Search results for: true/false self
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1110

Search results for: true/false self

570 Precious Gold and Diamond Accessories Versus False Fashion Diamond and Stained Accessories

Authors: Felib Ayman Shawky Salem

Abstract:

This paper includes fast fashion verses sustainable fashion or slow fashion Indian based consumers. The expression ‘Fast fashion’ is generally referred to low-cost clothing collections that considered first hand copy of luxury brands, sometime interchangeably used with ‘mass fashion’. Whereas slow fashion or limited fashion which are consider to be more organic or eco-friendly. "Sustainable fashion is ethical fashion and here the consumer is just not design conscious but also social-environment conscious". Paper will deal with desire of young Indian consumer towards such luxury brands present in India, and their understanding of sustainable fashion, how to maintain the equilibrium between never newer fashion, style, and fashion sustainability. The green fashion market is growing rapidly as eco-friendly consumers are willing to expand their organic lifestyle to include clothing. With an increasing share of fashion consumers globally, Indian consumers are observed to consider the social and environmental ethics while making purchasing decisions. While some research clearly identifies the efforts of responsible consumers towards green fashion, some argue that fashion-orientated consumers who are sensitive towards environment do not actively participate towards supporting green fashion. This study aims to analyze the current perception of green fashion among Indian consumers. A small-scale exploratory study is conducted where consumers’ perception of green fashion is examined followed by an analysis of translation of this perception into purchase decision making. This research paper gives insight into consumer awareness on green fashion and provides scope towards the expansion of ethical fashion consumption

Keywords: diamond, inclusions, temperature gradient, HPHT synthetic fibers, polyamide fibers, fiber volume, compressive strength. gold nano clusters, copper ions, wool keratin, fluorescence

Procedia PDF Downloads 6
569 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 349
568 Studies of Rule Induction by STRIM from the Decision Table with Contaminated Attribute Values from Missing Data and Noise — in the Case of Critical Dataset Size —

Authors: Tetsuro Saeki, Yuichi Kato, Shoutarou Mizuno

Abstract:

STRIM (Statistical Test Rule Induction Method) has been proposed as a method to effectively induct if-then rules from the decision table which is considered as a sample set obtained from the population of interest. Its usefulness has been confirmed by simulation experiments specifying rules in advance, and by comparison with conventional methods. However, scope for future development remains before STRIM can be applied to the analysis of real-world data sets. The first requirement is to determine the size of the dataset needed for inducting true rules, since finding statistically significant rules is the core of the method. The second is to examine the capacity of rule induction from datasets with contaminated attribute values created by missing data and noise, since real-world datasets usually contain such contaminated data. This paper examines the first problem theoretically, in connection with the rule length. The second problem is then examined in a simulation experiment, utilizing the critical size of dataset derived from the first step. The experimental results show that STRIM is highly robust in the analysis of datasets with contaminated attribute values, and hence is applicable to realworld data.

Keywords: rule induction, decision table, missing data, noise

Procedia PDF Downloads 370
567 An Unsupervised Domain-Knowledge Discovery Framework for Fake News Detection

Authors: Yulan Wu

Abstract:

With the rapid development of social media, the issue of fake news has gained considerable prominence, drawing the attention of both the public and governments. The widespread dissemination of false information poses a tangible threat across multiple domains of society, including politics, economy, and health. However, much research has concentrated on supervised training models within specific domains, their effectiveness diminishes when applied to identify fake news across multiple domains. To solve this problem, some approaches based on domain labels have been proposed. By segmenting news to their specific area in advance, judges in the corresponding field may be more accurate on fake news. However, these approaches disregard the fact that news records can pertain to multiple domains, resulting in a significant loss of valuable information. In addition, the datasets used for training must all be domain-labeled, which creates unnecessary complexity. To solve these problems, an unsupervised domain knowledge discovery framework for fake news detection is proposed. Firstly, to effectively retain the multidomain knowledge of the text, a low-dimensional vector for each news text to capture domain embeddings is generated. Subsequently, a feature extraction module utilizing the unsupervisedly discovered domain embeddings is used to extract the comprehensive features of news. Finally, a classifier is employed to determine the authenticity of the news. To verify the proposed framework, a test is conducted on the existing widely used datasets, and the experimental results demonstrate that this method is able to improve the detection performance for fake news across multiple domains. Moreover, even in datasets that lack domain labels, this method can still effectively transfer domain knowledge, which can educe the time consumed by tagging without sacrificing the detection accuracy.

Keywords: fake news, deep learning, natural language processing, multiple domains

Procedia PDF Downloads 61
566 Moving on or Deciding to Let Go: The Effects of Emotional and Decisional Forgiveness on Intentional Forgetting

Authors: Saima Noreen, Malcolm D. MacLeod

Abstract:

Different types of forgiveness (emotional and decisional) have been shown to have differential effects on incidental forgetting of information related to a prior transgression. The present study explored the extent to which emotional and decisional forgiveness also influenced intentional forgetting; that is, the extent to which forgetting occurs following an explicit instruction to forget. Using the List-Method Directed Forgetting (LMDF) paradigm, 236 participants were presented with a hypothetical transgression and then assigned to an emotional forgiveness, a decisional forgiveness, or a no-forgiveness manipulation. Participants were then presented with two-word lists each comprising transgression-relevant and transgression-irrelevant words. Following the presentation of the first list, participants were told to either remember or forget the previously learned list of words. Participants in the emotional forgiveness condition were found to remember fewer relevant and more irrelevant transgression-related words, while the opposite was true for both decisional forgiveness and no-forgiveness conditions. Furthermore, when directed to forget words in List 1, participants in the decisional and no-forgiveness conditions were less able to forget relevant transgression-related words in comparison to participants in the emotional forgiveness condition. This study suggests that emotional forgiveness plays a pivotal role in the intentional forgetting of transgression-related information. The potential implications of these findings for coping with unpleasant incidents will be considered.

Keywords: decisional forgiveness, directed forgetting, emotional forgiveness, executive control, forgiveness

Procedia PDF Downloads 215
565 Application of the Global Optimization Techniques to the Optical Thin Film Design

Authors: D. Li

Abstract:

Optical thin films are used in a wide variety of optical components and there are many software tools programmed for advancing multilayer thin film design. The available software packages for designing the thin film structure may not provide optimum designs. Normally, almost all current software programs obtain their final designs either from optimizing a starting guess or by technique, which may or may not involve a pseudorandom process, that give different answers every time, depending upon the initial conditions. With the increasing power of personal computers, functional methods in optimization and synthesis of optical multilayer systems have been developed such as DGL Optimization, Simulated Annealing, Genetic Algorithms, Needle Optimization, Inductive Optimization and Flip-Flop Optimization. Among these, DGL Optimization has proved its efficiency in optical thin film designs. The application of the DGL optimization technique to the design of optical coating is presented. A DGL optimization technique is provided, and its main features are discussed. Guidelines on the application of the DGL optimization technique to various types of design problems are given. The innovative global optimization strategies used in a software tool, OnlyFilm, to optimize multilayer thin film designs through different filter designs are outlined. OnlyFilm is a powerful, versatile, and user-friendly thin film software on the market, which combines optimization and synthesis design capabilities with powerful analytical tools for optical thin film designers. It is also the only thin film design software that offers a true global optimization function.

Keywords: optical coatings, optimization, design software, thin film design

Procedia PDF Downloads 290
564 A Case Study to Observe How Students’ Perception of the Possibility of Success Impacts Their Performance in Summative Exams

Authors: Rochelle Elva

Abstract:

Faculty in Higher Education today are faced with the challenge of convincing their students of the importance of learning and mastery of skills. This is because most students often have a single motivation -to get high grades. If it appears that this goal will not be met, they lose their motivation, and their academic efforts wane. This is true even for students in the competitive fields of STEM, including Computer Science majors. As educators, we have to understand our students and leverage what motivates them to achieve our learning outcomes. This paper presents a case study that utilizes cognitive psychology’s Expectancy Value Theory and Motivation Theory to investigate the effect of sustained expectancy for success on students’ learning outcomes. In our case study, we explore how students’ motivation and persistence in their academic efforts are impacted by providing them with an unexpected possible path to success that continues to the end of the semester. The approach was tested in an undergraduate computer science course with n = 56. The results of the study indicate that when presented with the real possibility of success, despite existing low grades, both low and high-scoring students persisted in their efforts to improve their performance. Their final grades were, on average, one place higher on the +/-letter grade scale, with some students scoring as high as three places above their predicted grade.

Keywords: expectancy for success and persistence, motivation and performance, computer science education, motivation and performance in computer science

Procedia PDF Downloads 58
563 Syndecan -1 as Regulator of Ischemic-Reperfusion Damage Limitation in Experiment

Authors: M. E. Kolpakova, A. A. Jakovleva, L. S. Poliakova, H. El Amghari, S. Soliman, D. R. Faizullina, V. V. Sharoyko

Abstract:

Brain neuroplasticity is associated with blood-brain barrier vascular endothelial proteoglycans and post-stroke microglial activation. The study of the mechanisms of reperfusion injury limitation by remote ischemic postconditioning (RC) is of interest due to the effects on functional recovery after cerebral ischemia. The goal of the study is the assessment of the role of syndecan-1 (SDC-1) in restriction of ischemic-reperfusion injury on middle cerebral artery model in rats using RC protocol. Randomized controlled trials were conducted. Ischemia was performed by middle cerebral artery occlusion by Belayev L. (1996) on the Wistar rat-males (n= 87) weighting 250 ± 50 g. under general anesthesia (Zoletil 100 и Xylazine 2%). Syndecan-1 (SDC-1) concentration difference in plasma samples of false operated animals and animals with brain ischemia was 30% (30 min. МСАо: 41.4 * ± 1.3 ng/ml). SDC-1 concentration in animal plasma samples with ischemia + RC protocol was 112% (30 min МСАо+ RC): 67.8**± 5.8 ng/ml). Calculation of infarction volume in the ischemia group revealed brain injury in 31.97 ± 2.5%; the volume of infarction was 13.6 ± 1.3% in 30 min. МCАо + RC group. Swelling of tissue in the group 30 min. МCАо + RC was 16 ± 2.1%; it was 47 ± 3.3%. in 30 min. МCАо group. Correlation analysis showed a high direct correlation relationship between infarct area and muscle strength in the right forelimb (КК=0.72) in the 30 min. МCАо + RC group. Correlation analysis showed very high inverse correlation between infarct area and capillary blood flow in the 30 min. МCАо + RC group (p <0.01; r = -0.98). We believe the SDC-1 molecule in blood plasma may play role of potential messenger of ischemic-reperfusion injury restriction mechanisms. This leads to infarct-limiting effect of remote ischemic postconditioning and early functioning recovery.

Keywords: ischemia, МСАо, remote ischemic postconditioning, syndecan-1

Procedia PDF Downloads 38
562 Malignancy in Venous Thromboembolism

Authors: Naser Shagerdi Esmaeli, Mohsen Hamidpour

Abstract:

Purposes: The activation of coagulation in patients with cancer contributes significantly to morbidity and mortality rates and may play a fundamental role in the host response to growing tumor’s. Patients with cancer are clearly at high risk for the development of venous thromboembolism (VTE), particularly during chemotherapy and surgery. This situation is aggravated by the use of venous access catheters and possibly growth factors. Methods: Data derived from large, randomized, controlled trials have been used to determine the true incidence of this complication of cancer and its treatment. The incidence based on the analyses of these randomized controlled trials varies from 1% for limited stage patients with breast cancer treated with tamoxifen to 60% for patients with any type of cancer who are subjected to orthopedic surgery and do not receive prophylactic therapy. Results: In view of the morbidity and mortality attributable to VTE in cancer, widespread utilization of prophylactic anticoagulation therapy, which has proven safe and effective in a variety of situations, should be considered. While migratory thrombophlebitis is a clear indicator of an underlying neoplasm, the risk of cancer in patients with the more typical form of VTE has been the subject of intense debate over recent years. Conclusion: Some investigators have suggested that the relative risk of being diagnosed with occult cancer within six months of an episode of VTE (particularly recurrent VTE) could be up to 10-fold. However, the cost-effectiveness of aggressive screening for cancer in patients with VTE has not yet been defined adequately.

Keywords: venous thromboembolism, malignancy, cancer, tumor, heparin

Procedia PDF Downloads 78
561 Knowledge, Hierarchy and Decision-Making: Analysis of Documentary Filmmaking Practices in India

Authors: Nivedita Ghosh

Abstract:

In his critique of Lefebvre’s view that ‘technological capacities’ are class-dependent, Francois Hetman argues that technology today is participatory, allowing the entry of individuals from different levels of social stratification. As a result, we are entering into an era of technology operators or ‘clerks’ who become the new decision-makers because of the knowledge they possess of the use of technologies. In response to Hetman’s thesis, this paper argues that knowledge of technology, while indeed providing a momentary space for decision-making, does not necessarily restructure social hierarchies. Through case studies presented from the world of Indian documentary filmmaking, this paper puts forth the view that Hetman’s clerks, despite being technologically advanced, do not break into the filmmaking hierarchical order. This remains true even for a situation where technical knowledge rests most with those in the lowest rungs of the filmmaking ladder. Instead, technological knowledge provides the space for other kinds of relationships to evolve, such as those of ‘trusting the technician’ or ‘admiration for the technician’s work’. Furthermore, what continues to define documentary filmmaking hierarchy is conceptualization capacities of the practitioners, which are influenced by a similarity in socio-cultural backgrounds and film school training accessible primarily to the filmmakers instead of the technicians. Accordingly, the paper concludes with the argument that more than ‘technological-capacities’, it is ‘conceptualization capacities’ which are class-dependent, especially when we study the field of documentary filmmaking.

Keywords: documentary filmmaking, India, technology, knowledge, hierarchy

Procedia PDF Downloads 236
560 Scientific Investigation for an Ancient Egyptian Polychrome Wooden Stele

Authors: Ahmed Abdrabou, Medhat Abdalla

Abstract:

The studied stele dates back to Third Intermediate Period (1075-664) B.C in an ancient Egypt. It is made of wood and covered with painted gesso layers. This study aims to use a combination of multi spectral imaging {visible, infrared (IR), Visible-induced infrared luminescence (VIL), Visible-induced ultraviolet luminescence (UVL) and ultraviolet reflected (UVR)}, along with portable x-ray fluorescence in order to map and identify the pigments as well as to provide a deeper understanding of the painting techniques. Moreover; the authors were significantly interested in the identification of wood species. Multispectral imaging acquired in 3 spectral bands, ultraviolet (360-400 nm), visible (400-780 nm) and infrared (780-1100 nm) using (UV Ultraviolet-induced luminescence (UVL), UV Reflected (UVR), Visible (VIS), Visible-induced infrared luminescence (VIL) and Infrared photography. False color images are made by digitally editing the VIS with IR or UV images using Adobe Photoshop. Optical Microscopy (OM), potable X-ray fluorescence spectroscopy (p-XRF) and Fourier Transform Infrared Spectroscopy (FTIR) were used in this study. Mapping and imaging techniques provided useful information about the spatial distribution of pigments, in particular visible-induced luminescence (VIL) which allowed the spatial distribution of Egyptian blue pigment to be mapped and every region containing Egyptian blue, even down to single crystals in some instances, is clearly visible as a bright white area; however complete characterization of the pigments requires the use of p. XRF spectroscopy. Based on the elemental analysis found by P.XRF, we conclude that the artists used mixtures of the basic mineral pigments to achieve a wider palette of hues. Identification of wood species Microscopic identification indicated that the wood used was Sycamore Fig (Ficus sycomorus L.) which is recorded as being native to Egypt and was used to make wooden artifacts since at least the Fifth Dynasty.

Keywords: polychrome wooden stele, multispectral imaging, IR luminescence, Wood identification, Sycamore Fig, p-XRF

Procedia PDF Downloads 241
559 Transition Metal Carbodiimide vs. Spinel Matrices for Photocatalytic Water Oxidation

Authors: Karla Lienau, Rafael Müller, René Moré, Debora Ressnig, Dan Cook, Richard Walton, Greta R. Patzke

Abstract:

The increasing demand for renewable energy sources and storable fuels underscores the high potential of artificial photosynthesis. The four electron transfer process of water oxidation remains the bottleneck of water splitting, so that special emphasis is placed on the development of economic, stable and efficient water oxidation catalysts (WOCs). Our investigations introduced cobalt carbodiimide CoNCN and its transition metal analogues as WOC types, and further studies are focused on the interaction of different transition metals in the convenient all-nitrogen/carbon matrix. This provides further insights into the nature of the ‘true catalyst’ for cobalt centers in this non-oxide environment. Water oxidation activity is evaluated with complementary methods, namely photocatalytically using a Ru-dye sensitized standard setup as well as electrocatalytically, via immobilization of the WOCs on glassy carbon electrodes. To further explore the tuning potential of transition metal combinations, complementary investigations were carried out in oxidic spinel WOC matrices with more versatile host options than the carbodiimide framework. The influence of the preparative history on the WOC performance was evaluated with different synthetic methods (e.g. hydrothermally or microwave assisted). Moreover, the growth mechanism of nanoscale Co3O4-spinel as a benchmark WOC was investigated with in-situ PXRD techniques.

Keywords: carbodiimide, photocatalysis, spinels, water oxidation

Procedia PDF Downloads 267
558 Challenging in Public Acceptability of Islamic Banking

Authors: Muhammad Ali Khan

Abstract:

Although most Muslims are aware that Riba is a great sin in Islamic Shariah, they still do not find themselves inclined toward Islamic banking for their financial needs/activities/requirements. The main purpose of this research work is to analyse the general trend of people's views and miss conceptions among them regarding Islamic Banking and therefore suggest promoting Islamic banking. Scholars believe that Islamic finance is more stable than conventional banking because of the nature of its banking practices, which are based on real assets or partnerships. This is why Islamic banking is growing fastly worldwide, particularly in the wake of global financial crisis. Even though the scope of Islamic banking is expanding on a daily basis yet, it is not gaining the popularity it deserves. Islam declares war against Allah and his last messenger Hazrat Muhammad (PBUM) as it is a great sin and strictly forbids all interest-based transactions. Holy Quran revealed, O you who believe, do not eat up the amounts acquired through Riba (interest), doubled and multiplied. Fear Allah, so that you may be successful. Therefore a, true Muslim who believe in Judgement day always make all efforts in their life to avoid gambling and other speculative activities like Riba for themselves and their loved ones. If a Muslim does not fight against Riba to protect himself and his family, then his faith is meaningless. Allah issues warnings at numerous places in the holy Quran regarding Riba and its sin. Thus, Islamic banking is an alternative banking system where banking transactions are based on Islamic principles. The major component of Islamic Banking is Profit and loss sharing (PLS), as well as ensuring economic justice and equity.

Keywords: Islamic banking, Riba, interest, financial crises

Procedia PDF Downloads 45
557 Can Exams Be Shortened? Using a New Empirical Approach to Test in Finance Courses

Authors: Eric S. Lee, Connie Bygrave, Jordan Mahar, Naina Garg, Suzanne Cottreau

Abstract:

Marking exams is universally detested by lecturers. Final exams in many higher education courses often last 3.0 hrs. Do exams really need to be so long? Can we justifiably reduce the number of questions on them? Surprisingly few have researched these questions, arguably because of the complexity and difficulty of using traditional methods. To answer these questions empirically, we used a new approach based on three key elements: Use of an unusual variation of a true experimental design, equivalence hypothesis testing, and an expanded set of six psychometric criteria to be met by any shortened exam if it is to replace a current 3.0-hr exam (reliability, validity, justifiability, number of exam questions, correspondence, and equivalence). We compared student performance on each official 3.0-hr exam with that on five shortened exams having proportionately fewer questions (2.5, 2.0, 1.5, 1.0, and 0.5 hours) in a series of four experiments conducted in two classes in each of two finance courses (224 students in total). We found strong evidence that, in these courses, shortening of final exams to 2.0 hrs was warranted on all six psychometric criteria. Shortening these exams by one hour should result in a substantial one-third reduction in lecturer time and effort spent marking, lower student stress, and more time for students to prepare for other exams. Our approach provides a relatively simple, easy-to-use methodology that lecturers can use to examine the effect of shortening their own exams.

Keywords: exam length, psychometric criteria, synthetic experimental designs, test length

Procedia PDF Downloads 256
556 True Single SKU Script: Applying the Automated Test to Set Software Properties in a Global Software Development Environment

Authors: Antonio Brigido, Maria Meireles, Francisco Barros, Gaspar Mota, Fernanda Terra, Lidia Melo, Marcelo Reis, Camilo Souza

Abstract:

As the globalization of the software process advances, companies are increasingly committed to improving software development technologies across multiple locations. On the other hand, working with teams distributed in different locations also raises new challenges. In this sense, automated processes can help to improve the quality of process execution. Therefore, this work presents the development of a tool called TSS Script that automates the sample preparation process for carrier requirements validation tests. The objective of the work is to obtain significant gains in execution time and reducing errors in scenario preparation. To estimate the gains over time, the executions performed in an automated and manual way were timed. In addition, a questionnaire-based survey was developed to discover new requirements and improvements to include in this automated support. The results show an average gain of 46.67% of the total hours worked, referring to sample preparation. The use of the tool avoids human errors, and for this reason, it adds greater quality and speed to the process. Another relevant factor is the fact that the tester can perform other activities in parallel with sample preparation.

Keywords: Android, GSD, automated testing tool, mobile products

Procedia PDF Downloads 285
555 Civil Engineering Tool Kit for Making Perfect Ellipses of Desired Dimensions on Very Large Surfaces

Authors: Karam Chand Gupta

Abstract:

If an ellipse is to be drawn of given dimensions on a large ground, there is no formula, method or set of calculations & procedure available which will help in drawing an ellipse of given length and width on ground. Whenever a field engineer is to start the work of an ellipse-shaped structure like elliptical conference hall, screening chamber and pump chamber in disposal work etc., it is cumbersome for him to give demarcation of the structure on the big surface of the ground. No procedure is available, even in Google. A set of formulas with calculations has been made which helps the field engineer to draw an true and perfect ellipse of given length and width on the large ground very easily so as to start the construction work of elliptical structure. Based on these formulas a civil Engineering tool kit has been made with the help of which we can make perfect ellipse of desired dimensions on very large surface. The Patent of the tool kit has been filed in Intellectual Property India with Patent Filing Number: 201611026153 and Patent Application Filing Date: 30.07.2016. An App named ‘KC’s Mesh Formula’ has also been made to ease the calculation work. This can be downloaded from Play Store. After adopting these formulas and tool kit, a field engineer will not face difficulty in drawing ellipse on the ground to start the work.

Keywords: ellipse, elliptical structure, foci, string, wooden peg

Procedia PDF Downloads 248
554 Measuring the Height of a Person in Closed Circuit Television Video Footage Using 3D Human Body Model

Authors: Dojoon Jung, Kiwoong Moon, Joong Lee

Abstract:

The height of criminals is one of the important clues that can determine the scope of the suspect's search or exclude the suspect from the search target. Although measuring the height of criminals by video alone is limited by various reasons, the 3D data of the scene and the Closed Circuit Television (CCTV) footage are matched, the height of the criminal can be measured. However, it is still difficult to measure the height of CCTV footage in the non-contact type measurement method because of variables such as position, posture, and head shape of criminals. In this paper, we propose a method of matching the CCTV footage with the 3D data on the crime scene and measuring the height of the person using the 3D human body model in the matched data. In the proposed method, the height is measured by using 3D human model in various scenes of the person in the CCTV footage, and the measurement value of the target person is corrected by the measurement error of the replay CCTV footage of the reference person. We tested for 20 people's walking CCTV footage captured from an indoor and an outdoor and corrected the measurement values with 5 reference persons. Experimental results show that the measurement error (true value-measured value) average is 0.45 cm, and this method is effective for the measurement of the person's height in CCTV footage.

Keywords: human height, CCTV footage, 2D/3D matching, 3D human body model

Procedia PDF Downloads 230
553 Tool for Maxillary Sinus Quantification in Computed Tomography Exams

Authors: Guilherme Giacomini, Ana Luiza Menegatti Pavan, Allan Felipe Fattori Alves, Marcela de Oliveira, Fernando Antonio Bacchim Neto, José Ricardo de Arruda Miranda, Seizo Yamashita, Diana Rodrigues de Pina

Abstract:

The maxillary sinus (MS), part of the paranasal sinus complex, is one of the most enigmatic structures in modern humans. The literature has suggested that MSs function as olfaction accessories, to heat or humidify inspired air, for thermoregulation, to impart resonance to the voice and others. Thus, the real function of the MS is still uncertain. Furthermore, the MS anatomy is complex and varies from person to person. Many diseases may affect the development process of sinuses. The incidence of rhinosinusitis and other pathoses in the MS is comparatively high, so, volume analysis has clinical value. Providing volume values for MS could be helpful in evaluating the presence of any abnormality and could be used for treatment planning and evaluation of the outcome. The computed tomography (CT) has allowed a more exact assessment of this structure, which enables a quantitative analysis. However, this is not always possible in the clinical routine, and if possible, it involves much effort and/or time. Therefore, it is necessary to have a convenient, robust, and practical tool correlated with the MS volume, allowing clinical applicability. Nowadays, the available methods for MS segmentation are manual or semi-automatic. Additionally, manual methods present inter and intraindividual variability. Thus, the aim of this study was to develop an automatic tool to quantity the MS volume in CT scans of paranasal sinuses. This study was developed with ethical approval from the authors’ institutions and national review panels. The research involved 30 retrospective exams of University Hospital, Botucatu Medical School, São Paulo State University, Brazil. The tool for automatic MS quantification, developed in Matlab®, uses a hybrid method, combining different image processing techniques. For MS detection, the algorithm uses a Support Vector Machine (SVM), by features such as pixel value, spatial distribution, shape and others. The detected pixels are used as seed point for a region growing (RG) segmentation. Then, morphological operators are applied to reduce false-positive pixels, improving the segmentation accuracy. These steps are applied in all slices of CT exam, obtaining the MS volume. To evaluate the accuracy of the developed tool, the automatic method was compared with manual segmentation realized by an experienced radiologist. For comparison, we used Bland-Altman statistics, linear regression, and Jaccard similarity coefficient. From the statistical analyses for the comparison between both methods, the linear regression showed a strong association and low dispersion between variables. The Bland–Altman analyses showed no significant differences between the analyzed methods. The Jaccard similarity coefficient was > 0.90 in all exams. In conclusion, the developed tool to quantify MS volume proved to be robust, fast, and efficient, when compared with manual segmentation. Furthermore, it avoids the intra and inter-observer variations caused by manual and semi-automatic methods. As future work, the tool will be applied in clinical practice. Thus, it may be useful in the diagnosis and treatment determination of MS diseases. Providing volume values for MS could be helpful in evaluating the presence of any abnormality and could be used for treatment planning and evaluation of the outcome. The computed tomography (CT) has allowed a more exact assessment of this structure which enables a quantitative analysis. However, this is not always possible in the clinical routine, and if possible, it involves much effort and/or time. Therefore, it is necessary to have a convenient, robust and practical tool correlated with the MS volume, allowing clinical applicability. Nowadays, the available methods for MS segmentation are manual or semi-automatic. Additionally, manual methods present inter and intraindividual variability. Thus, the aim of this study was to develop an automatic tool to quantity the MS volume in CT scans of paranasal sinuses. This study was developed with ethical approval from the authors’ institutions and national review panels. The research involved 30 retrospective exams of University Hospital, Botucatu Medical School, São Paulo State University, Brazil. The tool for automatic MS quantification, developed in Matlab®, uses a hybrid method, combining different image processing techniques. For MS detection, the algorithm uses a Support Vector Machine (SVM), by features such as pixel value, spatial distribution, shape and others. The detected pixels are used as seed point for a region growing (RG) segmentation. Then, morphological operators are applied to reduce false-positive pixels, improving the segmentation accuracy. These steps are applied in all slices of CT exam, obtaining the MS volume. To evaluate the accuracy of the developed tool, the automatic method was compared with manual segmentation realized by an experienced radiologist. For comparison, we used Bland-Altman statistics, linear regression and Jaccard similarity coefficient. From the statistical analyses for the comparison between both methods, the linear regression showed a strong association and low dispersion between variables. The Bland–Altman analyses showed no significant differences between the analyzed methods. The Jaccard similarity coefficient was > 0.90 in all exams. In conclusion, the developed tool to automatically quantify MS volume proved to be robust, fast and efficient, when compared with manual segmentation. Furthermore, it avoids the intra and inter-observer variations caused by manual and semi-automatic methods. As future work, the tool will be applied in clinical practice. Thus, it may be useful in the diagnosis and treatment determination of MS diseases.

Keywords: maxillary sinus, support vector machine, region growing, volume quantification

Procedia PDF Downloads 489
552 The Importance of Zakat in Struggle against Circle of Poverty and Income Redistribution

Authors: Hasan Bulent Kantarci

Abstract:

This paper examine how Zakat provide a fair income redistribution and struggle with poverty. To provide a fair income redistribution and struggle with poverty take place among the fundamental tasks of all countries. Each country seeks a solution for this problem according to their political, economical and administrative styles through applying various economic and financial policies. The same situation gets handled via zakat association in the Islam. Nowadays, we observe different versions of zakat in developed countries. The applications such as negative income tax denote merely a difference from the zakat being applied almost the same way under changed names. But the minimum values to donate the zakat (e.g. 85 gr. gold and 40 animals) get altered and various amounts are put into practice. It might be named as negative income tax instead of zakat, nonetheless, these applications are based on the Holy Koran and the hadith released 1400 years ago. Besides, considering the savage and slavery in the world at those times, we might easily recognize the true value of the zakat applied the first time then in Islamic system. Through zakat is enabled an income transfer by the government so that the poor could reach the minimum level of life standard. To whom the zakat would be donated was not left to people’s heart and encouraged to determine according to objective criteria. Since the zakat is obligatory, the transfer do not get forward by hand but via the government and get distributed, which requires a vast government organization. Through applying the zakat as it must be would achieve to reduce the poverty mostly and ensuring the fair income redistribution.

Keywords: Islamic finance, zakat, income redistribution, circle of poverty, negatif income tax

Procedia PDF Downloads 326
551 Culture and Mental Health in Nigeria: A Qualitative Study of Berom, Hausa, Yoruba and Igbo Cultural Beliefs

Authors: Dung Jidong, Rachel Tribe, Poul Rohlerder, Aneta Tunariu

Abstract:

Cultural understandings of mental health problems are frequently overshadowed by the western conceptualizations. Research on culture and mental health in the Nigerian context seems to be lacking. This study examined the linguistic understandings and cultural beliefs that have implications for mental health among the Berom, Hausa, Yoruba and Igbo people of Nigeria. A purposive sample of 53 participants underwent semi-structured interviews that lasted approximately 55 minutes each. Of the N=53 participants, n=26 were psychology-aligned practitioners and n=27 ‘laypersons’. Participants were recruited from four states in Nigeria, Plateau, Kaduna, Ekiti, and Enugu. All participants were self-identified as members of their ethnic groups who speak and understand their native-languages, cultural beliefs, and also are domiciled within their ethnic communities. Thematic analysis using socio-constructionism from a critical-realist position was employed to explore the participants’ beliefs about mental health, and the clash between western trained practitioners’ views and the cultural beliefs of the ‘laypersons’. Data analysis found three main themes that re-emerged across the four ethnic samples: (i) beliefs about mental health problems as a spiritual curse (ii) traditional and religious healing are used more often than western mental health care (iii) low levels of mental health awareness. In addition, the Nigerian traditional and religious healing are also revealed to be helpful as the practice gives prominence to the native-languages, religious and cultural values. However, participants described the role of ‘false’ traditional or religious healers in communities as being potentially harmful. Finally, due to the current lack of knowledge about mental health problems, awareness creation and re-orientation may be beneficial for both rural and urban Nigerian communities.

Keywords: beliefs cultures, health mental, languages religions, values

Procedia PDF Downloads 265
550 A Case Study of Misinterpretation of Results in Forensic DNA Cases Due to Expression of Y- Chromosome in Females

Authors: Garima Chaudhary

Abstract:

The gender of an individual in forensic DNA analysis is normally accessed by using the STR multiplexes with the incorporated gender based marker amelogenin or in other words by presence or absence of Y-Chromosome, but it may not be true in all the cases. We hereby report an interesting case of a phenotypic female carrying a male karyotype (46XY). In the alleged murder case, the deceased female with XY genotype was noticed. The expression of 18 Y-linked genes was studied to measure the extent of expression. Expression at 4 loci was observed that might have caused the misinterpretation in forensic casework. This clinical situation of the deceased in this case was diagnosed as testicular feminization syndrome, which characterize a female phenotype with a male karyotype (46, XY). Most of these cases have SRY (testis determining factor). The genetic explanation of this phenomenon is not very clear. Here, we are discussing the impact of such situations of genetic discrepancy in forensic interpretation of results. In the presented murder case of a phenotypic female, sexual assault was also suspected. For confirmation vaginal swabs and micro slides were also sent to us for DNA examination. After DNA analysis using STR markers, Y-chromosome was detected in the samples which supporting the suspicion of sexual assault before murder. When the reference blood sample of the deceased was analyzed, it was found to be case of testicular feminization syndrome. Interesting inferences were made from the results obtained.

Keywords: DNA profiling, forensic case study, Y chromosome, females

Procedia PDF Downloads 204
549 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 70
548 Migration and Provision of Support to Left-Behind Parents in Rural Cambodia

Authors: Benjamas Penboon, Zachary Zimmer, Aree Jampaklay

Abstract:

Cambodia is a country where labor migration has been consistently high. Coupled with advancing labor opportunities in urban areas, a function partly of globalization, this is resulting in massive migration out of rural areas. This is particularly true in Cambodia where there are high migration and a very large proportion of adult children living some distant from their parents. This paper explores characteristics associated with migrant providing support to parents in rural Cambodia. With reference to perspectives of family altruism and solidarity, this analysis particularly focusses on how a series of variables representing family integration and residential location associates with intergenerational monetary and instrumental support from migrants. The study hypothesizes that migrants are more likely to provide support when parents are in need, and there are no alternative means of support. Data come from The Rural Household Survey (N=3,713), part of the 2011 Cambodian Rural Urban Migration Project (CRUMP). Multilevel multinomial models indicate international migrants are likely to give money, while internal migrants are likely to provide both money and instrumental support, especially when migrants have no sibling and their parent in poor health status. In addition, employed migrants are two times providing monetary compared to those unemployed. Findings elucidate the decision to which and why support occurs more often when no other source of support exists and also depends on the ability to provide of migrants themselves.

Keywords: migration, left-behind parent, intergenerational relations, support, rural, Cambodia

Procedia PDF Downloads 146
547 Perfect Prey: Coercive Control and Subjugation, A Foundation for Dismissing the Truth

Authors: Christine Marie Cocchiola

Abstract:

This study assesses the relationship between coercive control and subjugation. Coercive control is the foundation of most domestic violence and a serious public health problem, having significant legal and social justice ramifications. Beyond the physical, it oftentimes is preceded by or motivated by a need for control. Subjugation, as a personality trait and a maladaptive schema, leads individuals to minimize their own needs or wants and, thereby, often to a loss of autonomy, a dismissal of what one might know to be true. This includes a dismissal of the trademarks of an abusive relationship. Subjugation may contribute to a person engaging in or remaining in a coercively controlling relationship. One hundred fifty-four female survivors of domestic violence participated in this study, assessing their own level of subjugation. Participants were limited to individuals who experienced non-physical abuse in their relationships. Subjugation was attributed as a “concern” or greater in 137 of the 154 participants. 11 participants were interviewed to determine their personal experiences in this abusive relationship. Common themes emerged from interviews, including that the participants worked diligently to fix these abusive relationships by regulating their own behaviors and attempting to please the offender. The results indicate a continued need for advocacy and support of this vulnerable population. Further education is indicated for mental health professionals and for individuals in or having left an abusive relationship on how to identify signs of subjugation, thereby empowering individuals to avoid future experiences of abuse.

Keywords: coercive control, intimate partner violence, subjugation, schemas, gender oppression, autonomy, gaslighting

Procedia PDF Downloads 67
546 Obioma's 'The Fishermen' and the Redefinition of African Postcolonial Narrative Tragedy

Authors: Ezechi Onyerionwu

Abstract:

If there is a modern world literary culture that has so tremendously patronized the tragic mode, it has to be that of Africa, and this has been largely true to the extent that the African socio-historical process has been given strong projection by its literature and other art forms. From the three-century-long transatlantic slave trade which brutally translocated millions of Africans to the ‘outermost parts of the earth’, to the vicious partitioning of Africa among European powers and the subsequent imposition of colonial authority on a pulverized people, Africa has really been at the receiving end of the big negatives of global transactions. The African tale has largely been one long tragic narrative. However, the postcolonial African tragic saga has presented an interesting variety of forms and approaches, which have seen to the production of some of the most thought-provoking and acclaimed African novels of the late 20th and early 21st century. Some of the defining characteristics of the African tragic prose has been: the exploration of the many neocolonial implications of the African contemporary existence; the significance of the robust interplay between the essentially foreign, and the originally indigenous elements of the modern African society; and the implosive aftermaths of the individual modern African’s attempt to rationalize his position at the centre of a very complex society. Obioma’s incredible novel, The Fishermen, is in many ways, a classic of the African postcolonial narrative tragedy. The reasons for this bold categorization would occupy the present paper.

Keywords: African narrative tragedy, neocolonialism, postcolonial literature, twenty first century African literature

Procedia PDF Downloads 232
545 The Effect of Antibiotic Use on Blood Cultures: Implications for Future Policy

Authors: Avirup Chowdhury, Angus K. McFadyen, Linsey Batchelor

Abstract:

Blood cultures (BCs) are an important aspect of management of the septic patient, identifying the underlying pathogen and its antibiotic sensitivities. However, while the current literature outlines indications for initial BCs to be taken, there is little guidance for repeat sampling in the following 5-day period and little information on how antibiotic use can affect the usefulness of this investigation. A retrospective cohort study was conducted using inpatients who had undergone 2 or more BCs within 5 days between April 2016 and April 2017 at a 400-bed hospital in the west of Scotland and received antibiotic therapy between the first and second BCs. The data for BC sampling was collected from the electronic microbiology database, and cross-referenced with data from the hospital electronic prescribing system. Overall, 283 BCs were included in the study, taken from 92 patients (mean 3.08 cultures per patient, range 2-10). All 92 patients had initial BCs, of which 83 were positive (90%). 65 had a further sample within 24 hours of commencement of antibiotics, with 35 positive (54%). 23 had samples within 24-48 hours, with 4 (17%) positive; 12 patients had sampling at 48-72 hours, 12 at 72-96 hours, and 10 at 96-120 hours, with none positive. McNemar’s Exact Test was used to calculate statistical significance for patients who received blood cultures in multiple time blocks (Initial, < 24h, 24-120h, > 120h). For initial vs. < 24h-post BCs (53 patients tested), the proportion of positives fell from 46/53 to 29/53 (one-tailed P=0.002, OR 3.43, 95% CI 1.48-7.96). For initial vs 24-120h (n=42), the proportions were 38/42 and 4/42 respectively (P < 0.001, OR 35.0, 95% CI 4.79-255.48). For initial vs > 120h (n=36), these were 33/36 and 2/36 (P < 0.001,OR ∞). These were also calculated for a positive in initial or < 24h vs. 24-120h (n=42), with proportions of 41/42 and 4/42 (P < 0.001, OR 38.0, 95% CI 5.22-276.78); and for initial or < 24h vs > 120h (n=36), with proportions of 35/36 and 2/36 respectively (P < 0.001, OR ∞). This data appears to show that taking an initial BC followed by a BC within 24 hours of antibiotic commencement would maximise blood culture yield while minimising the risk of false negative results. This could potentially remove the need for as many as 46% of BC samples without adversely affecting patient care. BC yield decreases sharply after 48 hours of antibiotic use, and may not provide any clinically useful information after this time. Further multi-centre studies would validate these findings, and provide a foundation for future health policy generation.

Keywords: antibiotics, blood culture, efficacy, inpatient

Procedia PDF Downloads 154
544 Short-Term Effects of an Open Monitoring Meditation on Cognitive Control and Information Processing

Authors: Sarah Ullrich, Juliane Rolle, Christian Beste, Nicole Wolff

Abstract:

Inhibition and cognitive flexibility are essential parts of executive functions in our daily lives, as they enable the avoidance of unwanted responses or selectively switch between mental processes to generate appropriate behavior. There is growing interest in improving inhibition and response selection through brief mindfulness-based meditations. Arguably, open-monitoring meditation (OMM) improves inhibitory and flexibility performance by optimizing cognitive control and information processing. Yet, the underlying neurophysiological processes have been poorly studied. Using the Simon-Go/Nogo paradigm, the present work examined the effect of a single 15-minute smartphone app-based OMM on inhibitory performance and response selection in meditation novices. We used both behavioral and neurophysiological measures (event-related potentials, ERPs) to investigate which subprocesses of response selection and inhibition are altered after OMM. The study was conducted in a randomized crossover design with N = 32 healthy adults. We thereby investigated Go and Nogo trials in the paradigm. The results show that as little as 15 minutes of OMM can improve response selection and inhibition at behavioral and neurophysiological levels. More specifically, OMM reduces the rate of false alarms, especially during Nogo trials regardless of congruency. It appears that OMM optimizes conflict processing and response inhibition compared to no meditation, also reflected in the ERP N2 and P3 time windows. The results may be explained by the meta control model, which argues in terms of a specific processing mode with increased flexibility and inclusive decision-making under OMM. Importantly, however, the effects of OMM were only evident when there was the prior experience with the task. It is likely that OMM provides more cognitive resources, as the amplitudes of these EKPs decreased. OMM novices seem to induce finer adjustments during conflict processing after familiarization with the task.

Keywords: EEG, inhibition, meditation, Simon Nogo

Procedia PDF Downloads 184
543 Steps to Create a Wine Tourism Product Based on Storytelling

Authors: Yorgos Darlas

Abstract:

This original research aims at creating a wine tourism experience specially designed for Thessaloniki, based on retsina, a traditional Greek wine produced continuously since 5400 BC. Wine is a staple of the Greek dinner table, and this is particularly true for Thessaloniki, a city with a rich culinary tradition member of the UNESCO Creative Cities Network for gastronomy. Our methodology is based on historical and folklore research in order to shed light on the history and culture around the production and enjoyment of wine. In addition, we use quantitative and qualitative market research with the aim of recording modern habits and trends related to wine enjoyment. The above research has revealed the habits, rules, and rituals of the people of Thessaloniki, demonstrating the close link between the city’s culinary heritage and retsina. Thanks to this close link, the people of the city have a strong emotional bond with retsina, always ready to share a relevant story loaded with memories. Based on the findings of the research, our aim is to create a new wine tourism product for Thessaloniki based on storytelling. This wine tourism experience will provide visitors with the opportunity to discover the city through the personal stories of locals. At the same time, they will be acquainted with the history and the culture of retsina by visiting landmarks associated with its production and consumption and discovering the city’s multifaceted gastronomic heritage through pairings with retsina.

Keywords: retsina, Thessaloniki, wine tourism, marketing, storytelling

Procedia PDF Downloads 54
542 The Construction of the Meaning of Beauty by the Representation of Wardah Halal Beauty

Authors: Indhie Febrianti Herlina, Riri Akadafi, Alna Hanana

Abstract:

This research describes the constructivism of the Halal beauty of Wardah commercials that present hijab women as the advertising models and shows the sign of Halal in each promotion. There are differences of the concept of beauty between wardah and other beauty ads. When today’s ads describe that beautiful women are who have bright skin, sharp nose and long hair, wardah describes that beautiful women are the hijab women and wear Halal beauty product. This research is interesting because it is so rare when the beauty is presented by hijab women. By using the constructivism paradigm and combining it with reception theory, the author wants to reveal whether women are constructed by these commercials. Reception theory is about how public accept the content of a media. The informants are the women who wear hijab, wear Wardah products and join ‘Wardah Goes to Campus’, a roadshow event conducted by Wardah in Universities all around Indonesia. By interviewing the informants, a statement can be inferred that informants A, B, C, and D assumed that beauty is a physical beauty. However, after they have learned about the true meaning of beauty and watched Wardah commercials, those informants understand that beauty is reflected by the women who wear hijab and wear Halal Cosmetics. Meanwhile, the informant E assumes that beauty is relative, inner, and good-looking. The conclusion of this research is that the informants are constructed by the halal beauty described by Wardah commercials. By presenting the models wearing hijab and wear natural-looking cosmetics, Wardah successfully influences the informants to be more confident to look good by wearing hijab.

Keywords: ad, commercial, construction, halal beauty, wardah

Procedia PDF Downloads 246
541 Exaptive Urbanism: Evolutionary Biology and the Regeneration of Mumbai’s Dhobighat

Authors: Piyush Bajpai, Sneha Pandey

Abstract:

Mumbai’s Dhobighat, 150 year old largest open laundry in the world, is the true live-work place and only source of income for some of Mumbai’s highest density ‘urban poor’ residents. The regeneration of Dhobighat, due to its ultra prime location and complex socio-political culture has been a complex issue. This once flourishing urban industrial core has been degrading for the past several decades mainly due to the decline of the open laundry business, the site’s over burdened infrastructure and conflicting socio-political and economic forces. The phenomena of ‘exaptation’ or ‘co-option’ has been observed by evolutionary biologists as a process responsible for producing highly tenacious and resilient offsprings within a species. The reddish egret uses its wings to cast shadow in shallow waters to attract small fish and hunt them. An unrelated feature used opportunistically to produce a very favorable result. How can this idea of co-option be applied to resolve the complex issue of Dhobighat’s regeneration? Our paper proposes a new methodology/approach for the regeneration of Dhobighat through the lens of evolutionary biology. Forces and systems (social, political, economic, cultural and ecological) that seem conflicting or unrelated by nature are opportunistically transformed into symbiotic and complimentary relationships that produce an inclusive, resilient and holistic solution for the regeneration of Dhobighat.

Keywords: urban regeneration, exaptation, resilience, Dhobighat, Mumbai

Procedia PDF Downloads 277