Search results for: origin destination
861 Bringing Ethics to a Violent System
Authors: Zeynep Selin Acar
Abstract:
In international system, there has always been a cycle of violence, war and peace. As there travels the time, after Christianity and later Just War theorists, international relations theorists have been tried to limit violence and war. As pieces of international law, Peace of Augsburg, Kellog-Briand Pact, League of Nations Covenant and UN Charter were and are still not effective to prevent war. Moreover, in order to find a way around these rules, it is believed that a new excuse started to be used instead of violence or war, humanitarian intervention. However, it has neither a legal nor a universally accepted framework. As a result, it is open to be manipulated by states. In order to prevent this, Responsibility to Protect (RtoP) which gives a state the responsibility to protect its citizens against violence, is created. Additionally, RtoP transfers this responsibility to regional or international group of states at the time when a state is the origin of violence. In the lights of these, this paper analyzes RtoP as an ethical approach to war and peace studies because it provides other states as guardians and care-takers of people who do not belong to them or do not share any togetherness.Keywords: ethics, humanitarian intervention, responsibility to protect, UN charter
Procedia PDF Downloads 324860 Agent-Based Modeling of Pedestrian Corridor Congestion on the Characteristics of Physical Space Form
Abstract:
The pedestrian corridor is the most crowded area in the public space. The crowded severity has been focused on the field of evacuation strategies of the entrance in large public spaces. The aim of this paper is to analyze the walking efficiency in different spaces of pedestrian corridor with the variation of spatial parameters. The congestion condition caused by the variation of walking efficiency is modeled as well. This study established the space model of the walking corridor by setting the width, slope, turning form and turning angle of the pedestrian corridor. The pedestrian preference of walking mode varied with the difference of the crowded severity, walking speed, field of vision, sight direction and the expected destination, which is influenced by the characters of physical space form. Swarm software is applied to build Agent model. According to the output of the Agent model, the relationship between the pedestrian corridor width, ground slope, turning forms, turning angle and the walking efficiency, crowded severity is acquired. The results of the simulation can be applied to pedestrian corridor design in order to reduce the crowded severity and the potential safety risks caused by crowded people.Keywords: crowded severity, multi-agent, pedestrian preference, urban space design
Procedia PDF Downloads 219859 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol
Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani
Abstract:
Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.Keywords: heuristics routing, intelligent routing, VANET, route optimization
Procedia PDF Downloads 176858 A Comparative Study of School Choice: China and the United States
Authors: Huizi Zeng
Abstract:
This paper delineates the historical retrospective and current status of school choice in China. Focusing on analyzing the similarities and differences in origin, evolution, public dispute, policy dynamics between China and the United States, the article depicts a panorama and explores possible causes. Both China and the United States continue to learn from historical legacy and invent new programs to perfect school choice policy but the outcomes are so different. On the one hand, the percentage of public schools in China remains high all along, while there is a considerably significant reduction in the United States. On the other hand, there is more governmental intervention in the United States with continuous and constant policy updates and adjustment. Finally, this article adopts public-private partnerships (PPP) to seek to provide insights into differences between the two countries and argue that school choice is not only the production of education marketization and corporation but also driven by political mechanism.Keywords: China, United States, school choice, comparative analysis, policy, public private partnerships
Procedia PDF Downloads 189857 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India
Authors: Mohammed Bashir Uddin
Abstract:
Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.Keywords: globalization, human security, human trafficking, political economy
Procedia PDF Downloads 471856 Comparison of Tourist Shopping Patterns in Korea, 2009-2015: A Case of China and Japan
Abstract:
Japan has been positioned as a major inbound market to Korea, accounting for about 31% of total inbound visitors until 2012. The percentage has sharply dropped each year since and remained in second place, reaching 13.33% in 2016. Meanwhile, China has been boosted as a major inbound market, reaching 46.79% in 2016. Chinese tourists mainly visit Korea with the major purpose of shopping. They consume Korean cosmetic/beauty products and clothes while Japanese tourists prefer to purchase healthy food such as ginseng and seaweed. This study aims to investigate and compare tourist shopping patterns across two major inbound markets, China and Japan. A quantitative approach using survey was applied from 2009 to 2016. Findings suggest Chinese visit Korea due to quality of product, value for money, and accessibility, and trust. Meanwhile, Japanese choose Korea as a shopping destination mainly due to convenience, affordability, and tourist attractions. Also, there were significant differences in shopping venues. For example, Japanese tourists prefer shopping at department stores while Chinese tourists prefer retail outlets and local markets. This study contributes to deeper understanding on two major inbound markets to Korea and suggests future marketing strategies.Keywords: tourist shopping patterns, Korea, China, Japan, historical data
Procedia PDF Downloads 198855 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery
Authors: Colette Malyack, Pius Egbelu
Abstract:
Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics
Procedia PDF Downloads 150854 Teaching Philosophy to Nigerian Students: Some Pedagogic Considerations
Authors: Patricia Agboro
Abstract:
The dominant strands of pedagogic ideas are often western in origin/orientation. This is the case because of the hegemony of the western world in global academia. For this reason, peculiarities and considerations of context are often swept to the margins as educational thinkers emphasize patently Eurocentric and one-size-fits-all solutions to the problems of effective teaching. This paper takes as a starting point the notion that pedagogy must be context specific and pragmatic in its application. It is from this perspective that it focuses on the challenges of teaching philosophy to students in the Nigerian tertiary institutions. Philosophy students in Nigeria usually come across philosophy for the first time at the tertiary level. This raises the problem of inadequate exposure. Beyond this, a substantial number of candidates are admitted into the philosophy program based on the Nigerian version of ‘affirmative action’ which is known as the quota system. This paper addresses the problems highlighted above and hosts of other issues as well as provides recommendations that can improve effectiveness of teaching philosophy at the university level.Keywords: justice, quota system, pedagogy, federal character
Procedia PDF Downloads 244853 Effects of Turbulence Penetration on Valve Leakage in Nuclear Reactor Coolant System
Authors: Gupta Rajesh, Paudel Sagar, Sharma Utkarsh, Singh Amit Kumar
Abstract:
Thermal stratification has drawn much attention because of the malfunctions at various nuclear plants in U.S.A that raised significant safety concerns. The concerns due to this phenomenon relate to thermal stresses in branch pipes connected to the reactor coolant system piping. This stress limits the lifetime of the piping system, and even leading to penetrating cracks. To assess origin of valve damage in the pipeline, it is essential to determine the effect of turbulence penetration on valve leakage; since stratified flow is generally generated by turbulent penetration or valve leakage. As a result, we concluded with the help of coupled fluent-structural analysis that the pipe with less turbulence has less chance of failure there by requiring less maintenance.Keywords: nuclear reactor coolant system, thermal stratification, turbulent penetration, coupled fluent-structural analysis, Von-Misses stress
Procedia PDF Downloads 293852 The Budget Profile of the Municipality of AtaleIa-MG in the Context of the Micro-Region of Teofilo Otoni in Brazil
Authors: Jeferson Gomes Dos Santos, Mirelle Cristina De Abreu Quintela
Abstract:
Considering that after the 1988 Constitution, in Brazil, municipalities have acquired new roles in the face of a financial reality that jeopardizes more substantial actions, the Public Budget is essential for the establishment of guidelines for action, within each budgetary reality. Within this, the present work sought to understand the budget profile of the mining municipality of Ataleia, with a view to identifying its budget composition, in relation to the main sources of revenue and expenditure. To achieve the purposes of the study, information was collected on the municipality's finances, from the years 2000 to 2016, visualizing the progress of its revenues in terms of funding and origin, and expenses in terms of nature and purpose. It was evidenced that the municipality, having its budget revenue in the period, still shows great dependence on intergovernmental transfers, as the own collection was relatively low. The budget expenditure of the period was mainly influenced by social expenditures, but it must be said that the municipality complied with the limits of spending, minimum and maximum, established by law.Keywords: expenses, municipal budget, planning, revenue
Procedia PDF Downloads 224851 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 581850 Comparative Study on Manet Using Soft Computing Techniques
Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri
Abstract:
Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network
Procedia PDF Downloads 349849 Comparative Assessment of Bus Rapid Transit System in India
Authors: Namrata Ghosh, Sapan Tiwari
Abstract:
Public transport service plays an important role in people's transportation needs in urban areas. Bus Rapid Transit System (BRTS) is a transport service that provides passengers with a quick and efficient mode of transport. It is developed by changing the existing infrastructure, vehicles, route, or by developing a new dedicated corridor for the bus route. This dedicated lanes transport passengers to their destination quickly and efficiently and flexible in meeting demand. However, with rapid urbanization and increasing population density in Indian cities, traffic congestion has become a significant issue. In a few Indian cities, the BRTS concept is implemented to address the issue of traffic congestion that eventually resulted in less road congestion. The research aims to provide a literature review on the overall outlook of the BRTS system and its practical implementation in mass urban transit. First, it reflects a literature review on the concept of the BRTS system in both developed and developing countries. Afterward, comparative analysis of BRTS, hindrances associated with the permanent integrated system, and the need for establishing the Bus Rapid Transit System in Indian cities is demonstrated. The research concludes with some recommendations that could help in improving the loopholes in the existing system.Keywords: bus rapid transit system(BRTS), dedicated corridor, public transport, traffic congestion
Procedia PDF Downloads 285848 Assessment of Tourist and Community Perception with Regard to Tourism Sustainability Indicators: A Case Study of Sinharaja World Heritage Rainforest, Sri Lanka
Authors: L. P. K. Liyanage, N. R. P. Withana, A. L. Sandika
Abstract:
The purpose of this study was to determine tourist and community perception-based sustainable tourism indicators as well as Human Pressure Index (HPI) and Tourist Activity Index (TAI). Study was carried out in Sinharaja forest which is considered as one of the major eco-tourism destination in Sri Lanka. Data were gathered using a pre-tested semi-structured questionnaire as well as records from Forest department. Convenient sampling technique was applied. For the majority of issues, the responses were obtained on multi-point Likert-type scales. Visual portrayal was used for display analyzed data. The study revealed that the host community of the Kudawa gets many benefits from tourism. Also, tourism has caused negative impacts upon the environment and community. The study further revealed the need of proper waste management and involvement of local cultural events for the tourism business in the Kudawa conservation center. The TAI, which accounted to be 1.27 and monthly evolution of HPI revealed that congestion can be occurred in the Sinharaja rainforest during peak season. The results provide useful information to any party involved with tourism planning anywhere, since such attempts would be more effective once the people’s perceptions on these aspects are taken into account.Keywords: Kudawa Conservation Center, Sinharaja World Heritage Rainforest, sustainability indicators, community perception
Procedia PDF Downloads 151847 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 61846 Pathology of the Partridge Gambra Alectoris barbara in a Semi-Captive Breeding in the Algiers Sahel
Authors: H. Saadi-Idouhar, A. Smai, S. Zenia, F. Haddadj, A. Saadi, M. Aissi, S. Doumandji
Abstract:
In Algeria, the Partridge gambra is a highly sought-after game species and is appreciated for its meat. Game birds are of interest because they play an important role for hunting federations and for the economy of a country. The breeding of indigenous breeds is necessary because it is of great economic interest. However, gambra breeding in the hunting centre of Zeralda (northern west of Algiers) is not easy, several diseases affecting Perdreaux and reproducing adults have been noted. Most of the diseases observed are parasitic in origin. This study is conducted during the 2010 breeding season. It is based on the autopsy of cadavers collected at the hunting centre and parasitic coprology. Indeed, the flotation enrichment method has identified several parasites such as Eimeria spp., Capillaria spp., and Ascaridia spp. Autopsied corpses show the importance of two major diseases, syngamosis caused to Syngamus trachea and histomonosis caused to Histomonas meleagridis.Keywords: partridge, livestock, eggs, affections pathology
Procedia PDF Downloads 180845 Heavy Metals and Antibiotic Resistant Bacteria as Indicators of Effluent Environmental Pollution in the Green Turtles, Chelonia Mydas
Authors: S. K. Al-Musharafi, I. Y. Mahmoud, S. N. Al-Bahry
Abstract:
At Ras Al-Hadd Reserve, Eggs from green turtles and Chelonia mydas were randomly collected immediately after Oviposition. Eggshells taken from fresh eggs and sand collected from the body chamber were analyzed for eight heavy metals (Al, Br, Cd, Co, Cu, Fe, S, and Zn) using inductively coupled plasma mass spectrometry (ICP). Heavy metal concentrations varied significantly (P<0.05) between nest sand and eggshells. Zn values were significantly higher than the other heavy metals. A total of 60 heterotrophic bacteria belong to eight genera were isolated from fresh egg contents (albumen and yolk). Resistance of the isolates to Amikacin, ampicillin, chloramphenicol, gentamycine, minocylin, nalidixicacid, neomycin, streptomycin, tetracycline, tobramycin, and Trimethoprim was tested. More than 40 % of the isolates were multiple resistant to 2-7 antibiotics. Most of the resistant strains were also resistant to Zn. The value of these findings may indicate that the origin of pollution is of human contaminated effluents.Keywords: antibiotic resistance, bacteria, environment, heavy metals, sea turtles
Procedia PDF Downloads 360844 Effects of Epinephrine on Gene Expressions during the Metamorphosis of Pacific Oyster Crassostrea gigas
Authors: Fei Xu, Guofan Zhang, Xiao Liu
Abstract:
Many major marine invertebrate phyla are characterized by indirect development. These animals transit from planktonic larvae to benthic adults via settlement and metamorphosis, which has many advantages for organisms to adapt marine environment. Studying the biological process of metamorphosis is thus a key to understand the origin and evolution of indirect development. Although the mechanism of metamorphosis has been largely studied on their relationships with the marine environment, microorganisms, as well as the neurohormones, little is known on the gene regulation network (GRN) during metamorphosis. We treated competent oyster pediveligers with epinephrine, which was known to be able to effectively induce oyster metamorphosis, and analyzed the dynamics of gene and proteins with transcriptomics and proteomics methods. The result indicated significant upregulation of protein synthesis system, as well as some transcription factors including Homeobox, basic helix-loop-helix, and nuclear receptors. The result suggested the GRN complexity of the transition stage during oyster metamorphosis.Keywords: indirect development, gene regulation network, protein synthesis, transcription factors
Procedia PDF Downloads 139843 Monitoring of Pesticide Content in Biscuits Available on the Vojvodina Market, Serbia
Authors: Ivana Loncarevic, Biljana Pajin, Ivana Vasiljevic, Milana Lazovic, Danica Mrkajic, Aleksandar Fises, Strahinja Kovacevic
Abstract:
Biscuits belong to a group of flour-confectionery products that are considerably consumed worldwide. The basic raw material for their production is wheat flour or integral flour as a nutritionally highly valuable component. However, this raw material is also a potential source of contamination since it may contain the residues of biochemical compounds originating from plant and soil protection agents. Therefore, it is necessary to examine the health safety of both raw materials and final products. The aim of this research was to examine the content of undesirable residues of pesticides (mostly organochlorine pesticides, organophosphorus pesticides, carbamate pesticides, triazine pesticides, and pyrethroid pesticides) in 30 different biscuit samples of domestic origin present on the Vojvodina market using Gas Chromatograph Thermo ISQ/Trace 1300. The results showed that all tested samples had the limit of detection of pesticide content below 0.01 mg/kg, indicating that this type of confectionary products is not contaminated with pesticides.Keywords: biscuits, pesticides, contamination, quality
Procedia PDF Downloads 183842 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks
Authors: A. Khan, H. Mahmood
Abstract:
In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.Keywords: energy holes, interference, routing, underwater
Procedia PDF Downloads 408841 Human Facial Emotion: A Comparative and Evolutionary Perspective Using a Canine Model
Authors: Catia Correia Caeiro, Kun Guo, Daniel Mills
Abstract:
Despite its growing interest, emotions are still an understudied cognitive process and their origins are currently the focus of much debate among the scientific community. The use of facial expressions as traditional hallmarks of discrete and holistic emotions created a circular reasoning due to a priori assumptions of meaning and its associated appearance-biases. Ekman and colleagues solved this problem and laid the foundations for the quantitative and systematic study of facial expressions in humans by developing an anatomically-based system (independent from meaning) to measure facial behaviour, the Facial Action Coding System (FACS). One way of investigating emotion cognition processes is by applying comparative psychology methodologies and looking at either closely-related species (e.g. chimpanzees) or phylogenetically distant species sharing similar present adaptation problems (analogy). In this study, the domestic dog was used as a comparative animal model to look at facial expressions in social interactions in parallel with human facial expressions. The orofacial musculature seems to be relatively well conserved across mammal species and the same holds true for the domestic dog. Furthermore, the dog is unique in having shared the same social environment as humans for more than 10,000 years, facing similar challenges and acquiring a unique set of socio-cognitive skills in the process. In this study, the spontaneous facial movements of humans and dogs were compared when interacting with hetero- and conspecifics as well as in solitary contexts. In total, 200 participants were examined with FACS and DogFACS (The Dog Facial Action Coding System): coding tools across four different emotionally-driven contexts: a) Happiness (play and reunion), b) anticipation (of positive reward), c) fear (object or situation triggered), and d) frustration (negation of a resource). A neutral control was added for both species. All four contexts are commonly encountered by humans and dogs, are comparable between species and seem to give rise to emotions from homologous brain systems. The videos used in the study were extracted from public databases (e.g. Youtube) or published scientific databases (e.g. AM-FED). The results obtained allowed us to delineate clear similarities and differences on the flexibility of the facial musculature in the two species. More importantly, they shed light on what common facial movements are a product of the emotion linked contexts (the ones appearing in both species) and which are characteristic of the species, revealing an important clue for the debate on the origin of emotions. Additionally, we were able to examine movements that might have emerged for interspecific communication. Finally, our results are discussed from an evolutionary perspective adding to the recent line of work that supports an ancient shared origin of emotions in a mammal ancestor and defining emotions as mechanisms with a clear adaptive purpose essential on numerous situations, ranging from maintenance of social bonds to fitness and survival modulators.Keywords: comparative and evolutionary psychology, emotion, facial expressions, FACS
Procedia PDF Downloads 434840 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263839 Gut Metabolite Profiling of the Ethnic Groups from Assam, India
Authors: Madhusmita Dehingia, Supriyo Sen, Bhuwan Bhaskar, Tulsi Joishy, Mojibur R. Khan
Abstract:
Human gut microbes and their metabolites are important for maintaining homeostasis in the gut and are responsible for many metabolic and immune mediated diseases. In the present study, we determined the profiles of the gut metabolites of five different ethnic groups (Bodo, Tai-Phake, Karbi, Tea tribe and Tai-Aiton) of Assam. Fecal metabolite profiling of the 39 individuals belonging to the ethnic groups was carried out using Gas chromatography – Mass spectrometry (GC-MS), and comparison was performed among the tribes for common and unique metabolites produced within their gut. Partial Least Squares Discriminant Analysis (PLS-DA) of the metabolites suggested that the individuals grouped according to their ethnicity. Among the 66 abundant metabolites, 12 metabolites were found to be common among the five ethnic groups. Additionally, ethnicity wise some unique metabolites were also detected. For example, the tea tribe of Assam contained the tea components, Aniline and Benzoate more in their gut in comparison to others. Metabolites of microbial origin were also correlated with the already published metagenomic data of the same ethnic group and functional analysis were carried out based on human metabolome database.Keywords: ethnicity, gut microbiota, GC-MS, metabolites
Procedia PDF Downloads 422838 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network
Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz
Abstract:
Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle
Procedia PDF Downloads 238837 Survey of Campylobacter Contamination in Poultry Meat and By-Products in Khuzestan Province
Authors: Ali Bagherpour, Masoud Soltanialvar
Abstract:
Campylobacter species are common bacterial pathogens associated with human gastroenteritis which are generally transmitted through foods of animal origin. This study was carried out to determine the prevalence of Campylobacter species in poultry meat and by products in the city of Dezful in Iran. Since April 2012 to July 2013, a total of 400 samples including meat (n = 100), liver (n = 100), gizzard (n = 100), and poultry heart (n = 100), were randomly collected from Dezful industrial poultry abattoir and were experimented in order to investigate presence of Campylobacter species. According to culture test, 251 samples out of 400 samples under study (69%) were contaminated with Campylobacter species. The highest prevalence of Campylobacter species was observed in poultry's liver (78.3%) and then in gizzard (75.8%), heart (65%) and meat (56.7%). The most common isolated Campylobacter were C. jejuni (90.9%) and the rest were C. coli (9.1%). There was a significant difference (P < 0.05) in the prevalence of Campylobacter species between the meat samples taken in the summer (86.7%). The results of this study indicate the importance of edible offal of poultries as the potential source of Campylobacter infections.Keywords: Campylobacter jejuni, Campylobacter coli, poultry, meat, products
Procedia PDF Downloads 613836 Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force
Authors: Maarten J. Van der Burgt
Abstract:
A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path.Keywords: celestial mechanics, cosmology, gravitation astrophysics, origin of structure, miscellaneous (matter and antimatter)
Procedia PDF Downloads 228835 Vénus Noire: A (Post)Colonial Gaze
Authors: Hania Pasandi
Abstract:
Over his first three films, Abdellatif Kechiche established himself as one of the most celebrated directors at work in twenty-first-century French cinema. While his first three movies, La Faute à Voltaire (2000), L’Esquive (2003), and La Graine et le mulet (2007) tell stories about individuals of the Maghrebi origin or descent struggling to find their place in the contemporary French Republic, his 2010’s movie, Vénus noire (2010) recounts the true story of the so-called ‘Hottentot Venus’, Saartjie Baartman, who became famous after her stage appearances in London and Paris in the early eighteenth century. The movie shows the complex ways in which gender and ethnicity can combine in exclusionary discourse. This paper studies gender and racial identities, the irony of science theorisation about ethnicities through the male colonial gaze on a heavily exhibited woman. This paper explores how Vénus Noire engages the spectator’s own corporeal awareness of violence and calls attention to the othering practices of (post)colonial times.Keywords: gender, (post)colonial gaze, other, violence
Procedia PDF Downloads 139834 Polycyclic Aromatic Hydrocarbons: Pollution and Ecological Risk Assessment in Surface Soil of the Tezpur Town, on the North Bank of the Brahmaputra River, Assam, India
Authors: Kali Prasad Sarma, Nibedita Baul, Jinu Deka
Abstract:
In the present study, pollution level of polycyclic aromatic hydrocarbon (PAH) in surface soil of historic Tezpur town located in the north bank of the River Brahmaputra were evaluated. In order to determine the seasonal distribution and concentration level of 16 USEPA priority PAHs surface soil samples were collected from 12 different sampling sites with various land use type. The total concentrations of 16 PAHs (∑16 PAHs) varied from 242.68µgkg-1to 7901.89µgkg-1. Concentration of total probable carcinogenic PAH ranged between 7.285µgkg-1 and 479.184 µgkg-1 in different seasons. However, the concentration of BaP, the most carcinogenic PAH, was found in the range of BDL to 50.01 µgkg-1. The composition profiles of PAHs in 3 different seasons were characterized by following two different types of ring: (1) 4-ring PAHs, contributed to highest percentage of total PAHs (43.75%) (2) while in pre- and post- monsoon season 3- ring compounds dominated the PAH profile, contributing 65.58% and 74.41% respectively. A high PAHs concentration with significant seasonality and high abundance of LMWPAHs was observed in Tezpur town. Soil PAHs toxicity was evaluated taking toxic equivalency factors (TEFs), which quantify the carcinogenic potential of other PAHs relative to BaP and estimate benzo[a]pyrene-equivalent concentration (BaPeq). The calculated BaPeq value signifies considerable risk to contact with soil PAHs. We applied cluster analysis and principal component analysis (PCA) with multivariate linear regression (MLR) to apportion sources of polycyclic aromatic hydrocarbons (PAHs) in surface soil of Tezpur town, based on the measured PAH concentrations. The results indicate that petrogenic and pyrogenic sources are the important sources of PAHs. A combination of chemometric and molecular indices were used to identify the sources of PAHs, which could be attributed to vehicle emissions, a mixed source input, natural gas combustion, wood or biomass burning and coal combustion. Source apportionment using absolute principle component scores–multiple linear regression showed that the main sources of PAHs are 22.3% mix sources comprising of diesel and biomass combustion and petroleum spill,13.55% from vehicle emission, 9.15% from diesel and natural gas burning, 38.05% from wood and biomass burning and 16.95% contribute coal combustion. Pyrogenic input was found to dominate source of PAHs origin with more contribution from vehicular exhaust. PAHs have often been found to co-emit with other environmental pollutants like heavy metals due to similar source of origin. A positive correlation was observed between PAH with Cr and Pb (r2 = 0.54 and 0.55 respectively) in monsoon season and PAH with Cd and Pb (r2 = 0.54 and 0.61 respectively) indicating their common source. Strong correlation was observed between PAH and OC during pre- and post- monsoon (r2=0.46 and r2=0.65 respectively) whereas during monsoon season no significant correlation was observed (r2=0.24).Keywords: polycyclic aromatic hydrocarbon, Tezpur town, chemometric analysis, ecological risk assessment, pollution
Procedia PDF Downloads 213833 Aggregation Scheduling Algorithms in Wireless Sensor Networks
Authors: Min Kyung An
Abstract:
In Wireless Sensor Networks which consist of tiny wireless sensor nodes with limited battery power, one of the most fundamental applications is data aggregation which collects nearby environmental conditions and aggregates the data to a designated destination, called a sink node. Important issues concerning the data aggregation are time efficiency and energy consumption due to its limited energy, and therefore, the related problem, named Minimum Latency Aggregation Scheduling (MLAS), has been the focus of many researchers. Its objective is to compute the minimum latency schedule, that is, to compute a schedule with the minimum number of timeslots, such that the sink node can receive the aggregated data from all the other nodes without any collision or interference. For the problem, the two interference models, the graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR), have been adopted with different power models, uniform-power and non-uniform power (with power control or without power control), and different antenna models, omni-directional antenna and directional antenna models. In this survey article, as the problem has proven to be NP-hard, we present and compare several state-of-the-art approximation algorithms in various models on the basis of latency as its performance measure.Keywords: data aggregation, convergecast, gathering, approximation, interference, omni-directional, directional
Procedia PDF Downloads 229832 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey
Authors: Stephanie M. De Oliveira
Abstract:
For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.Keywords: refugees, Turkey, asylum seekers, United Nations
Procedia PDF Downloads 368