialists can exchange knowledge and skills.

Keywords: developing nations, Ethiopia, public relations, public relations specialist

Procedia PDF Downloads 228
2147 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 70
2146 The Prevalence of Blood-Borne Viral Infections among Autopsy Cases in Jordan

Authors: Emad Al-Abdallat, Faris G. Bakri, Azmi Mahafza, Rayyan Al Ali, Nidaa Ababneh, Ahmed Idhair

Abstract:

Background: Morgues are high-risk areas for the spread of infection from the cadavers to the staff during the postmortem examination. Infection can spread from corpses to workers by the airborne route, by direct contact, or from needle and sharp object injuries. Objective: Knowledge about the prevalence of these infections among autopsies is prudent to appreciate any risk of transmission and to further enforce safety measures. Method: A total of 242 autopsies were tested. Age ranged from 3 days to 94 years (median 75.5 years, mean 45.3 (21.9 ± SD)). There were 172 (71%) males. Results: The cause of death was considered natural in 137 (56.6%) cases, accidental in 89 (36.8%), homicidal in 9 (3.7%), suicidal in 4 (1.7%), and unknown in 3 (1.2%). Hepatitis B surface antigen was positive in 5 (2.1%) cases. Hepatitis C virus antibody was detected in 5 (2.1%) cases and the hepatitis C virus polymerase chain reaction was positive in 2 of them (0.8%). HIV antibody was not detected in any of the cases. Conclusions: Autopsies can be associated with exposure to blood borne viruses. Autopsies performed during the study period were tested for hepatitis B surface antigen, hepatitis C virus antibody, and human immunodeficiency virus antibody. Positive tests were subsequently confirmed by polymerase chain reaction. There is low prevalence of infections with these viruses in our autopsy cases. However, the risk of transmission remains a threat. Healthcare workers in the forensic departments should adhere to standard precautions.

Keywords: autopsy, hepatitis B virus, hepatitis C virus, human immunodeficiency virus, Jordan

Procedia PDF Downloads 377
2145 Transforming Public Administration in the Digital Era: Challenges and Opportunities

Authors: Catalina Oana Dumitrescu, Andreea L. Drugau-constantin

Abstract:

In the digital age, public administration is facing profound change, fueled by technological advances and the growing demands of citizens for efficient, accessible and transparent services. This paper explores how new digital technologies – including artificial intelligence, blockchain, big data and e-governance solutions – are reshaping the functioning of public administrations globally. In addition to the obvious opportunities to streamline and optimize processes, digital transformation brings with it major challenges, such as cyber security, personal data protection, resistance to change and the need to develop new skills for employees. The paper aims to provide a discussion platform for public administration experts, policy makers and technology innovators to consider how governments can balance the benefits and risks of digital transformation. Topics such as the reconfiguration of administrative processes, the creation of interoperable government systems, the involvement of citizens in public decisions through digital platforms, and solutions for reducing the digital gap between developed and developing regions will be addressed. In conclusion, the digital transformation of public administration is not only an opportunity for modernization, but also a necessity to respond to the new demands and challenges of contemporary society. This paper will provide new insights into the role of technology in improving the quality of governance and public services.

Keywords: public administration, digital ERA, technology, government systems, global

Procedia PDF Downloads 14
2144 Effect of Poultry Manure and Nitrogen, Phosphorus, and Potassium (15:15:15) Soil Amendment on Growth and Yield of Carrot (Daucus carota)

Authors: Benjamin Osae Agyei, Hypolite Bayor

Abstract:

This present experiment was carried out during the 2012 cropping season, at the Farming for the Future Experimental Field of the University for Development Studies, Nyankpala Campus in the Northern Region of Ghana. The objective of the experiment was to determine the carrot growth and yield responses to poultry manure and N.P.K (15:15:15). Six treatments (Control (no amendment), 20 t/ha poultry manure (PM), 40 t/ha PM, 70 t/ha PM, 35 t/ha PM + 0.11t/ha N.P.K and 0.23 t/ha N.P.K) with three replications for each were laid in a Randomized Complete Block Design (RCBD). Data were collected on plant height, number of leaves per plant, canopy spread, root diameter, root weight, and root length. Microsoft Excel and Genstat Statistical Package (9th edition) were used for the data analysis. The treatment means were compared by using Least Significant Difference at 10%. Generally, the results showed that there were no significant differences (P>0.1) among the treatments with respect to number of leaves per plant, root diameter, root weight, and root length. However, significant differences occurred among plant heights and canopy spreads. Plant height treated with 40 t/ha PM at the fourth week after planting and canopy spread at eight weeks after planting and ten weeks after planting by 70 t/ha PM and 20 t/ha PM respectively showed significant difference (P<0.1). The study recommended that any of the amended treatments can be applied at their recommended rates to plots for carrot production, since there were no significant differences among the treatments.

Keywords: poultry manure, N.P.K., soil amendment, growth, yield, carrot

Procedia PDF Downloads 471
2143 A System Architecture for Hand Gesture Control of Robotic Technology: A Case Study Using a Myo™ Arm Band, DJI Spark™ Drone, and a Staubli™ Robotic Manipulator

Authors: Sebastian van Delden, Matthew Anuszkiewicz, Jayse White, Scott Stolarski

Abstract:

Industrial robotic manipulators have been commonplace in the manufacturing world since the early 1960s, and unmanned aerial vehicles (drones) have only begun to realize their full potential in the service industry and the military. The omnipresence of these technologies in their respective fields will only become more potent in coming years. While these technologies have greatly evolved over the years, the typical approach to human interaction with these robots has not. In the industrial robotics realm, a manipulator is typically jogged around using a teach pendant and programmed using a networked computer or the teach pendant itself via a proprietary software development platform. Drones are typically controlled using a two-handed controller equipped with throttles, buttons, and sticks, an app that can be downloaded to one’s mobile device, or a combination of both. This application-oriented work offers a novel approach to human interaction with both unmanned aerial vehicles and industrial robotic manipulators via hand gestures and movements. Two systems have been implemented, both of which use a Myo™ armband to control either a drone (DJI Spark™) or a robotic arm (Stäubli™ TX40). The methodologies developed by this work present a mapping of armband gestures (fist, finger spread, swing hand in, swing hand out, swing arm left/up/down/right, etc.) to either drone or robot arm movements. The findings of this study present the efficacy and limitations (precision and ergonomic) of hand gesture control of two distinct types of robotic technology. All source code associated with this project will be open sourced and placed on GitHub. In conclusion, this study offers a framework that maps hand and arm gestures to drone and robot arm control. The system has been implemented using current ubiquitous technologies, and these software artifacts will be open sourced for future researchers or practitioners to use in their work.

Keywords: human robot interaction, drones, gestures, robotics

Procedia PDF Downloads 156
2142 Penalization of Transnational Crimes in the Domestic Legal Order: The Case of Poland

Authors: Magda Olesiuk-Okomska

Abstract:

The degree of international interdependence has grown significantly. Poland is a party to nearly 1000 binding multilateral treaties, including international legal instruments devoted to criminal matters and obliging the state to penalize certain crimes. The paper presents results of a theoretical research conducted as a part of doctoral research. The main hypothesis assumed that there was a separate category of crimes to penalization of which Poland was obliged under international legal instruments; that a catalogue of such crimes and a catalogue of international legal instruments providing for Poland’s international obligations had never been compiled in the domestic doctrine, thus there was no mechanism for monitoring implementation of such obligations. In the course of the research, a definition of transnational crimes was discussed and confronted with notions of international crimes, treaty crimes, as well as cross-border crimes. A list of transnational crimes penalized in the Polish Penal Code as well as in non-code criminal law regulations was compiled; international legal instruments, obliging Poland to criminalize and penalize specific conduct, were enumerated and catalogued. It enabled the determination whether Poland’s international obligations were implemented in domestic legislation, as well as the formulation of de lege lata and de lege ferenda postulates. Implemented research methods included inter alia a dogmatic and legal method, an analytical method and desk research.

Keywords: international criminal law, transnational crimes, transnational criminal law, treaty crimes

Procedia PDF Downloads 222
2141 Preserving Digital Arabic Text Integrity Using Blockchain Technology

Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

Abstract:

With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.

Keywords: arabic text, authentication, blockchain, integrity, quran, verification

Procedia PDF Downloads 162
2140 Automation of AAA Game Development Using AI

Authors: Branden Heng, Harsheni Siddharthan, Allison Tseng, Paul Toprac, Sarah Abraham, Etienne Vouga

Abstract:

The goal of this project was to evaluate and document the capabilities and limitations of AI tools for empowering small teams to create high-budget, high-profile (AAA) 3D games typically developed by large studios. Two teams of novice game developers attempted to create two different games using AI and Unreal Engine 5.3. First, the teams evaluated 60 AI art, design, sound, and programming tools by considering their capability, ease of use, cost, and license restrictions. Then, the teams used a shortlist of 12 AI tools for game development. During this process, the following tools were found to be the most productive: (i) ChatGPT 4.0 for both game and narrative concepts and documentation; (ii) Dall-E 3 and OpenArt for concept art; (iii) Beatoven for music drafting; (iv) ChatGPT 4.0 and Github Copilot for generating simple code and to complement human-made tutorials as an additional learning resource. While current generative AI may appear impressive at first glance, the assets they produce fall short of AAA industry standards. Generative AI tools are helpful when brainstorming ideas such as concept art and basic storylines, but they still cannot replace human input or creativity at this time. Regarding programming, AI can only effectively generate simple code and act as an additional learning resource. Thus, generative AI tools are, at best, tools to enhance developer productivity rather than as a system to replace developers.

Keywords: AAA games, AI, automation tools, game development

Procedia PDF Downloads 24
2139 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 228
2138 The Decision-Making Mechanisms of Tax Regulations

Authors: Nino Pailodze, Malkhaz Sulashvili, Vladimer Kekenadze, Tea Khutsishvili, Irma Makharashvili, Aleksandre Kekenadze

Abstract:

In the nearest future among the important problems which Georgia has solve the most important is economic stability, that bases on fiscal policy and the proper definition of the its directions. The main source of the Budget revenue is the national income. The State uses taxes, loans and emission in order to create national income, were the principal weapon are taxes. As well as fiscal function of the fulfillment of the budget, tax systems successfully implement economic and social development and the regulatory functions of foreign economic relations. A tax is a mandatory, unconditional monetary payment to the budget made by a taxpayer in accordance with this Code, based on the necessary, nonequivalent and gratuitous character of the payment. Taxes shall be national and local. National taxes shall be the taxes provided for under this Code, the payment of which is mandatory across the whole territory of Georgia. Local taxes shall be the taxes provided for under this Code, introduced by normative acts of local self-government representative authorities (within marginal rates), the payment of which is mandatory within the territory of the relevant self-governing unit. National taxes have the leading role in tax systems, but also the local taxes have an importance role in tax systems. Exactly in the means of local taxes, the most part of the budget is formatted. National taxes shall be: income tax, profit tax, value added tax (VAT), excise tax, import duty, property tax shall be a local tax The property tax is one of the significant taxes in Georgia. The paper deals with the taxation mechanism that has been operated in Georgia. The above mention has the great influence in financial accounting. While comparing foreign legislation towards Georgian legislation we discuss the opportunity of using their experience. Also, we suggested recommendations in order to improve the tax system in financial accounting. In addition to accounting, which is regulated according the International Accounting Standards we have tax accounting, which is regulated by the Tax Code, various legal orders / regulations of the Minister of Finance. The rules are controlled by the tax authority, Revenue Service. The tax burden from the tax values are directly related to expenditures of the state from the emergence of the first day. Fiscal policy of the state is as well as expenditure of the state and decisions of taxation. In order to get the best and the most effective mobilization of funds, Government’s primary task is to decide the kind of taxation rules. Tax function is to reveal the substance of the act. Taxes have the following functions: distribution or the fiscal function; Control and regulatory functions. Foreign tax systems evolved in the different economic, political and social conditions influence. The tax systems differ greatly from each other: taxes, their structure, typing means, rates, the different levels of fiscal authority, the tax base, the tax sphere of action, the tax breaks.

Keywords: international accounting standards, financial accounting, tax systems, financial obligations

Procedia PDF Downloads 242
2137 Emotional Impact and Moral Panic in Swedish Social Media during the COVID-19 Crisis

Authors: Sophia Yakhlef

Abstract:

In spring 2020, the spread of coronavirus disease 2019 (COVID-19) reached the epidemiological criteria to be declared a global pandemic. Global action was taken in order to stop the spread of the virus, such as, for example, restrictions regarding spending time outside of your home and, in several countries, periods of mandatory quarantine. Sweden's method of handling the pandemic has stood out among other European nations, and the tactic of relying on citizens' sense of civic solidarity, rather than enforcing legal restrictions preventing people from spending time outside, has been highly criticised in international news media. This situation has entailed a moral dilemma concerning the proper conduct of behaviour in everyday situations in Sweden, which is also reflected in public news media and social media. This media study focuses on Swedish social media debates and attitudes concerning moral dilemmas of handling this sense of civic solidarity. Comments on social media forums expressing outrage and anger regarding, amongst others, the actions of public media figures (such as celebrities, journalists, and bloggers) are analyzed. Drawing on a social psychological perspective on emotions, the study identifies ambiguities of moral disagreements and moral panics as ways of expressing that a moral norm has been violated. The findings suggest that social media is used in order to handle such ambiguities and make sense of the loosely defined norms of civic solidarity.

Keywords: COVID-19 crisis, moral disagreements, moral panic, social media, social norms, social psychology, Sweden

Procedia PDF Downloads 124
2136 Ecological and Historical Components of the Cultural Code of the City of Florence as Part of the Edutainment Project Velonotte International

Authors: Natalia Zhabo, Sergey Nikitin, Marina Avdonina, Mariya Nikitina

Abstract:

The analysis of the activities of one of the events of the international educational and entertainment project Velonotte is provided: an evening bicycle tour with children around Florence. The aim of the project is to develop methods and techniques for increasing the sensitivity of the cycling participants and listeners of the radio broadcasts to the treasures of the national heritage, in this case, to the historical layers of the city and the ecology of the Renaissance epoch. The block of educational tasks is considered, and the issues of preserving the identity of the city are discussed. Methods. The Florentine event was prepared during more than a year. First of all the creative team selected such events of the history of the city which seem to be important for revealing the specifics of the city, its spirit - from antiquity to our days – including the forums of Internet with broad public opinion. Then a route (seven kilometers) was developed, which was proposed to the authorities and organizations of the city. The selection of speakers was conducted according to several criteria: they should be authors of books, famous scientists, connoisseurs in a certain sphere (toponymy, history of urban gardens, art history), capable and willing to talk with participants directly at the points of stops, in order to make a dialogue and so that performances could be organized with their participation. The music was chosen for each part of the itinerary to prepare the audience emotionally. Cards for coloring with images of the main content of each stop were created for children. A site was done to inform the participants and to keep photos, videos and the audio files with speakers’ speech afterward. Results: Held in April 2017, the event was dedicated to the 640th Anniversary of the Filippo Brunelleschi, Florentine architect, and to the 190th anniversary of the publication of Florence guide by Stendhal. It was supported by City of Florence and Florence Bike Festival. Florence was explored to transfer traditional elements of culture, sometimes unfairly forgotten from ancient times to Brunelleschi and Michelangelo and Tschaikovsky and David Bowie with lectures by professors of Universities. Memorable art boards were installed in public spaces. Elements of the cultural code are deeply internalized in the minds of the townspeople, the perception of the city in everyday life and human communication is comparable to such fundamental concepts of the self-awareness of the townspeople as mental comfort and the level of happiness. The format of a fun and playful walk with the ICT support gives new opportunities for enriching the city's cultural code of each citizen with new components, associations, connotations.

Keywords: edutainment, cultural code, cycling, sensitization Florence

Procedia PDF Downloads 219
2135 Effect of Birks Constant and Defocusing Parameter on Triple-to-Double Coincidence Ratio Parameter in Monte Carlo Simulation-GEANT4

Authors: Farmesk Abubaker, Francesco Tortorici, Marco Capogni, Concetta Sutera, Vincenzo Bellini

Abstract:

This project concerns with the detection efficiency of the portable triple-to-double coincidence ratio (TDCR) at the National Institute of Metrology of Ionizing Radiation (INMRI-ENEA) which allows direct activity measurement and radionuclide standardization for pure-beta emitter or pure electron capture radionuclides. The dependency of the simulated detection efficiency of the TDCR, by using Monte Carlo simulation Geant4 code, on the Birks factor (kB) and defocusing parameter has been examined especially for low energy beta-emitter radionuclides such as 3H and 14C, for which this dependency is relevant. The results achieved in this analysis can be used for selecting the best kB factor and the defocusing parameter for computing theoretical TDCR parameter value. The theoretical results were compared with the available ones, measured by the ENEA TDCR portable detector, for some pure-beta emitter radionuclides. This analysis allowed to improve the knowledge of the characteristics of the ENEA TDCR detector that can be used as a traveling instrument for in-situ measurements with particular benefits in many applications in the field of nuclear medicine and in the nuclear energy industry.

Keywords: Birks constant, defocusing parameter, GEANT4 code, TDCR parameter

Procedia PDF Downloads 146
2134 Analysis of a Differential System to Get Insights on the Potential Establishment of Microsporidia MB in the Mosquito Population for Malaria Control

Authors: Charlene N. T. Mfangnia, Henri E. Z. Tonnang, Berge Tsanou, Jeremy Herren

Abstract:

Microsporidia MB is a recently discovered symbiont capable of blocking the transmission of Plasmodium from mosquitoes to humans. The symbiont can spread both horizontally and vertically among the mosquito population. This dual transmission gives the symbiont the ability to invade the mosquito population. The replacement of the mosquito population by the population of symbiont-infected mosquitoes then appears as a promising strategy for malaria control. In this context, the present study uses differential equations to model the transmission dynamics of Microsporidia MB in the population of female Anopheles mosquitoes. Long-term propagation scenarios of the symbiont, such as extinction, persistence or total infection, are obtained through the determination of the target and basic reproduction numbers, the equilibria, and the study of their stability. The stability is illustrated numerically, and the contribution of vertical and horizontal transmission in the spread of the symbiont is assessed. Data obtained from laboratory experiments are then used to explain the low prevalence observed in nature. The study also shows that the male death rate, the mating rate and the attractiveness of MB-positive mosquitoes are the factors that most influence the transmission of the symbiont. In addition, the introduction of temperature and the study of bifurcations show the significant influence of the environmental condition in the propagation of Microsporidia MB. This finding proves the necessity of taking into account environmental variables for the potential establishment of the symbiont in a new area.

Keywords: differential equations, stability analysis, malaria, microsporidia MB, horizontal transmission, vertical transmission, numerical illustration

Procedia PDF Downloads 112
2133 Performance Evaluation of Wideband Code Division Multiplication Network

Authors: Osama Abdallah Mohammed Enan, Amin Babiker A/Nabi Mustafa

Abstract:

The aim of this study is to evaluate and analyze different parameters of WCDMA (wideband code division multiplication). Moreover, this study also incorporates brief yet throughout analysis of WCDMA’s components as well as its internal architecture. This study also examines different power controls. These power controls may include open loop power control, closed or inner group loop power control and outer loop power control. Different handover techniques or methods of WCDMA are also illustrated in this study. These handovers may include hard handover, inter system handover and soft and softer handover. Different duplexing techniques are also described in the paper. This study has also presented an idea about different parameters of WCDMA that leads the system towards QoS issues. This may help the operator in designing and developing adequate network configuration. In addition to this, the study has also investigated various parameters including Bit Energy per Noise Spectral Density (Eb/No), Noise rise, and Bit Error Rate (BER). After simulating these parameters, using MATLAB environment, it was investigated that, for a given Eb/No value the system capacity increase by increasing the reuse factor. Besides that, it was also analyzed that, noise rise is decreasing for lower data rates and for lower interference levels. Finally, it was examined that, BER increase by using one type of modulation technique than using other type of modulation technique.

Keywords: duplexing, handover, loop power control, WCDMA

Procedia PDF Downloads 213
2132 Starch Valorization: Biorefinery Concept for the Circular Bioeconomy

Authors: Maider Gómez Palmero, Ana Carrasco Pérez, Paula de la Sen de la Cruz, Francisco Javier Royo Herrer, Sonia Ascaso Malo

Abstract:

The production of bio-based products for different purposes is one of the strategies that has grown the most at European and even global levels, seeking to contribute to mitigating the impacts associated with climate change and to achieve the ambitious objectives set in this regard. However, the substitution of fossil-based products for bio-based products requires a challenging and deep transformation and adaptation of the secondary and primary sectors and, more specifically, in the latter, the agro-industries. The first step to developing a bio-based value chain focuses on the availability of a resource with the right characteristics for the substitution sought. This, in turn, requires a significant reshaping of the forestry/agricultural sector but also of the agro-industry, which has a relevant potential to be deployed as a supplier and develop a robust logistical supply chain and to market a biobased raw material at a competitive price. However, this transformation may involve a profound restructuring of its traditional business model to incorporate biorefinery concepts. In this sense, agro-industries that generate by-products in their processes that are currently not valorized, such as potato processing rejects or the starch found in washing water, constitute a potential raw material that can be used for different bio-applications. This article aims to explore this potential to evaluate the most suitable bio applications to target and identify opportunities and challenges.

Keywords: starch valorisation, biorefinery, bio-based raw materials, bio-applications

Procedia PDF Downloads 48
2131 Analysis of State Documents on Environmental Awareness Aspects in Kazakhstan

Authors: Y. A. Kumar

Abstract:

Environmental awareness issues in Kazakhstan are one of the most undermined topics both among the public community and in terms of state rhetoric. In the context of official state documents, so far only two official environmental codes and national programs called Zhasyl Kazakhstan were introduced in the country in 2021. While on the one hand the Environmental Code was introduced with the purpose to modernize, frame and enlist main legislative aspects on various sectors of environmental law in Kazakhstan, on the other hand, the Zhasyl Kazakhstan Program has been implemented as a state program to address with numerous environmental projects various environmental issues ranging from air pollution to waste management as well as aspects related to ecological education and low environmental awareness matters. In this regard, the main goal of this paper is to analyze critically the main content of both of these documents with a particular focus on sections related to environmental awareness-raising aspects. For that, this paper applied a subjective-based content analysis in order to identify interesting insights on regulatory legal aspects, future research streams, and uncovering of improved legislative frameworks in the context of an environmental awareness issue. Apart from that, five open-ended questions were sent out to the Ministry of Ecology, Geology and Natural Resources to obtain primary data on the state’s view in regards to current previous, recent and future aspects of environmental awareness issues in the country.

Keywords: Kazakhstan, environmental awareness, environmental code, Zhasyl Kazakhstan, content analysis

Procedia PDF Downloads 93
2130 The Development of Communication and Mobile Phones in Iran: The Role of Internet in Smart Mobile Phones in Social and Human Development and Social Mobility of Different Classes of Iranian Women

Authors: Zahra Tork

Abstract:

Before the spread of the Internet and the use of mobile phones, women were generally far from society and many restrictions were applied to them, but after the spread of the Internet and the cultural and social changes brought about by it, women in society got a new one and many restrictions regarding them disappeared; As we can see today, many women, like men, have a high social base, they earn for themselves, they can travel alone, stay out late at night, take personal and family photos or videos on virtual pages. Publish themselves (while before this, showing or publishing photos of women was considered dishonorable or indecent). In this article, an attempt is made to examine the effect of the internet on mobile phones and virtual social networks in changing beliefs, norms and social values and their relationship with the social mobility of women and the effect of these factors on social and human development be paid. For this reason, social and human development is discussed first, and then the role of the media in development is explained, and finally, the social mobility of women is discussed. Since the purpose of this study is to better understand the social mobility of Iranian women through the development of the Internet in mobile phones, a qualitative study using focus groups has been adopted. The results of this research indicated that the Internet has caused changes in the value and cultural system of the Iranian people, and women have also redefined their roles and identity. In this new definition, many of the past restrictions have disappeared and women have gained the same freedoms as men. Finally, these factors (change in values and norms and redefinition of the role of women) joined hands and caused the social mobility of women in Iran.

Keywords: development of communication in Iran, development of mobile phones, development of the Internet, women's social group, social mobility

Procedia PDF Downloads 73
2129 On the Principle of Sustainable Development and International Law

Authors: Zhang Rui

Abstract:

Context: The paper addresses the necessity of incorporating the principle of sustainable development into international law to guide states and international organizations towards achieving this goal. Research aim: To emphasize the importance of integrating sustainable development into international law and establishing procedures to attain this objective. Methodology: The study utilizes document analysis, comparative law analysis, and international law analysis to support the argument for including sustainable development in international legal frameworks. Findings: The findings suggest that integrating sustainable development into international law can lead to significant improvements in legal practices, treaty interpretations, and state behaviors. Theoretical importance: The paper highlights the potential impacts of the principle of sustainable development on reshaping existing legal norms and promoting sustainable practices globally. Data collection: The data is gathered through the analysis of relevant legal documents, comparative studies, and international legal frameworks. Analysis procedures: The analysis involves examining how the principle of sustainable development can influence legal outcomes, treaty interpretations, and state behaviors. Questions addressed: The study addresses how the principle of sustainable development can be integrated into international law and what implications this integration can have on legal practices and state behaviors. Conclusion: Integrating sustainable development into international law is crucial for advancing global sustainability objectives and guiding states and international organizations towards sustainable practices.

Keywords: international law, sustainable development, environmental legislation, sovereign equality

Procedia PDF Downloads 15
2128 Variable vs. Fixed Window Width Code Correlation Reference Waveform Receivers for Multipath Mitigation in Global Navigation Satellite Systems with Binary Offset Carrier and Multiplexed Binary Offset Carrier Signals

Authors: Fahad Alhussein, Huaping Liu

Abstract:

This paper compares the multipath mitigation performance of code correlation reference waveform receivers with variable and fixed window width, for binary offset carrier and multiplexed binary offset carrier signals typically used in global navigation satellite systems. In the variable window width method, such width is iteratively reduced until the distortion on the discriminator with multipath is eliminated. This distortion is measured as the Euclidean distance between the actual discriminator (obtained with the incoming signal), and the local discriminator (generated with a local copy of the signal). The variable window width have shown better performance compared to the fixed window width. In particular, the former yields zero error for all delays for the BOC and MBOC signals considered, while the latter gives rather large nonzero errors for small delays in all cases. Due to its computational simplicity, the variable window width method is perfectly suitable for implementation in low-cost receivers.

Keywords: correlation reference waveform receivers, binary offset carrier, multiplexed binary offset carrier, global navigation satellite systems

Procedia PDF Downloads 129
2127 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 135
2126 NextCovps: Design and Stress Analysis of Dome Composite Overwrapped Pressure Vessels using Geodesic Trajectory Approach

Authors: Ammar Maziz, Prateek Gupta, Thiago Vasconcellos Birro, Benoit Gely

Abstract:

Hydrogen as a sustainable fuel has the highest energy density per mass as compared to conventional non-renewable sources. As the world looks to move towards sustainability, especially in the sectors of aviation and automotive, it becomes important to address the issue of storage of hydrogen as compressed gas in high-pressure tanks. To improve the design for the efficient storage and transportation of Hydrogen, this paper presents the design and stress analysis of Dome Composite Overwrapped Pressure Vessels (COPVs) using the geodesic trajectory approach. The geodesic trajectory approach is used to optimize the dome design, resulting in a lightweight and efficient structure. Python scripting is employed to implement the mathematical modeling of the COPV, and after validating the model by comparison to the published paper, stress analysis is conducted using Abaqus commercial code. The results demonstrate the effectiveness of the geodesic trajectory approach in achieving a lightweight and structurally sound dome design, as well as the accuracy and reliability of the stress analysis using Abaqus commercial code. This study provides insights into the design and analysis of COPVs for aerospace applications, with the potential for further optimization and application in other industries.

Keywords: composite overwrapped pressure vessels, carbon fiber, geodesic trajectory approach, dome design, stress analysis, plugin python

Procedia PDF Downloads 90
2125 Process Optimization and Automation of Information Technology Services in a Heterogenic Digital Environment

Authors: Tasneem Halawani, Yamen Khateeb

Abstract:

With customers’ ever-increasing expectations for fast services provisioning for all their business needs, information technology (IT) organizations, as business partners, have to cope with this demanding environment and deliver their services in the most effective and efficient way. The purpose of this paper is to identify optimization and automation opportunities for the top requested IT services in a heterogenic digital environment and widely spread customer base. In collaboration with systems, processes, and subject matter experts (SMEs), the processes in scope were approached by analyzing four-year related historical data, identifying and surveying stakeholders, modeling the as-is processes, and studying systems integration/automation capabilities. This effort resulted in identifying several pain areas, including standardization, unnecessary customer and IT involvement, manual steps, systems integration, and performance measurement. These pain areas were addressed by standardizing the top five requested IT services, eliminating/automating 43 steps, and utilizing a single platform for end-to-end process execution. In conclusion, the optimization of IT service request processes in a heterogenic digital environment and widely spread customer base is challenging, yet achievable without compromising the service quality and customers’ added value. Further studies can focus on measuring the value of the eliminated/automated process steps to quantify the enhancement impact. Moreover, a similar approach can be utilized to optimize other IT service requests, with a focus on business criticality.

Keywords: automation, customer value, heterogenic, integration, IT services, optimization, processes

Procedia PDF Downloads 106
2124 Social Distancing as a Population Game in Networked Social Environments

Authors: Zhijun Wu

Abstract:

While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.

Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments

Procedia PDF Downloads 132
2123 Active Power Filters and their Smart Grid Integration - Applications for Smart Cities

Authors: Pedro Esteban

Abstract:

Most installations nowadays are exposed to many power quality problems, and they also face numerous challenges to comply with grid code and energy efficiency requirements. The reason behind this is that they are not designed to support nonlinear, non-balanced, and variable loads and generators that make up a large percentage of modern electric power systems. These problems and challenges become especially critical when designing green buildings and smart cities. These problems and challenges are caused by equipment that can be typically found in these installations like variable speed drives (VSD), transformers, lighting, battery chargers, double-conversion UPS (uninterruptible power supply) systems, highly dynamic loads, single-phase loads, fossil fuel generators and renewable generation sources, to name a few. Moreover, events like capacitor switching (from existing capacitor banks or passive harmonic filters), auto-reclose operations of transmission and distribution lines, or the starting of large motors also contribute to these problems and challenges. Active power filters (APF) are one of the fastest-growing power electronics technologies for solving power quality problems and meeting grid code and energy efficiency requirements for a wide range of segments and applications. They are a high performance, flexible, compact, modular, and cost-effective type of power electronics solutions that provide an instantaneous and effective response in low or high voltage electric power systems. They enable longer equipment lifetime, higher process reliability, improved power system capacity and stability, and reduced energy losses, complying with most demanding power quality and energy efficiency standards and grid codes. There can be found several types of active power filters, including active harmonic filters (AHF), static var generators (SVG), active load balancers (ALB), hybrid var compensators (HVC), and low harmonic drives (LHD) nowadays. All these devices can be used in applications in Smart Cities bringing several technical and economic benefits.

Keywords: power quality improvement, energy efficiency, grid code compliance, green buildings, smart cities

Procedia PDF Downloads 111
2122 Ground Motion Modelling in Bangladesh Using Stochastic Method

Authors: Mizan Ahmed, Srikanth Venkatesan

Abstract:

Geological and tectonic framework indicates that Bangladesh is one of the most seismically active regions in the world. The Bengal Basin is at the junction of three major interacting plates: the Indian, Eurasian, and Burma Plates. Besides there are many active faults within the region, e.g. the large Dauki fault in the north. The country has experienced a number of destructive earthquakes due to the movement of these active faults. Current seismic provisions of Bangladesh are mostly based on earthquake data prior to the 1990. Given the record of earthquakes post 1990, there is a need to revisit the design provisions of the code. This paper compares the base shear demand of three major cities in Bangladesh: Dhaka (the capital city), Sylhet, and Chittagong for earthquake scenarios of magnitudes 7.0MW, 7.5MW, 8.0MW and 8.5MW using a stochastic model. In particular, the stochastic model allows the flexibility to input region specific parameters such as shear wave velocity profile (that were developed from Global Crustal Model CRUST2.0) and include the effects of attenuation as individual components. Effects of soil amplification were analysed using the Extended Component Attenuation Model (ECAM). Results show that the estimated base shear demand is higher in comparison with code provisions leading to the suggestion of additional seismic design consideration in the study regions.

Keywords: attenuation, earthquake, ground motion, Stochastic, seismic hazard

Procedia PDF Downloads 247
2121 Testing of Infill Walls with Joint Reinforcement Subjected to in Plane Lateral Load

Authors: J. Martin Leal-Graciano, Juan J. Pérez-Gavilán, A. Reyes-Salazar, J. H. Castorena, J. L. Rivera-Salas

Abstract:

The experimental results about the global behavior of twelve 1:2 scaled reinforced concrete frame subject to in-plane lateral load are presented. The main objective was to generate experimental evidence about the use of steel bars within mortar bed-joints as shear reinforcement in infill walls. Similar to the Canadian and New Zealand standards, the Mexican code includes specifications for this type of reinforcement. However, these specifications were obtained through experimental studies of load-bearing walls, mainly confined walls. Little information is found in the existing literature about the effects of joint reinforcement on the seismic behavior of infill masonry walls. Consequently, the Mexican code establishes the same equations to estimate the contribution of joint reinforcement for both confined walls and infill walls. A confined masonry construction and a reinforced concrete frame infilled with masonry walls have similar appearances. However, substantial differences exist between these two construction systems, which are mainly related to the sequence of construction and to how these structures support vertical and lateral loads. To achieve the objective established, ten reinforced concrete frames with masonry infill walls were built and tested in pairs, having both specimens in the pair identical characteristics except that one of them included joint reinforcement. The variables between pairs were the type of units, the size of the columns of the frame and the aspect ratio of the wall. All cases included tie-columns and tie-beams on the perimeter of the wall to anchor the joint reinforcement. Also, two bare frame with identical characteristic to the infilled frames were tested. The purpose was to investigate the effects of the infill wall on the behavior of the system to in-plane lateral load. In addition, the experimental results were compared with the prediction of the Mexican code. All the specimens were tested in cantilever under reversible cyclic lateral load. To simulate gravity load, constant vertical load was applied on the top of the columns. The results indicate that the contribution of the joint reinforcement to lateral strength depends on the size of the columns of the frame. Larger size columns produce a failure mode that is predominantly a sliding mode. Sliding inhibits the production of new inclined cracks, which are necessary to activate (deform) the joint reinforcement. Regarding the effects of joint reinforcement in the performance of confined masonry walls, many facts were confirmed for infill walls: this type of reinforcement increases the lateral strength of the wall, produces a more distributed cracking and reduces the width of the cracks. Moreover, it reduces the ductility demand of the system at maximum strength. The prediction of the lateral strength provided by the Mexican code is property in some cases; however, the effect of the size of the columns on the contribution of joint reinforcement needs to be better understood.

Keywords: experimental study, Infill wall, Infilled frame, masonry wall

Procedia PDF Downloads 75
2120 Blast Load Resistance of Bridge Columns

Authors: Amir Kavousifard, Lan Lin

Abstract:

The objective of this study is to evaluate the effects of the detailing in the seismic design of reinforced concrete (RC) bridge columns on the blast load resistance. A generic two-span continuous RC bridge located in Victoria, British Columbia, which represents the highest seismicity in Canada, was examined in the study. The bridge superstructure consists of a single cell box girder while the substructure consists of two circular columns. The bridge was designed according to the 2006 Canadian Highway Bridge Design Code. More specifically, response spectrum analysis was performed to determine the seismic demands using CSI Bridge. The 3D blast load analysis is carried out in the platform of LS-DYNA. Two charge heights, i.e., one at the mid-height of the column and the other at the bottom of the column, are considered. For each height, three cases are analyzed in order to investigate the effects of standoff and charge weight on the structural response. The blast load resistance of the column is assessed in terms of the concrete failure mechanism, steel stress distribution, and column lateral displacement. The results from the study indicate that a column designed in accordance with the code requirements could survive during the blast attack. Spiral columns perform much better than tied columns. The results also show that the charge weight has more impact on the structural response than the standoff. These results are beneficial for the development of the Canadian standards for the design of bridges under blast loads.

Keywords: blast, bridge, charge, height, seismic, standoff

Procedia PDF Downloads 17