Search results for: mutual interference
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 999

Search results for: mutual interference

399 Electromagnetic Interface Shielding of Graphene Oxide–Carbon Nanotube Hybrid ABS Composites

Authors: Jeevan Jyoti, Bhanu Pratap Singh, S. R. Dhakate

Abstract:

In the present study, multiwalled carbon nanotubes (MWCNTs) and reduced graphene oxide (RGO) were synthesized by chemical vapor deposition and Improved Hummer’s method, respectively and their composite with acrylonitrile butadiene styrene (ABS) were prepared by twin screw co rotating extrusion technique. The electromagnetic interference (EMI) shielding effectiveness of graphene oxide carbon nanotube (GCNTs) hybrid composites was investigated and the results were compared with EMI shielding of carbon nanotube (CNTs) and reduced graphene oxide (RGO) in the frequency range of 12.4-18 GHz (Ku-band). The experimental results indicate that the EMI shielding effectiveness of these composites is achieved up to –21 dB for 10 wt. % loading of GCNT loading. The mechanism of improvement in EMI shielding effectiveness is discussed by resolving their contribution in absorption and reflection loss. The main reason for such a high improved shielding effectiveness has been attributed to the significant improvement in the electrical conductivity of the composites. The electrical conductivity of these GCNT/ABS composites was increased from 10-13 S/cm to 10-7 S/cm showing the improvement of the 6 order of the magnitude. Scanning electron microscopic (SEM) and high resolution transmission electron microscopic (HRTEM) studies showed that the GCNTs were uniformly dispersed in the ABS polymer matrix. GCNTs form a network throughout the polymer matrix and promote the reinforcement.

Keywords: ABS, EMI shielding, multiwalled carbon nanotubes, reduced graphene oxide, graphene, oxide-carbon nanotube (GCNTs), twin screw extruder, multiwall carbon nanotube, electrical conductivity

Procedia PDF Downloads 338
398 A Follow up Study on Indoor 222Rn, 220Rn and Their Decay Product Concentrations in a Mineralized Zone of Himachal Pradesh, India

Authors: B. S. Bajwa, Parminder Singh, Prabhjot Singh, Surinder Singh, B. K. Sahoo, B. K. Sapra

Abstract:

A follow up study was taken up in a mineralized zone situated in Hamirpur district, Himachal Pradesh, India to investigate high values of radon concentration reported in past studies as well to update the old radon data based on bare SSNTD technique. In the present investigation, indoor radon, thoron and their decay products concentrations have been measured using the newly developed Radon-Thoron discriminating diffusion chamber with single entry face, direct radon and thoron progeny sensors (DRPS/DTPS) respectively. The measurements have been carried out in seventy five dwellings of fourteen different villages. Houses were selected taking into consideration of the past data as well as the type of houses such as mud, concrete, brick etc. It was observed that high values of earlier reported radon concentrations were mainly because of thoron interference in the Solid State Nuclear Track Detector (LR-115 type II) exposed in bare mode. Now, the average concentration values and the estimated annual inhalation dose in these villages have been found to be within the reference level as recommended by the ICRP. The annual average indoor radon and thoron concentrations observed in these dwellings have been found to vary from 44±12-157±73 Bq m-3 and 44±11-240±125 Bq m-3 respectively. The equilibrium equivalent concentrations of radon and thoron decay products have been observed to be in the range of 10-63 Bq m-3 and 1-5 Bq m-3 respectively.

Keywords: radon, thoron, progeny concentration, dosimeter

Procedia PDF Downloads 433
397 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 236
396 Integrating Cost-Benefit Assessment and Contract Design to Support Industrial Symbiosis Deployment

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) is the realization of Industrial Ecology (I.E) principles in production systems in function. I.S consists in the use of waste materials, fatal energy, recirculated utilities and infrastructure/service sharing as resources for production. Environmental benefits can be achieved from resource conservation but economic profitability is required by the participating actors. I.S indeed involves several actors with their own objectives and resources so that each one must be satisfied by ex-ante arrangements to commit toward I.S execution (investments and transactions). Following the Resource-Based View of transactions we build a modular framework to assess global I.S profitability and to specify each actor’s contributions to costs and benefits in line with their resource endowments and performance requirements formulations. I.S projects specificities implied by the need for customization (asset specificity, non-homogeneity) induce the use of long-term contracts for transactions following Transaction costs economics arguments. Thus we propose first a taxonomy of costs and value drivers for I.S and an assignment to each actor of I.S specific risks that we identified as load profiles mismatch, quality problems and value fluctuations. Then appropriate contractual guidelines (pricing, cost sharing and warranties) that support mutual profitability are derived from the detailed identification of contributions by the cost-benefits model. This analytical framework helps identifying what points to focus on when bargaining over contracting for transactions and investments. Our methodology is applied to I.S archetypes raised from a literature survey on eco-industrial parks initiatives and practitioners interviews.

Keywords: contracts, cost-benefit analysis, industrial symbiosis, risks

Procedia PDF Downloads 321
395 Service Delivery Disparity Conundrum at Winnie Madikizela Mandela Local Municipality: Exploration of the Enhanced Future

Authors: Mandisi Matyana

Abstract:

Although the South African local government is doing all the best in ensuring improved service delivery for the citizens, service delivery disparity still remains the real challenge for other municipalities. The unequal distribution of services within municipal wards is causing unequal happiness among the citizens; hence others do enjoy different provided municipal services, while others do not. It is acknowledged that less access to municipal services infringes one’s rights, such as the right to human dignity and the right to life. Some of the municipal services are basic services and they are the mainstay of human survival, such as water, housing, etc. It is quite evident that the service delivery disparity could be caused by the various factors within the local municipality affairs, including both administrative and political factors. Therefore, this study is undertaken to check and evaluate the main foundations of service delivery disparity in ensuring equal development of the state, particularly for local communities. The study used the qualitative method to collect the data from the citizens of Winnie Madikizela Mandela Local Municipality. An extensive literature was also conducted in understanding the causes of service delivery disparity. Study findings prove that the service delivery disparity could be caused by factors such as political interference in administration, corruption and fraud, elevated unemployment levels, inadequate institutional capacity, etc. Therefore, the study recommends strong community participation and constant external supervision in the local government so as to encourage openness in local government to ensure fair administration towards services to be provided.

Keywords: administration, development, municipal services, service delivery disparity, Winnie Madikizela Mandela local municipality

Procedia PDF Downloads 93
394 Low Complexity Carrier Frequency Offset Estimation for Cooperative Orthogonal Frequency Division Multiplexing Communication Systems without Cyclic Prefix

Authors: Tsui-Tsai Lin

Abstract:

Cooperative orthogonal frequency division multiplexing (OFDM) transmission, which possesses the advantages of better connectivity, expanded coverage, and resistance to frequency selective fading, has been a more powerful solution for the physical layer in wireless communications. However, such a hybrid scheme suffers from the carrier frequency offset (CFO) effects inherited from the OFDM-based systems, which lead to a significant degradation in performance. In addition, insertion of a cyclic prefix (CP) at each symbol block head for combating inter-symbol interference will lead to a reduction in spectral efficiency. The design on the CFO estimation for the cooperative OFDM system without CP is a suspended problem. This motivates us to develop a low complexity CFO estimator for the cooperative OFDM decode-and-forward (DF) communication system without CP over the multipath fading channel. Especially, using a block-type pilot, the CFO estimation is first derived in accordance with the least square criterion. A reliable performance can be obtained through an exhaustive two-dimensional (2D) search with a penalty of heavy computational complexity. As a remedy, an alternative solution realized with an iteration approach is proposed for the CFO estimation. In contrast to the 2D-search estimator, the iterative method enjoys the advantage of the substantially reduced implementation complexity without sacrificing the estimate performance. Computer simulations have been presented to demonstrate the efficacy of the proposed CFO estimation.

Keywords: cooperative transmission, orthogonal frequency division multiplexing (OFDM), carrier frequency offset, iteration

Procedia PDF Downloads 249
393 A Novel Machining Method and Tool-Path Generation for Bent Mandrel

Authors: Hong Lu, Yongquan Zhang, Wei Fan, Xiangang Su

Abstract:

Bent mandrel has been widely used as precise mould in automobile industry, shipping industry and aviation industry. To improve the versatility and efficiency of turning method of bent mandrel with fixed rotational center, an instantaneous machining model based on cutting parameters and machine dimension is prospered in this paper. The spiral-like tool path generation approach in non-axisymmetric turning process of bent mandrel is developed as well to deal with the error of part-to-part repeatability in existed turning model. The actual cutter-location points are calculated by cutter-contact points, which are obtained from the approach of spiral sweep process using equal-arc-length segment principle in polar coordinate system. The tool offset is set to avoid the interference between tool and work piece is also considered in the machining model. Depend on the spindle rotational angle, synchronization control of X-axis, Z-axis and C-axis is adopted to generate the tool-path of the turning process. The simulation method is developed to generate NC program according to the presented model, which includes calculation of cutter-location points and generation of tool-path of cutting process. With the approach of a bent mandrel taken as an example, the maximum offset of center axis is 4mm in the 3D space. Experiment results verify that the machining model and turning method are appropriate for the characteristics of bent mandrel.

Keywords: bent mandrel, instantaneous machining model, simulation method, tool-path generation

Procedia PDF Downloads 317
392 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 508
391 Military Orchestrated Leadership Change in Zimbabwe and the Quest for Political Transition

Authors: Patrick Dzimiri

Abstract:

This chapter discusses the military-orchestrated leadership change in Zimbabwe that transpired in November 2017. Fundamentally, the chapter provides a critical examination of military interference in the country's politics and its implications for a political transition in the post-Mugabe dispensation. This chapter offers insight into Zimbabwe's political crises propelled by the lack of a succession plan. It emerged that the succession battle within ZANU-PF got complicated by the militarisation of factionalism. The chapter builds from an extensive review of primary and secondary data sources on political developments before and post-Mugabe era. Vilfredo Pareto's (1848-18923) theory on elite circulation is deployed herein to explain the absence of a succession mechanism within ZANU-PF and the militarisation of socio-politics life Zimbabwe. The chapter argues that what transpired in Zimbabwe’s power wrangle within the ZANU-PF political elites was triggered by a lack of a clear succession policy. Building from insights offered by Pareto's theory of elite circulation, it is averred that the removal of Mugabe by the military did not herald any form of political transition but rather a mere power play of one elite replacing another. In addition, it is argued that the lack of political reform by the Mnangagwa government affirms the position that political elites seek power for personal self-actualisation and not the public good. The chapter concludes that Mnangagwa's rise to power is nothing but a new elite displacing the old elite structure and does not herald a positive transition and transformation in the politics of Zimbabwe.

Keywords: military, politics, zimbabwe, governance, political transition

Procedia PDF Downloads 68
390 The Effect of Gender Differences on Mate Selection in Private University

Authors: Hui Min Kong, Rajalakshmi A/P Ganesan

Abstract:

The present study was conducted to investigate the effect of gender differences in mate selection in a private university. Mate selection is an important process and decision to the people around the world, especially for single people. The future partner we have chosen could be our lifetime friend, supporter, and lover. Mate selection is important to us, but we have never fully understood the evolution of gender differences in mate selection. Besides, there was an insufficient empirical finding of gender differences in mate selection in Malaysia. Hence, the research would allow us to understand our feelings and thoughts about our future partners. The research null hypotheses have stated that there was no significant difference on 18 mate selections characteristics between males and females. A quantitative method was performed to test the hypotheses through independent t-test. There was a total of 373 heterosexual participants with the age range of 18 to 35 in the study. The instrument used was Factors in choosing a mate developed by Buss and Barnes (1986). Results indicated that females (M= 26.69) were found to be highly valued on refinement and neatness, good financial prospect, dependable character, emotional stability and maturity, desire for home and children, favorable social status or rating, similar religious background, ambition and industriousness, mutual attraction, good health and education and intelligence than males (M= 23.25). These results demonstrated that there were 61.11% significant gender differences in mate selections characteristics. Findings of this research have highlighted the importance of human mate selections in Malaysia. Further research is needed to identify the factors that could have a possible moderating effect of gender differences in mate selection.

Keywords: gender differences, mate selections, evolution, future partner

Procedia PDF Downloads 88
389 The Hallmarks of War Propaganda: The Case of Russia-Ukraine Conflict

Authors: Veronika Solopova, Oana-Iuliana Popescu, Tim Landgraf, Christoph Benzmüller

Abstract:

Beginning in 2014, slowly building geopolitical tensions in Eastern Europe led to a full-blown conflict between the Russian Federation and Ukraine that generated an unprecedented amount of news articles and data from social media data, reflecting the opposing ideologies and narratives as a background and the essence of the ongoing war. These polarized informational campaigns have led to countless mutual accusations of misinformation and fake news, shaping an atmosphere of confusion and mistrust for many readers all over the world. In this study, we analyzed scraped news articles from Ukrainian, Russian, Romanian and English-speaking news outlets, on the eve of 24th of February 2022, compared to day five of the conflict (28th of February), to see how the media influenced and mirrored the changes in public opinion. We also contrast the sources opposing and supporting the stands of the Russian government in Ukrainian, Russian and Romanian media spaces. In a data-driven way, we describe how the narratives are spread throughout Eastern and Central Europe. We present predictive linguistic features surrounding war propaganda. Our results indicate that there are strong similarities in terms of rhetoric strategies in the pro-Kremlin media in both Ukraine and Russia, which, while being relatively neutral according to surface structure, use aggressive vocabulary. This suggests that automatic propaganda identification systems have to be tailored for each new case, as they have to rely on situationally specific words. Both Ukrainian and Russian outlets lean towards strongly opinionated news, pointing towards the use of war propaganda in order to achieve strategic goals.

Keywords: linguistic, news, propaganda, Russia, ukraine

Procedia PDF Downloads 96
388 Using LTE-Sim in New Hanover Decision Algorithm for 2-Tier Macrocell-Femtocell LTE Network

Authors: Umar D. M., Aminu A. M., Izaddeen K. Y.

Abstract:

Deployments of mini macrocell base stations also referred to as femtocells, improve the quality of service of indoor and outdoor users. Nevertheless, mobility management remains a key issue with regards to their deployment. This paper is leaned towards this issue, with an in-depth focus on the most important aspect of mobility management -handover. In handover management, making a handover decision in the LTE two-tier macrocell femtocell network is a crucial research area. Decision algorithms in this research are classified and comparatively analyzed according to received signal strength, user equipment speed, cost function, and interference. However, it was observed that most of the discussed decision algorithms fail to consider cell selection with hybrid access policy in a single macrocell multiple femtocell scenario, another observation was a majority of these algorithms lack the incorporation of user equipment residence parameter. Not including this parameter boosts the number of unnecessary handover occurrence. To deal with these issues, a sophisticated handover decision algorithm is proposed. The proposed algorithm considers the user’s velocity, received signal strength, residence time, as well as the femtocell base station’s access policy. Simulation results have shown that the proposed algorithm reduces the number of unnecessary handovers when compared to conventional received signal strength-based handover decision algorithm.

Keywords: user-equipment, radio signal service, long term evolution, mobility management, handoff

Procedia PDF Downloads 105
387 Knowledge Transfer among Cross-Functional Teams as a Continual Improvement Process

Authors: Sergio Mauricio Pérez López, Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander

Abstract:

The culture of continuous improvement in organizations is very important as it represents a source of competitive advantage. This article discusses the transfer of knowledge between companies which formed cross-functional teams and used a dynamic model for knowledge creation as a framework. In addition, the article discusses the structure of cognitive assets in companies and the concept of "stickiness" (which is defined as an obstacle to the transfer of knowledge). The purpose of this analysis is to show that an improvement in the attitude of individual members of an organization creates opportunities, and that an exchange of information and knowledge leads to generating continuous improvements in the company as a whole. This article also discusses the importance of creating the proper conditions for sharing tacit knowledge. By narrowing gaps between people, mutual trust can be created and thus contribute to an increase in sharing. The concept of adapting knowledge to new environments will be highlighted, as it is essential for companies to translate and modify information so that such information can fit the context of receiving organizations. Adaptation will ensure that the transfer process is carried out smoothly by preventing "stickiness". When developing the transfer process on cross-functional teams (as opposed to working groups), the team acquires the flexibility and responsiveness necessary to meet objectives. These types of cross-functional teams also generate synergy due to the array of different work backgrounds of their individuals. When synergy is established, a culture of continuous improvement is created.

Keywords: knowledge transfer, continuous improvement, teamwork, cognitive assets

Procedia PDF Downloads 308
386 The Mashishing Marking Memories Project: A Culture-Centered Approach to Participation

Authors: Nongcebo Ngcobo

Abstract:

This research explores the importance of including a multitude of voices in the cultural heritage narrative, particularly in South Africa. The Mashishing project is an extension of and builds on the existing ‘Biesje Poort project’ which is a rock art project that was funded by the National Heritage Council in 2010 - 2013. Hence, the Mashishing marking memories project applies comparable Biesje Poort project objectives, though in a different geographical area. The wider project objectives are to transfer skills, promote social cohesion and empowerment, and lastly to add to the knowledge base of the Mashishing region and the repository of the local museum in the Lydenburg museum. This study is located in the Mashishing area, in Mpumalanga, South Africa. In this area, there were no present multi-vocal heritage projects. This research assesses the Mashishing marking memories project through the culture-centered approach for communication for social change, which examines the impact that the diverse participants have on the operations of the Mashishing project and also investigates whether the culturally diverse participants facilitates or hinders effective participation within the project. Key findings of this research uncovered the significance of participation and diverse voices in the cultural heritage field. Furthermore, this study highlights how unequal power relations affect effective participation. As a result, this study encourages the importance of bringing the researcher and the participant in a safe space to facilitate mutual learning. It also encourages an exchange of roles, where the researcher shifts from being an authoritarian figure to being in the role of a listener.

Keywords: culture, heritage, participation, social change

Procedia PDF Downloads 102
385 Cost of Governance in Nigeria: In Whose Interest

Authors: Francis O. Iyoha, Daniel E. Gberevbie, Charles T. Iruonagbe, Matthew E. Egharevba

Abstract:

Cost of governance in Nigeria has become a challenge to development and concern to practitioners and scholars alike in the field of business and social science research. It has been observed that it takes 70 percent of the nation’s revenue to maintain less than 20 percent of the Nigerian population that are public servants. Furthermore, it has been observed that on a consistent yearly basis, the recurrent expenditure of government from the national budget keeps rising, while capital expenditure meant for development keeps falling. The implication is that development is stagnated in the country. For instance, in the 2010 national budget of NGN4.60tn or USD28.75b, only NGN1.80tn or USD11.15b was set aside for capital expenditure. Also, in the 2013 national budget of NGN4.92tn or USD30.75b, only NGN1.50tn or USD9.38b was set aside for capital expenditure. Therefore, with the analysis of secondary data, this study examined the reasons for the high cost of governance in Nigeria. It observed that the high cost of governance in the country is in the interest of the ruling class, arising from their unethical behaviour – corrupt practices and the poor management of public resources. As a result, the study recommends the need to intensify the war against corruption and mismanagement of public resources by government officials as possible solution to overcome the high cost of governance in Nigeria. This could be achieved by strengthening the constitutional powers of the various anti-corruption agencies in the area of arrest, investigation and prosecution of offenders without the interference of the executive arm of government either at the local, state or federal level.

Keywords: cost of governance, capital expenditure, recurrent expenditure, unethical behavior, Nigeria

Procedia PDF Downloads 317
384 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 85
383 YHV-Responsive Gene Expression under the Influence of PmRelish Regulation

Authors: Suwattana Visetnan, Premruethai Supungul, Sureerat Tang, Ikuo Hirono, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

In animals, infection by Gram-negative bacteria and certain viruses activates the Imd signaling pathway wherein the a NF-κB transcription factor, Relish, is a key regulatory protein for the synthesis of antimicrobial proteins. Infection by yellow head virus (YHV) activates the Imd pathway. To investigate the expression of genes involved in YHV infection and under the influence of PmRelish regulation, RNA interference and suppression subtractive hybridization (SSH) are employed. The genes in forward library expressed in shrimp after YHV infection and under the activity of PmRelish were obtained by subtracting the cDNAs from YHV-infected and PmRelish-knockdown shrimp with cDNAs from YHV-infected shrimp. Opposite subtraction gave a reverse library whereby an alternative set of genes under YHV infection and no PmRelish expression was obtained. Sequencing of 252 and 99 cDNA clones from the respective forward and reverse libraries were done and annotated through blast search against the GenBank sequences. Genes involved in defense and homeostasis were abundant in both libraries, 31% and 23% in the forward and reverse libraries, respectively. They were predominantly antimicrobial proteins, proteinases and proteinase inhibitors. The expression of antimicrobial protein genes, ALFPm3, crustinPm1, penaeidin3 and penaeidin5 were tested under PmRelish silencing and Gram-negative bacterium V. harveyi infection. Together with the results previously reported, the expression of penaeidin5 and also penaeidin3 but not ALFPm3 and crustinPm1 were under the regulation of PmRelish in the Imd pathway.

Keywords: relish, yellow head virus, penaeus monodon, antimicrobial proteins

Procedia PDF Downloads 193
382 Design Study on a Contactless Material Feeding Device for Electro Conductive Workpieces

Authors: Oliver Commichau, Richard Krimm, Bernd-Arno Behrens

Abstract:

A growing demand on the production rate of modern presses leads to higher stroke rates. Commonly used material feeding devices for presses like grippers and roll-feeding systems can only achieve high stroke rates along with high gripper forces, to avoid stick-slip. These forces are limited by the sensibility of the surfaces of the workpieces. Stick-slip leads to scratches on the surface and false positioning of the workpiece. In this paper, a new contactless feeding device is presented, which develops higher feeding force without damaging the surface of the workpiece through gripping forces. It is based on the principle of the linear induction motor. A primary part creates a magnetic field and induces eddy currents in the electrically conductive material. A Lorentz-Force applies to the workpiece in feeding direction as a mutual reaction between the eddy-currents and the magnetic induction. In this study, the FEA model of this approach is shown. The calculation of this model was used to identify the influence of various design parameters on the performance of the feeder and thus showing the promising capabilities and limits of this technology. In order to validate the study, a prototype of the feeding device has been built. An experimental setup was used to measure pulling forces and placement accuracy of the experimental feeder in order to give an outlook of a potential industrial application of this approach.

Keywords: conductive material, contactless feeding, linear induction, Lorentz-Force

Procedia PDF Downloads 161
381 The Association Between Objectively Measured Physical Activity and Health-related Quality of Life, Life-space Mobility and Successful Aging in Older Indian Adults

Authors: Jeanne Grace, Jacqueline Naiker

Abstract:

Background: Longevity is increasing, accompanied by a rise in disability and chronic diseases with physical activity (PA) delaying disability, ensuring successful aging (SA) and independent living in older adults. Aim: This study aimed to determine objectively measured PA levels, health-related quality of life (HRQoL), life-space mobility, and successful aging (SA) of older adults in KwaZulu-Natal province, South Africa, as well as their mutual associations. Methods: A total of 210 older adults aged 65–92 years were purposively sampled and completed the Medical Outcomes Study 36-Item Short-Form Health Survey, the Life-Space Mobility, and Successful Aging questionnaires. PA levels were measured using an Omron Pedometer, which the participants wore for seven consecutive days. Results: The average number of steps taken per day for the seven days was 2025, with 98.6% of the entire study population classified as sedentary. The Vitality domain (one of 8 categorized) reflected the best health status (M = 59.9, SD ± 18.8), with a significant 93% of the participants indicating that they had not visited places outside their immediate neighborhood (P < 0.0005). A significant, negative association between the average number of steps taken in 7 days and all three SA variables – namely, the physical (r = –0.152, P = 0.027), sociological (r = –0.148, P = 0.032) and psychological (r = –0.176, P = 0.010), and a significant, positive association with life-space mobility (r = 0.224, P = 0.001) was noted. Conclusion: The majority of the elderly were sedentary, affecting their HRQoL, life-space mobility, and SA negatively.

Keywords: active life expectancy, geriatrics, nursing homes, well-being

Procedia PDF Downloads 146
380 Architectural Experience of the Everyday in Bangkok CBD

Authors: Thirayu Jumsai Na Ayudhya

Abstract:

The attempt to understand about what architecture means to people as they go about their everyday life revealed that knowledge such as environmental psychology, environmental perception, environmental aesthetics, inadequately address the contextualized and holistic theoretical framework. In my previous research, it was found that people’s making senses of their everyday architecture can be addressed in terms of four super‐ordinate themes; (1) building in urban (text), (2) building in (text), (3) building in human (text), (4) and building in time (text). In this research, Bangkok CBD was selected as the focal urban context that the integrated style of architecture is noticeable. It is expected that in a unique urban context like Bangkok CBD unprecedented super-ordinate themes will be unveiled through the reflection of people’s everyday experiences. In this research, people’s architectural experience conducted in Bangkok CBD, Thailand, will be presented succinctly. The research addresses the question of how do people make sense of their everyday architecture/buildings especially in a unique urban context, Bangkok CBD, and identifies ways in which people make sense of their everyday architecture. Two key methodologies are adopted. First, Participant-Produced-Photograph (PPP) allows people to express their experiences of the everyday urban context freely without any interference or forced-data generating by researchers. Second, Interpretative Phenomenological Analysis (IPA) are also applied as main methodologies. With IPA methodology, a small pool of participants is considered giving the detailed level of analysis and its potential to produce a meaningful outcome.

Keywords: architectural experience, building appreciation, design psychology, environmental psychology, sense-making, the everyday experience, transactional theory

Procedia PDF Downloads 305
379 Exploration of a Blockchain Assisted Framework for Through Baggage Interlining: Blocklining

Authors: Mary Rose Everan, Michael McCann, Gary Cullen

Abstract:

International travel journeys, by their nature, incorporate elements provided by multiple service providers such as airlines, rail carriers, airports, and ground handlers. Data needs to be stored by and exchanged between these parties in the process of managing the journey. The fragmented nature of this shared management of mutual clients is a limiting factor in the development of a seamless, hassle-free, end-to-end travel experience. Traditional interlining agreements attempt to facilitate many separate aspects of co-operation between service providers, typically between airlines and, to some extent, intermodal travel operators, including schedules, fares, ticketing, through check-in, and baggage handling. These arrangements rely on pre-agreement. The development of Virtual Interlining - that is, interlining facilitated by a third party (often but not always an airport) without formal pre-agreement by the airlines or rail carriers - demonstrates an underlying demand for a better quality end-to-end travel experience. Blockchain solutions are being explored in a number of industries and offer, at first sight, an immutable, single source of truth for this data, avoiding data conflicts and misinterpretation. Combined with Smart Contracts, they seemingly offer a more robust and dynamic platform for multi-stakeholder ventures, and even perhaps the ability to join and leave consortia dynamically. Applying blockchain to the intermodal interlining space – termed Blocklining in this paper - is complex and multi-faceted because of the many aspects of cooperation outlined above. To explore its potential, this paper concentrates on one particular dimension, that of through baggage interlining.

Keywords: aviation, baggage, blocklining, intermodal, interlining

Procedia PDF Downloads 130
378 The Concept of Accounting in Islamic Transactions

Authors: Ahmad Abdulkadir Ibrahim

Abstract:

The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas.

Keywords: accounting, Islamic accounting, Islamic transactions, Islamic jurisprudence, double entry, murabaha, characteristics

Procedia PDF Downloads 44
377 Comparing Double-Stranded RNA Uptake Mechanisms in Dipteran and Lepidopteran Cell Lines

Authors: Nazanin Amanat, Alison Tayler, Steve Whyard

Abstract:

While chemical insecticides effectively control many insect pests, they also harm many non-target species. Double-stranded RNA (dsRNA) pesticides, in contrast, can be designed to target unique gene sequences and thus act in a species-specific manner. DsRNA insecticides do not, however, work equally well for all insects, and for some species that are considered refractory to dsRNA, a primary factor affecting efficacy is the relative ease by which dsRNA can enter a target cell’s cytoplasm. In this study, we are examining how different structured dsRNAs (linear, hairpin, and paperclip) can enter mosquito and lepidopteran cells, as they represent dsRNA-sensitive and refractory species, respectively. To determine how the dsRNAs enter the cells, we are using chemical inhibitors and RNA interference (RNAi)-mediated knockdown of key proteins associated with different endocytosis processes. Understanding how different dsRNAs enter cells will ultimately help in the design of molecules that overcome refractoriness to RNAi or develop resistance to dsRNA-based insecticides. To date, we have conducted chemical inhibitor experiments on both cell lines and have evidence that linear dsRNAs enter the cells using clathrin-mediated endocytosis, while the paperclip dsRNAs (pcRNAs) can enter both species’ cells in a clathrin-independent manner to induce RNAi. An alternative uptake mechanism for the pcRNAs has been tentatively identified, and the outcomes of our RNAi-mediated knockdown experiments, which should provide corroborative evidence of our initial findings, will be discussed.

Keywords: dsRNA, RNAi, uptake, insecticides, dipteran, lepidopteran

Procedia PDF Downloads 50
376 The Effect of Emotion Self-Confidence and Perceived Social Support on Hong Kong Higher-Education Students' Suicide-Related Emotional Experiences

Authors: K. C. Ching

Abstract:

There is growing public concern over the increasing prevalence of student suicide in Hong Kong. Some identify the problem with insufficient social support, while some attribute it to the vast fluctuations in emotional experience and the hindrances to emotion-regulation, both typical of adolescence and emerging adulthood. This study is thus designed to explore the respective effect of perceived social support and emotion self-confidence, on positive emotions and negative emotions. Fifty-seven Hong Kong higher-education students (17 males, 40 females) aged between 18 and 25 (M = 21.78) responded to an online questionnaire consisted of self-reported measures of perceived social support, emotional self-confidence, positive emotions, and negative emotions. Hierarchical regression analysis revealed that emotional self-confidence positively associated with positive emotions and negatively with negative emotions, while perceived social support positively associated with positive emotions but was not related to negative emotions. Perceived social support and emotional self-confidence both predicted positive emotions, but did not interact to predict any emotional outcome. It is concluded that students’ positive and negative emotional experiences are closely related to their emotion-regulation process. But for social support, its effect is merely protective, meaning that although perceived social support generally promotes positive emotions, it alone does not suffice to alleviate students’ negative emotions. These conclusions carry profound implications to suicide prevention practices, including that most existing suicide prevention campaigns should advance from merely fostering mutual support to directly promoting adaptive coping of emotional negativity.

Keywords: emerging adulthood, emotional self-confidence, hong kong, perceived social support, suicide prevention

Procedia PDF Downloads 115
375 Optimization Modeling of the Hybrid Antenna Array for the DoA Estimation

Authors: Somayeh Komeylian

Abstract:

The direction of arrival (DoA) estimation is the crucial aspect of the radar technologies for detecting and dividing several signal sources. In this scenario, the antenna array output modeling involves numerous parameters including noise samples, signal waveform, signal directions, signal number, and signal to noise ratio (SNR), and thereby the methods of the DoA estimation rely heavily on the generalization characteristic for establishing a large number of the training data sets. Hence, we have analogously represented the two different optimization models of the DoA estimation; (1) the implementation of the decision directed acyclic graph (DDAG) for the multiclass least-squares support vector machine (LS-SVM), and (2) the optimization method of the deep neural network (DNN) radial basis function (RBF). We have rigorously verified that the LS-SVM DDAG algorithm is capable of accurately classifying DoAs for the three classes. However, the accuracy and robustness of the DoA estimation are still highly sensitive to technological imperfections of the antenna arrays such as non-ideal array design and manufacture, array implementation, mutual coupling effect, and background radiation and thereby the method may fail in representing high precision for the DoA estimation. Therefore, this work has a further contribution on developing the DNN-RBF model for the DoA estimation for overcoming the limitations of the non-parametric and data-driven methods in terms of array imperfection and generalization. The numerical results of implementing the DNN-RBF model have confirmed the better performance of the DoA estimation compared with the LS-SVM algorithm. Consequently, we have analogously evaluated the performance of utilizing the two aforementioned optimization methods for the DoA estimation using the concept of the mean squared error (MSE).

Keywords: DoA estimation, Adaptive antenna array, Deep Neural Network, LS-SVM optimization model, Radial basis function, and MSE

Procedia PDF Downloads 77
374 An Exploratory Case Study of the Interference of Erotic Transference in the Longevity of Psychoanalytic Treatment

Authors: Mehravar Javid, Rohma Hassan, J. DeSilva

Abstract:

In this exploratory case study, a 37-year-old male patient who previously terminated treatment after four months of therapy with a different therapist begins anew with a 38-year-old female therapist and undergoes a similar cycle of premature termination, with added discourse caused by erotic transference. Process notes and records of the therapy treatment indicate that during the short course of treatment, the patient explored his difficulties navigating personal relationships, both current and past, and his difficulties coping with hypochondriasis. The therapist becomes tasked with not only navigating the patient’s inner conflict but also how she relates to the patient in the countertransference process while maintaining professional boundaries. This includes empathizing with the patient while also experiencing discomfort in the erotic transference from a professional standpoint. When the patient terminates once more, the therapist reflects on the possible reasons for termination. This includes the patient’s difficulties with tolerating interpretations, which cause him to blame himself for past events. These interpretations were also very frequent, contributing to the emotional burden the patient experienced. The therapist reflected on the use of interpretation versus exploration of the patient’s feelings and how exploring his feelings, including his feelings towards her, would have allowed for an opportunity to explore the emotions that troubled him more deeply. This includes exploring the patient’s anger and fear, which stem from unresolved conflicts from his childhood. Moreover, the erotic transference served as an enactment of previous experiences in which the patient feared losing what he loved, leading him to opt for premature termination instead of losing his ability to control the relationship and experience loss.

Keywords: countertransference, erotic transference, premature termination, therapist-client boundaries, transference

Procedia PDF Downloads 44
373 Natural Law in the Mu’Tazilite Theology

Authors: Samaneh Khalili

Abstract:

Natural law theory, in moral philosophy, refers to a system of unchanging values held to be mutual to all humans and can be discovered through reason. The natural law theory is commonly associated with western Philosophers. In contrast, discussions on notions of natural law in Islamic intellectual history were relatively rare. This paper aims to show that the moral theory developed by the Mu'tazilite thinkers can be classified in the ideas of natural law. In doing so, this study will demonstrate that the objective and unchanging values, according to Mu'tazilite theologians, provide the guidelines for assessing the Islamic law rules in the field of human coexistence. The focus of the paper lies on ʿAbd al-Ğabbār, who was the most influential thinker in the late epoch of the Muʿtazila. Although ʿAbd al-Ǧabbār did not leave a text with a systematic discussion of natural law, his teaching of nature, human reason, and the moral values of actions are all scattered throughout his work -'al-Muġnī fī abwāb at-tawḥīd wa-l-'adl'. It is necessary to focus on ʿAbd al-Ǧabbār's theories on reason, nature, and ethics since natural law revolves around the basic concepts of nature, reason, and moral value. While analyzing the concept of the Nature, it will attempt to answer how he explains the world's physical structure and God's relationship to natural events. Moreover, from ʿAbd al-Ǧabbār's point of view, is nature a self-determined system that follows its inner principle in every kind of change, or is nature guided by an external power? Does causality govern natural events? About the concept of reason, an attempt is made to examine how human reason, according to ʿAbd al-Ǧabbār, conceives moral attributes. Finally, the Autor will discuss the concepts of objective values and the place of rights and duties derived from Islamic law in ʿAbd al-Ǧabbār's thought.

Keywords: Islamic law, Mu'tazilite theology, natural law in Islamic theology, objective and unchanging values.

Procedia PDF Downloads 71
372 Academic Education and Internship towards Architecture Professional Practice

Authors: Sawsan Saridar masri, Hisham Arnaouty

Abstract:

Architecture both defines and is defined by social, cultural, political and financial constraints: this is where the discipline and the profession of architecture meet. This mutual sway evolves wherever interferences in the built environment are thought-out and can be strengthened or weakened by the many ways in which the practice of architecture can be undertaken. The more familiar we are about the concerns and factors that control what can be made, the greater the opportunities to propose and make appropriate architectures. Apparently, the criteria in any qualification policy should permit flexibility of approach and will – for reasons including cultural choice, political issues, and son on – vary significantly from country to country. However the weighting of the various criteria have to ensure adequate standards both in educational system as in the professional training. This paper develops, deepens and questions about the regulatory entry routes to the professional practice of architecture in the Arab world. It is also intended to provide an informed basis about strategies for conventional and unconventional models of practice in preparation for the next stages of architect’s work experience and professional experience. With the objective of promoting the implementation of adequate built environment in the practice of architecture, a comprehensive analysis of various pathways of access to the profession are selected as case studies, encompassing examples from across the world. The review of such case studies allows the creation of a comprehensive picture in relation to the conditions for qualification of practitioners of the built environment at the level of the Middle Eastern countries and the Arab World. Such investigation considers the following aspects: professional title and domain of practice, accreditation of courses, internship and professional training, professional examination and continuing professional development.

Keywords: architecture, internship, mobility, professional practice

Procedia PDF Downloads 528
371 Mineralogy and Thermobarometry of Xenoliths in Basalt from the Chanthaburi-Trat Gem Fields, Thailand

Authors: Apichet Boonsoong

Abstract:

In the Chanthaburi-Trat basalts, xenoliths are composed of essentially ultramafic xenoliths (particularly spinel lherzolite) with a few of an aggregate of feldspar. Some 19 ultramafic xenoliths were collected from 13 different locations. They range in size from 3.5 to 60mm across. Most are weathered and oxidized on the surface but fresh samples are obtained from cut surfaces. Chemical analyses were performed on carbon-coated polished thin sections using a fully automated CAMECA SX-50 electron microprobe (EMPA) in wavelength-dispersive mode. In thin section, they are seen to consist of variable amounts of olivine, clinopyroxene, orthopyroxene with minor spinel and plagioclase, and are classed as lherzolite. Modal compositions of the ultramafic nodules vary with olivine (60-75%), clinopyroxene (20-30%), orthopyroxene (0-15%), minor spinel (1-3%) and plagioclase (<1%). The essential minerals form an equigranular, medium- to coarse-grained, granoblastic texture, and all are in mutual contact indicating attainment of equilibrium. Reaction rims are common along the nodule margins and in some are also present along grain boundaries. Zoning occurs in clinopyroxene, and to a lesser extent in orthopyroxene. The homogeneity of mineral compositions in lherzolite xenoliths suggests the attainment of equilibrium. The equilibration temperatures of these xenoliths are estimated to be in the range of 973 to 1063°C. Pressure estimates are not so easily obtained because no suitable barometer exists for garnet-free lherzolites and so an indirect method was used. The general mineral assemblage of the lherzolite xenoliths and the absence of garnet indicate a pressure range of approximately 12–19kbar, which is equivalent to depths approximately of 38 to 60km.

Keywords: chanthaburi-trat basalts, spinel lherzolite, xenoliths, 973 to 1063°C, 38 to 60km

Procedia PDF Downloads 97
370 Beam Coding with Orthogonal Complementary Golay Codes for Signal to Noise Ratio Improvement in Ultrasound Mammography

Authors: Y. Kumru, K. Enhos, H. Köymen

Abstract:

In this paper, we report the experimental results on using complementary Golay coded signals at 7.5 MHz to detect breast microcalcifications of 50 µm size. Simulations using complementary Golay coded signals show perfect consistence with the experimental results, confirming the improved signal to noise ratio for complementary Golay coded signals. For improving the success on detecting the microcalcifications, orthogonal complementary Golay sequences having cross-correlation for minimum interference are used as coded signals and compared to tone burst pulse of equal energy in terms of resolution under weak signal conditions. The measurements are conducted using an experimental ultrasound research scanner, Digital Phased Array System (DiPhAS) having 256 channels, a phased array transducer with 7.5 MHz center frequency and the results obtained through experiments are validated by Field-II simulation software. In addition, to investigate the superiority of coded signals in terms of resolution, multipurpose tissue equivalent phantom containing series of monofilament nylon targets, 240 µm in diameter, and cyst-like objects with attenuation of 0.5 dB/[MHz x cm] is used in the experiments. We obtained ultrasound images of monofilament nylon targets for the evaluation of resolution. Simulation and experimental results show that it is possible to differentiate closely positioned small targets with increased success by using coded excitation in very weak signal conditions.

Keywords: coded excitation, complementary golay codes, DiPhAS, medical ultrasound

Procedia PDF Downloads 243