Search results for: complementary common gate
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6344

Search results for: complementary common gate

1034 Agricultural Knowledge Management System Design, Use, and Consequence for Knowledge Sharing and Integration

Authors: Dejen Alemu, Murray E. Jennex, Temtim Assefa

Abstract:

This paper is investigated to understand the design, the use, and the consequence of Knowledge Management System (KMS) for knowledge systems sharing and integration. A KMS for knowledge systems sharing and integration is designed to meet the challenges raised by knowledge management researchers and practitioners: the technical, the human, and social factors. Agricultural KMS involves various members coming from different Communities of Practice (CoPs) who possess their own knowledge of multiple practices which need to be combined in the system development. However, the current development of the technology ignored the indigenous knowledge of the local communities, which is the key success factor for agriculture. This research employed the multi-methodological approach to KMS research in action research perspective which consists of four strategies: theory building, experimentation, observation, and system development. Using the KMS development practice of Ethiopian agricultural transformation agency as a case study, this research employed an interpretive analysis using primary qualitative data acquired through in-depth semi-structured interviews and participant observations. The Orlikowski's structuration model of technology has been used to understand the design, the use, and the consequence of the KMS. As a result, the research identified three basic components for the architecture of the shared KMS, namely, the people, the resources, and the implementation subsystems. The KMS were developed using web 2.0 tools to promote knowledge sharing and integration among diverse groups of users in a distributed environment. The use of a shared KMS allows users to access diverse knowledge from a number of users in different groups of participants, enhances the exchange of different forms of knowledge and experience, and creates high interaction and collaboration among participants. The consequences of a shared KMS on the social system includes, the elimination of hierarchical structure, enhance participation, collaboration, and negotiation among users from different CoPs having common interest, knowledge and skill development, integration of diverse knowledge resources, and the requirement of policy and guideline. The research contributes methodologically for the application of system development action research for understanding a conceptual framework for KMS development and use. The research have also theoretical contribution in extending structuration model of technology for the incorporation of variety of knowledge and practical implications to provide management understanding in developing strategies for the potential of web 2.0 tools for sharing and integration of indigenous knowledge.

Keywords: communities of practice, indigenous knowledge, participation, structuration model of technology, Web 2.0 tools

Procedia PDF Downloads 255
1033 Intrathecal: Not Intravenous Administration of Evans Blue Reduces Pain Behavior in Neuropathic Rats

Authors: Kun Hua O., Dong Woon Kim, Won Hyung Lee

Abstract:

Introduction: Neuropathic pain induced by spinal or peripheral nerve injury is highly resistant to common painkillers, nerve blocks, and other pain management approaches. Recently, several new therapeutic drug candidates have been developed to control neuropathic pain. In this study, we used the spinal nerve L5 ligation (SNL) model to investigate the ability of intrathecal or intravenous Evans blue to decrease pain behavior and to study the relationship between Evans blue and the neural structure of pain transmission. Method: Neuropathic pain (allodynia) of the left hind paw was induced by unilateral SNL in Sprague-Dawley rats(n=10) in each group. Evans blue (5, 15, 50μg/10μl) or phosphate buffer saline(PBS,10μl) was injected intrathecally at 3days post-ligation or intravenously(1mg/200 μl) 3days and 5days post-ligation . Mechanical sensitivity was assessed using Von Frey filaments at 3 days post-ligation and at 2 hours, days 1, 2, 3, 5,7 after intrathecal Evans blue injection, and on days 2, 4, 7, and 11 at 14 days after intravenous injection. In the intrathecal group, microglia and glutaminergic neurons in the dorsal horn and VNUT(vesicular nucleotide transporter) in the dorsal root ganglia were tested to evaluate co-staining with Evans blue. The experimental procedures were performed in accordance with the animal care guideline of the Korean Academy of Medical Science(Animal ethic committee of Chungnam National University Hospital: CNUH-014-A0005-1). Results: Tight ligation of the L5 spinal nerve induced allodynia in the left hind paw 3 days post-ligation. Intrathecal Evans blue most significantly(P<0.001) alleviated allodynia at 2 days after intrathecal, but not an intravenous injection. Glutaminergic neurons in the dorsal horn and VNUT in the dorsal root ganglia were co-stained with Evans blue. On the other hand, microglia in the dorsal horn were partially co-stained with Evans blue. Conclusion: We confirmed that Evans blue might have an analgesic effect through the central nervous system, not another system in neuropathic pain of the SNL animal model. These results suggest Evans blue may be a potential new drug for the treatment of chronic pain. This research was supported by the National Research Foundation of Korea (NRF-2020R1A2C100757512), funded by the Ministry of Education.

Keywords: neuropathic pain, Evas blue, intrathecal, intravenous

Procedia PDF Downloads 95
1032 Learners’ Perceptions of Tertiary Level Teachers’ Code Switching: A Vietnamese Perspective

Authors: Hoa Pham

Abstract:

The literature on language teaching and second language acquisition has been largely driven by monolingual ideology with a common assumption that a second language (L2) is best taught and learned in the L2 only. The current study challenges this assumption by reporting learners' positive perceptions of tertiary level teachers' code switching practices in Vietnam. The findings of this study contribute to our understanding of code switching practices in language classrooms from a learners' perspective. Data were collected from student participants who were working towards a Bachelor degree in English within the English for Business Communication stream through the use of focus group interviews. The literature has documented that this method of interviewing has a number of distinct advantages over individual student interviews. For instance, group interactions generated by focus groups create a more natural environment than that of an individual interview because they include a range of communicative processes in which each individual may influence or be influenced by others - as they are in their real life. The process of interaction provides the opportunity to obtain the meanings and answers to a problem that are "socially constructed rather than individually created" leading to the capture of real-life data. The distinct feature of group interaction offered by this technique makes it a powerful means of obtaining deeper and richer data than those from individual interviews. The data generated through this study were analysed using a constant comparative approach. Overall, the students expressed positive views of this practice indicating that it is a useful teaching strategy. Teacher code switching was seen as a learning resource and a source supporting language output. This practice was perceived to promote student comprehension and to aid the learning of content and target language knowledge. This practice was also believed to scaffold the students' language production in different contexts. However, the students indicated their preference for teacher code switching to be constrained, as extensive use was believed to negatively impact on their L2 learning and trigger cognitive reliance on the L1 for L2 learning. The students also perceived that when the L1 was used to a great extent, their ability to develop as autonomous learners was negatively impacted. This study found that teacher code switching was supported in certain contexts by learners, thus suggesting that there is a need for the widespread assumption about the monolingual teaching approach to be re-considered.

Keywords: codeswitching, L1 use, L2 teaching, learners’ perception

Procedia PDF Downloads 326
1031 A Close Study on the Nitrate Fertilizer Use and Environmental Pollution for Human Health in Iran

Authors: Saeed Rezaeian, M. Rezaee Boroon

Abstract:

Nitrogen accumulates in soils during the process of fertilizer addition to promote the plant growth. When the organic matter decomposes, the form of available nitrogen produced is in the form of nitrate, which is highly mobile. The most significant health effect of nitrate ingestion is methemoglobinemia in infants under six months of age (blue baby syndrome). The mobile nutrients, like nitrate nitrogen, are not stored in the soil as the available forms for the long periods and in large amounts. It depends on the needs for the crops such as vegetables. On the other hand, the vegetables will compete actively for nitrate nitrogen as a mobile nutrient and water. The mobile nutrients must be shared. The fewer the plants, the larger this share is for each plant. Also, this nitrate nitrogen is poisonous for the people who use these vegetables. Nitrate is converted to nitrite by the existing bacteria in the stomach and the Gastro-Intestinal (GI) tract. When nitrite is entered into the blood cells, it converts the hemoglobin to methemoglobin, which causes the anoxemia and cyanosis. The increasing use of pesticides and chemical fertilizers, especially the fertilizers with nitrates compounds, which have been common for the increased production of agricultural crops, has caused the nitrate pollution in the (soil, water, and environment). They have caused a lot of damage to humans and animals. In this research, the nitrate accumulation in different kind of vegetables such as; green pepper, tomatoes, egg plants, watermelon, cucumber, and red pepper were observed in the suburbs of Mashhad, Neisabour, and Sabzevar cities. In some of these cities, the information forms of agronomical practices collected were such as; different vegetable crops fertilizer recommendations, varieties, pesticides, irrigation schedules, etc., which were filled out by some of our colleagues in the research areas mentioned above. Analysis of the samples was sent to the soil and water laboratory in our department in Mashhad. The final results from the chemical analysis of samples showed that the mean levels of nitrates from the samples of the fruit crops in the mentioned cities above were all lower than the critical levels. These fruit crop samples were in the order of: 35.91, 8.47, 24.81, 6.03, 46.43, 2.06 mg/kg dry matter, for the following crops such as; tomato, cucumber, eggplant, watermelon, green pepper, and red pepper. Even though, this study was conducted with limited samples and by considering the mean levels, the use of these crops from the nutritional point of view will not cause the poisoning of humans.

Keywords: environmental pollution, human health, nitrate accumulations, nitrate fertilizers

Procedia PDF Downloads 251
1030 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 269
1029 A Broadband Tri-Cantilever Vibration Energy Harvester with Magnetic Oscillator

Authors: Xiaobo Rui, Zhoumo Zeng, Yibo Li

Abstract:

A novel tri-cantilever energy harvester with magnetic oscillator was presented, which could convert the ambient vibration into electrical energy to power the low-power devices such as wireless sensor networks. The most common way to harvest vibration energy is based on the use of linear resonant devices such as cantilever beam, since this structure creates the highest strain for a given force. The highest efficiency will be achieved when the resonance frequency of the harvester matches the vibration frequency. The limitation of the structure is the narrow effective bandwidth. To overcome this limitation, this article introduces a broadband tri-cantilever harvester with nonlinear stiffness. This energy harvester typically consists of three thin cantilever beams vertically arranged with Neodymium Magnets ( NdFeB)magnetics at its free end and a fixed base at the other end. The three cantilevers have different resonant frequencies by designed in different thicknesses. It is obviously that a similar advantage of multiple resonant frequencies as piezoelectric cantilevers array structure is built. To achieve broadband energy harvesting, magnetic interaction is used to introduce the nonlinear system stiffness to tune the resonant frequency to match the excitation. Since the three cantilever tips are all free and the magnetic force is distance dependent, the resonant frequencies will be complexly changed with the vertical vibration of the free end. Both model and experiment are built. The electromechanically coupled lumped-parameter model is presented. An electromechanical formulation and analytical expressions for the coupled nonlinear vibration response and voltage response are given. The entire structure is fabricated and mechanically attached to a electromagnetic shaker as a vibrating body via the fixed base, in order to couple the vibrations to the cantilever. The cantilevers are bonded with piezoelectric macro-fiber composite (MFC) materials (Model: M8514P2). The size of the cantilevers is 120*20mm2 and the thicknesses are separately 1mm, 0.8mm, 0.6mm. The prototype generator has a measured performance of 160.98 mW effective electrical power and 7.93 DC output voltage via the excitation level of 10m/s2. The 130% increase in the operating bandwidth is achieved. This device is promising to support low-power devices, peer-to-peer wireless nodes, and small-scale wireless sensor networks in ambient vibration environment.

Keywords: tri-cantilever, ambient vibration, energy harvesting, magnetic oscillator

Procedia PDF Downloads 156
1028 Code Switching and Code Mixing among Adolescents in Kashmir

Authors: Sarwat un Nisa

Abstract:

One of the remarkable gifts that a human being is blessed with is the ability to speak using a combination of sounds. Different combinations of sounds combine to form a word which in turn make a sentence and therefore give birth to a language. A person can either be a monolingual, i.e., can speak one language or bilingual, i.e., can speak more than one language. Whether a person speaks one language or multiple languages or in whatever language a person speaks, the main aim is to communicate, express ideas, feelings or thoughts. Sometimes the choice of a language is deliberate and sometimes it is a habitual act. The language which is used to put our ideas across speaks many things about our cultural, linguistic and ethnic identities. It can never be claimed that bilinguals are better than monolinguals in terms of linguistic skills, bilinguals or multilinguals have more than one language at their disposal. Therefore, how effectively two languages are used by the same person keeps linguists always intrigued. The most prominent and common features found in the speech of bilingual speakers are code switching and code mixing. The aim of the present paper is to explore these features among the adolescent speakers of Kashmir. The reason for studying the linguistics behavior of adolescents is the age when a person is neither an adult nor a child. They want to drift away from the norms and make a new norm for themselves. Therefore, how their linguistics skills are influenced by their age is of great interest because it can set the trend for the future generation. Kashmir is a multilingual society where three languages, i.e., Kashmiri, Urdu, and English are regularly used by the speakers, especially the educated ones. Kashmiri is widely used at home or mostly among adults. Urdu is the official language, and English is used in schools and for most of the written official correspondences. Thus, it is not uncommon to find these three languages coming in contact with each other quite frequently. The language contact results in the code switching and code mixing. In this paper different aspects of code switching and code mixing are discussed. Research Method: The data were collected from the different districts of Kashmir. The informants did not have prior knowledge of the survey. The situation was spontaneous and natural. The topics were introduced by the interviewer to the group of informants which comprised of three participants. They were asked to discuss the topic, most of the times without any intervention of the interviewer. Along with conversations, the informants also filled in written questionnaires comprising sociolinguistic questions. Questionnaires were analysed to get an idea about the sociolinguistic attitude of the informants. Percentage, frequency, and average were used as statistical tools to analyse the data. Conclusions were drawn taking into consideration of interpretations of both speech samples and questionnaires.

Keywords: code mixing, code switching, Kashmir, bilingualism

Procedia PDF Downloads 147
1027 Corrosion Behavior of Organic-Inorganic Hybrid Coatings Fabricated by Electrostatic Method

Authors: Mohammed Ahmed, Ziba Nazarlou

Abstract:

Mild steels have a limited alloying content which makes them vulnerable to excessive corrosion rates in the harsh medium. To overcome this issue, some protective coatings are used to prevent corrosion on the steel surface. The use of specialized coatings, mainly organic coatings (such as epoxies, polyurethanes, and acrylics) and inorganic coatings (such as Polysiloxanes) is the most common method of mitigating corrosion of carbon steel. Incorporating the benefits of organic and inorganic hybrid (OIH) compounds for the designing of hybrid protective coatings is still challenging for industrial applications. There are advantages of inorganic coatings have, but purely inorganic siloxane-based coatings are difficult to use on industrial applications unless they are used at extremely low thicknesses (< 1-2 microns). Hence, most industrial applications try to have a combination of Polysiloxanes with organic compounds.  A hybrid coating possesses an organic section, which transports flexibility and impact resistance, and an inorganic section, which usually helps in the decreasing of porosity and increasing thermal stability and hardness. A number of polymers including polyethylene glycol and polyvinyl pyrrolidone have been reported to inhibit the corrosion mild steel in acidic media. However, reports on the effect of polyethylene oxide (PEO) or its blends on corrosion inhibition of metals is very scarce. Different composition of OIH coatings was synthesized by using silica sol-gel, epoxy, and PEO. The effect of different coating types on the corrosion behavior of carbon steel in harsh solution has been studied by weight loss and electrochemical measurements using Gamry 1000 Interface Potentiostat. Coating structures were investigated by SEM. İt revealed a considerable reduction in corrosion rate for coated sample. Based on these results, OIH coating prepared by epoxy-silica sol gel-PEO and epoxy-silica sol-gel exhibit had a %99.5 and %98 reduction of (Corrosion rate) CR compares to baseline. Cathodic Tafel constant (βc) shows that coatings change both Tafel constants but had more effect on the cathodic process. The evolution of the Potentiostatic scan with time displays stability in potential, some of them in a high value while the other in a low value which can be attributed to the formation of an oxide film covering substrate surface. The coated samples with the group of epoxy coating have a lower potential along with the time test, while the silica group shows higher in potential with respect to time.

Keywords: electrostatic, hybrid coating, corrosion tests, silica sol gel

Procedia PDF Downloads 118
1026 An Introduction to Corporate Financial Reporting Practices in India

Authors: Pradip Kumar Das

Abstract:

India is a developing country and is also one of the most industrialized developing countries of the world. In post-independence period, industry has grown rapidly in India and with industrialization corporate sector in the country has been growing day after day. Nowadays, the investment is not limited to be shareholders alone, apart from the shareholders the common people of the society have also started investing in shares of the corporate sectors. Thus, the responsibilities of the corporate sectors have increased much. Corporate financial reporting refers to a system which provides valuable information to different types of users in the society for taking resourceful decisions with regards to investment policy, organization credit worthiness, profitability, liquidity, provision of taxation etc. The quality of information available to different users fosters the efficient allocation of resources which are very urgent for economic development of a country like India. It is the responsibility of the management of the corporate sector to convey reliable and authentic information with the help of generally accepted accounting principles. Corporate sectors which disclose information through annual reports should be sufficient enough for the purpose of bringing out the salient features relating to business performances and other activities. However, the disclosures practices of the corporate sectors though annual reports have undergone several major changes from time to time. Many a time, these vital changes are in the fashion of presenting information in the annual reports and addition of so many non-statutory disclosures of the company. Very often managements of the corporate sectors are blamed for concealing true picture which is not desirable at all. The corporate financial reporting practice which in the current period has gained a place of prime importance suffers from certain limitations and invites question from the public about its reliability. Thus, the wide gap created by management between the exhibited picture and the real picture sometimes attains to such extent that the purpose of the reporting practice loses its importance. The requirement of full and adequate disclosure of information including information relating to human resources in the annual report in free trade economy of India helps the prospective investors to select the best portfolio of their investments. This paper is a reflection of a modest attempt of the author to highlight the corporate reporting practices followed in India. A cursory glance of the conceptual study shows limitations along with reliability of the reporting practices and suggests measures to overcome the shortcomings of the financial reporting practices.

Keywords: corporate enterprise, cursory glance, portfolio, yawning gap

Procedia PDF Downloads 417
1025 The Impact of Streptococcus pneumoniae Colonization on Viral Bronchiolitis

Authors: K. Genise, S. Murthy

Abstract:

Introductory Statement: The results of this retrospective chart review suggest the effects of bacterial colonization in critically ill children with viral bronchiolitis, currently unproven, are clinically insignificant. Background: Viral bronchiolitis is one of the most prevalent causes of illness requiring hospitalization among children worldwide and one of the most common reasons for admission to pediatric intensive care. It has been hypothesized that co-infection with bacteria results in more severe clinical outcomes. Conversely, the effects of bacterial colonization in critically ill patients with bronchiolitis are poorly defined. Current clinical management of colonized patients consists primarily of supportive therapies with the role of antibiotics remaining controversial. Methods: A retrospective review of all critically ill children admitted to the BC Children’s Hospital Pediatric Intensive Care Unit (PICU) from 2014-2017 with a diagnosis of bronchiolitis was performed. Routine testing in this time frame consisted of complete pathogen testing, including PCR for Streptococcus pneumoniae. Analyses were performed to determine the impact of bacterial colonization and antibiotic use on a primary outcome of PICU length-of-stay, with secondary outcomes of hospital length-of-stay and duration of ventilation. Results: There were 92 patients with complete pathogen testing performed during the assessed timeframe. A comparison between children with detected Streptococcus pneumoniae (n=22) and those without (n=70) revealed no significant (p=0.20) differences in severity of illness on presentation as per Pediatric Risk of Mortality III scores (mean=3.0). Patients colonized with S. pneumoniae had significantly shorter PICU stays (p=0.002), hospital stays (p=0.0001) and duration of non-invasive ventilation (p=0.002). Multivariate analyses revealed that these effects on length of PICU stay and duration of ventilation do not persist after controlling for antibiotic use, presence of radiographic consolidation, age, and severity of illness (p=0.15, p=0.32). The relationship between colonization and duration of hospital stay persists after controlling for these variables (p=0.008). Conclusions: Children with viral bronchiolitis colonized with S. pneumoniae do not appear to have significantly different PICU length-of-stays or duration of ventilation compared to children who are not colonized. Colonized children appear to have shorter hospital stays. The results of this study suggest bacterial colonization is not associated with increased severity of presenting illness or negative clinical outcomes.

Keywords: bronchiolitis, colonization, critical care, pediatrics, pneumococcal, infection

Procedia PDF Downloads 517
1024 Muhammad`s Vision of Interaction with Supernatural Beings According to the Hadith in Comparison to Parallels of Other Cultures

Authors: Vladimir A. Rozov

Abstract:

Comparative studies of religion and ritual could contribute better understanding of human culture universalities. Belief in supernatural beings seems to be a common feature of the religion. A significant part of the Islamic concepts that concern supernatural beings is based on a tradition based on the Hadiths. They reflect, among other things, his ideas about a proper way to interact with supernatural beings. These ideas to a large extent follow from the pre-Islamic religious experience of the Arabs and had been reflected in a number of ritual actions. Some of those beliefs concern a particular function of clothing. For example, it is known that Muhammad was wrapped in clothes during the revelation of the Quran. The same thing was performed by pre-Islamic soothsayers (kāhin) and by rival opponents of Muhammad during their trances. Muhammad also turned the clothes inside out during religious rituals (prayer for rain). Besides these specific ways of clothing which prove the external similarity of Muhammad with the soothsayers and other people who claimed the connection with supernatural forces, the pre-Islamic soothsayers had another characteristic feature which is physical flaws. In this regard, it is worth to note Muhammad's so-called "Seal the Prophecy" (h̠ ātam an- nubūwwa) -protrusion or outgrowth on his back. Another interesting feature of Muhammad's behavior was his attitude to eating onion and garlic. In particular, the Prophet didn`t eat them and forbade people who had tasted these vegetables to enter mosques, until the smell ceases to be felt. The reason for this ban on eating onion and garlic is caused by a belief that the smell of these products prevents communication with otherworldly forces. The materials of the Hadith also suggest that Muhammad shared faith in the apotropical properties of water. Both of these ideas have parallels in other cultures of the world. Muhammad's actions supposed to provide an interaction with the supernatural beings are not accidental. They have parallels in the culture of pre-Islamic Arabia as well as in many past and present world cultures. The latter fact can be explained by the similarity of the universal human beliefs in supernatural beings and how they should be interacted with. Later a number of similar ideas shared by the Prophet Muhammad was legitimized by the Islamic tradition and formed the basis of popular Islamic rituals. Thus, these parallels emphasize the commonality of human notions of supernatural beings and also demonstrate the significance of the pre-Islamic cultural context in analyzing the genesis of Islamic religious beliefs.

Keywords: hadith, Prophet Muhammad, ritual, supernatural beings

Procedia PDF Downloads 389
1023 Evaluation of Health Services after Emergency Decrees in Turkey

Authors: Sengul Celik, Alper Ketenci

Abstract:

In Turkish Constitution about health care in Article 56, it is said that: everyone has the right to live in a healthy and balanced environment. It is the duty of the state and citizens to improve the environment, protect environmental health, and prevent environmental pollution. The state ensures that everyone lives their lives in physical and mental health; it organizes the planning and service of health institutions from a single source in order to realize cooperation by increasing savings and efficiency in human and substance power. The state fulfills this task by utilizing and supervising health and social institutions in the public and private sectors. General health insurance can be established by law for the widespread delivery of health services. To have health care is one of the basic rights of patients. After the coupe attempt in July 2016, the Government of Turkey has announced a state of emergency and issued lots of emergency decrees. By these emergency decrees, lots of people were dismissed from their jobs and lost their some basic social rights. The violations occur in social life. One of the most common observations is the discrimination by government in health care system. This study aims to put forward the violation of human rights in health care system in Turkey due to their discriminated position by an emergency decree. The study is a case study that is based on nine interviews with the people or relatives of people who lost their jobs by an emergency decree in Turkey. In this study, no personally identifiable information was obtained for the safety of individuals. Also no distinctive questions regarding the identity of individuals were asked. The interviews are obtained through internet call applications. The data were analyzed through the requirements of regular health care system in Turkey. The interviews expose that the people or the relatives of people lost their right to have regular health care. They have to pay extra amount both in clinical services and in medication treatment. The patient right to quality medical care without prejudice is violated. It was assessed that the people who are involved in emergency decree and their relatives are discriminated by government and deprived of regular medical care and supervision. Although international legal arrangements and legal responsibilities of the state have been put forward by Article 56, they are violated in practice. To prevent these kinds of violations, some measures should be taken against the deprivation in health care system especially towards the discriminated people by an emergency decree.

Keywords: emergency decree in Turkey, health care, discriminated people, patients rights

Procedia PDF Downloads 111
1022 Rare Case of Three Metachronous Cancers Occurring over the Period of Three Years: Clinical Importance of Investigating Neoplastic Growth Discovered during Follow-Up

Authors: Marin Kanarev, Delyan Stoyanov, Ivanna Popova, Nadezhda Petrova

Abstract:

Thanks to increased survival rates in patients bearing oncological malignancies due to recent developments in anti-cancer therapies and diagnostic techniques, observation of clinical cases of metachronous cancers is more common and can provide more in-depth knowledge of their development and, as a result, help clinicians apply suitable therapy. This unusual case of three metachronous tumors presented the opportunity to follow their occurrence, progression, and treatment thoroughly. A 77-year-old male presented with carcinoma ventriculi of the pylorus region, which was surgically removed via upper subtotal stomach resection, a lateral antecolical gastro-enteroanastomosis, and a subsequent Braun anastomosis. An EOX chemotherapy regimen followed. A CT scan four months later showed no indication of recurrence or dissemination. The same scan, performed as a part of the follow-up plan two years later, showed an indication of neoplastic growth in the urinary bladder. After the patient had been directed to a urologist, the suspicion was confirmed, and the growth was histologically diagnosed as a carcinoma of the urinary bladder. An immunohistochemistry test showed an expression of PDL1 of less than 5%, which resulted in treatment with GemCis chemotherapy regimen that led to full remission. Two years and seven months after the first surgery, a CT scan showed again that the two carcinomas were gone. However, four months later, elevated tumor markers prompted a PET/CT scan, which showed data indicative of recurring neoplastic growth in the region of the stomach cardia. It was diagnosed as an adenocarcinoma infiltrating the esophagus. Preoperative chemotherapy with the ECF regimen was completed in four courses, and a CT scan showed no progression of the disease. In less than a month after therapy, the patient underwent laparotomy, debridement, gastrectomy, and a subsequent mechanical terminal-lateral esophago-jejunoanasthomosis. It was verified that the tumor originated from metastasis from the carcinoma ventriculi, which was located in the pylorus. In conclusion, this case report highlights the importance of patient follow-up and studying recurring neoplastic growth. Despite the absence of symptoms, clinicians should maintain a high level of suspicion when evaluating the patient data and choosing the most suitable therapy.

Keywords: carcinoma, follow-up, metachronous, neoplastic growth, recurrence

Procedia PDF Downloads 88
1021 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 240
1020 Estimation of Scour Using a Coupled Computational Fluid Dynamics and Discrete Element Model

Authors: Zeinab Yazdanfar, Dilan Robert, Daniel Lester, S. Setunge

Abstract:

Scour has been identified as the most common threat to bridge stability worldwide. Traditionally, scour around bridge piers is calculated using the empirical approaches that have considerable limitations and are difficult to generalize. The multi-physic nature of scouring which involves turbulent flow, soil mechanics and solid-fluid interactions cannot be captured by simple empirical equations developed based on limited laboratory data. These limitations can be overcome by direct numerical modeling of coupled hydro-mechanical scour process that provides a robust prediction of bridge scour and valuable insights into the scour process. Several numerical models have been proposed in the literature for bridge scour estimation including Eulerian flow models and coupled Euler-Lagrange models incorporating an empirical sediment transport description. However, the contact forces between particles and the flow-particle interaction haven’t been taken into consideration. Incorporating collisional and frictional forces between soil particles as well as the effect of flow-driven forces on particles will facilitate accurate modeling of the complex nature of scour. In this study, a coupled Computational Fluid Dynamics and Discrete Element Model (CFD-DEM) has been developed to simulate the scour process that directly models the hydro-mechanical interactions between the sediment particles and the flowing water. This approach obviates the need for an empirical description as the fundamental fluid-particle, and particle-particle interactions are fully resolved. The sediment bed is simulated as a dense pack of particles and the frictional and collisional forces between particles are calculated, whilst the turbulent fluid flow is modeled using a Reynolds Averaged Navier Stocks (RANS) approach. The CFD-DEM model is validated against experimental data in order to assess the reliability of the CFD-DEM model. The modeling results reveal the criticality of particle impact on the assessment of scour depth which, to the authors’ best knowledge, hasn’t been considered in previous studies. The results of this study open new perspectives to the scour depth and time assessment which is the key to manage the failure risk of bridge infrastructures.

Keywords: bridge scour, discrete element method, CFD-DEM model, multi-phase model

Procedia PDF Downloads 131
1019 Processes and Application of Casting Simulation and Its Software’s

Authors: Surinder Pal, Ajay Gupta, Johny Khajuria

Abstract:

Casting simulation helps visualize mold filling and casting solidification; predict related defects like cold shut, shrinkage porosity and hard spots; and optimize the casting design to achieve the desired quality with high yield. Flow and solidification of molten metals are, however, a very complex phenomenon that is difficult to simulate correctly by conventional computational techniques, especially when the part geometry is intricate and the required inputs (like thermo-physical properties and heat transfer coefficients) are not available. Simulation software is based on the process of modeling a real phenomenon with a set of mathematical formulas. It is, essentially, a program that allows the user to observe an operation through simulation without actually performing that operation. Simulation software is used widely to design equipment so that the final product will be as close to design specs as possible without expensive in process modification. Simulation software with real-time response is often used in gaming, but it also has important industrial applications. When the penalty for improper operation is costly, such as airplane pilots, nuclear power plant operators, or chemical plant operators, a mockup of the actual control panel is connected to a real-time simulation of the physical response, giving valuable training experience without fear of a disastrous outcome. The all casting simulation software has own requirements, like magma cast has only best for crack simulation. The latest generation software Auto CAST developed at IIT Bombay provides a host of functions to support method engineers, including part thickness visualization, core design, multi-cavity mold design with common gating and feeding, application of various feed aids (feeder sleeves, chills, padding, etc.), simulation of mold filling and casting solidification, automatic optimization of feeders and gating driven by the desired quality level, and what-if cost analysis. IIT Bombay has developed a set of applications for the foundry industry to improve casting yield and quality. Casting simulation is a fast and efficient solution for process for advanced tool which is the result of more than 20 years of collaboration with major industrial partners and academic institutions around the world. In this paper the process of casting simulation is studied.

Keywords: casting simulation software’s, simulation technique’s, casting simulation, processes

Procedia PDF Downloads 476
1018 Effect of Vitamin D3 on Polycystic Ovary Syndrome Prognosis, Anthropometric and Body Composition Parameters of Overweight Women: A Randomized, Placebo-Controlled Clinical Trial

Authors: Nahla Al-Bayyari, Rae’d Hailat

Abstract:

Vitamin D deficiency and overweight are common in women suffering from polycystic ovary syndrome (PCOS). Weight gain in PCOS is an important factor for the development of menstrual dysfunction and signs of hyperandrogenism and alopecia. Features of PCOS such as oligomenorrhea can be predicted by anthropometric measurements as body mass index (BMI). Therefore, the aim of this trial was to study the effect of 50,000 IU/week of vitamin D₃ supplementation on the body composition and on the anthropometric measurements of overweight women with PCOS and to examine the impact of this effect on ovaries ultrasonography and menstrual cycle regularity. The study design was a prospective randomized, double-blinded placebo-controlled clinical trial conducted on 60 overweight Jordanian women aged (18-49) years with PCOS and vitamin D deficiency. The study participants were divided into two groups; vitamin D group (n = 30) who were assigned to receive 50,000 IU/week of vitamin D₃ and placebo group (n = 30) who were assigned to receive placebo tablets orally for 90 days. The anthropometric measurements and body composition were measured at baseline and after treatment for the PCOS and vitamin D deficient women. Also, assessment of the participants’ picture of ovaries by ultrasound and menstrual cycle regulatory were performed before and after treatment. Results showed that there were no significant (p > 0.05) differences between the placebo and vitamin D group basal 25(OH)D levels, body composition and anthropometric parameters. After treatment, vitamin D group serum levels of 25(OH)D increased (12.5 ± 0.61 to 50.2 ± 2.04 ng/mL, (p < 0.001), and decreased (50.2 ± 2.04 to 48.2 ± 2.03 ng/mL, p < 0.001) after 14 days of vitamin D₃ treatment cessation. There were no significant changes in the placebo group. In the vitamin D group, there were significant (p < 0.001) decreases in body weight, BMI, waist, and hip circumferences and fat mass. In addition, there were significant increases (p < 0.05) in fat free mass and total body water. These improvements in both anthropometric and body composition as well as in 25(OH)D concentrations, resulted in significant improvements in the picture of PCOS women ovaries ultrasonography and in menstrual cycle regularity, where nearly most of them (93%) had regular cycles after vitamin D₃ supplementation. In the placebo group, there were only significant decreases (p < 0.05) in waist and hip circumferences. It can be concluded that vitamin D supplementation improving serum 25(OH)D levels and PCOS prognosis by reducing body weight of overweight PCOS women and regulating their menstrual cycle.

Keywords: anthropometric, overweight, polycystic ovary syndrome, vitamin D₃

Procedia PDF Downloads 113
1017 Establishing the Legality of Terraforming under the Outer Space Treaty

Authors: Bholenath

Abstract:

Ever since Elon Musk revealed his plan to terraform Mars on national television in 2015, the debate regarding the legality of such an activity under the current Outer Space Treaty regime is gaining momentum. Terraforming means to alter or transform the atmosphere of another planet to have the characteristics of landscapes on Earth. Musk’s plan is to alter the entire environment of Mars so as to make it habitable for humans. He has long been an advocate of colonizing Mars, and in order to make humans an interplanetary species; he wants to detonate thermonuclear devices over the poles of Mars. For a common man, it seems to be a fascinating endeavor, but for space lawyers, it poses new and fascinating legal questions. Some of the questions which arise are whether the use of nuclear weapons on celestial bodies is permitted under the Outer Space Treaty? Whether such an alteration of the celestial environment would fall within the scope of the term 'harmful contamination' under Article IX of the treaty? Whether such an activity which would put an entire planet under the control of a private company can be permitted under the treaty? Whether such terraforming of Mars would amount to its appropriation? Whether such an activity would be in the 'benefit and interests of all countries'? This paper will be attempt to examine and elucidate upon these legal questions. Space is one such domain where the law should precede man. The paper follows the approach that the de lege lata is not capable of prohibiting the terraforming of Mars. Outer Space Treaty provides the freedoms of space and prescribes certain restrictions on those freedoms as well. The author shall examine the provisions such as Article I, II, IV, and IX of the Outer Space Treaty in order to establish the legality of terraforming activity. The author shall establish how such activity is peaceful use of the celestial body, is in the benefit and interests of all countries, and does neither qualify as national appropriation of the celestial body nor as its harmful contamination. The author shall divide the paper into three chapters. The first chapter would be about the general introduction of the problem, the analysis of Elon Musk’s plan to terraform Mars, and the need to study terraforming from the lens of the Outer Space Treaty. In the second chapter, the author shall attempt to establish the legality of the terraforming activity under the provisions of the Outer Space Treaty. In this vein, the author shall put forth the counter interpretations and the arguments which may be formulated against the lawfulness of terraforming. The author shall show as to why the counter interpretations establishing the unlawfulness of terraforming should not be accepted, and in doing so, the author shall provide the interpretations that should prevail and ultimately establishes the legality of terraforming activity under the treaty. In the third chapter, the author shall draw relevant conclusions and give suggestions.

Keywords: appropriation, harmful contamination, peaceful, terraforming

Procedia PDF Downloads 154
1016 Influence of Single and Multiple Skin-Core Debonding on Free Vibration Characteristics of Innovative GFRP Sandwich Panels

Authors: Indunil Jayatilake, Warna Karunasena, Weena Lokuge

Abstract:

An Australian manufacturer has fabricated an innovative GFRP sandwich panel made from E-glass fiber skin and a modified phenolic core for structural applications. Debonding, which refers to separation of skin from the core material in composite sandwiches, is one of the most common types of damage in composites. The presence of debonding is of great concern because it not only severely affects the stiffness but also modifies the dynamic behaviour of the structure. Generally, it is seen that the majority of research carried out has been concerned about the delamination of laminated structures whereas skin-core debonding has received relatively minor attention. Furthermore, it is observed that research done on composite slabs having multiple skin-core debonding is very limited. To address this gap, a comprehensive research investigating dynamic behaviour of composite panels with single and multiple debonding is presented. The study uses finite-element modelling and analyses for investigating the influence of debonding on free vibration behaviour of single and multilayer composite sandwich panels. A broad parametric investigation has been carried out by varying debonding locations, debonding sizes and support conditions of the panels in view of both single and multiple debonding. Numerical models were developed with Strand7 finite element package by innovatively selecting the suitable elements to diligently represent their actual behavior. Three-dimensional finite element models were employed to simulate the physically real situation as close as possible, with the use of an experimentally and numerically validated finite element model. Comparative results and conclusions based on the analyses are presented. For similar extents and locations of debonding, the effect of debonding on natural frequencies appears greatly dependent on the end conditions of the panel, giving greater decrease in natural frequency when the panels are more restrained. Some modes are more sensitive to debonding and this sensitivity seems to be related to their vibration mode shapes. The fundamental mode seems generally the least sensitive mode to debonding with respect to the variation in free vibration characteristics. The results indicate the effectiveness of the developed three-dimensional finite element models in assessing debonding damage in composite sandwich panels

Keywords: debonding, free vibration behaviour, GFRP sandwich panels, three dimensional finite element modelling

Procedia PDF Downloads 316
1015 Multiaxial Fatigue in Thermal Elastohydrodynamic Lubricated Contacts with Asperities and Slip

Authors: Carl-Magnus Everitt, Bo Alfredsson

Abstract:

Contact mechanics and tribology have been combined with fundamental fatigue and fracture mechanics to form the asperity mechanism which supplies an explanation for the surface-initiated rolling contact fatigue damage, called pitting or spalling. The cracks causing the pits initiates at one surface point and thereafter they slowly grow into the material before chipping of a material piece to form the pit. In the current study, the lubrication aspects on fatigue initiation are simulated by passing a single asperity through a thermal elastohydrodynamic lubricated, TEHL, contact. The physics of the lubricant was described with Reynolds equation and the lubricants pressure-viscosity relation was modeled by Roelands equation, formulated to include temperature dependence. A pressure dependent shear limit was incorporated. To capture the full phenomena of the sliding contact the temperature field was resolved through the incorporation of the energy flow. The heat was mainly generated due to shearing of the lubricant and from dry friction where metal contact occurred. The heat was then transported, and conducted, away by the solids and the lubricant. The fatigue damage caused by the asperities was evaluated through Findley’s fatigue criterion. The results show that asperities, in the size of surface roughness found in applications, may cause surface initiated fatigue damage and crack initiation. The simulations also show that the asperities broke through the lubricant in the inlet, causing metal to metal contact with high friction. When the asperities thereafter moved through the contact, the sliding provided the asperities with lubricant releasing the metal contact. The release of metal contact was possible due to the high viscosity the lubricant obtained from the high pressure. The metal contact in the inlet caused higher friction which increased the risk of fatigue damage. Since the metal contact occurred in the inlet it increased the fatigue risk more for asperities subjected to negative slip than positive slip. Therefore the fatigue evaluations showed that the asperities subjected to negative slip yielded higher fatigue stresses than the asperities subjected to positive slip of equal magnitude. This is one explanation for why pitting is more common in the dedendum than the addendum on pinion gear teeth. The simulations produced further validation for the asperity mechanism by showing that asperities cause surface initiated fatigue and crack initiation.

Keywords: fatigue, rolling, sliding, thermal elastohydrodynamic

Procedia PDF Downloads 123
1014 Decision-Making in the Internationalization Process of Small and Medium Sized Companies: Experience from Managers in a Small Economy

Authors: Gunnar Oskarsson, Gudjon Helgi Egilsson

Abstract:

Due to globalization, small and medium-sized enterprises (SME) increasingly offer their products and services in foreign markets. The main reasons are either to compensate for a decreased market share in their home market or to exploit opportunities in foreign markets, which are becoming less distant and better accessible than before. International markets are particularly important for companies located in a small economy and offering specialized products. Although more accessible, entering international markets is both expensive and difficult. In order to select the most appropriate markets, it is, therefore, important to gain an insight into the factors that have an impact on success, or potential failure. Although there has been a reasonable volume of research into the theory of internationalization, there is still a need to gain further understanding of the decision-making process of SMEs in small economies and the most important characteristics that distinguish between success and failure. The main objective of this research is to enhance knowledge on the internationalization of SMEs, including the drivers for the decision to internationalize, and the most important factors contributing to success in their internationalization activities. A qualitative approach was found to be most appropriate for this kind of research, with the objective of gaining a deeper understanding and discovering factors which impact a company’s decision-making and potential success. In-depth interviews were conducted with 14 companies in different industries located in Iceland, a country extensively dependent on export revenues. The interviews revealed several factors as drivers of internationalization and, not surprisingly, the most frequently mentioned source of motivation was that the local market is inadequate to maintain a sustainable operation. Good networking relationships were seen as a particular priority for potential success, searching for new markets was mainly carried out through the internet, although sales exhibitions and sales trips were also considered important. When it comes to the final decision as to whether a market should be considered for further analysis, economy, labor cost, legal environment, and cultural barriers were the most common factors to be weighted. The ultimate answer to successful internationalization, however, is largely dependent on a coordinated and experienced management team. The main contribution of this research is offering an insight into factors affecting decision-making in the internationalization process of SMEs, based on the opinion and experience of managers of SMEs in a small economy.

Keywords: internationalization, success factors, small and medium-sized enterprises (SMEs), drivers, decision making

Procedia PDF Downloads 241
1013 The Emergence of Memory at the Nanoscale

Authors: Victor Lopez-Richard, Rafael Schio Wengenroth Silva, Fabian Hartmann

Abstract:

Memcomputing is a computational paradigm that combines information processing and storage on the same physical platform. Key elements for this topic are devices with an inherent memory, such as memristors, memcapacitors, and meminductors. Despite the widespread emergence of memory effects in various solid systems, a clear understanding of the basic microscopic mechanisms that trigger them is still a puzzling task. We report basic ingredients of the theory of solid-state transport, intrinsic to a wide range of mechanisms, as sufficient conditions for a memristive response that points to the natural emergence of memory. This emergence should be discernible under an adequate set of driving inputs, as highlighted by our theoretical prediction and general common trends can be thus listed that become a rule and not the exception, with contrasting signatures according to symmetry constraints, either built-in or induced by external factors at the microscopic level. Explicit analytical figures of merit for the memory modulation of the conductance are presented, unveiling very concise and accessible correlations between general intrinsic microscopic parameters such as relaxation times, activation energies, and efficiencies (encountered throughout various fields in Physics) with external drives: voltage pulses, temperature, illumination, etc. These building blocks of memory can be extended to a vast universe of materials and devices, with combinations of parallel and independent transport channels, providing an efficient and unified physical explanation for a wide class of resistive memory devices that have emerged in recent years. Its simplicity and practicality have also allowed a direct correlation with reported experimental observations with the potential of pointing out the optimal driving configurations. The main methodological tools used to combine three quantum transport approaches, Drude-like model, Landauer-Buttiker formalism, and field-effect transistor emulators, with the microscopic characterization of nonequilibrium dynamics. Both qualitative and quantitative agreements with available experimental responses are provided for validating the main hypothesis. This analysis also shades light on the basic universality of complex natural impedances of systems out of equilibrium and might help pave the way for new trends in the area of memory formation as well as in its technological applications.

Keywords: memories, memdevices, memristors, nonequilibrium states

Procedia PDF Downloads 99
1012 Layouting Phase II of New Priok Using Adaptive Port Planning Frameworks

Authors: Mustarakh Gelfi, Tiedo Vellinga, Poonam Taneja, Delon Hamonangan

Abstract:

The development of New Priok/Kalibaru as an expansion terminal of the old port has been being done by IPC (Indonesia Port Cooperation) together with the subsidiary company, Port Developer (PT Pengembangan Pelabuhan Indonesia). As stated in the master plan, from 2 phases that had been proposed, phase I has shown its form and even Container Terminal I has been operated in 2016. It was planned principally, the development will be divided into Phase I (2013-2018) consist of 3 container terminals and 2 product terminals and Phase II (2018-2023) consist of 4 container terminals. In fact, the master plan has to be changed due to some major uncertainties which were escaped in prediction. This study is focused on the design scenario of phase II (2035- onwards) to deal with future uncertainty. The outcome is the robust design of phase II of the Kalibaru Terminal taking into account the future changes. Flexibility has to be a major goal in such a large infrastructure project like New Priok in order to deal and manage future uncertainty. The phasing of project needs to be adapted and re-look frequently before being irrelevant to future challenges. One of the frameworks that have been developed by an expert in port planning is Adaptive Port Planning (APP) with scenario-based planning. The idea behind APP framework is the adaptation that might be needed at any moment as an answer to a challenge. It is a continuous procedure that basically aims to increase the lifespan of waterborne transport infrastructure by increasing flexibility in the planning, contracting and design phases. Other methods used in this study are brainstorming with the port authority, desk study, interview and site visit to the real project. The result of the study is expected to be the insight for the port authority of Tanjung Priok over the future look and how it will impact the design of the port. There will be guidelines to do the design in an uncertain environment as well. Solutions of flexibility can be divided into: 1 - Physical solutions, all the items related hard infrastructure in the projects. The common things in this type of solution are using modularity, standardization, multi-functional, shorter and longer design lifetime, reusability, etc. 2 - Non-physical solutions, usually related to the planning processes, decision making and management of the projects. To conclude, APP framework seems quite robust to deal with the problem of designing phase II of New Priok Project for such a long period.

Keywords: Indonesia port, port's design, port planning, scenario-based planning

Procedia PDF Downloads 240
1011 Analyses of Soil Volatile Contaminants Extraction by Hot Air Injection

Authors: Abraham Dayan

Abstract:

Remediation of soil containing volatile contaminants is often conducted by vapor extraction (SVE) technique. The operation is based on injection of air at ambient temperatures with or without thermal soil warming. Thermal enhancements of soil vapor extraction (TESVE) processes are usually conducted by soil heating, sometimes assisted by added steam injections. The current study addresses a technique which has not received adequate attention and is based on using exclusively hot air as an alternative to the common TESVE practices. To demonstrate the merit of the hot air TESVE technique, a sandy soil containing contaminated water is studied. Numerical and analytical tools were used to evaluate the rate of decontamination processes for various geometries and operating conditions. The governing equations are based on the Darcy law and are applied to an expanding compressible flow within a sandy soil. The equations were solved to determine the minimal time required for complete soil remediation. An approximate closed form solution was developed based on the assumption of local thermodynamic equilibrium and on a linearized representation of temperature dependence of the vapor to air density ratio. The solution is general in nature and offers insight into the governing processes of the soil remediation operation, where self-similar temperature profiles under certain conditions may exist, and the noticeable role of the contaminants evaporation and recondensation processes in affecting the remediation time. Based on analyses of the hot air TESVE technique, it is shown that it is sufficient to heat the air during a certain period of the decontamination process without compromising its full advantage, and thereby, entailing a minimization of the air-heating-energy requirements. This in effect is achieved by regeneration, leaving the energy stored in the soil during the early period of the remediation process to heat the subsequently injected ambient air, which infiltrates through it for the decontamination of the remaining untreated soil zone. The characteristic time required to complete SVE operations are calculated as a function of, both, the injected air temperature and humidity. For a specific set of conditions, it is demonstrated that elevating the injected air temperature by 20oC, the hot air injection technique reduces the soil remediation time by 50%, while requiring 30% of additional energy consumption. Those evaluations clearly unveil the advantage of the hot air SVE process, which for insignificant cost of added air heating energy, the substantial cost expenditures for manpower and equipment utilization are reduced.

Keywords: Porous Media, Soil Decontamination, Hot Air, Vapor Extraction

Procedia PDF Downloads 16
1010 Exploring the Psychosocial Brain: A Retrospective Analysis of Personality, Social Networks, and Dementia Outcomes

Authors: Felicia N. Obialo, Aliza Wingo, Thomas Wingo

Abstract:

Psychosocial factors such as personality traits and social networks influence cognitive aging and dementia outcomes both positively and negatively. The inherent complexity of these factors makes defining the underlying mechanisms of their influence difficult; however, exploring their interactions affords promise in the field of cognitive aging. The objective of this study was to elucidate some of these interactions by determining the relationship between social network size and dementia outcomes and by determining whether personality traits mediate this relationship. The longitudinal Alzheimer’s Disease (AD) database provided by Rush University’s Religious Orders Study/Memory and Aging Project was utilized to perform retrospective regression and mediation analyses on 3,591 participants. Participants who were cognitively impaired at baseline were excluded, and analyses were adjusted for age, sex, common chronic diseases, and vascular risk factors. Dementia outcome measures included cognitive trajectory, clinical dementia diagnosis, and postmortem beta-amyloid plaque (AB), and neurofibrillary tangle (NT) accumulation. Personality traits included agreeableness (A), conscientiousness (C), extraversion (E), neuroticism (N), and openness (O). The results show a positive correlation between social network size and cognitive trajectory (p-value = 0.004) and a negative relationship between social network size and odds of dementia diagnosis (p = 0.024/ Odds Ratio (OR) = 0.974). Only neuroticism mediates the positive relationship between social network size and cognitive trajectory (p < 2e-16). Agreeableness, extraversion, and neuroticism all mediate the negative relationship between social network size and dementia diagnosis (p=0.098, p=0.054, and p < 2e-16, respectively). All personality traits are independently associated with dementia diagnosis (A: p = 0.016/ OR = 0.959; C: p = 0.000007/ OR = 0.945; E: p = 0.028/ OR = 0.961; N: p = 0.000019/ OR = 1.036; O: p = 0.027/ OR = 0.972). Only conscientiousness and neuroticism are associated with postmortem AD pathologies; specifically, conscientiousness is negatively associated (AB: p = 0.001, NT: p = 0.025) and neuroticism is positively associated with pathologies (AB: p = 0.002, NT: p = 0.002). These results support the study’s objectives, demonstrating that social network size and personality traits are strongly associated with dementia outcomes, particularly the odds of receiving a clinical diagnosis of dementia. Personality traits interact significantly and beneficially with social network size to influence the cognitive trajectory and future dementia diagnosis. These results reinforce previous literature linking social network size to dementia risk and provide novel insight into the differential roles of individual personality traits in cognitive protection.

Keywords: Alzheimer’s disease, cognitive trajectory, personality traits, social network size

Procedia PDF Downloads 130
1009 A Critical Discourse Analysis of ‘Youth Radicalisation’: A Case of the Daily Nation Kenya Online Newspaper

Authors: Miraji H. Mohamed

Abstract:

The purpose of this study is to critique ‘radicalisation’ and more particularly ‘youth radicalisation’ by exploring its usage in online newspapers. ‘Radicalisation’ and ‘extremism’ have become the most common terms in terrorism studies since the 9/11 attacks. Regardless of the geographic location, when the word terrorism is used the terms ‘radicalisation’ and ‘extremism’ always follow to attempt to explore the journey of the perpetrators towards violence. These terms have come to represent a discourse of dominantly pejorative traits often used to describe spaces, groups, and processes identified as problematic. Even though ambiguously defined they feature widely in government documents, political statements, news articles, academic research, social media platforms, religious gatherings, and public discussions. Notably, ‘radicalisation’ and ‘extremism’ have been closely conflated with the term youth to form ‘youth radicalisation’ to refer to a discourse of ‘youth at risk’. The three terms largely continue to be used unquestioningly and interchangeably hence the reason why they are placed in single quotation marks to deliberately question their conventional usage. Albeit this comes timely in the Kenyan context where there has been a proliferation of academic and expert research on ‘youth radicalisation’ (used as a neutral label) without considering the political, cultural and socio-historical contexts that inform this label. This study seeks to draw these nuances by employing a genealogical approach that historicises and deconstructs ‘youth radicalisation’; and by applying a Discourse-Historical Approach (DHA) of Critical Discourse Analysis to analyse Kenyan online newspaper - The Daily Nation between 2015 and 2018. By applying the concept of representation to analyse written texts, the study reveals that the use of ‘youth radicalisation’ as a discursive strategy disproportionately affects young people especially those from cultural/ethnic/religious minority groups. Also, the ambiguous use of ‘radicalisation’ and ‘youth radicalisation’ by the media reinforces the discourse of ‘youth at risk’ which has become the major framework underpinning Countering Violent Extremism (CVE) interventions. Similarly, the findings indicate that the uncritical use of ‘youth radicalisation’ has been used to serve political interests; and has become an instrument of policing young people, thus contributing to their cultural shaping. From this, it is evident that the media could thwart rather than assist CVE efforts. By exposing the political nature of the three terms through evidence-based research, this study offers recommendations on how critical reflective reporting by the media could help to make CVE more nuanced.

Keywords: discourse, extremism, radicalisation, terrorism, youth

Procedia PDF Downloads 131
1008 Genome-Wide Mining of Potential Guide RNAs for Streptococcus pyogenes and Neisseria meningitides CRISPR-Cas Systems for Genome Engineering

Authors: Farahnaz Sadat Golestan Hashemi, Mohd Razi Ismail, Mohd Y. Rafii

Abstract:

Clustered regularly interspaced short palindromic repeats (CRISPR) and CRISPR-associated protein (Cas) system can facilitate targeted genome editing in organisms. Dual or single guide RNA (gRNA) can program the Cas9 nuclease to cut target DNA in particular areas; thus, introducing concise mutations either via error-prone non-homologous end-joining repairing or via incorporating foreign DNAs by homologous recombination between donor DNA and target area. In spite of high demand of such promising technology, developing a well-organized procedure in order for reliable mining of potential target sites for gRNAs in large genomic data is still challenging. Hence, we aimed to perform high-throughput detection of target sites by specific PAMs for not only common Streptococcus pyogenes (SpCas9) but also for Neisseria meningitides (NmCas9) CRISPR-Cas systems. Previous research confirmed the successful application of such RNA-guided Cas9 orthologs for effective gene targeting and subsequently genome manipulation. However, Cas9 orthologs need their particular PAM sequence for DNA cleavage activity. Activity levels are based on the sequence of the protospacer and specific combinations of favorable PAM bases. Therefore, based on the specific length and sequence of PAM followed by a constant length of the target site for the two orthogonals of Cas9 protein, we created a reliable procedure to explore possible gRNA sequences. To mine CRISPR target sites, four different searching modes of sgRNA binding to target DNA strand were applied. These searching modes are as follows i) coding strand searching, ii) anti-coding strand searching, iii) both strand searching, and iv) paired-gRNA searching. Finally, a complete list of all potential gRNAs along with their locations, strands, and PAMs sequence orientation can be provided for both SpCas9 as well as another potential Cas9 ortholog (NmCas9). The artificial design of potential gRNAs in a genome of interest can accelerate functional genomic studies. Consequently, the application of such novel genome editing tool (CRISPR/Cas technology) will enhance by presenting increased versatility and efficiency.

Keywords: CRISPR/Cas9 genome editing, gRNA mining, SpCas9, NmCas9

Procedia PDF Downloads 263
1007 The Path of Cotton-To-Clothing Value Chains to Development: A Mixed Methods Exploration of the Resuscitation of the Cotton-To-Clothing Value Chain in Post

Authors: Emma Van Schie

Abstract:

The purpose of this study is to use mixed methods research to create typologies of the performance of firms in the cotton-to-clothing value chain in Zimbabwe, and to use these typologies to achieve the objective of adding to the small pool of studies on Sub-Saharan African value chains performing in the context of economic liberalisation and achieving development. The uptake of economic liberalisation measures across Sub-Saharan Africa has led to the restructuring of many value chains. While this action has resulted in some African economies positively reintegrating into global commodity chains, it has also been deeply problematic for the development impacts of the majority of others. Over and above this, these nations have been placed at a disadvantage due to the fact that there is little scholarly and policy research on approaches for managing economic liberalisation and value chain development in the unique African context. As such, the central question facing these less successful cases is how they can integrate into the world economy whilst still fostering their development. This paper draws from quantitative questionnaires and qualitative interviews with 28 stakeholders in the cotton-to-clothing value chain in Zimbabwe. This paper examines the performance of firms in the value chain, and the subsequent local socio-economic development impacts that are affected by the revival of the cotton-to-clothing value chain following its collapse in the wake of Zimbabwe’s uptake of economic liberalisation measures. Firstly, the paper finds the relatively undocumented characteristics and structures of firms in the value chain in the post-economic liberalisation era. As well as this, it finds typologies of the status of firms as either being in operation, closed down, or being placed under judicial management and the common characteristics that these typologies hold. The key findings show how a mixture of macro and local level aspects, such as value chain governance and the management structure of a business, leads to the most successful typology that is able to add value to the chain in the context of economic liberalisation, and thus unlock its socioeconomic development potential. These typologies are used in making industry and policy recommendations on achieving this balance between the macro and the local level, as well as recommendations for further academic research for more typologies and models on the case of cotton value chains in Sub-Saharan Africa. In doing so, this study adds to the small collection of academic evidence and policy recommendations for the challenges that African nations face when trying to incorporate into global commodity chains in attempts to benefit from their associated socioeconomic development opportunities.

Keywords: cotton-to-clothing value chain, economic liberalisation, restructuring value chain, typologies of firms, value chain governance, Zimbabwe

Procedia PDF Downloads 170
1006 Traumatic Brain Injury in Cameroon: A Prospective Observational Study in a Level 1 Trauma Centre

Authors: Franklin Chu Buh, Irene Ule Ngole Sumbele, Andrew I. R. Maas, Mathieu Motah, Jogi V. Pattisapu, Eric Youm, Basil Kum Meh, Firas H. Kobeissy, Kevin W. Wang, Peter J. A. Hutchinson, Germain Sotoing Taiwe

Abstract:

Introduction: Studying TBI characteristics and their relation to outcomes can identify initiatives to improve TBI prevention and care. The objective of this study was to define the features and outcomes of TBI patients seen over a 1-year period in a level-I trauma center in Cameroon. Methods: Data on demographics, causes, injury mechanisms, clinical aspects, and discharge status were prospectively collected over a period of 12 months. The Glasgow Outcome Scale-Extended (GOSE) and the Quality of Life Questionnaire after Brain Injury (QoLIBRI) were used to evaluate outcomes 6-months after TBI. Categorical variables were described as frequencies and percentages. Comparisons between 2 categorical variables were done using Pearson's Chi-square test or Fisher's exact test. Results: A total of 160 TBI patients participated in the study. The age group 15-45 years (78%; 125) was most represented. Males were more affected (90%; 144). Low educational level was recorded in 122 (76%) cases. Road traffic incidents (RTI) were the main cause of TBI (85%), with professional bike riders being frequently involved (27%, 43/160). Assaults (7.5%) and falls (2.5%) represent the second and third most common causes of TBI in Cameroon, respectively. Only 15 patients were transported to the hospital by ambulance, and 14 of these were from a referring hospital. CT-imaging was performed in 78% (125/160) of cases intracranial traumatic abnormality was identified in 77/125 (64%) cases. Financial constraints were the main reason for not performing a CT scan on 35 patients. A total of 46 (33%) patients were discharged against medical advice (DAMA) due to financial constraints. Mortality was 14% (22/160) but disproportionately high in patients with severe TBI (46%). DAMA had poor outcomes with QoLIBRI. Only 4 patients received post-injury physiotherapy services. Conclusion: TBI in Cameroon mainly results from RTIs and commonly affects young adult males, and low educational or socioeconomic status and commercial bike riding appear to be predisposing factors. Lack of pre-hospital care, financial constraints limiting both CT-scanning and medical care, and lack of acute physiotherapy services likely influenced care and outcomes adversely.

Keywords: characteristics, traumatic brain injury, outcome, disparities in care, prospective study

Procedia PDF Downloads 124
1005 Epidemiology of Low Back Pain among Nurses Working in Public Hospitals of Addis Ababa, Ethiopia

Authors: Mengestie Mulugeta Belay, Serebe Abay Gebrie, Biruk Lambbiso Wamisho, Amare Worku

Abstract:

Background: Low back pain (LBP) related to nursing profession, is a very common public health problem throughout the world. Various risk factors have been implicated in the etiology and LBP is assumed to be of multi-factorial origin as individual, work-related and psychosocial factors can contribute to its development. Objectives: To determine the prevalence and to identify risk factors of LBP among nurses working in Addis Ababa City Public Hospitals, Ethiopia, in the year 2015. Settings: Addis Ababa University, Black-Lion (‘Tikur Anbessa’) Hospital-BLH, is the country’s highest tertiary level referral and teaching Hospital. The three departments in connection with this study: Radiology, Pathology and Orthopedics, run undergraduate and residency programs and receive referred patients from all over the country. Methods: A cross-sectional study with internal comparison was conducted throughout the period October-December, 2015. Sample was chosen by simple random sampling technique by taken the lists of nurses from human resource departments as a sampling frame. A well-structured, pre-tested and self-administered questionnaire was used to collect quantifiable information. The questionnaire included socio-demographic, back pain features, consequences of back pain, work-related and psychosocial factors. The collected data was entered into EpiInfo version 3.5.4 and was analyzed by SPSS. A probability level of 0.05 or less and 95% confidence level was used to indicate statistical significance. Ethical clearance was obtained from all respected administrative bodies, Hospitals and study participants. Results: The study included 395 nurses and gave a response rate of 91.9%. The mean age was 30.6 (±8.4) years. Majority of the respondents were female (285, 72.2%). Nearly half of the participants (n=181, 45.8% (95% CI (40.8%- 50.6%))) were complained low back pain. There was statistical significant association between low back pain and working shift, physical activities at work; sleep disturbance and felt little pleasure by doing things. Conclusion: A high prevalence of low back pain was found among nurses working in Addis Ababa Public Hospitals. Recognition and preventive measures like providing resting periods should be taken to reduce the risk of low back pain in nurses working in Public hospitals.

Keywords: low back pain, risk factors, nurses, public hospitals

Procedia PDF Downloads 314