Search results for: protection methods
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16824

Search results for: protection methods

16134 Translating Creativity to an Educational Context: A Method to Augment the Professional Training of Newly Qualified Secondary School Teachers

Authors: Julianne Mullen-Williams

Abstract:

This paper will provide an overview of a three year mixed methods research project that explores if methods from the supervision of dramatherapy can augment the occupational psychology of newly qualified secondary school teachers. It will consider how creativity and the use of metaphor, as applied in the supervision of dramatherapists, can be translated to an educational context in order to explore the explicit / implicit dynamics between the teacher trainee/ newly qualified teacher and the organisation in order to support the super objective in training for teaching; how to ‘be a teacher.’ There is growing evidence that attrition rates among teachers are rising after only five years of service owing to too many national initiatives, an unmanageable curriculum and deteriorating student discipline. The fieldwork conducted entailed facilitating a reflective space for Newly Qualified Teachers from all subject areas, using methods from the supervision of dramatherapy, to explore the social and emotional aspects of teaching and learning with the ultimate aim of improving the occupational psychology of teachers. Clinical supervision is a formal process of professional support and learning which permits individual practitioners in frontline service jobs; counsellors, psychologists, dramatherapists, social workers and nurses to expand their knowledge and proficiency, take responsibility for their own practice, and improve client protection and safety of care in complex clinical situations. It is deemed integral to continued professional practice to safeguard vulnerable people and to reduce practitioner burnout. Dramatherapy supervision incorporates all of the above but utilises creative methods as a tool to gain insight and a deeper understanding of the situation. Creativity and the use of metaphor enable the supervisee to gain an aerial view of the situation they are exploring. The word metaphor in Greek means to ‘carry across’ indicating a transfer of meaning form one frame of reference to another. The supervision support was incorporated into each group’s induction training programme. The first year group attended fortnightly one hour sessions, the second group received two one hour sessions every term. The existing literature on the supervision and mentoring of secondary school teacher trainees calls for changes in pre-service teacher education and in the induction period. There is a particular emphasis on the need to include reflective and experiential learning, within training programmes and within the induction period, in order to help teachers manage the interpersonal dynamics and emotional impact within a high pressurised environment

Keywords: dramatherapy supervision, newly qualified secondary school teachers, professional development, teacher education

Procedia PDF Downloads 377
16133 Convergence of Sinc Methods Applied to Kuramoto-Sivashinsky Equation

Authors: Kamel Al-Khaled

Abstract:

A comparative study of the Sinc-Galerkin and Sinc-Collocation methods for solving the Kuramoto-Sivashinsky equation is given. Both approaches depend on using Sinc basis functions. Firstly, a numerical scheme using Sinc-Galerkin method is developed to approximate the solution of Kuramoto-Sivashinsky equation. Sinc approximations to both derivatives and indefinite integrals reduces the solution to an explicit system of algebraic equations. The error in the solution is shown to converge to the exact solution at an exponential. The convergence proof of the solution for the discrete system is given using fixed-point iteration. Secondly, a combination of a Crank-Nicolson formula in the time direction, with the Sinc-collocation in the space direction is presented, where the derivatives in the space variable are replaced by the necessary matrices to produce a system of algebraic equations. The methods are tested on two examples. The demonstrated results show that both of the presented methods more or less have the same accuracy.

Keywords: Sinc-Collocation, nonlinear PDEs, numerical methods, fixed-point

Procedia PDF Downloads 464
16132 Assessment of Slope Stability by Continuum and Discontinuum Methods

Authors: Taleb Hosni Abderrahmane, Berga Abdelmadjid

Abstract:

The development of numerical analysis and its application to geomechanics problems have provided geotechnical engineers with extremely powerful tools. One of the most important problems in geotechnical engineering is the slope stability assessment. It is a very difficult task due to several aspects such the nature of the problem, experimental consideration, monitoring, controlling, and assessment. The main objective of this paper is to perform a comparative numerical study between the following methods: The Limit Equilibrium (LEM), Finite Element (FEM), Limit Analysis (LAM) and Distinct Element (DEM). The comparison is conducted in terms of the safety factors and the critical slip surfaces. Through the results, we see the feasibility to analyse slope stability by many methods.

Keywords: comparison, factor of safety, geomechanics, numerical methods, slope analysis, slip surfaces

Procedia PDF Downloads 519
16131 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 249
16130 Reliability Analysis of Steel Columns under Buckling Load in Second-Order Theory

Authors: Hamed Abshari, M. Reza Emami Azadi, Madjid Sadegh Azar

Abstract:

For studying the overall instability of members of steel structures, there are several methods in which overall buckling and geometrical imperfection effects are considered in analysis. In first section, these methods are compared and ability of software to apply these methods is studied. Buckling loads determined from theoretical methods and software is compared for 2D one bay, one and two stories steel frames. To consider actual condition, buckling loads of three steel frames that have various dimensions are calculated and compared. Also, uncertainties that exist in loading and modeling of structures such as geometrical imperfection, yield stress, and modulus of elasticity in buckling load of 2D framed steel structures have been studied. By performing these uncertainties to each reliability analysis procedures (first-order, second-order, and simulation methods of reliability), one index of reliability from each procedure is determined. These values are studied and compared.

Keywords: buckling, second-order theory, reliability index, steel columns

Procedia PDF Downloads 481
16129 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.

Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka

Procedia PDF Downloads 359
16128 Contribution to the Development of a New Design of Dentist's Gowns: A Case Study of Using Infra-Red Technology and Pressure Sensors

Authors: Tran Thi Anh Dao, M. Arnold, L. Schacher, D. C. Adolphe, G. Reys

Abstract:

During tooth extraction or implant surgery, dentists are in contact with numerous infectious germs from patients' saliva and blood. For that reason, dentist's clothes have to play their role of protection from contamination. In addition, dentist's apparels should be not only protective but also comfortable and breathable because dentists have to perform many operations and treatments on patients throughout the day with high concentration and intensity. However, this type of protective garments has not been studied scientifically, whereas dentists are facing new risks and eager for looking for a comfortable personal protective equipment. For that reason, we have proposed some new designs of dentist's gown. They were expected to diminish heat accumulation that are considered as an important factor in reducing the level of comfort experienced by users. Experiments using infra-red technology were carried out in order to compare the breathable properties between a traditional gown and a new design with open zones. Another experiment using pressure sensors was also carried out to study ergonomic aspects trough the flexibility of movements of sleeves. The sleeves-design which is considered comfortable and flexible will be chosen for the further step. The results from the two experiments provide valuable information for the development of a new design of dentists' gowns in order to achieve maximum levels of cooling and comfort for the human body.

Keywords: garment, dentists, comfort, design, protection, thermal

Procedia PDF Downloads 212
16127 Sun Protection Factor (SPF) Determination of Sericin Cream and Niosomal Gel

Authors: Farzad Doostishoar, Abbas Pardakhty, Abdolreza Hassanzadeh, Sudeh salarpour, Elham Sharif

Abstract:

Background: Sericin is a protein extracted from silk and has antioxidant, antimicrobial, antineoplastic, wound healing and moisturizing properties. Different cosmetic formulation of sericin is available in different countries such as Japan and the other south-eastern Asian countries. We formulated and evaluated the sunscreen properties of topical formulations of sericin by an in vitro method. Method: Niosomes composed of sorbitan palmitate (Span 40), polysorbate 40 (Tween 40) and cholesterol (300 µmol, 3.5:3.5:3 molar ratio) were prepared by film hydration technique. Sericin was dissolved in normal saline and the lipid hydration was carried out at 60°C and the niosomes were incorporated in a Carbomer gel base. A W/O cream was also prepared and the release of sericin was evaluated by using Franz diffusion cell. Particle size analysis, sericin encapsulation efficiency measurement, morphological studies and stability evaluation were done in niosomal formulations. SPF was calculated by using Transpore tape in vitro method for both formulations. Results: Niosomes had high stability during 6 months storage at 4-8°C. The mean volume diameter of niosomes was less than 7 µm which is ideal for sustained release of drugs in topical formulations. The SPF of niosomal gel was 25 and higher than sericin cream with a diffusion based release pattern of active material. Conclusion: Sericin can be successfully entrapped in niosomes with sustained release pattern and relatively high SPF.

Keywords: sericin, niosomes, sun protection factor, cream, gel

Procedia PDF Downloads 493
16126 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 353
16125 Rock Slope Stabilization and Protection for Roads and Multi-Storey Structures in Jabal Omar, Saudi Arabia

Authors: Ibrahim Abdel Gadir Malik, Dafalla Siddig Dafalla, Abdelazim Ibrahim

Abstract:

Jabal Omar is located in the western side of Makkah city in Saudi Arabia. The proposed Jabal Omar Development project includes several multi-storey buildings, roads, bridges and below ground structures founded at various depths. In this study, geological mapping and site inspection which covered pre-selected areas were carried out within the easily accessed parts. Geological features; including rock types, structures, degree of weathering, and geotechnical hazards were observed and analyzed with specified software and also were documented in form of photographs. The presence of joints and fractures in the area made the rock blocks small and weak. The site is full of jointing; it was observed that, the northern side consists of 3 to 4 jointing systems with 2 random fractures associated with dykes. The southern part is affected by 2 to 3 jointing systems with minor fault and shear zones. From the field measurements and observations, it was concluded that, the Jabal Omar intruded by andesitic and basaltic dykes of different thickness and orientation. These dykes made the outcrop weak, highly deformed and made the rock masses sensitive to weathering.

Keywords: rock, slope, stabilization, protection, Makkah

Procedia PDF Downloads 798
16124 The Effect of the Spinacia oleracea Extract on the Control of the Green Mold 'Penilillium digitatum' at the Post Harvested Citrus

Authors: Asma Chbani, Douaa Salim, Josephine Al Alam, Pascale De Caro

Abstract:

Penicillium digitatum, the causal agent of citrus green mold, is responsible for 90% of post-harvest losses. Chemical fungicides remain the most used products for protection against this pathogen but are also responsible for damage to human health and the environment. The aim of this study is to evaluate the ability of Spinacia oleracea extract to serve as biological control agents, an alternative to harmful synthetic fungicides, against orange decay for storing fruit caused by P. digitatum. In this study, we studied the implication of a crude extract of a green plant, Spinacia oleracea, in the protection of oranges against P. digitatum. Thus, in vivo antifungal tests as well as adhesion test were done. For in vivo antifungal test, oranges were pulverized with the prepared crude extracts at different concentrations ranged from 25 g L⁻¹ to 200 g L⁻¹, contaminated by the fungus and then observed during 8 weeks for their macroscopic changes at 24°C. For adhesion test, the adhesion index is defined as the number of Penicillium digitatum spores fixed per orange cell. An index greater than 25 is the indicator of a strong adhesion, whereas for an index less than 10, the adhesion is low. Ten orange cells were examined in triplicate for each extract, and the averages of adherent cells were calculated. Obtained results showed an inhibitory activity of the Penicillium development with the aqueous extract of dry Spinacia oleracea with a concentration of 50 g L⁻¹ considered as the minimal protective concentration. The prepared extracts showed a greater inhibition of the development of P. digitatum up to 10 weeks, even greater than the fungicide control Nystatin. Adhesion test’s results showed that the adhesion of P. digitatum spores to the epidermal cells of oranges in the presence of the crude spinach leaves extract is weak; the mean of the obtained adhesion index was estimated to 2.7. However, a high adhesion was observed with water used a negative control. In conclusion, all these results confirm that the use of this green plant highly rich in chlorophyll having several phytotherapeutic activities, could be employed as a great treatment for protection of oranges against mold and also as an alternative for chemical fungicides.

Keywords: Penicillium digitatum, Spinacia oleracea, oranges, biological control, postharvest diseases

Procedia PDF Downloads 163
16123 Research Methodology and Mixed Methods (Qualitative and Quantitative) for Ph.D. Construction Management – Post-Disaster Reconstruction

Authors: Samuel Quashie

Abstract:

Ph.D. Construction Management methodology and mixed methods are organized to guide the researcher to assemble and assess data in the research activities. Construction management research is close to business management and social science research. It also contributes to researching the phenomenon and answering the research question, generating an integrated management system for post-disaster reconstruction in construction and related industries. Research methodology and methods drive the research to achieve the goal or goals, contribute to knowledge, or increase knowledge. This statement means the research methodology, mixed methods, aim, objectives, and processes address the research question, facilitate its achievement and foundation to conduct the study. Mixed methods use project-based case studies, interviews, observations, literature and archival document reviews, research questionnaires, and surveys, and evaluation of integrated systems used in the construction industry and related industries to address the research work. The research mixed methods (qualitative, quantitative) define the research topic and establish a more in-depth study. The research methodology is action research, which involves the collaboration of participants and service users to collect and evaluate data, studying the phenomenon, research question(s) to improve the situation in post-disaster reconstruction phase management.

Keywords: methodology, Ph.D. research, post-disaster reconstruction, mixed-methods qualitative and quantitative

Procedia PDF Downloads 217
16122 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things

Authors: Wei Hu, Wenguang Chen, Chong Dong

Abstract:

In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.

Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management

Procedia PDF Downloads 113
16121 Recent Advances of Isolated Microspore Culture Response in Durum Wheat

Authors: Zelikha Labbani

Abstract:

Many biotechnology methods have been used in plant breeding programs. The in vitro isolated microspore culture is the one of these methods. For durum wheat, the use of this technology has been limited for a long time due to the low number of embryos produced and also most regeneration plants are albina. The objective of this paper is to show that using isolated microspores culture on durum wheat is possible due to the development of the new methods using the new pretreatment of the microspores before their isolation and cultivation.

Keywords: isolated microspore culture, pretreatments, in vitro embryogenesis, plant breeding program

Procedia PDF Downloads 521
16120 Assessment of the Use of Participatory Research Methods among Researchers in Federal University of Agriculture Abeokuta, Nigeria

Authors: Samson Olusegun Apantaku, Adetayo K. Aromolaran, Giyatt Hammed

Abstract:

The study assessed the use of participatory research methods among Federal University of Agriculture Abeokuta, Nigeria (FUNAAB) researchers. Simple random sampling technique was used to select one hundred and twenty respondents from the study area. Data were collected using a questionnaire. Data collected were subjected to descriptive and inferential statistical analyses. Results showed that 75.8% of the respondents were males while only 21.3% were female. The mean age of the respondents was 38.8 years and most (77.5%) of them were married. 15% of the respondents were in professorial cadre, 21.7% and 20% of the respondents were senior lecturers/fellow and lecturer/research fellow I&II respectively. The results further revealed that 93.3% of the respondents were aware of participatory research methods and 82.5% of the respondents have utilized it before. The average period of usage was 2.7 years and participation by consultation (86.7%) and interactive participation (76.7%) were mostly used. Most (94.2%) indicated that fund was the major hindrance to the use of participatory research methods. The result of correlation analysis showed that there was significant relationship between the years of research experience, designation post (status) of the respondents and usage of participatory research methods (r = 0.034, 0.031, p < 0.05). The study concluded that most of the researchers were aware of and used participatory research methods, which could influence the quality of their research or make it acceptable to the end users. It was recommended that more funds should be made available and accessible for participatory research. All researchers should be trained and encouraged to make use of participatory research methods in their research activities so as to achieve effective research and capacity building that could enhance adoption of technologies and increase agricultural production in the country. Farmers’ capacity to participate in agricultural research should also be enhanced.

Keywords: participatory research, participatory research methods, awareness, utilization

Procedia PDF Downloads 406
16119 Accessing the 'No-Harm' Principle of Protection of the Mekong River’s Environment

Authors: Hang Thuy Tran, Hanh Hong Pham, Ha Thanh Hoa

Abstract:

From 2009 up to now, the water quantity and water quality of the Mekong River, located in the South of Vietnam, have been significantly reduced. The phenomenon happened as a result of climate change and human activities. The Mekong River is an international source of water, flowing across the borders of 6 countries, with Vietnam downstream. Activities to block the flow or build dams to construct hydroelectricity or diversion in upstream countries are either the direct cause or the risk of further deterioration of the water quality and quantity of the Mekong River, as evidenced by two phenomena which are a saline intrusion and transboundary water pollution. The protection of the crucial source of water is done through bilateral and multilateral cooperation mechanisms, notably the Mekong River Commission, established by members of the Agreement on the Cooperation for the Sustainable Development of the Mekong River Basin 1995. In this document, under Article 7, the 'no-harm' principle requires member states to take appropriate measures to prevent causing substantial damage to other member states. This principle has been practiced through the work of a number of committees established by the commission. However, the content of the rules is undetailed, lacks an implementation monitoring mechanism, and has an unreasonable dispute solution. With such difficulties, the provisions in the principle of no-harm are not adequate to protect the Mekong River's water resources in the current context.

Keywords: no-harm principle, transboundary water pollution, Mekong Commission, international source of water

Procedia PDF Downloads 182
16118 Examinations of Sustainable Protection Possibilities against Granary Weevil (Sitophilus granarius L.) on Stored Products

Authors: F. Pal-Fam, R. Hoffmann, S. Keszthelyi

Abstract:

Granary weevil, Sitophilus granarius (L.) (Col.: Curculionidae) is a typical cosmopolitan pest. It can cause significant damage to stored grains, and can drastically decrease yields. Damaged grain has reduced nutritional and market value, weaker germination, and reduced weight. The commonly used protectants against stored-product pests in Europe are residual insecticides, applied directly to the product. Unfortunately, these pesticides can be toxic to mammals, the residues can accumulate in the treated products, and many pest species could become resistant to the protectants. During recent years, alternative solutions of grain protection have received increased attention. These solutions are considered as the most promising alternatives to residual insecticides. The aims of our comparative study were to obtain information about the efficacies of the 1. diatomaceous earth, 2. sterile insect technology and 3. herbal oils against the S. granarius on grain (foremost maize), and to evaluate the influence of the dose rate on weevil mortality and progeny. The main results of our laboratory experiments are the followings: 1. Diatomaceous earth was especially efficacious against S. granarius, but its insecticidal properties depend on exposure time and applied dose. The efficacy on barley was better than on maize. Mortality value of the highest dose was 85% on the 21st day in the case of barley. It can be ascertained that complete elimination of progeny was evidenced on both gain types. To summarize, a satisfactory efficacy level was obtained only on barley at a rate of 4g/kg. Alteration of efficacy between grain types can be explained with differences in grain surface. 2. The mortality consequences of Roentgen irradiation on the S. granarius was highly influenced by the exposure time, and the dose applied. At doses of 50 and 70Gy, the efficacy accepted in plant protection (mortality: 95%) was recorded only on the 21st day. During the application of 100 and 200Gy doses, high mortality values (83.5% and 97.5%) were observed on the 14th day. Our results confirmed the complete sterilizing effect of the doses of 70Gy and above. The autocide effect of 50 and 70Gy doses were demonstrated when irradiated specimens were mixed into groups of fertile specimens. Consequently, these doses might be successfully applied to put sterile insect technique (SIT) into practice. 3. The results revealed that both studied essential oils (Callendula officinalis, Hippophae rhamnoides) exerted strong toxic effect on S. granarius, but C. officinalis triggered higher mortality. The efficacy (94.62 ± 2.63%) was reached after a 48 hours exposure to H. rhamnoides oil at 2ml/kg while the application of 2ml/kg of C. officinalis oil for 24 hours produced 98.94 ± 1.00% mortality rate. Mortality was 100% at 5 ml/kg of H. rhamnoides after 24 hours duration of its application, while with C. officinalis the same value could be reached after a 12 hour-exposure to the oil. Both essential oils applied were eliminated the progeny.

Keywords: Sitophilus granarius, stored product, protection, alternative solutions

Procedia PDF Downloads 164
16117 Therapeutic Effects of Toll Like Receptor 9 Ligand CpG-ODN on Radiation Injury

Authors: Jianming Cai

Abstract:

Exposure to ionizing radiation causes severe damage to human body and an safe and effective radioprotector is urgently required for alleviating radiation damage. In 2008, flagellin, an agonist of TLR5, was found to exert radioprotective effects on radiation injury through activating NF-kB signaling pathway. From then, the radioprotective effects of TLR ligands has shed new lights on radiation protection. CpG-ODN is an unmethylated oligonucleotide which activates TLR9 signaling pathway. In this study, we demonstrated that CpG-ODN has therapeutic effects on radiation injuries induced by γ ray and 12C6+ heavy ion particles. Our data showed that CpG-ODN increased the survival rate of mice after whole body irradiation and increased the number of leukocytes as well as the bone marrow cells. CpG-ODN also alleviated radiation damage on intestinal crypt through regulating apoptosis signaling pathway including bcl2, bax, and caspase 3 etc. By using a radiation-induced pulmonary fibrosis model, we found that CpG-ODN could alleviate structural damage, within 20 week after whole–thorax 15Gy irradiation. In this model, Th1/Th2 imbalance induced by irradiation was also reversed by CpG-ODN. We also found that TGFβ-Smad signaling pathway was regulated by CpG-ODN, which accounts for the therapeutic effects of CpG-ODN in radiation-induced pulmonary injury. On another hand, for high LET radiation protection, we investigated protective effects of CpG-ODN against 12C6+ heavy ion irradiation and found that after CpG-ODN treatment, the apoptosis and cell cycle arrest induced by 12C6+ irradiation was reduced. CpG-ODN also reduced the expression of Bax and caspase 3, while increased the level of bcl2. Then we detected the effect of CpG-ODN on heavy ion induced immune dysfunction. Our data showed that CpG-ODN increased the survival rate of mice and also the leukocytes after 12C6+ irradiation. Besides, the structural damage of immune organ such as thymus and spleen was also alleviated by CpG-ODN treatment. In conclusion, we found that TLR9 ligand, CpG-ODN reduced radiation injuries in response to γ ray and 12C6+ heavy ion irradiation. On one hand, CpG-ODN inhibited the activation of apoptosis induced by radiation through regulating bcl2, bax and caspase 3. On another hand, through activating TLR9, CpG-ODN recruit MyD88-IRAK-TRAF6 complex, activating TAK1, IRF5 and NF-kB pathway, and thus alleviates radiation damage. This study provides novel insights into protection and therapy of radiation damages.

Keywords: TLR9, CpG-ODN, radiation injury, high LET radiation

Procedia PDF Downloads 469
16116 Low Pertussis Vaccine Coverage Rates among Polish Nurses

Authors: Aneta Nitsch-Osuch, Sylwia Dyk, Izabela Gołebiak

Abstract:

Background. Since 2014 the pertussis vaccine is recommended to Polish health care workers who have close contacts with infants. Although this recommendation is implemented into the National Immunization Programme, its realization has remained unknown. The Purpose: The aim of the study, conducted at the department of Social Medicine and Public Health (Medical University of Warsaw, Poland), was to describe a perception, knowledge and coverage rates regarding pertussis vaccination among nursing staff. According to the authors' knowledge, it was the first study related to this topic in our country. Material and Methods: A total number of 543 nurses who work at pediatric or neonatal wards was included into the study (501 women and 42 men), average age was 47 years. All nurses were asked to fulfill the anonymous survey, previously validated. Results: 1. Coverage rates: The analysis of results revealed that only 4% of responders reported they were vaccinated with Tdpa within past 10 years, while 8% declared they would plan the vaccine in the future. 35% of responders would consider the Tdpa vaccine whether there is some kind of the reimbursement. 2. Perception and knowledge of the disease and vaccination: The majority (82%) of nurses did not recognize pertussis as a re-emerging infectious disease. 54% of them believed that obligatory vaccinations in the childhood protect against the disease and the protection is a life-long one. Only 15% of nurses considered pertussis as a possible nosocomial infection. The current epidemiology of the disease was known to 6% of responders, while 24% of them were familiar with pertussis vaccination schedules for infants, children and adolescents, but only 9% of responders knew that adults older than 19 years are recommended to be vaccinated with Tdpa every 10 years. Many nurses (82%) would expect more educational activities related to pertussis and methods of its prophylaxis. Conclusions: The pertussis vaccine coverage rate among Polish nurses is extremely low. This is a result of not enough knowledge about the disease and its prevention. Educational activities addressed to health care workers and reimbursement of the pertussis vaccine are required to improve awareness and increase of vaccine coverage rates in the future.

Keywords: coverage, nurse, pertussis, vaccine

Procedia PDF Downloads 205
16115 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law

Authors: Ida D. Souza, Lena Ashok

Abstract:

Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.

Keywords: child protection, best practices, juvenile justice, reformation teamwork

Procedia PDF Downloads 358
16114 An Overview of Smart Growth Concept from Ecological Planning Perspective

Authors: Ozge Celik, Elvan Ender

Abstract:

With rapidly increasing population growth and industrial revolution in the 1950s, in Turkey migration began to the cities from the countryside. Along the rapid growth of urban population has started to bring many problems. Depending on the uncontrolled urban development, concerns about the protection of natural values has increased day by day. As a result of disturbance on the natural environment, human health has started to be under threat. After all, much urban planning approaches outspread that protecting natural resources by respect to human health and troubleshooting problems emerging with anthropogenic effects. Smart growth concept is one of the chosen methods to resolve the problems in Turkey. In this paper, smart growth concept idea and its criteria will be explained while ecological planning and urban planning problems will be mentioned in Turkey according to the need of concept. Studies, consisting of practical and theoretical smart growth ideas, shows that ecological landscape planning is not included in the urban development process in Turkey. The main idea is to initiate urban development plans considering social and cultural structures of cultural assets and also natural values.

Keywords: ecological landscape planning, smart growth, Turkey, urban development

Procedia PDF Downloads 352
16113 Empirical Investigation of the Ecoprint Technique and Natural Dyes Using Geranium and Petunia Petals in a Sustainable Way

Authors: María Rojo Granados

Abstract:

This work presents an empirical investigation of the performance of pink and purple petunia petals and orange and red geranium petals on a linen fabric using the Eco Print technique. This theoretical and practical approach represents an advance in the textile world towards sustainable dyeing and printing methods. It is understood that the possibility of mass printing or dyeing through these methods in fashion is complex, but it can be an approach toward a more sustainable industry. The research consists of twenty-two empirical tests where different processes and methods are applied and explained at different temperatures and using different mordants. The test results allow the selection of which printing and dyeing methods can be applied to the fashion industry in an environmentally consistent way.

Keywords: dyeing, empirical tests, petals, performance, printing, sustainably

Procedia PDF Downloads 93
16112 Exploring Legal Liabilities of Mining Companies for Human Rights Abuses: Case Study of Mongolian Mine

Authors: Azzaya Enkhjargal

Abstract:

Context: The mining industry has a long history of human rights abuses, including forced labor, environmental pollution, and displacement of communities. In recent years, there has been growing international pressure to hold mining companies accountable for these abuses. Research Aim: This study explores the legal liabilities of mining companies for human rights abuses. The study specifically examines the case of Erdenet Mining Corporation (EMC), a large mining company in Mongolia that has been accused of human rights abuses. Methodology: The study used a mixed-methods approach, which included a review of legal literature, interviews with community members and NGOs, and a case study of EMC. Findings: The study found that mining companies can be held liable for human rights abuses under a variety of regulatory frameworks, including soft law and self-regulatory instruments in the mining industry, international law, national law, and corporate law. The study also found that there are a number of challenges to holding mining companies accountable for human rights abuses, including the lack of effective enforcement mechanisms and the difficulty of proving causation. Theoretical Importance: The study contributes to the growing body of literature on the legal liabilities of mining companies for human rights abuses. The study also provides insights into the challenges of holding mining companies accountable for human rights abuses. Data Collection: The data for the study was collected through a variety of methods, including a review of legal literature, interviews with community members and NGOs, and a case study of EMC. Analysis Procedures: The data was analyzed using a variety of methods, including content analysis, thematic analysis, and case study analysis. Conclusion: The study concludes that mining companies can be held liable for human rights abuses under a variety of legal and regulatory frameworks. There are positive developments in ensuring greater accountability and protection of affected communities and the environment in countries with a strong economy. Regrettably, access to avenues of redress is reasonably low in less developed countries, where the governments have not implemented a robust mechanism to enforce liability requirements in the mining industry. The study recommends that governments and mining companies take more ambitious steps to enhance corporate accountability.

Keywords: human rights, human rights abuses, ESG, litigation, Erdenet Mining Corporation, corporate social responsibility, soft law, self-regulation, mining industry, parent company liability, sustainability, environment, UN

Procedia PDF Downloads 72
16111 Effect of PGPB Inoculation, Addition of Biochar and Mineral N Fertilization on Mycorrhizal Colonization

Authors: Irina Mikajlo, Jaroslav Záhora, Helena Dvořáčková, Jaroslav Hynšt, Jakub Elbl

Abstract:

Strong anthropogenic impact has uncontrolled consequences on the nature of the soil. Hence, up-to-date sustainable methods of soil state improvement are essential. Investigators provide the evidence that biochar can positively effects physical, chemical and biological soil properties and the abundance of mycorrhizal fungi which are in the focus of this study. The main aim of the present investigation is to demonstrate the effect of two types of plant growth promoting bacteria (PGPB) inoculums along with the beech wood biochar and mineral N additives on mycorrhizal colonization. Experiment has been set up in laboratory conditions with containers filled with arable soil from the protection zone of the main water source ‘Brezova nad Svitavou’. Lactuca sativa (lettuce) has been selected as a model plant. Based on the obtained data, it can be concluded that mycorrhizal colonization increased as the result of combined influence of biochar and PGPB inoculums amendment. In addition, correlation analyses showed that the numbers of main groups of cultivated bacteria were dependent on the degree of mycorrhizal colonization.

Keywords: Arbuscular mycorrhiza, biochar, PGPB inoculum, soil microorganisms

Procedia PDF Downloads 242
16110 A Study on the Interlaminar Shear Strength of Carbon Fiber Reinforced Plastics Depending on the Lamination Methods

Authors: Min Sang Lee, Hee Jae Shin, In Pyo Cha, Sun Ho Ko, Hyun Kyung Yoon, Hong Gun Kim, Lee Ku Kwac

Abstract:

The prepreg process among the CFRP (Carbon Fiber Reinforced Plastic) forming methods is the short term of ‘Pre-impregnation’, which is widely used for aerospace composites that require a high quality property such as a fiber-reinforced woven fabric, in which an epoxy hardening resin is impregnated. the reality is, however, that this process requires continuous researches and developments for its commercialization because the delamination characteristically develops between the layers when a great weight is loaded from outside. to supplement such demerit, three lamination methods among the prepreg lamination methods of CFRP were designed to minimize the delamination between the layers due to external impacts. Further, the newly designed methods and the existing lamination methods were analyzed through a mechanical characteristic test, Interlaminar Shear Strength test. The Interlaminar Shear Strength test result confirmed that the newly proposed three lamination methods, i.e. the Roll, Half and Zigzag laminations, presented more excellent strengths compared to the conventional Ply lamination. The interlaminar shear strength in the roll method with relatively dense fiber distribution was approximately 1.75% higher than that in the existing ply lamination method, and in the half method, it was approximately 0.78% higher.

Keywords: carbon fiber reinforced plastic(CFRP), pre-impregnation, laminating method, interlaminar shear strength (ILSS)

Procedia PDF Downloads 366
16109 Developing Fire Risk Factors for Existing Small-Scale Hospitals

Authors: C. L. Wu, W. W. Tseng

Abstract:

From the National Health Insurance (NHI) system was introduced in Taiwan in 2000, there have been some problems in transformed small-scale hospitals, such as mobility of patients, shortage of nursing staff, medical pipelines breaking fire compartments and insufficient fire protection systems. Due to shrinking of the funding scale and the aging society, fire safety in small-scale hospitals has recently given cause for concern. The aim of this study is to determine fire risk index for small-scale hospital through a systematic approach The selection of fire safety mitigation methods can be regarded as a multi-attribute decision making process which must be guaranteed by expert groups. First of all, identify and select safety related factors and identify evaluation criteria through literature reviews and experts group. Secondly, application of the Fuzzy Analytic Hierarchy Process method is used to ascertain a weighted value which enables rating of the importance each of the selected factors. Overall, Sprinkler type and Compartmentation are the most crucial indices in mitigating fire, that is to say, structural approach play an important role to decrease losses in fire events.

Keywords: Fuzzy Delphi Method, fuzzy analytic hierarchy, process risk assessment, fire events

Procedia PDF Downloads 437
16108 Innovation of Teaching Methods in Vocational Education with Popularity Development Process

Authors: Hong Zeng

Abstract:

In the process of popularization of higher education, it is necessary to innovate teaching methods in order to make the students cultivated suitable for the needs of social development. This paper discusses the limitations and shortcomings of the traditional teaching method of teaching approach to a person's aptitude, personality, and interest and introduces the new teaching method of teaching approach to a person's personality. The teaching approach to a person's personality is a target teaching method that aims to develop students' potential and cultivate professional talents. Therefore, teachers should be professional and can adopt modern teaching methods from the Internet so that students can clearly understand the course and the knowledge structure. Finally, the students using new teaching methods can enhance their motivation to study and quickly acquire professional skills.

Keywords: higher education, personality, target education, student-centered

Procedia PDF Downloads 104
16107 Sexual Health and Sexual Risk Behavior of the Youth with HIV Positive in Northeastern Part, Thailand

Authors: Orathai Srithongtham, Ubonsri Thabuddha

Abstract:

The youth with HIV positive is not difference from the general youth in term of sexual needs. Sexual health is crucial the most to support the youth with HIV positive to be sexual well-being. This study aims to elucidate the sexual health on protection from STDs (Sexual Transmitted Diseases) and HIV transmission and to explain sexual risk behavior of the youth with HIV positive. The target group was the youth with HIV positive about 23 cases from two provinces in northeastern part of Thailand. Qualitative method was applied for collecting data by in-depth interview. Content analysis was use for data analysis. The youth with HIV positive was protection from STDs and HIV transmission by using the condom during sexual activity. The reason to deny the condom use were ashamed, condom is not a part of life, no have fit size, and the youth fear to stigmatized as a mental disorder and fear to stigmatized as going to fuck someone. The youth who trust with nurse in clinic was dare to request the condom by face. Sexual activity without condom use is sexual risk behavior. The major causes were couple trust and the sexual enjoyment first and sexual active competition with friend without condom use. The concern on HIV was the boyfriend or girlfriend not accepts the HIV positive people, worry about the HIV transmutation, and finally not compliance to ARV drug. The youth with HIV positive was lacking of the knowledge on sexual health on the issues of access to condom and the concern to keep on relationship with the boyfriend or girlfriend. This concern issues was led to the non-adherence of ARV drug and HIV distribution. To provide the sexual health service is more essential to the youth with HIV positive.

Keywords: sexual health, sexual risk behavior, youth, HIV

Procedia PDF Downloads 463
16106 Development of the Analysis and Pretreatment of Brown HT in Foods

Authors: Hee-Jae Suh, Mi-Na Hong, Min-Ji Kim, Yeon-Seong Jeong, Ok-Hwan Lee, Jae-Wook Shin, Hyang-Sook Chun, Chan Lee

Abstract:

Brown HT is a bis-azo dye which is permitted in EU as a food colorant. So far, many studies have focused on HPLC using diode array detection (DAD) analysis for detection of this food colorant with different columns and mobile phases. Even though these methods make it possible to detect Brown HT, low recovery, reproducibility, and linearity are still the major limitations for the application in foods. The purpose of this study was to compare various methods for the analysis of Brown HT and to develop an improved analytical methods including pretreatment. Among tested analysis methods, best resolution of Brown HT was observed when the following solvent was applied as a eluent; solvent A of mobile phase was 0.575g NH4H2PO4, and 0.7g Na2HPO4 in 500mL water added with 500mL methanol. The pH was adjusted using phosphoric acid to pH 6.9 and solvent B was methanol. Major peak for Brown HT appeared at the end of separation, 13.4min after injection. This method exhibited relatively high recovery and reproducibility compared with other methods. LOD (0.284 ppm), LOQ (0.861 ppm), resolution (6.143), and selectivity (1.3) of this method were better than those of ammonium acetate solution method which was most frequently used. Precision and accuracy were verified through inter-day test and intra-day test. Various methods for sample pretreatments were developed for different foods and relatively high recovery over 80% was observed in all case. This method exhibited high resolution and reproducibility of Brown HT compared with other previously reported official methods from FSA and, EU regulation.

Keywords: analytic method, Brown HT, food colorants, pretreatment method

Procedia PDF Downloads 470
16105 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 378