Search results for: open loop supply chain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6855

Search results for: open loop supply chain

1275 African Pattern Trends in Contemporary Textile and Fashion Design: Exploratory Study in African Sources and Technology in Fashion, Art, and Textiles

Authors: Leslie Nobler

Abstract:

African fabrics based specifically on the Dutch Wax Print, or Ankara, popularized during Africa's colonial era, have had an enormous impact on western fashion (especially in the US and UK), in the last half-decade. The trend has had an effect on the world of visual arts as well, which circuitously, also heavily impacts fashion design. In fashion, and notably in celebrity apparel choices, this is in part due to ‘identity’ and taking pride in one's African roots; in the visual arts, artists such as Yinka Shonibare and Njideka Akunyili Crosby are making statements about identity politics, colonialism up through post-colonialism, and racism. The ‘global village’ brought on by the internet has driven this proliferation, as have improvements in the printing technology with which the Ankara print is made, combining wax-resist with roller printing. The newest patterns can now be designed authentically in western African and easily sent electronically to Europe for printing. Examples of Ankara's new reach across the Atlantic abound. They have taken several paths, which the paper will detail. Briefly, the first is its greater utilization in the fashion world, from authentic textile shops in African American neighborhoods to copied (knocked-off) low-end reproductions in discount chains. Secondly, we are seeing far more uses of these textiles/patterns in important works of fine arts from major museums, in Philadelphia to Palm Beach to the Mass MOCA (in the US), all the way to the Israel Museum in Jerusalem, and everywhere in between. And lastly, but quite significantly, we see this trend throughout social media thanks to Instagram, Pinterest and celebrity photos –even at the recent royal wedding. What shall sustain this major new design direction is that Ankara changes with and adapts to the times. Some of it is now printed in West Africa, often in the Nigeria area. And some may be designed in Europe or even at knock-off apparel studios in NY or Asia. But it stays utterly relevant because the motifs are based on objects and scenes in everyday life. In my design studio and university design classes, this idea is first and foremost, from our big spiritual eye motifs to drawings of our art supplies to the ‘politically-loaded’ chain patterns. This first-hand creativity experience becomes part of the research of this paper, along with historic and contemporary sources of inquiry, both through a literature/image search and anecdotal experience into what is behind this exciting and surprising trend.

Keywords: African wax print, Ankara, identity (politics), textile design, surface design

Procedia PDF Downloads 118
1274 Impact of Social Media in Shaping Perceptions on Filipino Muslim Identity

Authors: Anna Rhodora A. Solar, Jan Emil N. Langomez

Abstract:

Social Media plays a crucial role in influencing Philippine public opinion with regard to a variety of socio-political issues. This became evident in the massacre of 44 members of the Special Action Force (SAF 44) tasked by the Philippine government to capture one of the US Federal Bureau of Investigation’s most wanted terrorists. The incident was said to be perpetrated by members of the Moro Islamic Liberation Front and the Bangsamoro Islamic Freedom Fighters. Part of the online discourse within Philippine cyberspace sparked intense debates on Filipino Muslim identity, with several Facebook viral posts linking Islam as a factor to the tragic event. Facebook is considered to be the most popular social media platform in the Philippines. As such, this begs the question of the extent to which social media, specifically Facebook, shape the perceptions of Filipinos on Filipino Muslims. This study utilizes Habermas’ theory of communicative action as it offers an explanation on how public sphere such as social media could be a network for communicating information and points of view through free and open dialogue among equal citizens to come to an understanding or common perception. However, the paper argues that communicative action which is aimed at reaching understanding free from force, and strategic action which is aimed at convincing someone through argumentation may not necessarily be mutually exclusive since reaching an understanding can also be considered as a result of convincing someone through argumentation. Moreover, actors may clash one another in their ideas before reaching common understanding, hence the presence of force. Utilizing content analysis on the Facebook posts with Islamic component that went viral after the massacre of the SAF 44, this paper argues that framing the image of Filipino Muslims through Facebook reflects both communicative and strategic actions. Moreover, comment threads on viral posts manifest force albeit implicit.

Keywords: communication, Muslim, Philippines, social media

Procedia PDF Downloads 384
1273 Decolonising Postgraduate Research Curricula and Its Impact on a Sustainable Protein Supply in Rural-Based Communities

Authors: Fabian Nde Fon

Abstract:

Decolonisation is one of the hottest topics in most African Universities; this is because many researchers focus on research that does not speak to their immediate community. This research looked at postgraduate research projects that can take students to the community to apply the knowledge that they have learned as an attempt to transform their community. In regards to this, an honours project was designed to try and provide a cheaper and continuous source of protein (egg) using amber-link layers and to investigate the potential of the project to promote postgraduate student development and entrepreneurship. Two ban layer production systems were created: (1) Production system one on a Hill (PS-I) and (2) Production system two in a valley, closer to a dam (PS-II) at Nqutshini, Gingindlovu, KwaZulu-Natal Province. Forty point-of-lay (18 weeks old) amber links were bought at Inverness Rearers and divided into PS-I (20), and PS-II (20), and each of the production systems was further divided into two groups of ten (PS-I-1 and PS-II-1 (partially supplemented) and PS-I-2 and PS-II-2 (supplemented with layer mash)) by a random selection. Birds' weights were balanced in each group to avoid bias. The two groups in each production system were caged separately (1.5x1.5m² for ten birds) and in close proximity. Partially supplemented birds received 0.6 kg of layer mash (60g/per bird/day) and kitchen leftovers daily, and supplemented birds were fed 1.2 kg of layer mash (120g/per bird/day). Egg collection was daily after feeding in the morning while was given ad libitium. The eggs were assessed for internal and external quality after weighing before recording. Egg production from fully supplemented birds (PS-I-2 and PS-II-2) was generally higher (P<0.05) than those of PS-I-1 and PS-II-1. The difference in production was only 6% in the valley while on the Hill, it was only 3%. However, some of the birds in the valley showed signs of respiratory infections, which was not observed with those on the Hill. There are no differences in the internal and external qualities of eggs (york colour and egg shell) determined. This implies that both systems were sustainable. It was suggested members in the community living at the valley or Hill can use these hardy layers as a cheaper source of protein and preferable to the partially supplemented systems because it is relatively cheaper. The smallholder farmers are still pursuing the project long after the students graduate; hence the benefit of the project is reciprocal for both the university and the community (entrepreneurship).

Keywords: animal nutrition, ban layer, production, postgraduate curricula, entrepreneurship

Procedia PDF Downloads 98
1272 Confidence Building Strategies Adopted in an EAP Speaking Course at METU and Their Effectiveness: A Case Study

Authors: Canan Duzan

Abstract:

For most language learners, mastery of the speaking skill is the proof of the mastery of the foreign language. On the other hand, the speaking skill is considered as the most difficult aspect of language learning to develop for both learners and teachers. Especially in countries like Turkey where exposure to the target language is minimum and resources and opportunities provided for language practice are scarce, teaching and learning to speak the language become a real struggle for teachers and learners alike. Data collected from students, instructors, faculty members and the business sector in needs analysis studies conducted previously at Middle East Technical University (METU) consistently revealed the need for addressing the problem of lack of confidence in speaking English. Action was taken during the design of the only EAP speaking course offered in Modern Languages Department since lack of confidence is considered to be a serious barrier for effective communication and causes learners to suffer from insecurity, uncertainty and fear. “Confidence building” served as the guiding principle in the syllabus design, nature of the tasks created for the course and the assessment procedures to help learners become more confident speakers of English. In order to see the effectiveness of the decisions made during the design phase of the course and whether students become more confident speakers upon completion of the course, a case study was carried out with 100 students at METU. A questionnaire including both Likert-Scale and open-ended items were administered to students to collect data and this data were analyzed using the SPSS program. Group interviews were also carried out to gain more insight into the effectiveness of the course in terms of building speaking confidence. This presentation will explore the specific actions taken to develop students’ confidence based on the findings of program evaluation studies and to what extent the students believe these actions to be effective in improving their confidence. The unique design of this course and strategies adopted for confidence building are highly applicable in other EAP contexts and may yield similar positive results.

Keywords: confidence, EAP, speaking, strategy

Procedia PDF Downloads 385
1271 Analysis of the Content of Sugars, Vitamin C, Preservatives, Synthetic Dyes, Sweeteners, Sodium and Potassium and Microbiological Purity in Selected Products Made From Fruit and Vegetables in Small Regional Factories and in Large Food Corporations

Authors: Katarzyna Miśkiewicz, Magdalena Lasoń-Rydel, Małgorzata Krępska, Katarzyna Sieczyńska, Iwona Masłowska-Lipowicz, Katarzyna Ławińska

Abstract:

The aim of the study was to analyse a selection of 12 pasteurised products made from fruit and vegetables, such as fruit juices, fruit drinks, jams, marmalades and jam produced by small regional factories as well as large food corporations. The research was carried out as part of the project "Innovative system of healthy and regional food distribution", funded by the Ministry of Education and Science (Poland), which aims to create an economically and organisationally strong agri-food industry in Poland through effective cooperation between scientific and socio-economic actors. The main activities of the project include support for the creation of new distribution channels for regional food products and their easy access to a wide group of potential customers while maintaining the highest quality standards. One of the key areas of the project is food quality analyses conducted to indicate the competitive advantage of regional products. Presented here are studies on the content of sugars, vitamin C, preservatives, synthetic colours, sweeteners, sodium and potassium, as well as studies on the microbiological purity of selected products made from fruit and vegetables. The composition of products made from fruit and vegetables varies greatly and depends on both the type of raw material and the way it is processed. Of the samples tested, fruit drinks contained the least amount of sugars, and jam and marmalade made by large producers and bought in large chain stores contained the most. However, the low sugar content of some fruit drinks is due to the presence of the sweetener sucralose in their composition. The vitamin C content of the samples varied, being higher in products where it was added during production. All products made in small local factories were free of food additives such as preservatives, sweeteners and synthetic colours, indicating their superiority over products made by large producers. Products made in small local factories were characterised by a relatively high potassium content. The microbiological purity of commercial products was confirmed - no Salmonella spp. were detected, and the number of mesophilic bacteria, moulds, yeasts, and β-glucuronidase-positive E. coli was below the limit of quantification.

Keywords: fruit and vegetable products, sugars, food additives, HPLC, ICP-OES

Procedia PDF Downloads 72
1270 Coach-Created Motivational Climate and the Coach-Athlete Relationship

Authors: Kamila Irena Szpunar

Abstract:

The central idea of the study is considered from two perspectives. The first perspective includes the interpersonal relationships formed by coach and athlete. Another perspective is connected with motivational environment which is created by the coach in team. This study will show the interplay between the perceived motivational climate created by the coach and the interpersonal dynamics between coaches and athletes. It is important because it will supply knowledge of the interpersonal conditions that can foster adaptive or maladaptive behavior in sport conditions. It also ensures implications for understanding how the perceived motivational atmosphere in a team is manifested at the level of coach – athlete relationship and interactions. The primary purpose of the study was to identify the association between coach-athlete relationship and athletes' perception of the motivational climate in team sports. The secondary purposes examined the differences between female and male athletes in perceiving of the motivational climate and the coach athlete-relationship. To check coach-athlete relationship Polish translation of The Coach-Athlete Relationship Questionnaire will be used. It measures athletes' perceptions of coach- athlete relationship defined by 3+1 Cs conceptual model of the coach-athlete relationship. From this model were used three constructs such as closeness (feelings of trust, respect etc.), commitment (thoughts about the future of the relationship), and complementarity (co-operative interactions during practice sessions). To check perceived motivational climate will be used Polish translation of The Perceived Motivational Climate in Sport Questionnaire-2 (PMCSQ-2). PMCSQ-2 was created to assess athletes' perceptions of the motivational climates in their teams. The questionnaire includes two general dimensions, the perceived task-involving climate and the perceived ego-involving climate; each contains three subscales. To check the associations between elements the motivational climate and coach-athlete relationship was used canonical correlation analysis. Student's t-test was used to check gender differences in athletes' perceptions of the motivational climate and the coach-athlete relationship. The findings suggest that in Polish athletes' perceptions of the coach-athlete relationship have motivational significance and that there are gender differences between female and male athletes in both variables – coach-athlete relationship and kind of motivational climate. According to the author's knowledge, such kind of study has not been conducted in Polish conditions before and is the first study on the subject of the motivational climate and the coach-athlete relationship in Poland. Information from this study can be useful for the development of interventions for enhancing the quality of coach- athlete relationship and its associated outcomes connected with motivational climate.

Keywords: coach-athlete relationship, ego-involving climate, motivational climate, task-involving climate

Procedia PDF Downloads 188
1269 Effects of Indole on Aerobic Biodegradation of Butanoic Acid by Pseudomonas aeruginosa and Serratia marcescens

Authors: J. B. J. Njalam’mano, E. M. N. Chirwa

Abstract:

In low resource settings in Africa and other developing regions, pit latrines remain the dominant basic minimum acceptable form of sanitation. However, unpleasant smells-malodours emitted from faecal sludge in the pit latrines, which elicit disgusting or repulsive response, are one of the factors that thwart people to use latrines and instead opt for open defecation as an alternative. This provides an important but often overlooked major impediment, dissuading people from adopting and using the pit latrines hence affecting successful, effective sanitation promotion. The malodours are primarily attributed to four odorants: butanoic acid (C₄H₈O₂), dimethyl trisulphide (C₂H₆S₃), indole (C₈H₇N) and para-cresol (C₇H₈O). Several pit latrine deodorisation methods such as addition of carbonous materials, use of ventilation systems and urine separation are available, and they continue to occupy their niche, but social, economic, environmental and technological shortfalls remain. Bioremediation has been gaining popularity because it is inexpensive, simple to operate and environmentally friendly. Recently, the biodegradation of butanoic acid as individual odorant has been studied. However, to the best of our knowledge, there have been no kinetic studies of the butanoic acid in the presence of other key odorous compounds. In this study, a series of experiments were conducted to investigate the effects of indole on the removal of butanoic acid under aerobic conditions using indigenous bacteria strains, Pseudomonas aeruginosa, and Serratia marcescens isolated from faecal sludge as pure cultures as well as mixed cultures. In this purpose, butanoic acid removal was performed in a batch reactor containing the bacterial strains in mineral salt medium (MSM) amended with 3000 ppm of butanoic acid at the temperature of 30°C, under continuous stirring rate of 150 rpm and the concentration of indole was varied from 50-200 ppm. The initial pH of the solution was in the range of 6.0-7.2. Overall, there were significant differences in the bacterial growth rate and total butanoic acid removal dependent on the concentration of indole in the solution.

Keywords: biodegradation, butanoic acid, indole, pit latrine

Procedia PDF Downloads 170
1268 The Rupture of Tendon Achilles During the Recreative and Sports Activities

Authors: Jasmin S. Nurkovic, Ljubisa Dj. Jovasevic, Zana C. Dolicanin, Zoran S. Bajin

Abstract:

Ruptured muscles and tendons very often must be repatriated by open operation in young persons. In young, muscles are ruptured more often than tendons, at the sane time in older persons are more exposed to rupture than muscles. Ruptured of the calcaneus are the most present of all ruptures. Sometime the rupture is complete, but very often the incomplete rupture can be noticed. During six years, from 2006 to 2012, we treated nineteen male patients and three female patients with the rupture of tendon Achilles. The youngest patient was aged thirty two, and the oldest was also managed sixty four. The youngest female patient was forty one and the oldest was forty six. One of our patients who was under corticosteroid treatment did not take any part in sport activities but she was, as she told us, going for a long walk, the same was with other two patients one man and one woman. We had nineteen male patients age 32 to 64 and three female patients age 41, 44 and 46. Conservative treatment by cast was applied in five patients and very good results were in three of them. In two patients surgical treatment failed in patient’s age 53 and 64. Only one of all patients treated by surgery had healing problems because of necrotic changes of the skin where incision was made. One of our female patients age 45 was under steroid treatment for almost 20 years because of asthmatic problems. We suggested her wearing boots with 8cm long heels by day and by night eight weeks. The final results were satisfactory and all the time she was able to work and to walk. It was the only case we had with bilateral tendon rupture. After eight weeks the cast is removed and psychiatric treatment started, patient is using crutches with partial weight bearing over a period of two weeks. Quite the same treatment conservative treatment, only the cast is not removed after two but after four weeks. Everyday activities after the surgical treatment started ten weeks and sport activities can start after fourteen to sixteen weeks. An increased activity of our patient without previous preparing for forces activity can result, as we already see, with tendon rupture. Treatment is very long and very often surgical. We find that surgical treatment resulted as safer and better solution for patients. We also had a patient with spontaneous rupture of tendon during longer walking but this patient was under prolonged corticosteroid treatment.

Keywords: tendon, Achilles, rupture, sport

Procedia PDF Downloads 225
1267 Numerical Investigation of Indoor Environmental Quality in a Room Heated with Impinging Jet Ventilation

Authors: Mathias Cehlin, Arman Ameen, Ulf Larsson, Taghi Karimipanah

Abstract:

The indoor environmental quality (IEQ) is increasingly recognized as a significant factor influencing the overall level of building occupants’ health, comfort and productivity. An air-conditioning and ventilation system is normally used to create and maintain good thermal comfort and indoor air quality. Providing occupant thermal comfort and well-being with minimized use of energy is the main purpose of heating, ventilating and air conditioning system. Among different types of ventilation systems, the most widely known and used ventilation systems are mixing ventilation (MV) and displacement ventilation (DV). Impinging jet ventilation (IJV) is a promising ventilation strategy developed in the beginning of 2000s. IJV has the advantage of supplying air downwards close to the floor with high momentum and thereby delivering fresh air further out in the room compare to DV. Operating in cooling mode, IJV systems can have higher ventilation effectiveness and heat removal effectiveness compared to MV, and therefore a higher energy efficiency. However, how is the performance of IJV when operating in heating mode? This paper presents the function of IJV in a typical office room for winter conditions (heating mode). In this paper, a validated CFD model, which uses the v2-f model is used for the prediction of air flow pattern, thermal comfort and air change effectiveness. The office room under consideration has the dimensions 4.2×3.6×2.5m, which can be designed like a single-person or two-person office. A number of important factors influencing in the room with IJV are studied. The considered parameters are: heating demand, number of occupants and supplied air conditions. A total of 6 simulation cases are carried out to investigate the effects of the considered parameters. Heat load in the room is contributed by occupants, computer and lighting. The model consists of one external wall including a window. The interaction effects of heat sources, supply air flow and down draught from the window result in a complex flow phenomenon. Preliminary results indicate that IJV can be used for heating of a typical office room. The IEQ seems to be suitable in the occupied region for the studied cases.

Keywords: computation fluid dynamics, impinging jet ventilation, indoor environmental quality, ventilation strategy

Procedia PDF Downloads 160
1266 Formulation of Hybrid Nanopowder-Molecular Ink for Fabricating Critical Material-Free Cu₂ZnSnS₄ Thin Film Solar Absorber

Authors: Anies Mutiari, Neha Bansal, Martin Artner, Veronika Mayer, Juergen Roth, Mathias Weil, Rachmat Adhi Wibowo

Abstract:

Cu₂ZnSnS₄ (CZTS) compound (mineral name kesterite) has attracted considerable interests for photovoltaic application owing to its optoelectrical properties. Moreover, its elemental abundance in Earth’s crust offers a comparative advantage for envisaged large-scale photovoltaic deployment without any material shortage issues. In this contribution, we present an innovative route to prepare CZTS solar absorber layer for photovoltaic application from low-cost and up-scalable process. CZTS layers were spin coated on the Molybdenum-coated glass from two inks composed of different solvents; dimethylsulfoxide (DMSO) and ultrapure water. Into each solvent; 0.57M CuCl₂, 0.39M ZnCl₂, 0.53M SnCl₂, and 1.85M Thiourea or Na₂S₂O₃, as well as pre-synthesized CZTS nanopowder, were added as sources of Cu, Zn, Sn and S in the ink. The crystallisation of ink into CZTS dense layers was carried out by firstly annealing the as-deposited CZTS layer in open air at 300°C for 1 minute, followed by sulfurisation at 560–620°C under atmospheric pressure for 120 minutes. Complementary electron microscopy, grazing incidence X-ray diffraction and Raman spectroscopy investigations suggest that both solvents can be used for preparing high quality and device relevant CZTS solar absorber layers. The sulphurisation crystallizes the as-deposited CZTS into highly polycrystalline CZTS layer with tetragonal structure demonstrated by the presence of tetrahedrally-shaped grains with the size of 1 µm. An advancement of the CZTS layer preparation was made by gradual substitution of volatile organic compound solvent of DMSO with ultrapure water. It is revealed that by using similar air annealing and sulphurisation process, dense and compact CZTS layers can also be fabricated from an ink with reduced volatile organic compound content.

Keywords: kesterite, solar ink, spin coating, photovoltaics

Procedia PDF Downloads 153
1265 Exploring Emerging Viruses From a Protected Reserve

Authors: Nemat Sokhandan Bashir

Abstract:

Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.

Keywords: wild, plant, novel, metagenomics

Procedia PDF Downloads 59
1264 Topography Effects on Wind Turbines Wake Flow

Authors: H. Daaou Nedjari, O. Guerri, M. Saighi

Abstract:

A numerical study was conducted to optimize the positioning of wind turbines over complex terrains. Thus, a two-dimensional disk model was used to calculate the flow velocity deficit in wind farms for both flat and complex configurations. The wind turbine wake was assessed using the hybrid methods that combine CFD (Computational Fluid Dynamics) with the actuator disc model. The wind turbine rotor has been defined with a thrust force, coupled with the Navier-Stokes equations that were resolved by an open source computational code (Code_Saturne V3.0 developed by EDF) The simulations were conducted in atmospheric boundary layer condition considering a two-dimensional region located at the north of Algeria at 36.74°N longitude, 02.97°E latitude. The topography elevation values were collected according to a longitudinal direction of 1km downwind. The wind turbine sited over topography was simulated for different elevation variations. The main of this study is to determine the topography effect on the behavior of wind farm wake flow. For this, the wake model applied in complex terrain needs to selects the singularity effects of topography on the vertical wind flow without rotor disc first. This step allows to determine the existence of mixing scales and friction forces zone near the ground. So, according to the ground relief the wind flow waS disturbed by turbulence and a significant speed variation. Thus, the singularities of the velocity field were thoroughly collected and thrust coefficient Ct was calculated using the specific speed. In addition, to evaluate the land effect on the wake shape, the flow field was also simulated considering different rotor hub heights. Indeed, the distance between the ground and the hub height of turbine (Hhub) was tested in a flat terrain for different locations as Hhub=1.125D, Hhub = 1.5D and Hhub=2D (D is rotor diameter) considering a roughness value of z0=0.01m. This study has demonstrated that topographical farm induce a significant effect on wind turbines wakes, compared to that on flat terrain.

Keywords: CFD, wind turbine wake, k-epsilon model, turbulence, complex topography

Procedia PDF Downloads 544
1263 Structural and Binding Studies of Peptidyl-tRNA Hydrolase from Pseudomonas aeruginosa Provide a Platform for the Structure Based Inhibitor Design against Peptidyl-tRNA Hydrolase

Authors: Sujata Sharma, Avinash Singh, Lovely Gautam, Pradeep Sharma, Mau Sinha, Asha Bhushan, Punit Kaur, Tej P. Singh

Abstract:

Peptidyl-tRNA hydrolase (Pth) Pth is an essential bacterial enzyme that catalyzes the release of free tRNA and peptide moeities from peptidyl tRNAs during stalling of protein synthesis. In order to design inhibitors of Pth from Pseudomonas aeruginosa (PaPth), we have determined the structures of PaPth in its native state and in the bound states with two compounds, amino acylate-tRNA analogue (AAtA) and 5-azacytidine (AZAC). The peptidyl-tRNA hydrolase gene from Pseudomonas aeruginosa was amplified by Phusion High-Fidelity DNA Polymerase using forward and reverse primers, respectively. The E. coliBL21 (λDE3) strain was used for expression of the recombinant peptidyl-tRNA hydrolase from Pseudomonas aeruginosa. The protein was purified using a Ni-NTA superflow column. The crystallization experiments were carried out using hanging drop vapour diffusion method. The crystals diffracted to 1.50 Å resolution. The data were processed using HKL-2000. The polypeptide chain of PaPth consists of 194 amino acid residues from Met1 to Ala194. The centrally located β-structure is surrounded by α-helices from all sides except the side that has entrance to the substrate binding site. The structures of the complexes of PaPth with AAtA and AZAC showed the ligands bound to PaPth in the substrate binding cleft and interacted with protein atoms extensively. The residues that formed intermolecular hydrogen bonds with the atoms of AAtA included Asn12, His22, Asn70, Gly113, Asn116, Ser148, and Glu161 of the symmetry related molecule. The amino acids that were involved in hydrogen bonded interactions in case of AZAC included, His22, Gly113, Asn116, and Ser148. As indicated by fittings of two ligands and the number of interactions made by them with protein atoms, AAtA appears to be a more compatible with the structure of the substrate binding cleft. However, there is a further scope to achieve a better stacking than that of O-tyrosyl moiety because it is not still ideally stacked. These observations about the interactions between the protein and ligands have provided the information about the mode of binding of ligands, nature and number of interactions. This information may be useful for the design of tight inhibitors of Pth enzymes.

Keywords: peptidyl tRNA hydrolase, Acinetobacter baumannii, Pth enzymes, O-tyrosyl

Procedia PDF Downloads 410
1262 Refugee Job Seeking Opportunities: It's Not What You Know, It's Who You Know

Authors: Kimberley Kershaw, Denis Hyams-Ssekasi

Abstract:

Although there is a wealth of information about refugees and Asylum seekers, Refugee job opportunities continue to be one of the most hotly contested areas and less researched within the social sciences. Refugees are a vital asset in the society due to their experiences, skills, and competences. However, society perceives them differently, and as such, their prior lived experiences are often underutilised. This research study gleans from the work conducted during the Refugee Employment Support Clinic delivered for 12 weeks within a University setting in the North West of England. The study is conducted using three perspectives, refugees, students, and researchers, allowing for identification of the challenges encountered by the refugees concerning job opportunities. Through the utilisation of the qualitative research method, the study has found that refugees experience a wide range of issues unrelated to their skills, prior experience, and education but rather due to the red tapes connected to their legal identity labelling. Refugees struggle to build reliable employment networks that appreciate and acknowledge their capabilities and talents, impacting their ability to navigate the labour market and classism. Notably, refugees are misunderstood within their new societies, and little care is taken to understand the unique struggles they face with respect to securing paid work in their industry or field of work due to their lack of experience in the UK. Unlike other European countries, it is evident that the UK has no strategic approach to enhancing the chances of paid or voluntary work for refugees. A clinic like this provided lenses for comprehending how refugees can be better supported with employment related opportunities. By creating a safe and conducive platform for honest and open discussion about employment and through collaborative approaches with local community agencies, doors were opened for social and professional networks to be built. The study concluded that there is a need for local communities and education establishments to be more aware of the prevailing challenges and in a position to support at all stages of their asylum claim in order for the perceptions of distrust and uncertainty around refugees to be minimised.

Keywords: refugees, employment, community, classism, education

Procedia PDF Downloads 83
1261 Dynamic Modeling of the Impact of Chlorine on Aquatic Species in Urban Lake Ecosystem

Authors: Zhiqiang Yan, Chen Fan, Yafei Wang, Beicheng Xia

Abstract:

Urban lakes play an invaluable role in urban water systems such as flood control, water supply, and public recreation. However, over 38% of the urban lakes have suffered from severe eutrophication in China. Chlorine that could remarkably inhibit the growth of phytoplankton in eutrophic, has been widely used in the agricultural, aquaculture and industry in the recent past. However, little information has been reported regarding the effects of chlorine on the lake ecosystem, especially on the main aquatic species.To investigate the ecological response of main aquatic species and system stability to chlorine interference in shallow urban lakes, a mini system dynamic model was developed based on the competition and predation of main aquatic species and total phosphorus circulation. The main species of submerged macrophyte, phytoplankton, zooplankton, benthos, spiroggra and total phosphorus in water and sediment were used as variables in the model,while the interference of chlorine on phytoplankton was represented by an exponential attenuation equation. Furthermore, the eco-exergy expressing the development degree of ecosystem was used to quantify the complexity of the shallow urban lake. The model was validated using the data collected in the Lotus Lake in Guangzhoufrom1 October 2015 to 31 January 2016.The correlation coefficient (R), root mean square error-observations standard deviation ratio (RSR) and index of agreement (IOA) were calculated to evaluate accuracy and reliability of the model.The simulated values showed good qualitative agreement with the measured values of all components. The model results showed that chlorine had a notable inhibitory effect on Microcystis aeruginos,Rachionus plicatilis, Diaphanosoma brachyurum Liévin and Mesocyclops leuckarti (Claus).The outbreak of Spiroggra.spp. inhibited the growth of Vallisneria natans (Lour.) Hara, leading to a gradual decrease of eco-exergy and the breakdown of ecosystem internal equilibria. This study gives important insight into using chlorine to achieve eutrophication control and understand mechanism process.

Keywords: system dynamic model, urban lake, chlorine, eco-exergy

Procedia PDF Downloads 214
1260 Exploring the Profiles of Militants in the SWAT Valley of Pakistan

Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali

Abstract:

In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.

Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants

Procedia PDF Downloads 140
1259 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 374
1258 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs

Authors: Aldona Guzik

Abstract:

Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.

Keywords: experts, media, public discours, symbolic elites

Procedia PDF Downloads 111
1257 The Emergence of Construction Mafia in South Africa: The Implication on the Construction Industry

Authors: Thandokazi Nyangiwe, Christopher Amoah, Charles P. Mukumba

Abstract:

The South African construction sector is threatened by emerging black business forums called construction mafias. The emergence of the construction mafia has culminated in the disruptions and abandonment of construction sites resulting in the loss of jobs for construction workers. The paper examines the origin of construction mafias and their impact on the construction sector, including the potential ways to cope with their operations. A qualitative research approach was adopted for this study using open-ended interview questions to gather information from 30 key construction industry stakeholders, including contractors, subcontractors, consultants, and the construction project communities. Content and thematic analysis were used to analyse the data collected. The findings suggest that most participants do not fully understand the existence and operations of construction mafias in the construction industry. Construction mafias claim to be part of the local business forums. They disrupt construction projects and demand a certain amount, usually 30% of the construction value. Construction mafias frequently resort to intimidation and violence if their demands are unmet. Their operations have resulted in delayed completion of construction projects, abandonment of projects, and loss of income for the contractor and jobs for the construction workers. The interviews were limited to construction stakeholders. Because of the nature of the mafias’ operations, they could not be accessed for interviews for fear of being identified because of the connotation attached to their role as construction mafias. Construction project owners face disruptions of projects resulting in loss of equipment, materials, and income. Therefore, there is a need to sensitise the construction stakeholders in the construction industry regarding the existence and operations of the construction mafia and the implications on construction project performance and delivery. The findings will give insight into the operations of the construction mafias in the South African construction industry, which has caused disruptions in construction project sites. Stakeholders must find solutions to address the construction mafias’ disruptive actions on construction projects. The study presents an initial inquiry that will come up with how to manage and cope with the growing operations of construction mafias in the South African construction industry.

Keywords: black business forums, construction mafia, emergence, implication

Procedia PDF Downloads 102
1256 Rainwater Harvesting and Management of Ground Water (Case Study Weather Modification Project in Iran)

Authors: Samaneh Poormohammadi, Farid Golkar, Vahideh Khatibi Sarabi

Abstract:

Climate change and consecutive droughts have increased the importance of using rainwater harvesting methods. One of the methods of rainwater harvesting and, in other words, the management of atmospheric water resources is the use of weather modification technologies. Weather modification (also known as weather control) is the act of intentionally manipulating or altering the weather. The most common form of weather modification is cloud seeding, which increases rain or snow, usually for the purpose of increasing the local water supply. Cloud seeding operations in Iran have been married since 1999 in central Iran with the aim of harvesting rainwater and reducing the effects of drought. In this research, we analyze the results of cloud seeding operations in the Simindashtplain in northern Iran. Rainwater harvesting with the help of cloud seeding technology has been evaluated through its effects on surface water and underground water. For this purpose, two different methods have been used to estimate runoff. The first method is the US Soil Conservation Service (SCS) curve number method. Another method, known as the reasoning method, has also been used. In order to determine the infiltration rate of underground water, the balance reports of the comprehensive water plan of the country have been used. In this regard, the study areas located in the target area of each province have been extracted by drawing maps of the influence coefficients of each area in the GIS software. It should be mentioned that the infiltration coefficients were taken from the balance sheet reports of the country's comprehensive water plan. Then, based on the area of each study area, the weighted average of the infiltration coefficient of the study areas located in the target area of each province is considered as the infiltration coefficient of that province. Results show that the amount of water extracted from the rain with the help of cloud seeding projects in Simindasht is as follows: an increase in runoff 63.9 million cubic meters (with SCS equation) or 51.2 million cubic meters (with logical equation) and an increase in ground water resources: 40.5 million cubic meters.

Keywords: rainwater harvesting, ground water, atmospheric water resources, weather modification, cloud seeding

Procedia PDF Downloads 91
1255 Closing down the Loop Holes: How North Korea and Other Bad Actors Manipulate Global Trade in Their Favor

Authors: Leo Byrne, Neil Watts

Abstract:

In the complex and evolving landscape of global trade, maritime sanctions emerge as a critical tool wielded by the international community to curb illegal activities and alter the behavior of non-compliant states and entities. These sanctions, designed to restrict or prohibit trade by sea with sanctioned jurisdictions, entities, or individuals, face continuous challenges due to the sophisticated evasion tactics employed by countries like North Korea. As the Democratic People's Republic of Korea (DPRK) diverts significant resources to circumvent these measures, understanding the nuances of their methodologies becomes imperative for maintaining the integrity of global trade systems. The DPRK, one of the most sanctioned nations globally, has developed an intricate network to facilitate its trade in illicit goods, ensuring the flow of revenue from designated activities continues unabated. Given its geographic and economic conditions, North Korea predominantly relies on maritime routes, utilizing foreign ports to route its illicit trade. This reliance on the sea is exploited through various sophisticated methods, including the use of front companies, falsification of documentation, commingling of bulk cargos, and physical alterations to vessels. These tactics enable the DPRK to navigate through the gaps in regulatory frameworks and lax oversight, effectively undermining international sanctions regimes Maritime sanctions carry significant implications for global trade, imposing heightened risks in the maritime domain. The deceptive practices employed not only by the DPRK but also by other high-risk jurisdictions, necessitate a comprehensive understanding of UN targeted sanctions. For stakeholders in the maritime sector—including maritime authorities, vessel owners, shipping companies, flag registries, and financial institutions serving the shipping industry—awareness and compliance are paramount. Violations can lead to severe consequences, including reputational damage, sanctions, hefty fines, and even imprisonment. To mitigate risks associated with these deceptive practices, it is crucial for maritime sector stakeholders to employ rigorous due diligence and regulatory compliance screening measures. Effective sanctions compliance serves as a protective shield against legal, financial, and reputational risks, preventing exploitation by international bad actors. This requires not only a deep understanding of the sanctions landscape but also the capability to identify and manage risks through informed decision-making and proactive risk management practices. As the DPRK and other sanctioned entities continue to evolve their sanctions evasion tactics, the international community must enhance its collective efforts to demystify and counter these practices. By leveraging more stringent compliance measures, stakeholders can safeguard against the illicit use of the maritime domain, reinforcing the effectiveness of maritime sanctions as a tool for global security. This paper seeks to dissect North Korea's adaptive strategies in the face of maritime sanctions. By examining up-to-date, geographically, and temporally relevant case studies, it aims to shed light on the primary nodes through which Pyongyang evades sanctions and smuggles goods via third-party ports. The goal is to propose multi-level interaction strategies, ranging from governmental interventions to localized enforcement mechanisms, to counteract these evasion tactics.

Keywords: maritime, maritime sanctions, international sanctions, compliance, risk

Procedia PDF Downloads 50
1254 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 71
1253 Investigating Legal Consciousness Among Migrants in Greece: A Study of Migrant’s Views of Hate Crime and their Legal Rights

Authors: Violeta Kapageorgiadou

Abstract:

Over the past decade, millions of individuals from middle-eastern and African countries have migrated to Europe to seek refuge. The majority of these refugees emigrate from Muslim majority countries and seek to integrate into European societies. Notably, Greece has hosted thousands of individuals seeking asylum since 2015. Many of these individuals have applied for asylum. They have sought to integrate into the Greek society and to navigate their way through the national and European legal systems with regard to their status. This paper, drawn from a PhD thesis project, focuses on the legal consciousness of migrants and the processes open to asylum seekers to assert their rights, notably with regard to incidents of hate crime and including their interactions with the legal authorities in Greece. The research seeks to capture the factors that influence the views and behaviors of migrants towards the law and their legal rights, using legal consciousness as a theoretical framework. The research findings indicate that asylum seekers have developed a multidimensional legal consciousness influenced by their religious and political background, legal knowledge, previous (negative) experiences with the legal system and their socio-economic status in Greece. Asylum seekers, while aware of the rights essential for their survival in the host country (such as applying for asylum to obtain a secure status, claiming for benefits and housing), were unaware of, and less willing to engage with, legal authorities and rights which they did not find essential for their survival. They viewed hate incidents against them as less important, not worth reporting and sometimes did not even consider these incidents as crimes. The research suggests that asylum seekers in Greece are a vulnerable population who need mechanisms to support them and raise their legal consciousness around their rights in order to better integrate, develop and thrive in the host society. Moving forwards, a better understanding of refugees' and asylum seekers’ reactions towards hate crime will help to create future policies and support mechanisms that could improve the lives of these individuals.

Keywords: hate crime, legal consciousness, legal rights, migrations

Procedia PDF Downloads 203
1252 The Role of Middle Managers SBU's in Context of Change: Sense-Making Approach

Authors: Hala Alioua, Alberic Tellier

Abstract:

This paper is designed to spotlight the research on corporate strategic planning, by emphasizing the role of middle manager of SBU’s and related issues such as the context of vision change. Previous research on strategic vision has been focused principally at the SME, with relatively limited consideration given to the role of middle managers SBU’s in the context of change. This project of research has been done by using a single case study. We formulated through our immersion for 2.5 years on the ground and by a qualitative method and abduction approach. This entity that we analyze is a subsidiary of multinational companies headquartered in Germany, specialized in manufacturing automotive equipment. The "Delta Company" is a French manufacturing plant that has undergone numerous changes over the past three years. The two major strategic changes that have a significant impact on the Delta plant are the strengths of its core business through « lead plant strategy» in 2011 and the implementation of a new strategic vision in 2014. These consecutive changes impact the purpose of the mission of the middle managers. The plant managers ask the following questions: How the middle managers make sense of the corporate strategic planning imposed by the parent company? How they appropriate the new vision and decline it into actions on the ground? We chose the individual interview technique through open-ended questions as the source of data collection. We first of all carried out an exploratory approach by interviewing 8 members of the Management committee’s decision and 19 heads of services. The first findings and results show that exist a divergence of opinion and interpretations of the corporate strategic planning among organization members and there are difficulties to make sense and interpretations of the signals of the environment. The lead plant strategy enables new projects which insure the workload of Delta Company. Nevertheless, it creates a tension and stress among the middle managers because its provoke lack of resources to the detriment of their main jobs as manufacturer plant. The middle managers does not have a clear vision and they are wondering if the new strategic vision means more autonomy and less support from the group.

Keywords: change, middle managers, vision, sensemaking

Procedia PDF Downloads 387
1251 Poly(L-Lactic Acid) Scaffolds for Bone Tissue Engineering

Authors: Aleksandra BužArovska, Gordana Bogoeva Gaceva

Abstract:

Biodegradable polymers have received significant scientific attention in tissue engineering (TE) application, in particular their composites consisting of inorganic nanoparticles. In the last 15 years, they are subject of intensive research by many groups, aiming to develop polymer scaffolds with defined biodegradability, porosity and adequate mechanical stability. The most important characteristic making these materials attractive for TE is their biodegradability, a process that could be time controlled and long enough to enable generation of a new tissue as a replacement for the degraded polymer scaffold. In this work poly(L-lactic acid) scaffolds, filled with TiO2 nanoparticles functionalized with oleic acid, have been prepared by thermally induced phase separation method (TIPS). The functionalization of TiO2 nanoparticles with oleic acid was performed in order to improve the nanoparticles dispersibility within the polymer matrix and at the same time to inhibit the cytotoxicity of the nanofiller. The oleic acid was chosen as amphiphilic molecule belonging to the fatty acid family because of its non-toxicity and possibility for mediation between the hydrophilic TiO2 nanoparticles and hydrophobic PLA matrix. The produced scaffolds were characterized with thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), scanning electron microscopy (SEM) and mechanical compression measurements. The bioactivity for bone tissue engineering application was tested in supersaturated simulated body fluid. The degradation process was followed by Fourier transform infrared spectroscopy (FTIR). The results showed anisotropic morphology with elongated open pores (100 µm), high porosity (around 92%) and perfectly dispersed nanofiller. The compression moduli up to 10 MPa were identified independent on the nanofiller content. Functionalized TiO2 nanoparticles induced formation of hydroxyapatite clusters as much as unfunctionalized TiO2. The prepared scaffolds showed properties ideal for scaffold vascularization, cell attachment, growth and proliferation.

Keywords: biodegradation, bone tissue engineering, mineralization, PLA scaffolds

Procedia PDF Downloads 248
1250 Performance and Specific Emissions of an SI Engine Using Anhydrous Ethanol–Gasoline Blends in the City of Bogota

Authors: Alexander García Mariaca, Rodrigo Morillo Castaño, Juan Rolón Ríos

Abstract:

The government of Colombia has promoted the use of biofuels in the last 20 years through laws and resolutions, which regulate their use, with the objective to improve the atmospheric air quality and to promote Colombian agricultural industry. However, despite the use of blends of biofuels with fossil fuels, the air quality in large cities does not get better, this deterioration in the air is mainly caused by mobile sources that working with spark ignition internal combustion engines (SI-ICE), operating with a mixture in volume of 90 % gasoline and 10 % ethanol called E10, that for the case of Bogota represent 84 % of the fleet. Another problem is that Colombia has big cities located above 2200 masl and there are no accurate studies on the impact that the E10 mixture could cause in the emissions and performance of SI-ICE. This study aims to establish the optimal blend between gasoline ethanol in which an SI engine operates more efficiently in urban centres located at 2600 masl. The test was developed on SI engine four-stroke, single cylinder, naturally aspirated and with carburettor for the fuel supply using blends of gasoline and anhydrous ethanol in different ratios E10, E15, E20, E40, E60, E85 and E100. These tests were conducted in the city of Bogota, which is located at 2600 masl, with the engine operating at 3600 rpm and at 25, 50, 75 and 100% of load. The results show that the performance variables as engine brake torque, brake power and brake thermal efficiency decrease, while brake specific fuel consumption increases with the rise in the percentage of ethanol in the mixture. On the other hand, the specific emissions of CO2 and NOx present increases while specific emissions of CO and HC decreases compared to those produced by gasoline. From the tests, it is concluded that the SI-ICE worked more efficiently with the E40 mixture, where was obtained an increases of the brake power of 8.81 % and a reduction on brake specific fuel consumption of 2.5 %, coupled with a reduction in the specific emissions of CO2, HC and CO in 9.72, 52.88 and 76.66 % respectively compared to the results obtained with the E10 blend. This behaviour is because the E40 mixture provides the appropriate amount of the oxygen for the combustion process, which leads to better utilization of available energy in this process, thus generating a comparable power output to the E10 mixing and producing lower emissions CO and HC with the other test blends. Nevertheless, the emission of NOx increases in 106.25 %.

Keywords: emissions, ethanol, gasoline, engine, performance

Procedia PDF Downloads 313
1249 Structural Correlates of Reduced Malicious Pleasure in Huntington's Disease

Authors: Sandra Baez, Mariana Pino, Mildred Berrio, Hernando Santamaria-Garcia, Lucas Sedeno, Adolfo Garcia, Sol Fittipaldi, Agustin Ibanez

Abstract:

Schadenfreude refers to the perceiver’s experience of pleasure at another’s misfortune. This is a multidetermined emotion which can be evoked by hostile feelings and envy. The experience of Schadenfreude engages mechanisms implicated in diverse social cognitive processes. For instance, Schadenfreude involves heightened reward processing, accompanied by increased striatal engagement and it interacts with mentalizing and perspective-taking abilities. Patients with Huntington's disease (HD) exhibit reductions of Schadenfreude experience, suggesting a role of striatal degeneration in such an impairment. However, no study has directly assessed the relationship between regional brain atrophy in HD and reduced Schadenfreude. This study investigated whether gray matter (GM) atrophy in HD patients correlates with ratings of Schadenfreude. First, we compared the performance of 20 HD patients and 23 controls on an experimental task designed to trigger Schadenfreude and envy (another social emotion acting as a control condition). Second, we compared GM volume between groups. Third, we examined brain regions where atrophy might be associated with specific impairments in the patients. Results showed that while both groups showed similar ratings of envy, HD patients reported lower Schadenfreude. The latter pattern was related to atrophy in regions of the reward system (ventral striatum) and the mentalizing network (precuneus and superior parietal lobule). Our results shed light on the intertwining of reward and socioemotional processes in Schadenfreude, while offering novel evidence about their neural correlates. In addition, our results open the door to future studies investigating social emotion processing in other clinical populations characterized by striatal or mentalizing network impairments (e.g., Parkinson’s disease, schizophrenia, autism spectrum disorders).

Keywords: envy, Gray matter atrophy, Huntigton's disease, Schadenfreude, social emotions

Procedia PDF Downloads 317
1248 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 340
1247 Communicating Corporate Social Responsibility in Kuwait: Assessment of Environmental Responsibility Efforts and Targeted Stakeholders

Authors: Manaf Bashir

Abstract:

Corporate social responsibility (CSR) has become a tool for corporations to meet the expectations of different stakeholders about economic, social and environmental issues. It has become indispensable for an organization’s success, positive image and reputation. Equally important is how corporations communicate and report their CSR. Employing the stakeholder theory, the purpose of this research is to analyse CSR content of leading Kuwaiti corporations. No research analysis of CSR reporting has been conducted in Kuwait and this study is an attempt to redress in part this empirical deficit in the country and the region. It attempts to identify the issues and stakeholders of the CSR and if corporations are following CSR reporting standards. By analysing websites, annual and CSR reports of the top 100 Kuwaiti corporations, this study found low mentions of the CSR issues and even lower mentions of CSR stakeholders. Environmental issues were among the least mentioned despite an increasing global concern toward the environment. ‘Society’ was mentioned the most as a stakeholder and ‘The Environment’ was among the least mentioned. Cross-tabulations found few significant relationships between type of industry and the CSR issues and stakeholders. Independent sample t-tests found no significant difference between the issues and stakeholders that are mentioned on the websites and the reports. Only two companies from the sample followed reporting standards and both followed the Global Reporting Initiative. Successful corporations would be keen to identify the issues that meet the expectations of different stakeholders and address them through their corporate communication. Kuwaiti corporations did not show this keenness. As the stakeholder theory suggests, extending the spectrum of stakeholders beyond investors can open mutual dialogue and understanding between corporations and various stakeholders. However, Kuwaiti corporations focus on few CSR issues and even fewer CSR stakeholders. Kuwaiti corporations need to pay more attention to CSR and particularly toward environmental issues. They should adopt a strategic approach and allocate specialized personnel such as marketers and public relations practitioners to manage it. The government and non-profit organizations should encourage the private sector in Kuwait to do more CSR and meet the needs and expectations of different stakeholders and not only shareholders. This is in addition to reporting the CSR information professionally because of its benefits to corporate image, reputation, and transparency.

Keywords: corporate social responsibility, environmental responsibility, Kuwait, stakeholder theory

Procedia PDF Downloads 130
1246 Generation Z: Insights into Travel Behavior

Authors: Joao Ferreira Do Rosario, Nuno Gustavo, Ana Machado, Lurdes Calisto, Luisa Carvalho, Georgette Andraz

Abstract:

Currently, tourism small and medium enterprises (TSMEs) face serious economic and financial problems, making recovery efforts difficult. How the pandemic will affect tourists' behavior is still to be known. Will tourists be even more cautious regarding their choices or, on the contrary, will they be more adventurers with an enormous desire to travel in search of the lost freedom? Tourists may become even more demanding when traveling, more austere, or less concerned and eager to socialize. Adjusting to this "new tourist" is an added challenge for tourism service providers. Generation Z made up of individuals born in 1995 and following years, currently tends to assume a particular role and meaning in the present and future economic and social context, considering that we are facing the youngest workforce as well as tomorrow's consumers. This generation is distinguished from others as it is the first generation to combine a high level of education and technological knowledge and to fully experience the digital world. These young people are framed by a new value system that can explain new behaviours and consumption, namely, in the context of tourism. All these considerations point to the importance of investigating this target group as it is essential to understand how these individuals perceive, understand, act, and can be involved in a new environment built around a society regulated by new priorities and challenges of a sustainable nature. This leads not only to a focus on short-term market choices but mainly to predict future choices from a longer-term perspective. Together with the social background of a person, values are considered a stable antecedent of behavior and might therefore predict not just immediate, but also future choices. Furthermore, the meaning attributed to travel has a general connotation and goes beyond a specific travel choice or experience. In other words, values and travel's meaning form a chain of influences on the present and future travel behavior. This study explores the social background and values of Generation Z travelers vs the meaning these tourists give to travel. The aim is to discover in their present behavior cues to predict travel choices so that the future of tourism can be secured. This study also provides data for predicting the tourism choices of youngsters in the more immediate future. Methodologically, a quantitative approach was adopted based on the collection of data through a survey. Since academic research on Generation Z of tourists is still scarce, it is expected to contribute to deepening scientific knowledge in this area. Furthermore, it is expected that this research will support tourism professionals in defining differentiated marketing strategies and adapted to the requirements of this target, in a new time.

Keywords: Generation Z, travel behavior, travel meaning, Generation Z Values

Procedia PDF Downloads 205