Search results for: maxim infringement recognition
1167 Digi-Buddy: A Smart Cane with Artificial Intelligence and Real-Time Assistance
Authors: Amaladhithyan Krishnamoorthy, Ruvaitha Banu
Abstract:
Vision is considered as the most important sense in humans, without which leading a normal can be often difficult. There are many existing smart canes for visually impaired with obstacle detection using ultrasonic transducer to help them navigate. Though the basic smart cane increases the safety of the users, it does not help in filling the void of visual loss. This paper introduces the concept of Digi-Buddy which is an evolved smart cane for visually impaired. The cane consists for several modules, apart from the basic obstacle detection features; the Digi-Buddy assists the user by capturing video/images and streams them to the server using a wide-angled camera, which then detects the objects using Deep Convolutional Neural Network. In addition to determining what the particular image/object is, the distance of the object is assessed by the ultrasonic transducer. The sound generation application, modelled with the help of Natural Language Processing is used to convert the processed images/object into audio. The object detected is signified by its name which is transmitted to the user with the help of Bluetooth hear phones. The object detection is extended to facial recognition which maps the faces of the person the user meets in the database of face images and alerts the user about the person. One of other crucial function consists of an automatic-intimation-alarm which is triggered when the user is in an emergency. If the user recovers within a set time, a button is provisioned in the cane to stop the alarm. Else an automatic intimation is sent to friends and family about the whereabouts of the user using GPS. In addition to safety and security by the existing smart canes, the proposed concept devices to be implemented as a prototype helping visually-impaired visualize their surroundings through audio more in an amicable way.Keywords: artificial intelligence, facial recognition, natural language processing, internet of things
Procedia PDF Downloads 3551166 Using Convolutional Neural Networks to Distinguish Different Sign Language Alphanumerics
Authors: Stephen L. Green, Alexander N. Gorban, Ivan Y. Tyukin
Abstract:
Within the past decade, using Convolutional Neural Networks (CNN)’s to create Deep Learning systems capable of translating Sign Language into text has been a breakthrough in breaking the communication barrier for deaf-mute people. Conventional research on this subject has been concerned with training the network to recognize the fingerspelling gestures of a given language and produce their corresponding alphanumerics. One of the problems with the current developing technology is that images are scarce, with little variations in the gestures being presented to the recognition program, often skewed towards single skin tones and hand sizes that makes a percentage of the population’s fingerspelling harder to detect. Along with this, current gesture detection programs are only trained on one finger spelling language despite there being one hundred and forty-two known variants so far. All of this presents a limitation for traditional exploitation for the state of current technologies such as CNN’s, due to their large number of required parameters. This work aims to present a technology that aims to resolve this issue by combining a pretrained legacy AI system for a generic object recognition task with a corrector method to uptrain the legacy network. This is a computationally efficient procedure that does not require large volumes of data even when covering a broad range of sign languages such as American Sign Language, British Sign Language and Chinese Sign Language (Pinyin). Implementing recent results on method concentration, namely the stochastic separation theorem, an AI system is supposed as an operate mapping an input present in the set of images u ∈ U to an output that exists in a set of predicted class labels q ∈ Q of the alphanumeric that q represents and the language it comes from. These inputs and outputs, along with the interval variables z ∈ Z represent the system’s current state which implies a mapping that assigns an element x ∈ ℝⁿ to the triple (u, z, q). As all xi are i.i.d vectors drawn from a product mean distribution, over a period of time the AI generates a large set of measurements xi called S that are grouped into two categories: the correct predictions M and the incorrect predictions Y. Once the network has made its predictions, a corrector can then be applied through centering S and Y by subtracting their means. The data is then regularized by applying the Kaiser rule to the resulting eigenmatrix and then whitened before being split into pairwise, positively correlated clusters. Each of these clusters produces a unique hyperplane and if any element x falls outside the region bounded by these lines then it is reported as an error. As a result of this methodology, a self-correcting recognition process is created that can identify fingerspelling from a variety of sign language and successfully identify the corresponding alphanumeric and what language the gesture originates from which no other neural network has been able to replicate.Keywords: convolutional neural networks, deep learning, shallow correctors, sign language
Procedia PDF Downloads 1011165 Pioneering Conservation of Aquatic Ecosystems under Australian Law
Authors: Gina M. Newton
Abstract:
Australia’s Environment Protection and Biodiversity Conservation Act (EPBC Act) is the premiere, national law under which species and 'ecological communities' (i.e., like ecosystems) can be formally recognised and 'listed' as threatened across all jurisdictions. The listing process involves assessment against a range of criteria (similar to the IUCN process) to demonstrate conservation status (i.e., vulnerable, endangered, critically endangered, etc.) based on the best available science. Over the past decade in Australia, there’s been a transition from almost solely terrestrial to the first aquatic threatened ecological community (TEC or ecosystem) listings (e.g., River Murray, Macquarie Marshes, Coastal Saltmarsh, Salt-wedge Estuaries). All constitute large areas, with some including multiple state jurisdictions. Development of these conservation and listing advices has enabled, for the first time, a more forensic analysis of three key factors across a range of aquatic and coastal ecosystems: -the contribution of invasive species to conservation status, -how to demonstrate and attribute decline in 'ecological integrity' to conservation status, and, -identification of related priority conservation actions for management. There is increasing global recognition of the disproportionate degree of biodiversity loss within aquatic ecosystems. In Australia, legislative protection at Commonwealth or State levels remains one of the strongest conservation measures. Such laws have associated compliance mechanisms for breaches to the protected status. They also trigger the need for environment impact statements during applications for major developments (which may be denied). However, not all jurisdictions have such laws in place. There remains much opposition to the listing of freshwater systems – for example, the River Murray (Australia's largest river) and Macquarie Marshes (an internationally significant wetland) were both disallowed by parliament four months after formal listing. This was mainly due to a change of government, dissent from a major industry sector, and a 'loophole' in the law. In Australia, at least in the immediate to medium-term time frames, invasive species (aliens, native pests, pathogens, etc.) appear to be the number one biotic threat to the biodiversity and ecological function and integrity of our aquatic ecosystems. Consequently, this should be considered a current priority for research, conservation, and management actions. Another key outcome from this analysis was the recognition that drawing together multiple lines of evidence to form a 'conservation narrative' is a more useful approach to assigning conservation status. This also helps to addresses a glaring gap in long-term ecological data sets in Australia, which often precludes a more empirical data-driven approach. An important lesson also emerged – the recognition that while conservation must be underpinned by the best available scientific evidence, it remains a 'social and policy' goal rather than a 'scientific' goal. Communication, engagement, and 'politics' necessarily play a significant role in achieving conservation goals and need to be managed and resourced accordingly.Keywords: aquatic ecosystem conservation, conservation law, ecological integrity, invasive species
Procedia PDF Downloads 1331164 Audio-Visual Co-Data Processing Pipeline
Authors: Rita Chattopadhyay, Vivek Anand Thoutam
Abstract:
Speech is the most acceptable means of communication where we can quickly exchange our feelings and thoughts. Quite often, people can communicate orally but cannot interact or work with computers or devices. It’s easy and quick to give speech commands than typing commands to computers. In the same way, it’s easy listening to audio played from a device than extract output from computers or devices. Especially with Robotics being an emerging market with applications in warehouses, the hospitality industry, consumer electronics, assistive technology, etc., speech-based human-machine interaction is emerging as a lucrative feature for robot manufacturers. Considering this factor, the objective of this paper is to design the “Audio-Visual Co-Data Processing Pipeline.” This pipeline is an integrated version of Automatic speech recognition, a Natural language model for text understanding, object detection, and text-to-speech modules. There are many Deep Learning models for each type of the modules mentioned above, but OpenVINO Model Zoo models are used because the OpenVINO toolkit covers both computer vision and non-computer vision workloads across Intel hardware and maximizes performance, and accelerates application development. A speech command is given as input that has information about target objects to be detected and start and end times to extract the required interval from the video. Speech is converted to text using the Automatic speech recognition QuartzNet model. The summary is extracted from text using a natural language model Generative Pre-Trained Transformer-3 (GPT-3). Based on the summary, essential frames from the video are extracted, and the You Only Look Once (YOLO) object detection model detects You Only Look Once (YOLO) objects on these extracted frames. Frame numbers that have target objects (specified objects in the speech command) are saved as text. Finally, this text (frame numbers) is converted to speech using text to speech model and will be played from the device. This project is developed for 80 You Only Look Once (YOLO) labels, and the user can extract frames based on only one or two target labels. This pipeline can be extended for more than two target labels easily by making appropriate changes in the object detection module. This project is developed for four different speech command formats by including sample examples in the prompt used by Generative Pre-Trained Transformer-3 (GPT-3) model. Based on user preference, one can come up with a new speech command format by including some examples of the respective format in the prompt used by the Generative Pre-Trained Transformer-3 (GPT-3) model. This pipeline can be used in many projects like human-machine interface, human-robot interaction, and surveillance through speech commands. All object detection projects can be upgraded using this pipeline so that one can give speech commands and output is played from the device.Keywords: OpenVINO, automatic speech recognition, natural language processing, object detection, text to speech
Procedia PDF Downloads 801163 Analysis of the Best Interest of the Child Principle within a Marriage Law Framework: A Study of South Africa
Authors: Lizelle Ramaccio Calvino
Abstract:
Article 3 of the United Nations Convention on the Rights of Child states that 'The best interests of the child must be a top priority in all decisions and actions that affect children.' This stance is also echoed in terms of article 20 of the African Charter on the Rights and Welfare of the Child. South Africa, as a signatory of the aforesaid international and national conventions, constitutionalised the best interest of the child in terms of section 28(2) of the Republic of South Africa, 1996. Section 28(2) provides that '[A] child’s best interests are of paramount importance in every matter concerning the child.' The application of 'the best interests of the child' principle is consequently applicable in all fields of South African law, including matrimonial law. Two separate but equal Acts regulate civil marriages in South Africa, namely the Marriage Act 25 of 1961 and the Civil Union Act 17 of 2006. Customary marriages are regulated by the Recognition of Customary Marriages Act 120 of 1998. In terms of the Marriage Act and the Recognition of Customary Marriages Act, a minor may (provided he/she obtains the required consent) enter into a marriage. Despite the aforesaid, section 1 of the Civil Union Act categorically prohibits a minor from entering into a civil union. The article will first determine whether the ban of minors from entering into a civil union undermines the 'the best interests of the child' principle, and if so, whether it is in violation of the Constitution as well as international and national conventions. In addition, the article will critically analyse whether the application of the Marriage Act and the Civil Union Act (dual Acts) result in disparity within the South African marriage law framework, and if so, whether such discrepancy violates same-sex couples’ right (in particular a same-sex minor) to equality before the law and to have their dignity protected. The article intends, through the application of a qualitative research methodology and by way of a comparative analyses of international and domestic laws, consider whether a single well-defined structure such as the Dutch marriage law system would not be an improved alternative to address the existing paradox resulting from the application of an Act that undermines 'the best interest of the child' principle. Ultimately the article proposes recommendations for matrimonial law reform.Keywords: best interests of the child, civil marriage, civil union, minor
Procedia PDF Downloads 1781162 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 2521161 Case Report: Massive Deep Venous Thrombosis in a Young Female: A Rare and Fatal Presentation of May-Thurner Syndrome
Authors: Mahmoud Eldeeb, Yousri Mohamed
Abstract:
Background: May-Thurner Syndrome (MTS) is a rare vascular condition caused by the compression of the left common iliac vein by the overlying right common iliac artery, leading to venous stasis and an increased risk of deep vein thrombosis (DVT). While MTS typically presents in young adults, its diagnosis is often delayed due to its nonspecific presentation, which can lead to catastrophic complications like massive pulmonary embolism (PE). Early recognition and intervention are paramount to prevent fatal outcomes. Objectives: Highlight the importance of early recognition and management of critically ill patients presenting with life- and limb-threatening conditions. Raise awareness of May-Thurner Syndrome as a rare but significant cause of extensive DVT in young adults. Emphasize the necessity of a multidisciplinary approach to managing complex vascular emergencies. Methodology: A 21-year-old female presented with a 7-day history of progressive left leg swelling, pain, and skin discoloration following immobilization due to gastroenteritis. Clinical suspicion for massive DVT and compartment syndrome prompted immediate initiation of a heparin bolus and referrals to vascular and orthopedic surgery teams. Bedside Doppler ultrasound confirmed extensive DVT, and subsequent CT venography revealed thrombi extending to the inferior vena cava, consistent with MTS. Despite anticoagulation therapy, angioplasty and stenting were required to restore venous patency. Tragically, the patient experienced a massive PE during the procedure, requiring cardiopulmonary resuscitation (CPR) and transfer to a tertiary center for cardiothoracic intervention. Results: The case highlights the aggressive and life-threatening progression of MTS. The patient’s presentation was characterized by massive DVT with severe pain and discoloration, rapidly culminating in a PE during intervention. The combination of bedside imaging and CT venography facilitated an accurate diagnosis. Despite timely management, the patient’s course underscores the high mortality risk associated with MTS-related thromboembolism. Conclusion: May-Thurner Syndrome, though rare, can lead to devastating complications in young adults if not promptly recognized and treated. This case emphasizes the need for a high index of suspicion in patients presenting with unexplained extensive DVT, especially in the context of limited mobility or other precipitating factors. Multidisciplinary collaboration, including vascular imaging, anticoagulation, and interventional procedures, is critical to optimize outcomes. Urgent recognition and treatment of MTS are vital to prevent progression to massive PE and death.Keywords: may-thurner syndrome, deep venous thrombosis, pulmonary embolism, vascular emergency, iliac vein compression syndrome
Procedia PDF Downloads 111160 Assessment of Image Databases Used for Human Skin Detection Methods
Authors: Saleh Alshehri
Abstract:
Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.Keywords: image databases, image processing, pattern recognition, neural networks
Procedia PDF Downloads 2721159 The Dark Side of the Fight against Organised Crime
Authors: Ana M. Prieto del Pino
Abstract:
As is well known, UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) was a landmark regarding the seizure of proceeds of crime. Depriving criminals of the profits from their activity became a priority at an international level in the fight against organised crime. Enabling confiscation of proceeds of illicit traffic in narcotic drugs and psychotropic substances, criminalising money laundering and confiscating the proceeds thereof are the three measures taken in order to achieve that purpose. The beginning of 21st century brought the declaration of war on corruption and on the illicit enjoyment of the profits thereof onto the international scene. According to the UN Convention against Transnational Organised Crime (2000), States Parties should adopt the necessary measures to enable the confiscation of proceeds of crime derived from offences (or property of equivalent value) and property, equipment and other instrumentalities used in offences covered by that Convention. The UN Convention against Corruption (2003) states asset recovery explicitly as a fundamental principle and sets forth measures aiming at the direct recovery of property through international cooperation in confiscation. Furthermore, European legislation has made many significant strides forward in less than twenty years concerning money laundering, confiscation, and asset recovery. Crime does not pay, let there be no doubt about it. Nevertheless, we must be very careful not to sing out of tune with individual rights and legal guarantees. On the one hand, innocent individuals and businesses must be protected, since they should not pay for the guilty ones’ faults. On the other hand, the rule of law must be preserved and not be tossed aside regarding those who have carried out criminal activities. An in-depth analysis of judicial decisions on money laundering and confiscation of proceeds of crime issued by European national courts and by the European Court of Human Rights in the last decade has been carried out from a human rights, legal guarantees and criminal law basic principles’ perspective. The undertaken study has revealed the violation of the right to property, of the proportionality principle legal and the infringement of basic principles of states’ domestic substantive and procedural criminal law systems. The most relevant ones have to do with the punishment of money laundering committed through negligence, non-conviction based confiscation and a too-far reaching interpretation of the notion of ‘proceeds of crime’. Almost everything in life has a bright and a dark side. Confiscation of criminal proceeds and asset recovery are not an exception to this rule.Keywords: confiscation, human rights, money laundering, organized crime
Procedia PDF Downloads 1391158 Comparative Study of Skeletonization and Radial Distance Methods for Automated Finger Enumeration
Authors: Mohammad Hossain Mohammadi, Saif Al Ameri, Sana Ziaei, Jinane Mounsef
Abstract:
Automated enumeration of the number of hand fingers is widely used in several motion gaming and distance control applications, and is discussed in several published papers as a starting block for hand recognition systems. The automated finger enumeration technique should not only be accurate, but also must have a fast response for a moving-picture input. The high performance of video in motion games or distance control will inhibit the program’s overall speed, for image processing software such as Matlab need to produce results at high computation speeds. Since an automated finger enumeration with minimum error and processing time is desired, a comparative study between two finger enumeration techniques is presented and analyzed in this paper. In the pre-processing stage, various image processing functions were applied on a real-time video input to obtain the final cleaned auto-cropped image of the hand to be used for the two techniques. The first technique uses the known morphological tool of skeletonization to count the number of skeleton’s endpoints for fingers. The second technique uses a radial distance method to enumerate the number of fingers in order to obtain a one dimensional hand representation. For both discussed methods, the different steps of the algorithms are explained. Then, a comparative study analyzes the accuracy and speed of both techniques. Through experimental testing in different background conditions, it was observed that the radial distance method was more accurate and responsive to a real-time video input compared to the skeletonization method. All test results were generated in Matlab and were based on displaying a human hand for three different orientations on top of a plain color background. Finally, the limitations surrounding the enumeration techniques are presented.Keywords: comparative study, hand recognition, fingertip detection, skeletonization, radial distance, Matlab
Procedia PDF Downloads 3821157 Transition towards a Market Society: Commodification of Public Health in India and Pakistan
Authors: Mayank Mishra
Abstract:
Market Economy can be broadly defined as economic system where supply and demand regulate the economy and in which decisions pertaining to production, consumption, allocation of resources, price and competition are made by collective actions of individuals or organisations with limited government intervention. On the other hand Market Society is one where instead of the economy being embedded in social relations, social relations are embedded in the economy. A market economy becomes a market society when all of land, labour and capital are commodified. This transition also has effect on people’s attitude and values. Such a transition commence impacting the non-material aspect of life such as public education, public health and the like. The inception of neoliberal policies in non-market norms altered the nature of social goods like public health that raised the following questions. What impact would the transition to a market society make on people in terms of accessibility to public health? Is healthcare a commodity that can be subjected to a competitive market place? What kind of private investments are being made in public health and how do private investments alter the nature of a public good like healthcare? This research problem will employ empirical-analytical approach that includes deductive reasoning which will be using the existing concept of market economy and market society as a foundation for the analytical framework and the hypotheses to be examined. The research also intends to inculcate the naturalistic elements of qualitative methodology which refers to studying of real world situations as they unfold. The research will analyse the existing literature available on the subject. Concomitantly the research intends to access the primary literature which includes reports from the World Bank, World Health Organisation (WHO) and the different departments of respective ministries of the countries for the analysis. This paper endeavours to highlight how the issue of commodification of public health would lead to perpetual increase in its inaccessibility leading to stratification of healthcare services where one can avail the better services depending on the extent of one’s ability to pay. Since the fundamental maxim of private investments is to churn out profits, these kinds of trends would pose a detrimental effect on the society at large perpetuating the lacuna between the have and the have-nots.The increasing private investments, both, domestic and foreign, in public health sector are leading to increasing inaccessibility of public health services. Despite the increase in various public health schemes the quality and impact of government public health services are on a continuous decline.Keywords: commodity, India and Pakistan, market society, public health
Procedia PDF Downloads 3141156 Performing Marginality and Contestation of Ethnic Identity: Dynamics of Identity Politics in Assam, India
Authors: Hare Krishna Doley
Abstract:
Drawing upon empirical data, this paper tries to examine how ethnic groups like Ahom, Moran, Motok, and Chutia creates and recreates ethnic boundaries while making claims for recognition as Scheduled Tribes (STs) under the Sixth Schedule of the Constitution of India, in the state of Assam. Underlying such claim is the distinct identity consciousness amongst these groups as they assert themselves originally as tribe drawing upon primordial elements. For them, tribal identity promises social justice and give credence to their claims of indigeneity while preserving their exclusivity within the multifarious society of Assam. Having complex inter-group relationships, these groups under study displays distinct as well as overlapping identities, which demonstrate fluidity of identities across groups while making claims for recognition. In this process, the binary of ‘us’ and ‘them’ are often constructed amongst these groups, which are in turn difficult to grasp as they share common historical linkages. This paper attempts to grapple with such complex relationships the studied groups and their assertion as distinct cultural entities while making ethnic boundaries on the basis of socio-cultural identities. Such claims also involve frequent negotiation with the Sate as well as with other ethnic groups, which further creates strife among indigenous groups for tribal identity. The paper argues that identity consciousnesses amongst groups have persisted since the introduction of resource distribution on ethnic lines; therefore, issues of exclusive ethnic identity in the state of Assam can be contextualised within the colonial and post-colonial politics of redrawing ethnic and spatial boundaries. Narrative of the ethnic leaders who are in the forefront of struggle for ST status revealed that it is not merely to secure preferential treatment, but it also encompasses entitlement to land and their socio-cultural identity as aboriginal. While noting the genesis of struggle by the ethnic associations for ST status, this paper will also delineate the interactions among ethnic groups and how the identity of tribe is being performed by them to be included in the official categories of ST.Keywords: ethnic, identity, sixth schedule, tribe
Procedia PDF Downloads 2021155 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 2291154 Monitoring Potential Temblor Localities as a Supplemental Risk Control System
Authors: Mikhail Zimin, Svetlana Zimina, Maxim Zimin
Abstract:
Without question, the basic method of prevention of human and material losses is the provision for adequate strength of constructions. At the same time, seismic load has a stochastic character. So, at all times, there is little danger of earthquake forces exceeding the selected design load. This risk is very low, but the consequences of such events may be extremely serious. Very dangerous are also occasional mistakes in seismic zoning, soil conditions changing before temblors, and failure to take into account hazardous natural phenomena caused by earthquakes. Besides, it is known that temblors detrimentally affect the environmental situation in regions where they occur, resulting in panic and worsening various disease courses. It may lead to mistakes of personnel of hazardous production facilities like the production and distribution of gas and oil, which may provoke severe accidents. In addition, gas and oil pipelines often have long mileage and cross many perilous zones by contrast with buildings. This situation increases the risk of heavy accidents. In such cases, complex monitoring of potential earthquake localities would be relevant. Even though the number of successful real-time forecasts of earthquakes is not great, it is well in excess, such as may be under random guessing. Experimental performed time-lapse study and analysis consist of searching seismic, biological, meteorological, and light earthquake precursors, processing such data with the help of fuzzy sets, collecting weather information, utilizing a database of terrain, and computing risk of slope processes under the temblor in a given setting. Works were done in a real-time environment and broadly acceptable results took place. Observations from already in-place seismic recording systems are used. Furthermore, a look back study of precursors of known earthquakes is done. Situations before Ashkhabad, Tashkent, and Haicheng seismic events are analyzed. Fairish findings are obtained. Results of earthquake forecasts can be used for predicting dangerous natural phenomena caused by temblors such as avalanches and mudslides. They may also be utilized for prophylaxis of some diseases and their complications. Relevant software is worked out too. It should be emphasized that such control does not require serious financial expenses and can be performed by a small group of professionals. Thus, complex monitoring of potential earthquake localities, including short-term earthquake forecasts and analysis of possible hazardous consequences of temblors, may further the safety of pipeline facilities.Keywords: risk, earthquake, monitoring, forecast, precursor
Procedia PDF Downloads 241153 Dual Biometrics Fusion Based Recognition System
Authors: Prakash, Vikash Kumar, Vinay Bansal, L. N. Das
Abstract:
Dual biometrics is a subpart of multimodal biometrics, which refers to the use of a variety of modalities to identify and authenticate persons rather than just one. We limit the risks of mistakes by mixing several modals, and hackers have a tiny possibility of collecting information. Our goal is to collect the precise characteristics of iris and palmprint, produce a fusion of both methodologies, and ensure that authentication is only successful when the biometrics match a particular user. After combining different modalities, we created an effective strategy with a mean DI and EER of 2.41 and 5.21, respectively. A biometric system has been proposed.Keywords: multimodal, fusion, palmprint, Iris, EER, DI
Procedia PDF Downloads 1471152 Current Issues of Cross-Border Enforcement
Authors: Gábor Kocsmárik
Abstract:
The topic of this is coercive measures against assets in which the factor of the procedure contains a foreign element. We speak of cross-border enforcement if the debtor or the property requesting enforcement or subject to enforcement is not located in the bordering country. Given that the jurisdiction of a country cannot extend beyond its borders, the cooperation of nations and the mutual recognition of their decisions are necessary to eliminate this. In addition, it is essential to create framework rules that are binding and enforceable for each country participating in the convention. During the study, some conventions between countries that are still in force will be presented, which can serve as a starting point for dealing with existing problems.Keywords: law, execution, civil procedure law, international
Procedia PDF Downloads 381151 Pupil Size: A Measure of Identification Memory in Target Present Lineups
Authors: Camilla Elphick, Graham Hole, Samuel Hutton, Graham Pike
Abstract:
Pupil size has been found to change irrespective of luminosity, suggesting that it can be used to make inferences about cognitive processes, such as cognitive load. To see whether identifying a target requires a different cognitive load to rejecting distractors, the effect of viewing a target (compared with viewing distractors) on pupil size was investigated using a sequential video lineup procedure with two lineup sessions. Forty one participants were chosen randomly via the university. Pupil sizes were recorded when viewing pre target distractors and post target distractors and compared to pupil size when viewing the target. Overall, pupil size was significantly larger when viewing the target compared with viewing distractors. In the first session, pupil size changes were significantly different between participants who identified the target (Hits) and those who did not. Specifically, the pupil size of Hits reduced significantly after viewing the target (by 26%), suggesting that cognitive load reduced following identification. The pupil sizes of Misses (who made no identification) and False Alarms (who misidentified a distractor) did not reduce, suggesting that the cognitive load remained high in participants who failed to make the correct identification. In the second session, pupil sizes were smaller overall, suggesting that cognitive load was smaller in this session, and there was no significant difference between Hits, Misses and False Alarms. Furthermore, while the frequency of Hits increased, so did False Alarms. These two findings suggest that the benefits of including a second session remain uncertain, as the second session neither provided greater accuracy nor a reliable way to measure it. It is concluded that pupil size is a measure of face recognition strength in the first session of a target present lineup procedure. However, it is still not known whether cognitive load is an adequate explanation for this, or whether cognitive engagement might describe the effect more appropriately. If cognitive load and cognitive engagement can be teased apart with further investigation, this would have positive implications for understanding eyewitness identification. Nevertheless, this research has the potential to provide a tool for improving the reliability of lineup procedures.Keywords: cognitive load, eyewitness identification, face recognition, pupillometry
Procedia PDF Downloads 4051150 A CORDIC Based Design Technique for Efficient Computation of DCT
Authors: Deboraj Muchahary, Amlan Deep Borah Abir J. Mondal, Alak Majumder
Abstract:
A discrete cosine transform (DCT) is described and a technique to compute it using fast Fourier transform (FFT) is developed. In this work, DCT of a finite length sequence is obtained by incorporating CORDIC methodology in radix-2 FFT algorithm. The proposed methodology is simple to comprehend and maintains a regular structure, thereby reducing computational complexity. DCTs are used extensively in the area of digital processing for the purpose of pattern recognition. So the efficient computation of DCT maintaining a transparent design flow is highly solicited.Keywords: DCT, DFT, CORDIC, FFT
Procedia PDF Downloads 4811149 Mesalazine-Induced Myopericarditis in a Professional Athlete
Authors: Tristan R. Fraser, Christopher D. Steadman, Christopher J. Boos
Abstract:
Myopericarditis is an inflammation syndrome characterised by clinical diagnostic criteria for pericarditis, such as chest pain, combined with evidence of myocardial involvement, such as elevation of biomarkers of myocardial damage, e.g., troponins. It can rarely be a complication of therapeutics used for dysregulated immune-mediated diseases such as inflammatory bowel disease (IBD), for example, mesalazine. The infrequency of mesalazine-induced myopericarditis adds to the challenge in its recognition. Rapid diagnosis and the early introduction of treatment are crucial. This case report follows a 24-year-old professional footballer with a past medical history of ulcerative colitis, recently started on mesalazine for disease control. Three weeks after mesalazine was initiated, he was admitted with fever, shortness of breath, and chest pain worse whilst supine and on deep inspiration, as well as elevated venous blood cardiac troponin T level (cTnT, 288ng/L; normal: <13ng/L). Myocarditis was confirmed on initial inpatient cardiac MRI, revealing the presence of florid myocarditis with preserved left ventricular systolic function and an ejection fraction of 67%. This was a longitudinal case study following the progress of a single individual with myopericarditis over four acute hospital admissions over nine weeks, with admissions ranging from two to five days. Parameters examined included clinical signs and symptoms, serum troponin, transthoracic echocardiogram, and cardiac MRI. Serial measurements of cardiac function, including cardiac MRI and transthoracic echocardiogram, showed progressive deterioration of cardiac function whilst mesalazine was continued. Prior to cessation of mesalazine, transthoracic echocardiography revealed a small global pericardial effusion of < 1cm and worsening left ventricular systolic function with an ejection fraction of 45%. After recognition of mesalazine as a potential cause and consequent cessation of the drug, symptoms resolved, with cardiac MRI performed as an outpatient showing resolution of myocardial oedema. The patient plans to make a return to competitive sport. Patients suffering from myopericarditis are advised to refrain from competitive sport for at least six months in order to reduce the risk of cardiac remodelling and sudden cardiac death. Additional considerations must be taken in individuals for whom competitive sport is an essential component of their livelihood, such as professional athletes. Myopericarditis is an uncommon, however potentially serious medical condition with a wide variety of aetiologies, including viral, autoimmune, and drug-related causes. Management is mainly supportive and relies on prompt recognition and removal of the aetiological process. Mesalazine-induced myopericarditis is a rare condition; as such increasing awareness of mesalazine as a precipitant of myopericarditis is vital for optimising the management of these patients.Keywords: myopericarditis, mesalazine, inflammatory bowel disease, professional athlete
Procedia PDF Downloads 1371148 Sorting Fish by Hu Moments
Authors: J. M. Hernández-Ontiveros, E. E. García-Guerrero, E. Inzunza-González, O. R. López-Bonilla
Abstract:
This paper presents the implementation of an algorithm that identifies and accounts different fish species: Catfish, Sea bream, Sawfish, Tilapia, and Totoaba. The main contribution of the method is the fusion of the characteristics of invariance to the position, rotation and scale of the Hu moments, with the proper counting of fish. The identification and counting is performed, from an image under different noise conditions. From the experimental results obtained, it is inferred the potentiality of the proposed algorithm to be applied in different scenarios of aquaculture production.Keywords: counting fish, digital image processing, invariant moments, pattern recognition
Procedia PDF Downloads 4121147 Perceptions and Experiences of Learners on the Banning of Corporal Punishment in South African Schools
Authors: Londeka Ngubane
Abstract:
The use of corporal punishment is not a new phenomenon in the South African education system as it was, for a long time, recognised as a fitting form of punishment for ill-disciplined and disobedient children. The growing recognition that corporal punishment is an act of violence against children has resulted in the abolishment of this form of punishment in society and particularly in schools. However, regardless of criminalising corporal punishment, it appears to be a disciplinary measure that is persistently used by some educators. Historically and currently, the intimate connection between corporal punishment and discipline has not merely been a convention of human thinking, as this practice is given recognition in various definitions in dictionaries. ‘To discipline’ is habitually stated to mean ‘to punish’. The notion of ‘disciplining children’ also comes from entrenched common conceptions about children and their relationship with adults. Corporal punishment has, for a long time, been associated with the rearing and education of children, and this practice thus pervades schooling across nations. In many societies, punishment is a term that is closely linked with the self-perception of teachers who feel that they must be ‘in control’ and have ‘the upper hand’ in order to be respected. This impression of control is evident in the widespread conception of education which is to ‘socialize’ children in ‘desirable ways’ of ‘sitting in a formal classroom’, ‘behaving’ in school, ‘following instructions’ from the teacher, talking only when asked to, and finishing tasks on time. It was against this backdrop that a comprehensive review of relevant literature was undertaken and that individual interviews were conducted with fifty learners from four schools (two junior secondary and two senior secondary schools) in a selected township area in KwaZulu-Natal Province. The main aim of the study was to explore and thus understand learners’ views on the administration of corporal punishment regardless of the fact that it was legally abolished. It was envisaged that the interviews with the learners would elicit rich data that would enhance the researcher’s insight into their perceptions of the persistent use of corporal punishment as a disciplinary measure in their schools. The study was thus premised on the assumption, which had been strengthened by anecdotal and media evidence, that corporal punishment was still administered in some schools in South Africa and in schools in the study area in particular.Keywords: corporal punishment, ban, school learners, South Africa
Procedia PDF Downloads 1561146 Exploring the Role of Immune-Modulators in Pathogen Recognition Receptor NOD2 Mediated Protection against Visceral Leishmaniasis
Authors: Junaid Jibran Jawed, Prasanta Saini, Subrata Majumdar
Abstract:
Background: Leishmania donovani infection causes severe host immune-suppression through the modulation of pathogen recognition receptors. Apart from TLRs (Toll Like Receptor), recent studies focus on the important contribution of NLR (NOD-Like Receptor) family member NOD1 and NOD2 as these receptors are capable of triggering host innate immunity. The aim of this study was to decipher the role of NOD1/NOD2 receptors during experimental visceral leishmaniasis (VL) and the important link between host failure and parasite evasion strategy. Method: The status of NOD1 and NOD2 receptors were analysed in uninfected and infected cells through western blotting and RT-PCR. The active contributions of these receptors in reducing parasite burden were confirmed by siRNA mediated silencing, and over-expression studies and the parasite numbers were calculated through microscopic examination of the Giemsa-stained slides. In-vivo studies were done by using non-toxic dose of Mw (Mycobacterium indicus pranii), Ara-LAM(Arabinoasylated lipoarabinomannan) along with MDP (Muramyl dipeptide) administration. Result: Leishmania donovani infection of the macrophages reduced the expression of NOD2 receptors whereas NOD1 remain unaffected. MDP, a NOD2-ligand, treatment during over-expression of NOD2, reduced the parasite burden effectively which was associated with increased pro-inflammatory cytokine generation and NO production. In experimental mouse model, Ara-LAM treatment increased the expression of NOD2 and in combination with MDP it showed active therapeutic potential against VL and found to be more effective than Mw which was already reported to be involved in NOD2 modulation. Conclusion: This work explores the essential contribution of NOD2 during experimental VL and mechanistic understanding of Ara-LAM + MDP combination therapy to work against this disease and highlighted NOD2 as an essential therapeutic target.Keywords: Ara-LAM (Arabinoacylated Lipoarabinomannan), NOD2 (nucleotide binding oligomerization receptor 2), MDP (muramyl di peptide), visceral Leishmaniasis
Procedia PDF Downloads 1771145 Revolutionizing Product Packaging: The Impact of Transparent Graded Lanes on Ketchup and Edible Oils Containers on Consumer Behavior
Authors: Saeid Asghari
Abstract:
The growing interest in sustainability and healthy lifestyles has stimulated the development of solutions that promote mindful consumption and healthier choices. One such solution is the use of transparent graded lanes in product packaging, which enables consumers to visually track their product consumption and encourages portion control. However, the extent to which this packaging affects consumer behavior, trust, and loyalty towards a product or brand, as well as the effectiveness of messaging on the graded lanes, remains unclear. The research aims to examine the impact of transparent graded lanes on consumer behavior, trust, and loyalty towards products or brands in the context of the Janbo chain supermarket in Tehran, Iran, focusing on Ketchup and edible oils containers. A representative sample of 720 respondents is selected using quota sampling based on sex, age, and financial status. The study assesses the effect of messaging on the graded lanes in enhancing consumer recall and recognition of the product at the time of purchase, increasing repeat purchases, and fostering long-term relationships with customers. Furthermore, the potential outcomes of using transparent graded lanes, including the promotion of healthy consumption habits and the reduction of food waste, are also considered. The findings and results can inform the development of effective messaging strategies for graded lanes and suggest ways to enhance consumer engagement with product packaging. Moreover, the study's outcomes can contribute to the broader discourse on sustainable consumption and healthy lifestyles, highlighting the potential role of packaging innovations in promoting these values. We used four theories (social cognitive theory, self-perception theory, nudge theory, and marketing and consumer behavior) to examine the effect of these transparent graded lanes on consumer behavior. The conceptual model integrates the use of transparent graded lanes, consumer behavior, trust and loyalty, messaging, and promotion of healthy consumption habits. The study aims to provide insights into how transparent graded lanes can promote mindful consumption, increase consumer recognition and recall of the product, and foster long-term relationships with customers. Findings suggest that the use of transparent graded lanes on Ketchup and edible oils containers can have a positive impact on consumer behavior, trust, and loyalty towards a product or brand, as well as promote mindful consumption and healthier choices. The messaging on the graded lanes is also found to be effective in promoting recall and recognition of the product at the time of purchase and encouraging repeat purchases. However, the impact of transparent graded lanes may be limited by factors such as cultural norms, personal values, and financial status. Broadly speaking, the investigation provides valuable insights into the potential benefits and challenges of using transparent graded lanes in product packaging, as well as effective strategies for promoting healthy consumption habits and building long-term relationships with customers.Keywords: packaging customer behavior, purchase, brand loyalty, healthy consumption
Procedia PDF Downloads 2551144 Voices from Inside and the Power of Art to Transform and Restore
Authors: Karen Miner-Romanoff
Abstract:
Few art programs for incarcerated juveniles exist; however, evaluation results indicate decreased recidivism and behavior problems. This paper reports on an on-going study of a promising art program for incarcerated adolescents with community exhibits and charitable sale of their work. Voices from Inside, a partnership between Franklin University and the Ohio Department of Youth Services, sponsored three exhibits in 2012, 2013, and 2014. In 2013, youth exhibitor survey results (response rate 47%, 16 of 34) showed that 81% cited as benefits cooperation with others, task completion, and increased self-esteem from public recognition and art sales. Community attendee survey results (response rate 29.5%, 59 of 200) showed positive attitude changes toward juvenile offenders, from 40% to 53%. Qualitative responses were similarly positive. The 2014 youth exhibitor sample was larger (response rate 58%, 29 of 50) and showed that 93% cited positive benefits including increase in self-esteem, decrease in stress, pride or recognition of the ability to reach a goal from completing, exhibiting and selling their art to benefit a charity for at-risk youth. This year, the research was able to conduct ten one-on-one interviews inside of the youth facilities, and qualitative responses were even more positive with one youth explaining, “This art represents my joy, my tears, my pain and my hope.” Community attendee survey results (response rate 50%, 86 of 170) were transformative in that that they indicated significant impression on attitudes toward juvenile offenders and their rehabilitative needs with one attendee stating that the event had an, “Immense impact for me bringing into focus the humanity and value these youth still have for us and society.” Future research indicates a need for a correlation study to determine the extent to which these art programs reduce behavioral incidents inside of the facility and long-term reduction in reoffending rates. Generally, further study of juvenile offenders’ art for rehabilitation and restorative justice, the power of art to transform, and university-community partnerships implementing art programs for juvenile offenders should continue.Keywords: art, juvenile, incarcerated, restorative justice
Procedia PDF Downloads 4311143 MR Imaging Spectrum of Intracranial Infections: An Experience of 100 Cases in a Tertiary Hospital in Northern India
Authors: Avik Banerjee, Kavita Saggar
Abstract:
Infections of the nervous system and adjacent structures are often life-threatening conditions. Despite the recent advances in neuroimaging evaluation, the diagnosis of unclear infectious CNS disease remains a challenge. Our aim is to evaluate the typical and atypical neuro-imaging features of the various routinely encountered CNS infected patients so as to form guidelines for their imaging recognition and differentiation from tumoral, vascular and other entities that warrant a different line of therapy.Keywords: central nervous system (CNS), Cerebro Spinal Fluid (Csf), Creutzfeldt Jakob Disease (CJD), progressive multifocal leukoencephalopathy (PML)
Procedia PDF Downloads 3011142 Image Processing-Based Maize Disease Detection Using Mobile Application
Authors: Nathenal Thomas
Abstract:
In the food chain and in many other agricultural products, corn, also known as maize, which goes by the scientific name Zea mays subsp, is a widely produced agricultural product. Corn has the highest adaptability. It comes in many different types, is employed in many different industrial processes, and is more adaptable to different agro-climatic situations. In Ethiopia, maize is among the most widely grown crop. Small-scale corn farming may be a household's only source of food in developing nations like Ethiopia. The aforementioned data demonstrates that the country's requirement for this crop is excessively high, and conversely, the crop's productivity is very low for a variety of reasons. The most damaging disease that greatly contributes to this imbalance between the crop's supply and demand is the corn disease. The failure to diagnose diseases in maize plant until they are too late is one of the most important factors influencing crop output in Ethiopia. This study will aid in the early detection of such diseases and support farmers during the cultivation process, directly affecting the amount of maize produced. The diseases in maize plants, such as northern leaf blight and cercospora leaf spot, have distinct symptoms that are visible. This study aims to detect the most frequent and degrading maize diseases using the most efficiently used subset of machine learning technology, deep learning so, called Image Processing. Deep learning uses networks that can be trained from unlabeled data without supervision (unsupervised). It is a feature that simulates the exercises the human brain goes through when digesting data. Its applications include speech recognition, language translation, object classification, and decision-making. Convolutional Neural Network (CNN) for Image Processing, also known as convent, is a deep learning class that is widely used for image classification, image detection, face recognition, and other problems. it will also use this algorithm as the state-of-the-art for my research to detect maize diseases by photographing maize leaves using a mobile phone.Keywords: CNN, zea mays subsp, leaf blight, cercospora leaf spot
Procedia PDF Downloads 751141 Working Capital Management Effectiveness
Authors: Asif Iqbal
Abstract:
Working capital management has its effect on liquidity as well as on profitability of a firm. In this research we have selected a sample of 100 respondents whose firms are listed on Karachi stock exchange. We have studied the effect of different variable s of working capital management. We find that organizations throughout the world as well as in Pakistan have to give immense recognition to the working capital management as it is an effective thing from their long term perspective especially to their shareholders to have a firm confidence over the companies for investment purpose.Keywords: working capital management, Karachi stock exchange, shareholders, capital management
Procedia PDF Downloads 5751140 Methodology to Achieve Non-Cooperative Target Identification Using High Resolution Range Profiles
Authors: Olga Hernán-Vega, Patricia López-Rodríguez, David Escot-Bocanegra, Raúl Fernández-Recio, Ignacio Bravo
Abstract:
Non-Cooperative Target Identification has become a key research domain in the Defense industry since it provides the ability to recognize targets at long distance and under any weather condition. High Resolution Range Profiles, one-dimensional radar images where the reflectivity of a target is projected onto the radar line of sight, are widely used for identification of flying targets. According to that, to face this problem, an approach to Non-Cooperative Target Identification based on the exploitation of Singular Value Decomposition to a matrix of range profiles is presented. Target Identification based on one-dimensional radar images compares a collection of profiles of a given target, namely test set, with the profiles included in a pre-loaded database, namely training set. The classification is improved by using Singular Value Decomposition since it allows to model each aircraft as a subspace and to accomplish recognition in a transformed domain where the main features are easier to extract hence, reducing unwanted information such as noise. Singular Value Decomposition permits to define a signal subspace which contain the highest percentage of the energy, and a noise subspace which will be discarded. This way, only the valuable information of each target is used in the recognition process. The identification algorithm is based on finding the target that minimizes the angle between subspaces and takes place in a transformed domain. Two metrics, F1 and F2, based on Singular Value Decomposition are accomplished in the identification process. In the case of F2, the angle is weighted, since the top vectors set the importance in the contribution to the formation of a target signal, on the contrary F1 simply shows the evolution of the unweighted angle. In order to have a wide database or radar signatures and evaluate the performance, range profiles are obtained through numerical simulation of seven civil aircraft at defined trajectories taken from an actual measurement. Taking into account the nature of the datasets, the main drawback of using simulated profiles instead of actual measured profiles is that the former implies an ideal identification scenario, since measured profiles suffer from noise, clutter and other unwanted information and simulated profiles don't. In this case, the test and training samples have similar nature and usually a similar high signal-to-noise ratio, so as to assess the feasibility of the approach, the addition of noise has been considered before the creation of the test set. The identification results applying the unweighted and weighted metrics are analysed for demonstrating which algorithm provides the best robustness against noise in an actual possible scenario. So as to confirm the validity of the methodology, identification experiments of profiles coming from electromagnetic simulations are conducted, revealing promising results. Considering the dissimilarities between the test and training sets when noise is added, the recognition performance has been improved when weighting is applied. Future experiments with larger sets are expected to be conducted with the aim of finally using actual profiles as test sets in a real hostile situation.Keywords: HRRP, NCTI, simulated/synthetic database, SVD
Procedia PDF Downloads 3541139 Recognition of International Internships for Students at European Level
Authors: Tiron-Tudor Adriana, Ciolomic Ioana, Farcas Teodora
Abstract:
The mission of a business school is to train students for business careers in which practical skills- based on theoretical knowledge- are needed. These skills include a thorough knowledge of languages, creative skills, and well-founded professional and practical knowledge. With those skills, the graduates are highly competitive in the labour market. The paper objective is to disseminate the results of an international project by revealing how a HEI are prepared for higher vocational training course leading to professional diplomas.Keywords: vocational education, business schools, international projects, HEI
Procedia PDF Downloads 4121138 The Effects of Stoke's Drag, Electrostatic Force and Charge on Penetration of Nanoparticles through N95 Respirators
Authors: Jacob Schwartz, Maxim Durach, Aniruddha Mitra, Abbas Rashidi, Glen Sage, Atin Adhikari
Abstract:
NIOSH (National Institute for Occupational Safety and Health) approved N95 respirators are commonly used by workers in construction sites where there is a large amount of dust being produced from sawing, grinding, blasting, welding, etc., both electrostatically charged and not. A significant portion of airborne particles in construction sites could be nanoparticles created beside coarse particles. The penetration of the particles through the masks may differ depending on the size and charge of the individual particle. In field experiments relevant to this current study, we found that nanoparticles of medium size ranges are penetrating more frequently than nanoparticles of smaller and larger sizes. For example, penetration percentages of nanoparticles of 11.5 – 27.4 nm into a sealed N95 respirator on a manikin head ranged from 0.59 to 6.59%, whereas nanoparticles of 36.5 – 86.6 nm ranged from 7.34 to 16.04%. The possible causes behind this increased penetration of mid-size nanoparticles through mask filters are not yet explored. The objective of this study is to identify causes behind this unusual behavior of mid-size nanoparticles. We have considered such physical factors as Boltzmann distribution of the particles in thermal equilibrium with the air, kinetic energy of the particles at impact on the mask, Stoke’s drag force, and electrostatic forces in the mask stopping the particles. When the particles collide with the mask, only the particles that have enough kinetic energy to overcome the energy loss due to the electrostatic forces and the Stokes’ drag in the mask can pass through the mask. To understand this process, the following assumptions were made: (1) the effect of Stoke’s drag depends on the particles’ velocity at entry into the mask; (2) the electrostatic force is proportional to the charge on the particles, which in turn is proportional to the surface area of the particles; (3) the general dependence on electrostatic charge and thickness means that for stronger electrostatic resistance in the masks and thicker the masks’ fiber layers the penetration of particles is reduced, which is a sensible conclusion. In sampling situations where one mask was soaked in alcohol eliminating electrostatic interaction the penetration was much larger in the mid-range than the same mask with electrostatic interaction. The smaller nanoparticles showed almost zero penetration most likely because of the small kinetic energy, while the larger sized nanoparticles showed almost negligible penetration most likely due to the interaction of the particle with its own drag force. If there is no electrostatic force the fraction for larger particles grows. But if the electrostatic force is added the fraction for larger particles goes down, so diminished penetration for larger particles should be due to increased electrostatic repulsion, may be due to increased surface area and therefore larger charge on average. We have also explored the effect of ambient temperature on nanoparticle penetrations and determined that the dependence of the penetration of particles on the temperature is weak in the range of temperatures in the measurements 37-42°C, since the factor changes in the range from 3.17 10-3K-1 to 3.22 10-3K-1.Keywords: respiratory protection, industrial hygiene, aerosol, electrostatic force
Procedia PDF Downloads 195