Search results for: unusual happenings
214 Changing the Biopower Hierarchy between Women’s Bodily Knowledge and the Medical Knowledge about the Body: The Case of Female Ejaculation and #Notpee
Authors: Lior B. Navon
Abstract:
The objective of this study is to investigate how technology, such as social media, can influence the biopower hierarchy between the medical knowledge about the body and women’s bodily knowledge through the case study of the hashtag 'notpee'. In January 2015, the hashtag #notpee, relating to a feminine physiological phenomenon called female ejaculation (FE) or squirting (SQ) started circulating on twitter. This hashtag, born as a reaction to a medical study claiming that SQ is essentially involuntary emission of urine during sexual activity, sparked an unusual public discourse about FE, a phenomenon that is usually not discussed or referred to in socio-legitimate public spheres. This unusual backlash got the attention of women’s magazines and blogs, as well as more mainstream large and respected outlets such as The Guardian and CNN. Both the tweets on twitter, as well as the media coverage of them, were mainly aimed at rejecting the research’s findings. While not offering an alternative and choosing to define the phenomenon by negation, women argued that the fluid extracted was not pee based on their personal experiences. Based on a critical discourse analysis of 742 tweets with the hashtag 'notpee' between January 2015 and January 2016, and of 15 articles covering the backlash, this study suggests that the #notpee backlash challenged the power balance between the medical knowledge about the feminine body and the feminine bodily knowledge through two different, yet related, forms of resistance to biopower. The first resistance is to the authority over knowledge production — who has the power to produce 'true' statements when it comes to the body? Is it the women who experience the phenomenon, or is it the medical institution? The second resistance to biopower has to do with what we regard as facts or veracity. A critical discourse analysis reveals that while both the scientific field, as well as the women arguing against its findings, use empirical information, they, nevertheless, rely on two dichotomic databases- while the scientific research relies on samples from the 'dead like body', these woman are relying on their lived subjective senses as a source for fact making. Nevertheless, while #notpee is asking to change the power relations between the feminine subjective bodily knowledge and the seemingly objective masculine medical knowledge about the body, it by no means dismisses it. These women are essentially asking the medical institution to take into consideration the subjective body as well as the objective one while acknowledging and accepting the power of the latter over knowledge production.Keywords: biopower, female ejaculation, new media, bodily knowledge
Procedia PDF Downloads 157213 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 229212 Substitutional Inference in Poetry: Word Choice Substitutions Craft Multiple Meanings by Inference
Authors: J. Marie Hicks
Abstract:
The art of the poetic conjoins meaning and symbolism with imagery and rhythm. Perhaps the reader might read this opening sentence as 'The art of the poetic combines meaning and symbolism with imagery and rhythm,' which holds a similar message, but is not quite the same. The reader understands that these factors are combined in this literary form, but to gain a sense of the conjoining of these factors, the reader is forced to consider that these aspects of poetry are not simply combined, but actually adjoin, abut, skirt, or touch in the poetic form. This alternative word choice is an example of substitutional inference. Poetry is, ostensibly, a literary form where language is used precisely or creatively to evoke specific images or emotions for the reader. Often, the reader can predict a coming rhyme or descriptive word choice in a poem, based on previous rhyming pattern or earlier imagery in the poem. However, there are instances when the poet uses an unexpected word choice to create multiple meanings and connections. In these cases, the reader is presented with an unusual phrase or image, requiring that they think about what that image is meant to suggest, and their mind also suggests the word they expected, creating a second, overlying image or meaning. This is what is meant by the term 'substitutional inference.' This is different than simply using a double entendre, a word or phrase that has two meanings, often one complementary and the other disparaging, or one that is innocuous and the other suggestive. In substitutional inference, the poet utilizes an unanticipated word that is either visually or phonetically similar to the expected word, provoking the reader to work to understand the poetic phrase as written, while unconsciously incorporating the meaning of the line as anticipated. In other words, by virtue of a word substitution, an inference of the logical word choice is imparted to the reader, while they are seeking to rationalize the word that was actually used. There is a substitutional inference of meaning created by the alternate word choice. For example, Louise Bogan, 4th Poet Laureate of the United States, used substitutional inference in the form of homonyms, malapropisms, and other unusual word choices in a number of her poems, lending depth and greater complexity, while actively engaging her readers intellectually with her poetry. Substitutional inference not only adds complexity to the potential interpretations of Bogan’s poetry, as well as the poetry of others, but provided a method for writers to infuse additional meanings into their work, thus expressing more information in a compact format. Additionally, this nuancing enriches the poetic experience for the reader, who can enjoy the poem superficially as written, or on a deeper level exploring gradations of meaning.Keywords: poetic inference, poetic word play, substitutional inference, word substitution
Procedia PDF Downloads 238211 The Effect of Mood and Creativity on Product Creativity: Using LEGO as a Hands-On Activity
Authors: Kaewmart Pongakkasira
Abstract:
This study examines whether construction of LEGO reflects affective states and creativity as the clue to develop effective learning resources for classrooms. For this purpose, participants are instructed to complete a hands-on activity by using LEGO. Prior to the experiment, participants’ affective states and creativity are measured by the Positive and Negative Affect Schedule (PANAS) and the Alternate Uses Task (AUT), respectively. Then, subjects are asked to freely combine LEGO as unusual as possible versus constraint LEGO combination and named the LEGO products. Creativity of the LEGO products is scored for originality and abstractness of titles. It is hypothesized that individuals’ mood and creativity may affect product creativity. If so, there might be correlation among the three parameters.Keywords: affective states, creativity, hands-on activity, LEGO
Procedia PDF Downloads 373210 Teachers' Perceptions of Physical Education and Sports Calendar and Conducted in the Light of the Objective of the Lesson Approach Competencies
Authors: Chelali Mohammed
Abstract:
In the context of the application of the competency-based approach in the system educational Algeria, the price of physical education and sport must privilege the acquisition of learning approaches and especially the approach science, which from problem situations, research and develops him information processing and application of knowledge and know-how in new situations in the words of ‘JOHN DEWEY’ ‘learning by practice’. And to achieve these goals and make teaching more EPS motivating, consistent and concrete, it is appropriate to perform a pedagogical approach freed from the constraints and open to creativity and student-centered in the light of the competency approach adopted in the formal curriculum. This approach is not unusual, but we think it is a highly professional nature requires the competence of the teacher.Keywords: approach competencies, physical, education, teachers
Procedia PDF Downloads 603209 Anomaly Detection Based on System Log Data
Authors: M. Kamel, A. Hoayek, M. Batton-Hubert
Abstract:
With the increase of network virtualization and the disparity of vendors, the continuous monitoring and detection of anomalies cannot rely on static rules. An advanced analytical methodology is needed to discriminate between ordinary events and unusual anomalies. In this paper, we focus on log data (textual data), which is a crucial source of information for network performance. Then, we introduce an algorithm used as a pipeline to help with the pretreatment of such data, group it into patterns, and dynamically label each pattern as an anomaly or not. Such tools will provide users and experts with continuous real-time logs monitoring capability to detect anomalies and failures in the underlying system that can affect performance. An application of real-world data illustrates the algorithm.Keywords: logs, anomaly detection, ML, scoring, NLP
Procedia PDF Downloads 94208 Case Report: Ocular Helminth - In Unusual Site (Lens)
Authors: Chandra Shekhar Majumder, Md. Shamsul Haque, Khondaker Anower Hossain, Md. Rafiqul Islam
Abstract:
Introduction: Ocular helminths are parasites that infect the eye or its adnexa. They can be either motile worms or sessile worms that form cysts. These parasites require two hosts for their life cycle, a definite host (usually a human) and an intermediate host (usually an insect). While there have been reports of ocular helminths infecting various structures of the eye, including the anterior chamber and subconjunctival space, there is no previous record of such a case involving the lens. Research Aim: The aim of this case report is to present a rare case of ocular helminth infection in the lens and to contribute to the understanding of this unusual site of infection. Methodology: This study is a case report, presenting the details and findings of an 80-year-old retired policeman who presented with severe pain, redness, and vision loss in the left eye. The patient had a history of diabetes mellitus and hypertension. The examination revealed the presence of a thread-like helminth in the lens. The patient underwent treatment and follow-up, and the helminth specimen was sent for identification to the department of Parasitology. Case report: An 80-year-old retired policeman attended the OPD, Faridpur Medical College Hospital with the complaints of severe pain, redness and gross dimness of vision of the left eye for 5 days. He had a history of diabetes mellitus and hypertension for 3 years. On examination, L/E visual acuity was PL only, moderate ciliary congestion, KP 2+, cells 2+ and posterior synechia from 5 to 7 O’clock position was found. Lens was opaque. A thread like helminth was found under the anterior of the lens. The worm was moving and changing its position during examination. On examination of R/E, visual acuity was 6/36 unaided, 6/18 with pinhole. There was lental opacity. Slit-lamp and fundus examination were within normal limit. Patient was admitted in Faridpur Medical College Hospital. Diabetes mellitus was controlled with insulin. ICCE with PI was done on the same day of admission under depomedrol coverage. The helminth was recovered from the lens. It was thread like, about 5 to 6 mm in length, 1 mm in width and pinkish in colour. The patient followed up after 7 days, VA was HM, mild ciliary congestion, few KPs and cells were present. Media was hazy due to vitreous opacity. The worm was sent to the department of Parasitology, NIPSOM, Dhaka for identification. Findings: The findings of this case report highlight the presence of a helminth in the lens, which has not been previously reported. The helminth was successfully removed from the lens, but the patient experienced complications such as anterior uveitis and vitreous opacity. The exact mechanism by which the helminth enters the lens remains unclear. Theoretical Importance: This case report contributes to the existing literature on ocular helminth infections by reporting a unique case involving the lens. It highlights the need for further research to understand the pathogenesis and mechanism of entry of helminths in the lens. Data Collection and Analysis Procedures: The data for this case report were collected through clinical examination and medical records of the patient. The findings were described and presented in a descriptive manner. No statistical analysis was conducted. Question Addressed: This case report addresses the question of whether ocular helminth infections can occur in the lens, which has not been previously reported. Conclusion: To the best of our knowledge, this is the first reported case of ocular helminth infection in the lens. The presence of the helminth in the lens raises interesting questions regarding its pathogenesis and entry mechanism. Further study and research are needed to explore these aspects. Ophthalmologists and parasitologists should be aware of the possibility of ocular helminth infections in unusual sites like the lens.Keywords: ocular, helminth, unsual site, lens
Procedia PDF Downloads 66207 An Unusual Case of Extensive, Unilateral, Idiopathic Dental Resorption
Authors: Ceri McIntosh
Abstract:
A 25-year-old male was referred to the Maxillofacial department by his general dental practitioner with a complaint of mobile teeth. Medically he was well though he took mirtazapine for anxiety. He was found to have had previous extractions of the lower right second premolar and first molar, with grade 2 mobility of the upper right first and second molars and lower right lateral incisor. Radiographically there was significant external root resorption of these teeth, which were subsequently extracted. Over the next 18 months, the resorption continued around multiple teeth on the right side, and when the mobile teeth were removed, they showed no remaining root, including loss of coronal dentine, leaving only an enamel shell. No cause has been identified either histologically or in the patient’s blood work. A review of relevant literature will be included in this case report.Keywords: case report, idiopathic resorption, idiopathic root resorption, external resorption
Procedia PDF Downloads 79206 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0
Authors: Harris Niavis, Dimitra Politaki
Abstract:
The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.Keywords: blockchain, data quality, industry4.0, product quality
Procedia PDF Downloads 189205 Night Patrolling Robot for Suspicious Activity Detection
Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe
Abstract:
Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.Keywords: night patrolling, node MCU, server, security
Procedia PDF Downloads 159204 The Unique Electrical and Magnetic Properties of Thorium Di-Iodide Indicate the Arrival of Its Superconducting State
Authors: Dong Zhao
Abstract:
Even though the recent claim of room temperature superconductivity by LK-99 was confirmed an unsuccessful attempt, this work reawakened people’s century striving to get applicable superconductors with Tc of room temperature or higher and under ambient pressure. One of the efforts was focusing on exploring the thorium salts. This is because certain thorium compounds revealed an unusual property of having both high electrical conductivity and diamagnetism or the so-called “coexistence of high electrical conductivity and diamagnetism.” It is well known that this property of the coexistence of high electrical conductivity and diamagnetism is held by superconductors because of the electron pairings. Consequently, the likelihood for these thorium compounds to have superconducting properties becomes great. However, as a surprise, these thorium salts possess this property at room temperature and atmosphere pressure. This gives rise to solid evidence for these thorium compounds to be room-temperature superconductors without a need for external pressure. Among these thorium compound superconductors claimed in that work, thorium di-iodide (ThI₂) is a unique one and has received comprehensive discussion. ThI₂ was synthesized and structurally analyzed by the single crystal diffraction method in the 1960s. Its special property of coexistence of high electrical conductivity and diamagnetism was revealed. Because of this unique property, a special molecular configuration was sketched. Except for an ordinary oxidation of +2 for the thorium cation, the thorium’s oxidation state in ThI₂ is +4. According to the experimental results, ThI₂‘s actual molecular configuration was determined as an unusual one of [Th4+(e-)2](I-)2. This means that the ThI₂ salt’s cation is composed of a [Th4+(e-)2]2+ cation core. In other words, the cation of ThI₂ is constructed by combining an oxidation state +4 of the thorium atom and a pair of electrons or an electron lone pair located on the thorium atom. This combination of the thorium atom and the electron lone pair leads to an oxidation state +2 for the [Th4+(e-)2]2+ cation core. This special construction of the thorium cation is very distinctive, which is believed to be the factor that grants ThI₂ the room temperature superconductivity. Actually, the key for ThI₂ to become a room-temperature superconductor is this characteristic electron lone pair residing on the thorium atom along with the formation of a network constructed by the thorium atoms. This network specializes in a way that allows the electron lone pairs to hop over it and, thus, to generate the supercurrent. This work will discuss, in detail, the special electrical and magnetic properties of ThI₂ as well as its structural features at ambient conditions. The exploration of how the electron pairing in combination with the structurally specialized network works together to bring ThI₂ into a superconducting state. From the experimental results, strong evidence has definitely pointed out that the ThI₂ should be a superconductor, at least at room temperature and under atmosphere pressure.Keywords: co-existence of high electrical conductivity and diamagnetism, electron lone pair, room temperature superconductor, special molecular configuration of thorium di-iodide ThI₂
Procedia PDF Downloads 59203 Acute Myocardial Infarction Associated with Ingestion of Herbal Mixtures Containing Acetylcholinesterase Inhibitors: A Case Study
Authors: M. Hakami, A. Jammaly, I. Attafi, M. Oraiby, M. Jeraiby
Abstract:
We reviewed an unusual case of a 65-year-old male taking an herbal mixture containing compounds with anticholinesterase activity for a long period of time, presented with acute my myocardial infarction and multiple organ dysfunction syndrome followed by death. Clinically, there are findings correlated with anticholinesterase activity, such as bilateral miosis, diaphoresis, vomiting and fasciculation without a history of any toxic ingestion or exposure. Gas chromatography–mass spectrometry screening studies identified the presence of thymol, anethole in the herbal extract and butylated hydroxytoluene in the blood sample. Hence, with this case report, we intend to highlight the necessity of evaluating the long-term use of the herbal mixture.Keywords: cholinesterase inhibitors, thymole, anethole, butylatedhydroxytoluene, cardiac toxicity, myocardial infarction
Procedia PDF Downloads 279202 Improving English by Reading Local Literature: The Case for Thai Primary Children
Authors: Wipada Prasansaph
Abstract:
The aim of this research is twofold: to develop a local literature (simplified English translation version) reading booklet for Thai primary school children (the fourth graders) and to encourage the love of reading in English by reading local literature. An excerpt from Thai literature namely Phra-apaimani, the reading requirement for Primary 4 was selected to be translated into English in simplified language with cartoon pictures to illustrate the key happenings of the story. After the first draft of the booklet development, the samples of the booklets were distributed to 3 educator experts to call for validity and comments on 1) the appropriateness of the English language, 2) the organization of the booklet, 3) the comprehension of the story, and 4) the relevance to the core curriculum of Basic Education of Thailand (B.E.2551). The IOC (Index of Item – Objective Congruence) was 0.9 indicated that the material is applicable (with some comments and suggestions). After the first amendment, the booklets were distributed to 30 fourth graders (in 3 schools – 10 in each school), 10 English teachers of Primary 4, and 10 educational supervisors for English subjects (in primary level) to call for comments on 1) the comprehension of the story 2) the organization of the booklet, and 3) the encouragement for the love of reading in English. The English reading booklet on Phra-apaimani for Thai primary children, the IOC questionnaire (with the open-ended questions) for the educator experts, and the rating scales for the students, the teachers, and the educational supervisors were used as the instruments of the research. The findings revealed that most students rated ‘positive’ level for the comprehension of the story, while the teachers and the educational supervisors rated ‘highly positive’. The 3 groups rated ‘highly positive’ for both the organization of the booklet and for the encouragement for the love of reading in English. It is recommended that there should be more production of English reading texts for children, especially the texts that children already have some background knowledge. Moreover, illustration is the most crucial part for the children’s reading texts.Keywords: English language, reading skill, primary children, Thai literature
Procedia PDF Downloads 366201 Towards a Resources Provisioning for Dynamic Workflows in the Cloud
Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem
Abstract:
Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications
Procedia PDF Downloads 295200 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring
Authors: Seung-Lock Seo
Abstract:
This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.Keywords: data mining, process data, monitoring, safety, industrial processes
Procedia PDF Downloads 401199 Gall Bladder Polyp Identified as Solitary RCC Metastasis 4 Years after Nephrectomy: An Unusual Case Report
Authors: Gerard Bray, Arya Bahadori, Sachinka Ranasinghe
Abstract:
Renal cell carcinoma (RCC) is among the top 10 most common cancers worldwide, where metastatic disease carries a poor prognosis. Herein, we present a 74-year-old male presenting with asymptomatic solitary metachronous metastasis to the gall bladder 4 years following nephrectomy for clear cell RCC. Solitary RCC metastasis to the gall bladder following nephrectomy is rarely reported in the literature and brings with it a clinical conundrum of whether surgical resection or systemic therapy should be utilized. In this case, surgical excision with cholecystectomy was employed without systemic therapy. We, therefore, contribute a rare and interesting case that highlights that metastasectomy of a solitary metastasis can improve survival according to current literature.Keywords: renal cell carcinoma, gall bladder metastasis, solitary metastasectomy, metachronous
Procedia PDF Downloads 173198 Mechanisms Leading to the Protective Behavior of Ethanol Vapour Drying of Probiotics
Authors: Shahnaz Mansouri, Xiao Dong Chen, Meng Wai Woo
Abstract:
A new antisolvent vapour precipitation approach was used to make ultrafine submicron probiotic encapsulates. The approach uses ethanol vapour to precipitate submicron encapsulates within relatively large droplets. Surprisingly, the probiotics (Lactobacillus delbrueckii ssp. bulgaricus, Streptococcus thermophilus) showed relatively high survival even under destructive ethanolic conditions within the droplet. This unusual behaviour was deduced to be caused by the denaturation and aggregation of the milk protein forming an ethanolic protective matrix for the probiotics. Skim milk droplets which is rich in casein and contains naturally occurring minerals provided higher ethanolic protection when compared whey protein isolate and lactose droplets.Keywords: whey, skim milk, probiotic, antisolvent, precipitation, encapsulation, denaturation, aggregation
Procedia PDF Downloads 522197 Sustainable Transformative Approaches to Reuse the Built Heritage of Erbil Citadel Houses as Part of Restoration
Authors: Wafaa Anwar Sulaiman Goriel
Abstract:
The historiography of the Revival heritage aims to breathe a wider spirit of historical building back into life. This paper reflects an approach to revitalizing architectural antiquities through unusual methodologies elsewhere unknown in the renovation heritage sphere using the Erbil Citadel houses as a example. The 6000-year-old, continuously occupied site of Erbil Citadel embodies the challenges and mutual opportunities in ensuring that historical context is preserved during modern redevelopment. It shows how these principles can engage traditional construction systems with modern materials and technologies. It is an approach that champions the age and integrity of restored heritage sites, containing within its vernacular style elements which add to a sense of relevance when contextually re-set in modern settings. Some Citadel’s houses will be discussed in the paper and the restoration method has been processed.Keywords: Erbil Citadel houses, preservation, heritage, historical sites
Procedia PDF Downloads 18196 Possibility of Making Ceramic Models from Condemned Plaster of Paris (Pop) Moulds for Ceramics Production in Edo State Nigeria
Authors: Osariyekemwen, Daniel Nosakhare
Abstract:
Some ceramic wastes, such as discarded (condemn) Plaster of Paris (POP) in Auchi Polytechnic, Edo State, constitute environmental hazards. This study, therefore, bridges the forgoing gaps by undertaking the use of these discarded (POP) moulds to produced ceramic models for making casting moulds for mass production. This is in line with the possibility of using this medium to properly manage the discarded (condemn) Plaster of Paris (POP) that littered our immediate environment. Presently these are major wastes disposal in the department. Hence, the study has been made to fabricate sanitary miniature models and contract fuse models, respectively. Findings arising from this study show that discarded (condemn) Plaster of Paris (POP) can be carved when to set it neither shrink nor expand; hence warping is quite unusual. Above all, it also gives good finishing with little deterioration with time when compared to clay models.Keywords: plaster of Paris, condemn, moulds, models, production
Procedia PDF Downloads 191195 A Novel Image Steganography Scheme Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography
Procedia PDF Downloads 541194 A Novel Image Steganography Method Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography
Procedia PDF Downloads 619193 Giant Filiform Polyposis in a Patient with Ulcerative Colitis Mimicking Colorectal Cancer
Authors: Godwin Dennison, Edwin Cooper, George Theobald, Richard Dalton
Abstract:
We report an unusual case of giant filiform polyposis in a patient with ulcerative colitis, causing a large stricture in the colon. A 62-year-old man was referred to the Bowel Cancer Screening Programme with a positive Faecal Immunochemical Test (FIT). He was known to have UC for 30 years. A CT scan showed a 9 cm stricture in the transverse colon suspicious of malignancy. A colonoscopy was attempted three times, and biopsies confirmed features of ulcerative colitis. A laparoscopic assisted transverse colectomy (Left hemicolectomy) was performed, and the histology revealed giant filiform polyposis. This should be considered in a UC patient presenting with signs of obstruction mimicking a carcinoma. Whilst it is a benign condition, because of the size of the lesion, it often causes obstruction, and surgery is indicated to relieve symptoms.Keywords: giant inflammatory polyposis, filiform polyposis, ulcerative colitis, inflammatory bowel disease
Procedia PDF Downloads 117192 An Unusual Occurrence: Typhoid Retinitis with Kyrieleis' Vasculitis
Authors: Aditya Sethi, Vaibhav Sethi, Shenouda Girgis
Abstract:
We present a case of a 31-year-old female who presented with a three week history of left eye blurry vision following a fever. She was diagnosed with Typhoid fever, confirmed by a positive Widal test report. On examination, her best corrected visual acuity in the right eye was 20/20 and in the left eye was 20/60. Fundus examination of the right eye showed a focal area of retinitis with retinal haemorrhages along the superior arcade within the macula. There was also focal area of retinitis with superficial retinal haemorrhages along the superior arcade vessels. There was also presence of multiple yellowish white exudates within the adjacent retinal artery arranged in a beaded pattern, suggestive of Kyrieleis' vasculitis. Optical Coherence Tomography (OCT) of the left eye demonstrated cystoid macula edema with serous foveal detachment.Keywords: typhoid retinitis, Kyrieleis’ vasculitis, immune-mediated retinitis, post-fever retinitis, typhoid retinopathy, retinitis
Procedia PDF Downloads 178191 Model Based Development of a Processing Map for Friction Stir Welding of AA7075
Authors: Elizabeth Hoyos, Hernán Alvarez, Diana Lopez, Yesid Montoya
Abstract:
The main goal of this research relates to the modeling of FSW from a different or unusual perspective coming from mechanical engineering, particularly looking for a way to establish process windows by assessing soundness of the joints as a priority and with the added advantage of lower computational time. This paper presents the use of a previously developed model applied to specific aspects of soundness evaluation of AA7075 FSW welds. EMSO software (Environment for Modeling, Simulation, and Optimization) was used for simulation and an adapted CNC machine was used for actual welding. This model based approach showed good agreement with the experimental data, from which it is possible to set a window of operation for commercial aluminum alloy AA7075, all with low computational costs and employing simple quality indicators that can be used by non-specialized users in process modeling.Keywords: aluminum AA7075, friction stir welding, phenomenological based semiphysical model, processing map
Procedia PDF Downloads 261190 Colonizing the Colonizers: Layers of Subjectification in the Russian Caucasus
Authors: Aaron Derner
Abstract:
Unlike the histories of France, the UK, or even Spain, the Russian colonial past often dissolves before the seemingly more salient Cold War figurations or Soviet dissolution. The obvious explanation behind Caucasian states’ roles—that of Russian-propped governments obeying the whims of their patron—is but the latest instance of such oversight. Where the results of colonial social and cultural interactions are indelibly stamped across France, Algeria, and every other former (and current) French holding, so to are the Muscovite and Russian colonial ambitions embedded within the modern politics and cultures of both Russia and the Caucasus. Russian colonial artefacts are enhanced and perhaps granted an additional social explanatory edge over those of the ‘typical’ colonizers, by the cyclical adoration for and noisy rejection of European cultural markers over the centuries, along with the somewhat unusual composition of the Cossacks: Russia’s main agents of colonialization within the Caucasian frontier. The story of Russia and Chechnya, of all the Caucasus, is of the manufacture of social and individual identity through “modes of subjectification” inherent within the region’s colonial history and driven by the triangular interactions between three main groups: the Cossacks, the Caucasian Mountain Tribes, and the Russian Metropol. Together, interactions between these social groups worked to shape and transform the lifestyles and institutional pathologies that constitute the Russian and Chechen states and the politics between them. At the core of this (Western) state-building is the simultaneous and seemingly contradictory desire to be more Western and emulate Western cultural and political practices while also desperately grasping for a uniquely Russian identity. This sits somewhat ironically against the backdrop that Russia hosted a frontier-based settler society and had established that distinctly European feature of settler colonialism early in its history—arguably establishing a claim to being the most “colonial” of the colonial powers. There is no doubt that these forces worked to shape contemporary Russian political and social identity—apparent in the mythic popularity of the Cossack in Russian literature, politics, and academic discourse. What needs to be expanded from the current narrative, however, is that beyond the Cossack identity’s attractiveness on the grounds of its tones of freedom and resistance to unjust authority, the identity is rooted in the imperial ambitions and colonial experiences of the Russian state, and is, therefore, a direct marker of domination and subjectification. Adding an unusual dimension to this not-uncommon cultural progression, the Russian state needed to colonize both the Caucases and the Russian Cossacks, appropriating them in much the same way they appropriated the Circassian mountain tribes. The focus of this paper is not to tell yet another story of how one culture entered an area to overpower another but how a ‘powerful,’ ‘modern,’ ‘Western(ish)’ culture was profoundly and continually changed through its contact with a group of tribal ‘savages’ and ‘braves.’Keywords: Russia, chechnya, subjectification, caucasus, cossacks, Ukraine
Procedia PDF Downloads 76189 Juxtaposing Constitutionalism and Democratic Process in Nigeria Vis a Vis the South African Perspective
Authors: Onyinyechi Lilian Uche
Abstract:
Limiting arbitrariness and political power in governance is expressed in the concept of constitutionalism. Constitutionalism acknowledges the necessity for government but insists upon a limitation being placed upon its powers. It is therefore clear that the essence of constitutionalism is obviation of arbitrariness in governance and maximisation of liberty with adequate and expedient restraint on government. The doctrine of separation of powers accompanied by a system of checks and balances in Nigeria like many other African countries is marked by elements of ‘personal government’ and this has raised questions about whether the apparent separation of powers provided for in the Nigerian Constitution is not just a euphemism for the hegemony of the executive over the other two arms of government; the legislature and the judiciary. Another question raised in the article is whether the doctrine is merely an abstract philosophical inheritance that lacks both content and relevance to the realities of the country and region today? The current happenings in Nigeria and most African countries such as the flagrant disregard of court orders by the Executive, indicate clearly that the concept constitutionalism ordinarily goes beyond mere form and strikes at the substance of a constitution. It, therefore, involves a consideration of whether there are provisions in the constitution which limit arbitrariness in the exercise of political powers by providing checks and balances upon such exercise. These questions underscore the need for Africa to craft its own understanding of the separation of powers between the arms of government in furtherance of good governance as it has been seen that it is possible to have a constitution in place which may just be a mere statement of unenforceable ‘rights’ or may be bereft of provisions guaranteeing liberty or adequate and necessary restraint on exercise of government. This paper seeks to expatiate on the importance of the nexus between constitutionalism and democratic process and a juxtaposition of practices between Nigeria and South Africa. The article notes that an abstract analysis of constitutionalism without recourse to the democratic process is meaningless and also analyses the structure of government of some selected African countries. These are examined the extent to which the doctrine operates within the arms of government and concludes that it should not just be regarded as a general constitutional principle but made rigid or perhaps effective and binding through law and institutional reforms.Keywords: checks and balances, constitutionalism, democratic process, separation of power
Procedia PDF Downloads 126188 Timely Detection and Identification of Abnormalities for Process Monitoring
Authors: Hyun-Woo Cho
Abstract:
The detection and identification of multivariate manufacturing processes are quite important in order to maintain good product quality. Unusual behaviors or events encountered during its operation can have a serious impact on the process and product quality. Thus they should be detected and identified as soon as possible. This paper focused on the efficient representation of process measurement data in detecting and identifying abnormalities. This qualitative method is effective in representing fault patterns of process data. In addition, it is quite sensitive to measurement noise so that reliable outcomes can be obtained. To evaluate its performance a simulation process was utilized, and the effect of adopting linear and nonlinear methods in the detection and identification was tested with different simulation data. It has shown that the use of a nonlinear technique produced more satisfactory and more robust results for the simulation data sets. This monitoring framework can help operating personnel to detect the occurrence of process abnormalities and identify their assignable causes in an on-line or real-time basis.Keywords: detection, monitoring, identification, measurement data, multivariate techniques
Procedia PDF Downloads 236187 A Rare Case of Acquired Benign Tracheoesophageal Fistula: Case Report and Literature Review
Authors: Sarah Bouayyad, Ajay Nigam, Meera Beena
Abstract:
Acquired benign tracheoesophageal fistula is a rare medical condition that usually results from trauma, foreign bodies, or granulomatous infections. This is an unusual presentation of a male patient with a history of laryngectomy who had had over a period of several years inappropriately and vigorously used valve cleaning brushes to clean tracheal secretions, which had led to the formation of a tracheoesophageal fistula. Due to the patient’s obsessive habit, we couldn’t manage him using conventional surgical methods. Instead, we opted for the placement of a salivary bypass tube, which yielded good results and recovery. To the best of our knowledge, no other case of similar etiology has been published. We would like to highlight the importance of appropriate patient selection and education prior to performing a tracheoesophageal puncture to avoid developing life-threatening complications as demonstrated in our case report.Keywords: tracheoesophageal fistula, speech valve, endoscopic insertion of salivary bypass tube, head and neck malignancies
Procedia PDF Downloads 124186 Readiness of Military Professionals for Challenging Situations
Authors: Petra Hurbišová, Monika Davidová
Abstract:
The article deals with the readiness of military professionals for challenging situations. It discusses higher requirements on the psychical endurance of military professionals arising from the specific nature of the military occupation, which is typical for being very difficult to maintain regularity, which is in accordance with the hygiene of work alternated by relaxation. The soldier must be able to serve in the long term and constantly intense performance that goes beyond human tolerance to stress situations. A challenging situation is always associated with overcoming difficulties, obstacles and complicated circumstances or using unusual methods, ways and means to achieve the desired (expected) objectives, performing a given task or satisfying an important need. This paper describes the categories of challenging situations, their classification and characteristics. Attention is also paid to the formation of personality in challenging situations, coping with stress in challenging situations, Phases of solutions of stressful situations, resistance to challenging life situations and its factors. Finally, the article is focused on increasing the readiness of military professionals for challenging situations.Keywords: coping, challenging situations, stress, stressful situations, military professionals, resilience
Procedia PDF Downloads 316185 Psychoanalytical Foreshadowing: The Application of a Literary Device in Quranic Narratology
Authors: Fateme Montazeri
Abstract:
Literary approaches towards the text of the Quran predate the modern period. Suyuti (d.1505)’s encyclopedia of Quranic sciences, Al-Itqan, provides a notable example. In the modern era, the study of the Quranic rhetorics received particular attention in the second half of the twentieth century by Egyptian scholars. Amin Al-Khouli (d. 1966), who might be considered the first to argue for the necessity of applying a literary-rhetorical lens toward the tafseer, Islamic exegesis, and his students championed the literary analysis as the most effective approach to the comprehension of the holy text. Western scholars continued the literary criticism of the Islamic scripture by applying to the Quran similar methodologies used in biblical studies. In the history of the literary examination of the Quran, the scope of the critical methods applied to the Quranic text has been limited. For, the rhetorical approaches to the Quran, in the premodern as well as the modern period, concerned almost exclusively with the lexical layer of the text, leaving the narratological dimensions insufficiently examined. Recent contributions, by Leyla Ozgur Alhassen, for instance, attempt to fill this lacunae. This paper aims at advancing the studies of the Quranic narratives by investigating the application of a literary device whose role in the Quranic stories remains unstudied, that is, “foreshadowing.” This paper shall focus on Chapter 12, “Surah al-Yusuf,” as its case study. Chapter 12, the single chapter that includes the story of Joseph in one piece, contains several instances in which the events of the story are foreshadowed. As shall be discussed, foreshadowing occurs either through a monolog or dialogue whereby one or more of the characters allude to the future happenings or through the manner in which the setting is described. Through a close reading of the text, it will be demonstrated that the usage of the rhetorical tool of foreshadowing meets a dual purpose: on the one hand, foreshadowing prepares the reader/audience for the upcoming events in the plot, and on the other hand, it highlights the psychological dimensions of the characters, their thoughts, intentions, and disposition. In analyzing the story, this study shall draw on psychoanalytical criticism to explore the layers of meanings embedded in the Quranic narrative that are unfolded through foreshadowing.Keywords: foreshadowing, quranic narrative, literary criticism, surah yusuf
Procedia PDF Downloads 154