Search results for: embedded ARM7 processor
458 Galtung’s Violence Triangle: We Need to Be Thinking Upside Down
Authors: Michael Fusi Ligaliga
Abstract:
Peace and Conflict Studies (PACS), despite being a new pedagogical discipline, is a growing interdisciplinary academic field that has expanded its presence from the traditional lens of war, conflict, and violence to addressing various social issues impacting society. Family and domestic violence (FDV) has seldom been explored through the PACS lens despite some studies showing that “on average, nearly 20 people per minute are physically abused by an intimate partner in the United States. Over one year, this equates to more than 10 million women and men.” In the Pacific, FDV rates are some of the highest in the world. The friction caused by cultural practices reinforcing patriarchy and male impunity, compounded by historical colonial experiences, as well as the impact of Christianity on the Pacific region, creates a complex social landscape when thinking about and addressing FDV in the Pacific. This paper seeks to re-examine Johan Galtung’s violence triangle (GVT) theory and its application to understanding FDV in the Pacific. Galtung argues that there are three forms of violence – direct, structural, and cultural. Direct violence (DV) is behaviors that threaten life itself or diminishes the ability of a person to meet his or her basic needs. This form of violence is visible because it is manifested in behaviors such as killing, maiming, sexual assault, etc. Structural violence (SV) exists when people do not get equal access to goods and services (health, education, justice) that enable them to reach their full potential. When ideologies embedded in cultural norms and practices are used to justify and advocate acts of violence by shifting the moral parameters from being wrong to right or acceptable, this, according to Galtung, is referred to as Cultural violence (CV).Keywords: direct violence, cultural violence, structural violence, indigenous peacebuilding, samoa
Procedia PDF Downloads 77457 Dynamic Process Model for Designing Smart Spaces Based on Context-Awareness and Computational Methods Principles
Authors: Heba M. Jahin, Ali F. Bakr, Zeyad T. Elsayad
Abstract:
As smart spaces can be defined as any working environment which integrates embedded computers, information appliances and multi-modal sensors to remain focused on the interaction between the users, their activity, and their behavior in the space; hence, smart space must be aware of their contexts and automatically adapt to their changing context-awareness, by interacting with their physical environment through natural and multimodal interfaces. Also, by serving the information used proactively. This paper suggests a dynamic framework through the architectural design process of the space based on the principles of computational methods and context-awareness principles to help in creating a field of changes and modifications. It generates possibilities, concerns about the physical, structural and user contexts. This framework is concerned with five main processes: gathering and analyzing data to generate smart design scenarios, parameters, and attributes; which will be transformed by coding into four types of models. Furthmore, connecting those models together in the interaction model which will represent the context-awareness system. Then, transforming that model into a virtual and ambient environment which represents the physical and real environments, to act as a linkage phase between the users and their activities taking place in that smart space . Finally, the feedback phase from users of that environment to be sure that the design of that smart space fulfill their needs. Therefore, the generated design process will help in designing smarts spaces that can be adapted and controlled to answer the users’ defined goals, needs, and activity.Keywords: computational methods, context-awareness, design process, smart spaces
Procedia PDF Downloads 331456 Valorisation of Waste Chicken Feathers: Electrospun Antibacterial Nanoparticles-Embedded Keratin Composite Nanofibers
Authors: Lebogang L. R. Mphahlele, Bruce B. Sithole
Abstract:
Chicken meat is the highest consumed meat in south Africa, with a per capita consumption of >33 kg yearly. Hence, South Africa produces over 250 million kg of waste chicken feathers each year, the majority of which is landfilled or incinerated. The discarded feathers have caused environmental pollution and natural protein resource waste. Therefore, the valorisation of waste chicken feathers is measured as a more environmentally friendly and cost-effective treatment. Feather contains 91% protein, the main component being beta-keratin, a fibrous and insoluble structural protein extensively cross linked by disulfide bonds. Keratin is usually converted it into nanofibers via electrospinning for a variety of applications. keratin nanofiber composites have many potential biomedical applications for their attractive features, such as high surface-to-volume ratio and very high porosity. The application of nanofibers in the biomedical wound dressing requires antimicrobial properties for materials. One approach is incorporating inorganic nanoparticles, among which silver nanoparticles played an important alternative antibacterial agent and have been studied against many types of microbes. The objective of this study is to combine synthetic polymer, chicken feather keratin, and antibacterial nanoparticles to develop novel electrospun antibacterial nanofibrous composites for possible wound dressing application. Furthermore, this study will converting a two-dimensional electrospun nanofiber membrane to three-dimensional fiber networks that resemble the structure of the extracellular matrix (ECM)Keywords: chicken feather keratin, nanofibers, nanoparticles, nanocomposites, wound dressing
Procedia PDF Downloads 132455 Water-Repellent Coating Based on Thermoplastic Polyurethane, Silica Nanoparticles and Graphene Nanoplatelets
Authors: S. Naderizadeh, A. Athanassiou, I. S. Bayer
Abstract:
This work describes a layer-by-layer spraying method to produce a non-wetting coating, based on thermoplastic polyurethane (TPU) and silica nanoparticles (Si-NPs). The main purpose of this work was to transform a hydrophilic polymer to superhydrophobic coating. The contact angle of pure TPU was measured about 77˚ ± 2, and water droplets did not roll away upon tilting even at 90°. But after applying a layer of Si-NPs on top of this, not only the contact angle increased to 165˚ ± 2, but also water droplets can roll away even below 5˚ tilting. The most important restriction in this study was the weak interfacial adhesion between polymer and nanoparticles, which had a bad effect on durability of the coatings. To overcome this problem, we used a very thin layer of graphene nanoplatelets (GNPs) as an interlayer between TPU and Si-NPs layers, followed by thermal treatment at 150˚C. The sample’s morphology and topography were characterized by scanning electron microscopy (SEM), EDX analysis and atomic force microscopy (AFM). It was observed that Si-NPs embedded into the polymer phase in the presence of GNPs layer. It is probably because of the high surface area and considerable thermal conductivity of the graphene platelets. The contact angle value for the sample containing graphene decreased a little bit respected to the coating without graphene and reached to 156.4˚ ± 2, due to the depletion of the surface roughness. The durability of the coatings against abrasion was evaluated by Taber® abrasion test, and it was observed that superhydrophobicity of the coatings remains for a longer time, in the presence of GNPs layer. Due to the simple fabrication method and good durability of the coating, this coating can be used as a durable superhydrophobic coating for metals and can be produced in large scale.Keywords: graphene, silica nanoparticles, superhydrophobicity, thermoplastic polyurethane
Procedia PDF Downloads 186454 Voices and Cries Across the Generations: British Bangladeshis’ Responses to Combat and Resist Stigmatisation
Authors: Mubassir Hussain
Abstract:
British Bangladeshis are one of the most marginalised and lowest socioeconomic groups in the UK. Their silent hardships have crystallised the stigma surrounding them. Understanding the intimate workings of this stigma can unravel its profound psychological impact, which has hindered their social and economic progress and slowly taken them out of the ‘victim’ mindset. Although community-based studies have been conducted to understand the nuances of British Bangladeshis’ stigma experiences, these examinations are broad and touch only the surface. They do not investigate the private family dynamics behind closed doors, how family members feel and engage with stigma or the use and justification of their responses. The main objectives of this qualitative research are to observe how attitudes towards stigma differ across generations, analyse the variety and frequency of reactions across age cohorts, gender, and social class, and examine how their actions and identities shape their responses. This data will be collected through embedded ethnography and analysed using qualitative software. Through this analysis, the research hypothesises that the older generation will engage more in the ‘isolation’, ‘not responding’, and ‘management of the self’ response categories, whereas the subsequent generations will employ ‘confrontation’, ‘demonstrating competence’, and ‘management of the self’ reactions. From these findings, the study anticipates an assortment of compelling and diverse responses and effects. Ultimately, the family members and community are responsible for their own futures and have the power to make these life-altering changes. Their collective experiences and values shape how individuals perceive and respond to stigma, racism, Islamophobia and discrimination through either silence, resilience or confrontation.Keywords: British Bangladeshi, stigma, racism, discrimination, Islamophobia, responses
Procedia PDF Downloads 17453 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 289452 The Experiences of Claiming Welfare Benefits for People with Disabilities in the UK
Authors: Jennifer McNeill
Abstract:
Over the years UK Governments have extended the use of welfare conditionality to more marginalised groups. Whereas in the past, disabled people’s rights to unconditional welfare were defended, significant numbers of disabled people have in recent years been re-classified as ‘fit for work’ as a result of this policy shift towards increased conditionality targeting more welfare service user groups. This paper discusses findings from a five-year project exploring the ethics and efficacy of welfare conditionality. Drawing on repeat interviews over three years with 58 disabled welfare service users across England and Scotland, the paper explores the experience of, and impact of conditionality upon, disabled participants. In particular, participants described the process of claiming disability-related benefits as stigmatising, with some describing the medical assessments as demeaning, traumatic and even painful. The medical assessments are conducted by private contractors and participants felt they were treated unfairly, under suspicion and under surveillance. This finding is important in line with a recent UN report concerned with the practice of such assessments. The findings reveal that notions of ‘deservedness’ are embedded in this system as disabled recipients argue for their entitlement to welfare claims relative to what are deemed to be less deserving groups of benefit claimants. This indicates an increasing competition ethic within different sections of the most marginalised social groups that facilitate further forms of social fragmentation, particularly in relation to opposition to benefit cuts and other changes requiring concerted and organised forms of resistance. The impact of media and political scapegoating of the most marginal has generated divisions within even those who position themselves as legitimate recipients.Keywords: disability, medical assessments, stigma, welfare conditionality
Procedia PDF Downloads 202451 Exploring the Cross-Cultural Practice of Transnational Community in Taiwan
Authors: Ya-Hsuan Wang
Abstract:
This project of intercultural education aimed to explore pluricultural people’s interpretation and evaluation of the transnational community in Taiwan. Based on transnationalism and transculturalism, this study concerns the human right issues for immigrants and pluricultural people. Research participants as immigrants in Taiwan were asked about their typical thinking styles in the transnational community, their cultural integration in terms of transnational behaviors, and their collective memory of the transnational community. Interview questions included what key factors were involved in their identity negotiation, what roles the transnational community and collective memory would be for their identity negotiation and what were the positive or negative aspects impacting cross-border identity. Based on the experiences of pluricultural people and transnational communities, this project expected to enhance the depth and width of developing transcultural knowledge in textbook reform on History in K-12 schools. It is to transform cross-border identity into knowledge embedded with local culture in response to globalization and localization. The purpose of this paper is to portrait the cross-cultural practice of transnational community for Taiwan’s immigrants. It is to report their external socio-cultural expectation of ethnic economics, to understand their internal life course of national identity, and to clarify transnational community in relation to their cross-border identity. In conclusion, the cross-cultural practice of transnational community combined the external contexts such as ethnic economic interaction among transnational communities, social report and ethnic industry, and the internal contexts such as ethnic identity, language use, and collective memory in ethnic history.Keywords: cross-cultural practice, immigrants, pluricultural people, transnational community
Procedia PDF Downloads 196450 The Colombian Special Jurisdiction for Peace, a Transitional Justice Mechanism That Prioritizes Reconciliation over Punishment: A Content Analysis of the Colombian Peace Agreement
Authors: Laura Mendez
Abstract:
Tribunals for the prosecution of crimes against humanity have been implemented in recent history via international intervention or imposed by one side of the conflict, as in the cases of Rwanda, Iraq, Argentina, and Chile. However, the creation of a criminal tribunal as the result of a peace agreement between formerly warring parties has been unique to the Colombian peace process. As such, the Colombian Jurisdiction for Peace (SJP), or JEP for its Spanish acronym, is viewed as a site of social contestation where actors shape its design and implementation. This study contributes to the literature of transitional justice by analyzing how the framing of the creation of the Colombian tribunal reveals the parties' interests. The analysis frames the interests of the power-brokers, i.e., the government and the Revolutionary Armed Forces of Colombia (FARC), and the victims in light of the tribunal’s functions. The purpose of this analysis is to understand how the interests of the parties are embedded in the designing of the SJP. This paper argues that the creation of the SJP rests on restorative justice, for which the victim, not the perpetrator, is at the center of prosecution. The SJP’s approach to justice moves from prosecution as punishment to prosecution as sanctions. SJP’s alternative sanctions focused on truth, reparation, and restoration are designed to humanize both the victim and the perpetrator in order to achieve reconciliation. The findings also show that requiring the perpetrator to perform labor to repair the victim as an alternative form of sanction aims to foster relations of reintegration and social learning between victims and perpetrators.Keywords: transitional justice mechanisms, criminal tribunals, Colombia, Colombian Jurisdiction for Peace, JEP
Procedia PDF Downloads 118449 Elder Abuse: An Exploration of China, the United States, and Israel’s Perspectives on Elder Abuse and What Their Differences Reveal about Its Underreported Nature
Authors: Sydney Burnett
Abstract:
The history of the relationship between elder abuse and its tendency to go underreported is rooted in the oppressive nature of ageism and victimization. Approximately 8% of the world's population was aged sixty or over in 1950, whereas, in 2020, the number more than doubled to 16.9%. By 2050, that number is expected to reach 22%. Although difficult for individuals of any age to feel completely supported in society, this task proves especially difficult for the elderly demographic. And as the elderly population continues to grow, the systemic abuse and neglect that this group encounters, and thus its underreported nature, multiply at a similar rate. Although a recent increase in awareness has initiated stronger efforts towards addressing the meager resources, processes, and personnel present to manage elder abuse, both reported and unreported, the destructive complexities of ageism and victimization persist. Examining the byproducts of the rapidly growing elderly demographic in China, the United States, and Israel, in cohesion with the inherent challenges in the context of terminology, definition, and typologies of elder abuse should provide insight into the pernicious influences of elder abuse that contribute to the non-identification and non-recognition of elder maltreatment present in these three countries in different stages of development. This investigation aims to understand the intricacy of elder abuse and its correlation to a lack of acknowledgment as well as its consequences in society by exploring the variation between China, the United States, and Israel's attitudes surrounding the subject. Furthermore, the systemic abuse and neglect embedded in global ageism can be revealed by the differences between the three countries' approaches to reporting elder abuse.Keywords: elder abuse, ageism, mistreatment, underreported
Procedia PDF Downloads 91448 Cone Beam Computed Tomography: A Useful Diagnostic Tool to Determine Root Canal Morphology in a Sample of Egyptian Population
Authors: H. El-Messiry, M. El-Zainy, D. Abdelkhalek
Abstract:
Cone-beam computed tomography (CBCT) provides high-quality 3-dimensional images of dental structures because of its high spatial resolution. The study of dental morphology is important in research as it provides information about diversities within a population. Many studies have shown different shapes and numbers of roots canals among different races, especially in molars. The aim of this study was to determine the morphology of root canals of mandibular first and third molars in a sample of Egyptian population using CBCT scanning. Fifty mandibular first Molars (M1) and fifty mandibular third (M3) extracted molars were collected. Thick rectangular molds were made using pink wax to hold the samples. Molars were embedded in the wax mold by aligning them in rows leaving arbitrary 0.5cm space between them. The molds with the samples in were submitted for CBCT scan. The number and morphology of root canals were assessed and classified according to Vertucci's classification. The mesial and the distal roots were examined separately. Finally, data was analyzed using Fisher exact test. The most prevalent mesial root canal frequency in M1 was type IV (60%) and type II (40 %), while M3 showed prevalence of type I (40%) and II (40%). Distal root canal morphology showed prevalence of type I in both M1 (66%) and M3 (86%). So, it can be concluded that CBCT scanning provides supplemental information about the root canal configurations of mandibular molars in a sample of Egyptian population. This study may help clinicians in the root canal treatment of mandibular molars.Keywords: cone beam computed tomography, mandibular first molar, mandibular third molar, root canal morphology
Procedia PDF Downloads 318447 Evolution of Predator-prey Body-size Ratio: Spatial Dimensions of Foraging Space
Authors: Xin Chen
Abstract:
It has been widely observed that marine food webs have significantly larger predator–prey body-size ratios compared with their terrestrial counterparts. A number of hypotheses have been proposed to account for such difference on the basis of primary productivity, trophic structure, biophysics, bioenergetics, habitat features, energy efficiency, etc. In this study, an alternative explanation is suggested based on the difference in the spatial dimensions of foraging arenas: terrestrial animals primarily forage in two dimensional arenas, while marine animals mostly forage in three dimensional arenas. Using 2-dimensional and 3-dimensional random walk simulations, it is shown that marine predators with 3-dimensional foraging would normally have a greater foraging efficiency than terrestrial predators with 2-dimensional foraging. Marine prey with 3-dimensional dispersion usually has greater swarms or aggregations than terrestrial prey with 2-dimensional dispersion, which again favours a greater predator foraging efficiency in marine animals. As an analytical tool, a Lotka-Volterra based adaptive dynamical model is developed with the predator-prey ratio embedded as an adaptive variable. The model predicts that high predator foraging efficiency and high prey conversion rate will dynamically lead to the evolution of a greater predator-prey ratio. Therefore, marine food webs with 3-dimensional foraging space, which generally have higher predator foraging efficiency, will evolve a greater predator-prey ratio than terrestrial food webs.Keywords: predator-prey, body size, lotka-volterra, random walk, foraging efficiency
Procedia PDF Downloads 77446 Exploration of Two Selected Sculptural Forms in the Department of Fine and Applied Arts, Federal Capital Territory College of Education Zuba-Abuja, Nigeria as Motifs for Wax Print Pattern and Design
Authors: Adeoti Adebowale, Abduljaleel, Ejiogu Fidelis Onyekwo
Abstract:
Form and image development are fundamental to creative expression in visual arts. The form is an element that distinguishes the difference between two-dimension and three-dimension among the branches of visual arts. Particularly, the sculpture is a three-dimensional form, while the textile design is a two-dimensional form of its visual appearance. The visual expression of each of them is embedded in the creative practice of the artist, which is easily understood and interpreted by the viewer. In this research, an attempt is made to explore and analyse sculptural forms adopted as a motif for wax print in textile design, aiming at breeding yet another pattern and motif suitable for various design uses. For instance, the dynamics of sculptural form adaptation into other areas of creativity, such as architecture, pictorial arts and pottery, as well as automobile bodies, is a discernible image everywhere. The research is studio exploratory, while a camera and descriptive analysis were used to process the data. Two sculptural forms were adopted from the Department of Fine and Applied Arts, Federal Capital Territory College of Education Zuba-Abuja, in this study due to the uniqueness of their technique of execution. The findings resulted in ten (10) paper designs showing the dexterity of studio practice in the development of design for various fashion and textile uses. However, the paper concludes that sculptural form is a source of inspiration for generating design concepts for a textile designer.Keywords: exploration, design, motifs, sculptural forms, wax print
Procedia PDF Downloads 70445 A Corporate Social Responsibility View on Bribery Control in Business Relationships
Authors: Irfan Ameer
Abstract:
Bribery control in developing countries is the biggest challenge for multinational enterprises (MNEs). Bribery practices are socially embedded and institutionalized, and therefore may achieve collective legitimacy in the society. MNEs often have better and strict norms, codes and standards about such corrupt practices. Bribery in B2B sales relationships has been researched but studies focusing on the role of firm in controlling bribery are scarce. The main objective of this paper is to explore MNEs strategies to control bribery in an environment where bribery is institutionalized. This qualitative study uses narrative approach and focuses on key events, actors and their role in controlling bribery in B2B sales relationships. The context of this study is pharmaceutical industry of Pakistan and data is collected through 23 episodic interviews supported by secondary data. The Corporate social responsibility (CSR) literature e.g. CSR three domain model and CSR pyramid is used to make sense of MNEs strategies to control bribery in developing countries. Results show that MNEs’ bribery control strategies are rather emerging based on the role of some key stakeholders and events which shape bribery strategies. Five key bribery control strategies were found through which MNEs can control both demand and supply side of bribery: bribery related codes development; bribery related codes implementation; focusing on competitive advantage; find mutually beneficial ethical solution; and collaboration with ethical stakeholders. The results also highlight the problems associated with each strategy. Study is unique in a sense that it focuses on stakeholders having unethical interests and provides guidelines to MNEs in controlling bribery practices in B2B sales relationships.Keywords: bribery, developing countries, CSR, narrative research, B2B sales, MNEs
Procedia PDF Downloads 375444 Between a Rock and a Hard Place: The Possible Roles of Eternity Clauses in the Member States of the European Union
Authors: Zsuzsa Szakaly
Abstract:
Several constitutions have explicit or implicit eternity clauses in the European Union, their classic roles were analyzed so far, albeit there are new possibilities emerging in relation to the identity of the constitutions of the Member States. The aim of the study is to look at the practice of the Constitutional Courts of the Member States in detail regarding eternity clauses where limiting constitutional amendment has practical bearing, and to examine the influence of such practice on Europeanization. There are some states that apply explicit eternity clauses embedded in the text of the constitution, e.g., Italy, Germany, and Romania. In other states, the Constitutional Court 'unearthed' the implicit eternity clauses from the text of the basic law, e.g., Slovakia and Croatia. By using comparative analysis to examine the explicit or implicit clauses of the concerned constitutions, taking into consideration the new trends of the judicial opinions of the Member States and the fresh scientific studies, the main questions are: How to wield the double-edged sword of eternity clauses? To support European Integration or to support the sovereignty of the Member State? To help Europeanization or to act against it? Eternity clauses can easily find themselves between a rock and a hard place, the law of the European Union and the law of a Member State, with more possible interpretations. As more and more Constitutional Courts started to declare elements of their Member States’ constitutional identities, these began to interfere with the eternity clauses. Will this trend eventually work against Europeanization? As a result of the research, it can be stated that a lowest common denominator exists in the practice of European Constitutional Courts regarding eternity clauses. The chance of a European model and the possibility of this model influencing the status quo between the European Union and the Member States will be examined by looking at the answers these courts have found so far.Keywords: constitutional court, constitutional identity, eternity clause, European Integration
Procedia PDF Downloads 141443 Incorporating Lexical-Semantic Knowledge into Convolutional Neural Network Framework for Pediatric Disease Diagnosis
Authors: Xiaocong Liu, Huazhen Wang, Ting He, Xiaozheng Li, Weihan Zhang, Jian Chen
Abstract:
The utilization of electronic medical record (EMR) data to establish the disease diagnosis model has become an important research content of biomedical informatics. Deep learning can automatically extract features from the massive data, which brings about breakthroughs in the study of EMR data. The challenge is that deep learning lacks semantic knowledge, which leads to impracticability in medical science. This research proposes a method of incorporating lexical-semantic knowledge from abundant entities into a convolutional neural network (CNN) framework for pediatric disease diagnosis. Firstly, medical terms are vectorized into Lexical Semantic Vectors (LSV), which are concatenated with the embedded word vectors of word2vec to enrich the feature representation. Secondly, the semantic distribution of medical terms serves as Semantic Decision Guide (SDG) for the optimization of deep learning models. The study evaluate the performance of LSV-SDG-CNN model on four kinds of Chinese EMR datasets. Additionally, CNN, LSV-CNN, and SDG-CNN are designed as baseline models for comparison. The experimental results show that LSV-SDG-CNN model outperforms baseline models on four kinds of Chinese EMR datasets. The best configuration of the model yielded an F1 score of 86.20%. The results clearly demonstrate that CNN has been effectively guided and optimized by lexical-semantic knowledge, and LSV-SDG-CNN model improves the disease classification accuracy with a clear margin.Keywords: convolutional neural network, electronic medical record, feature representation, lexical semantics, semantic decision
Procedia PDF Downloads 126442 Disrupting Patriarchy: Transforming Gender Oppression through Dialogue between Women and Men at a South African University
Authors: S. van Schalkwyk
Abstract:
On international levels and across disciplines gender scholars have argued that patriarchal scripts of masculinity and femininity are harmful as they negatively impact constructions of selfhood and relations between women and men. Patriarchal ideologies serve as a scaffolding for dominance and subordination and fuel violence against women. Toxic masculinity—social discourses of men as violent, unemotional, and sexually dominant—are embedded in South African culture and are rooted in the high rates of gender violence occurring in the country. Finding strategies that can open up space for the interrogation of toxic masculinity is crucial in order to disrupt the destructive consequences of patriarchy in educational and social contexts. The University of the Free State (UFS) in South Africa in collaboration with the non-profit organization Gender Reconciliation International conducted a year-long series of workshops with male and female students. The aim of these workshops was to facilitate healing between men and women through collective dialogue processes. Drawing on a collective biography methodology outlined by feminist poststructuralists, this paper explores the impact of these workshops on gender relations. Findings show that the students experienced significant psychological connections with others during these dialogues, through which they began to interrogate their own gendered conditioning and harmful patriarchal assumptions and practices. This paper enhances insights into the possibilities for disrupting patriarchy in South African universities through feminist collective research efforts.Keywords: collective biography methodology, South Africa, toxic masculinity, transforming gender oppression, violence against women
Procedia PDF Downloads 480441 Contactless Electromagnetic Detection of Stress Fluctuations in Steel Elements
Authors: M. A. García, J. Vinolas, A. Hernando
Abstract:
Steel is nowadays one of the most important structural materials because of its outstanding mechanical properties. Therefore, in order to look for a sustainable economic model and to optimize the use of extensive resources, new methods to monitor and prevent failure of steel-based facilities are required. The classical mechanical tests, as for instance building tasting, are invasive and destructive. Moreover, for facilities where the steel element is embedded, (as reinforced concrete) these techniques are directly non applicable. Hence, non-invasive monitoring techniques to prevent failure, without altering the structural properties of the elements are required. Among them, electromagnetic methods are particularly suitable for non-invasive inspection of the mechanical state of steel-based elements. The magnetoelastic coupling effects induce a modification of the electromagnetic properties of an element upon applied stress. Since most steels are ferromagnetic because of their large Fe content, it is possible to inspect their structure and state in a non-invasive way. We present here a distinct electromagnetic method for contactless evaluation of internal stress in steel-based elements. In particular, this method relies on measuring the magnetic induction between two coils with the steel specimen in between them. We found that the alteration of electromagnetic properties of the steel specimen induced by applied stress-induced changes in the induction allowed us to detect stress well below half of the elastic limit of the material. Hence, it represents an outstanding non-invasive method to prevent failure in steel-based facilities. We here describe the theoretical model, present experimental results to validate it and finally we show a practical application for detection of stress and inhomogeneities in train railways.Keywords: magnetoelastic, magnetic induction, mechanical stress, steel
Procedia PDF Downloads 50440 Using the SMT Solver to Minimize the Latency and to Optimize the Number of Cores in an NoC-DSP Architectures
Authors: Imen Amari, Kaouther Gasmi, Asma Rebaya, Salem Hasnaoui
Abstract:
The problem of scheduling and mapping data flow applications on multi-core architectures is notoriously difficult. This difficulty is related to the rapid evaluation of Telecommunication and multimedia systems accompanied by a rapid increase of user requirements in terms of latency, execution time, consumption, energy, etc. Having an optimal scheduling on multi-cores DSP (Digital signal Processors) platforms is a challenging task. In this context, we present a novel technic and algorithm in order to find a valid schedule that optimizes the key performance metrics particularly the Latency. Our contribution is based on Satisfiability Modulo Theories (SMT) solving technologies which is strongly driven by the industrial applications and needs. This paper, describe a scheduling module integrated in our proposed Workflow which is advised to be a successful approach for programming the applications based on NoC-DSP platforms. This workflow transform automatically a Simulink model to a synchronous dataflow (SDF) model. The automatic transformation followed by SMT solver scheduling aim to minimize the final latency and other software/hardware metrics in terms of an optimal schedule. Also, finding the optimal numbers of cores to be used. In fact, our proposed workflow taking as entry point a Simulink file (.mdl or .slx) derived from embedded Matlab functions. We use an approach which is based on the synchronous and hierarchical behavior of both Simulink and SDF. Whence, results of running the scheduler which exist in the Workflow mentioned above using our proposed SMT solver algorithm refinements produce the best possible scheduling in terms of latency and numbers of cores.Keywords: multi-cores DSP, scheduling, SMT solver, workflow
Procedia PDF Downloads 286439 Integration of GIS with Remote Sensing and GPS for Disaster Mitigation
Authors: Sikander Nawaz Khan
Abstract:
Natural disasters like flood, earthquake, cyclone, volcanic eruption and others are causing immense losses to the property and lives every year. Current status and actual loss information of natural hazards can be determined and also prediction for next probable disasters can be made using different remote sensing and mapping technologies. Global Positioning System (GPS) calculates the exact position of damage. It can also communicate with wireless sensor nodes embedded in potentially dangerous places. GPS provide precise and accurate locations and other related information like speed, track, direction and distance of target object to emergency responders. Remote Sensing facilitates to map damages without having physical contact with target area. Now with the addition of more remote sensing satellites and other advancements, early warning system is used very efficiently. Remote sensing is being used both at local and global scale. High Resolution Satellite Imagery (HRSI), airborne remote sensing and space-borne remote sensing is playing vital role in disaster management. Early on Geographic Information System (GIS) was used to collect, arrange, and map the spatial information but now it has capability to analyze spatial data. This analytical ability of GIS is the main cause of its adaption by different emergency services providers like police and ambulance service. Full potential of these so called 3S technologies cannot be used in alone. Integration of GPS and other remote sensing techniques with GIS has pointed new horizons in modeling of earth science activities. Many remote sensing cases including Asian Ocean Tsunami in 2004, Mount Mangart landslides and Pakistan-India earthquake in 2005 are described in this paper.Keywords: disaster mitigation, GIS, GPS, remote sensing
Procedia PDF Downloads 481438 3D Geomechanical Model the Best Solution of the 21st Century for Perforation's Problems
Authors: Luis Guiliana, Andrea Osorio
Abstract:
The lack of comprehension of the reservoir geomechanics conditions may cause operational problems that cost to the industry billions of dollars per year. The drilling operations at the Ceuta Field, Area 2 South, Maracaibo Lake, have been very expensive due to problems associated with drilling. The principal objective of this investigation is to develop a 3D geomechanical model in this area, in order to optimize the future drillings in the field. For this purpose, a 1D geomechanical model was built at first instance, following the workflow of the MEM (Mechanical Earth Model), this consists of the following steps: 1) Data auditing, 2) Analysis of drilling events and structural model, 3) Mechanical stratigraphy, 4) Overburden stress, 5) Pore pressure, 6) Rock mechanical properties, 7) Horizontal stresses, 8) Direction of the horizontal stresses, 9) Wellbore stability. The 3D MEM was developed through the geostatistic model of the Eocene C-SUP VLG-3676 reservoir and the 1D MEM. With this data the geomechanical grid was embedded. The analysis of the results threw, that the problems occurred in the wells that were examined were mainly due to wellbore stability issues. It was determined that the stress field change as the stratigraphic column deepens, it is normal to strike-slip at the Middle Miocene and Lower Miocene, and strike-slipe to reverse at the Eocene. In agreement to this, at the level of the Eocene, the most advantageous direction to drill is parallel to the maximum horizontal stress (157º). The 3D MEM allowed having a tridimensional visualization of the rock mechanical properties, stresses and operational windows (mud weight and pressures) variations. This will facilitate the optimization of the future drillings in the area, including those zones without any geomechanics information.Keywords: geomechanics, MEM, drilling, stress
Procedia PDF Downloads 273437 Applying Failure Modes and Effect Analysis Concept in a Global Software Development Process
Authors: Camilo Souza, Lidia Melo, Fernanda Terra, Francisco Caio, Marcelo Reis
Abstract:
SIDIA is a research and development (R&D) institute that belongs to Samsung’s global software development process. The SIDIA’s Model Team (MT) is a part of Samsung’s Mobile Division Area, which is responsible for the development of Android releases embedded in Samsung mobile devices. Basically, in this software development process, the kickoff occurs in some strategic countries (e.g., South Korea) where some software requirements are applied and the initial software tests are performed. When the software achieves a more mature level, a new branch is derived, and the development continues in subsidiaries from other strategic countries (e.g., SIDIA-Brazil). However, even in the newly created branches, there are several interactions between developers from different nationalities in order to fix bugs reported during test activities, apply some specific requirements from partners and develop new features as well. Despite the GSD strategy contributes to improving software development, some challenges are also introduced as well. In this paper, we share the initial results about the application of the failure modes and effect analysis (FMEA) concept in the software development process followed by the SIDIA’s model team. The main goal was to identify and mitigate the process potential failures through the application of recommended actions. The initial results show that the application of the FMEA concept allows us to identify the potential failures in our GSD process as well as to propose corrective actions to mitigate them. Finally, FMEA encouraged members of different teams to take actions that contribute to improving our GSD process.Keywords: global software development, potential failures, FMEA, recommended actions
Procedia PDF Downloads 227436 The Role of Long-Chain Ionic Surfactants on Extending Drug Delivery from Contact Lenses
Authors: Cesar Torres, Robert Briber, Nam Sun Wang
Abstract:
Eye drops are the most commonly used treatment for short-term and long-term ophthalmic diseases. However, eye drops could deliver only about 5% of the functional ingredients contained in a burst dosage. To address the limitations of eye drops, the use of therapeutic contact lenses has been introduced. Drug-loaded contact lenses provide drugs a longer residence time in the tear film and hence, decrease the potential risk of side effects. Nevertheless, a major limitation of contact lenses as drug delivery devices is that most of the drug absorbed is released within the first few hours. This fact limits their use for extended release. The present study demonstrates the application of long-alkyl chain ionic surfactants on extending drug release kinetics from commercially available silicone hydrogel contact lenses. In vitro release experiments were carried by immersing drug-containing contact lenses in phosphate buffer saline at physiological pH. The drug concentration as a function of time was monitored using ultraviolet-visible spectroscopy. The results of the study demonstrate that release kinetics is dependent on the ionic surfactant weight percent in the contact lenses, and on the length of the hydrophobic alkyl chain of the ionic surfactants. The use of ionic surfactants in contact lenses can extend the delivery of drugs from a few hours to a few weeks, depending on the physicochemical properties of the drugs. Contact lenses embedded with ionic surfactants could be potential biomaterials to be used for extended drug delivery and in the treatment of ophthalmic diseases. However, ocular irritation and toxicity studies would be needed to evaluate the safety of the approach.Keywords: contact lenses, drug delivery, controlled release, ionic surfactant
Procedia PDF Downloads 143435 Flow and Heat Transfer Analysis of Copper-Water Nanofluid with Temperature Dependent Viscosity past a Riga Plate
Authors: Fahad Abbasi
Abstract:
Flow of electrically conducting nanofluids is of pivotal importance in countless industrial and medical appliances. Fluctuations in thermophysical properties of such fluids due to variations in temperature have not received due attention in the available literature. Present investigation aims to fill this void by analyzing the flow of copper-water nanofluid with temperature dependent viscosity past a Riga plate. Strong wall suction and viscous dissipation have also been taken into account. Numerical solutions for the resulting nonlinear system have been obtained. Results are presented in the graphical and tabular format in order to facilitate the physical analysis. An estimated expression for skin friction coefficient and Nusselt number are obtained by performing linear regression on numerical data for embedded parameters. Results indicate that the temperature dependent viscosity alters the velocity, as well as the temperature of the nanofluid and, is of considerable importance in the processes where high accuracy is desired. Addition of copper nanoparticles makes the momentum boundary layer thinner whereas viscosity parameter does not affect the boundary layer thickness. Moreover, the regression expressions indicate that magnitude of rate of change in effective skin friction coefficient and Nusselt number with respect to nanoparticles volume fraction is prominent when compared with the rate of change with variable viscosity parameter and modified Hartmann number.Keywords: heat transfer, peristaltic flows, radially varying magnetic field, curved channel
Procedia PDF Downloads 166434 Finite Element Approach to Evaluate Time Dependent Shear Behavior of Connections in Hybrid Steel-PC Girder under Sustained Loading
Authors: Mohammad Najmol Haque, Takeshi Maki, Jun Sasaki
Abstract:
Headed stud shear connections are widely used in the junction or embedded zone of hybrid girder to achieve whole composite action with continuity that can sustain steel-concrete interfacial tensile and shear forces. In Japan, Japan Road Association (JRA) specifications are used for hybrid girder design that utilizes very low level of stud capacity than those of American Institute of Steel Construction (AISC) specifications, Japan Society of Civil Engineers (JSCE) specifications and EURO code. As low design shear strength is considered in design of connections, the time dependent shear behavior due to sustained external loading is not considered, even not fully studied. In this study, a finite element approach was used to evaluate the time dependent shear behavior for headed studs used as connections at the junction. This study clarified, how the sustained loading distinctively impacted on changing the interfacial shear of connections with time which was sensitive to lodging history, positions of flanges, neighboring studs, position of prestress bar and reinforcing bar, concrete strength, etc. and also identified a shear influence area. Stud strength was also confirmed through pushout tests. The outcome obtained from the study may provide an important basis and reference data in designing connections of hybrid girders with enhanced stud capacity with due consideration of their long-term shear behavior.Keywords: finite element, hybrid girder, shear connections, sustained loading, time dependent behavior
Procedia PDF Downloads 135433 Cultural Notion of Mental Health and Role of Local Deities: A Case Study of North-Western Himalaya
Authors: Randhir Singh Ranta
Abstract:
The attempt to achieve and maintain an optimum state of health has always drilled the human mind and consequently, a number of healing systems have evolved around the world. Communities have contrived procedures to alleviate the wearisome condition arising out of ailments, using their own system, which differ from one community to another. Each culture has evolved a viewpoint regarding the cause of disease and the same is embedded in their belief systems. In India, the elementary proposition of mental health is within the community. From the theoretical perspective, the individual obeying and adhering to the institution of village deity represents the two changeovers i.e. from biological to psychological and from psychological to spiritual. In order to understand the cultural notion of mental health and role of local deities, a study was conducted in North-western Himalaya with a purpose to study the belief system of people in context of institution of village deity and establish a relationship between religiosity and general well-being among the believers. An effort was made to compare the mental health status of people facing psychosomatic disorders with the normal. Quantitative and qualitative methods were used for the purpose. Case studies were made to have an understanding of nature of mental and behavioural disorders and the role of institutions of local deities in managing the same. The results revealed that mountain communities have firm beliefs in local deities. A significant difference was found on the scores of belief and wellbeing, and a positive correlation was found between the belief assessment and general wellbeing.Keywords: culture notion, mental health, healing system, deities
Procedia PDF Downloads 320432 Micro-Meso 3D FE Damage Modelling of Woven Carbon Fibre Reinforced Plastic Composite under Quasi-Static Bending
Authors: Aamir Mubashar, Ibrahim Fiaz
Abstract:
This research presents a three-dimensional finite element modelling strategy to simulate damage in a quasi-static three-point bending analysis of woven twill 2/2 type carbon fibre reinforced plastic (CFRP) composite on a micro-meso level using cohesive zone modelling technique. A meso scale finite element model comprised of a number of plies was developed in the commercial finite element code Abaqus/explicit. The interfaces between the plies were explicitly modelled using cohesive zone elements to allow for debonding by crack initiation and propagation. Load-deflection response of the CRFP within the quasi-static range was obtained and compared with the data existing in the literature. This provided validation of the model at the global scale. The outputs resulting from the global model were then used to develop a simulation model capturing the micro-meso scale material features. The sub-model consisted of a refined mesh representative volume element (RVE) modelled in texgen software, which was later embedded with cohesive elements in the finite element software environment. The results obtained from the developed strategy were successful in predicting the overall load-deflection response and the damage in global and sub-model at the flexure limit of the specimen. Detailed analysis of the effects of the micro-scale features was carried out.Keywords: woven composites, multi-scale modelling, cohesive zone, finite element model
Procedia PDF Downloads 138431 Histopathological Examination of BALB/C Mice Receiving Strains of Acinetobacter baumannii Resistant to Colistin Antibiotic
Authors: Shahriar Sepahvand, Mohammad Ali Davarpanah
Abstract:
Infections caused by Acinetobacter baumannii are among the common hospital-acquired infections that have seen an increase in antibiotic resistance in recent years. Colistin is the last treatment option against this pathogen. The aim of this study is to investigate the histopathology of BALB/C mice receiving sensitive and resistant strains of Acinetobacter baumannii to colistin. A total of 68 female laboratory mice weighing 30 to 40 grams of the BALB/C breed were studied in this research for three weeks under appropriate laboratory conditions in terms of food and environment. The experimental groups included: control group, second group, third group, fourth group. Lung, liver, spleen, and kidney tissues were removed from anesthetized mice and, after washing in physiological serum, were fixed in 10% formalin for 14 days. For dehydration, alcohol with ascending degrees of 70, 80, 90, and 100 was used. After clearing and soaking in paraffin, the samples were embedded in paraffin. Then, sections with a thickness of 5 microns were prepared and, after staining by hematoxylin-eosin, the samples were ready for study with a light microscope. In liver, spleen, lung, and kidney tissues of mice receiving the colistin-sensitive strain of Acinetobacter baumannii, infiltration of inflammatory cells and hyperemia were observed compared to control group mice. Liver and lung tissues of mice receiving strains of Acinetobacter baumannii resistant to colistin showed tissue destruction in addition to infiltration of inflammatory cells and hyperemia, with more destruction observed in lung tissue.Keywords: acinetobacter baumannii, colistin antibiotic, histopathological examination, resistant
Procedia PDF Downloads 68430 Sharing Tacit Knowledge: The Essence of Knowledge Management
Authors: Ayesha Khatun
Abstract:
In 21st century where markets are unstable, technologies rapidly proliferate, competitors multiply, products and services become obsolete almost overnight and customers demand low cost high value product, leveraging and harnessing knowledge is not just a potential source of competitive advantage rather a necessity in technology based and information intensive industries. Knowledge management focuses on leveraging the available knowledge and sharing the same among the individuals in the organization so that the employees can make best use of it towards achieving the organizational goals. Knowledge is not a discrete object. It is embedded in people and so difficult to transfer outside the immediate context that it becomes a major competitive advantage. However, internal transfer of knowledge among the employees is essential to maximize the use of knowledge available in the organization in an unstructured manner. But as knowledge is the source of competitive advantage for the organization it is also the source of competitive advantage for the individuals. People think that knowledge is power and sharing the same may lead to lose the competitive position. Moreover, the very nature of tacit knowledge poses many difficulties in sharing the same. But sharing tacit knowledge is the vital part of knowledge management process because it is the tacit knowledge which is inimitable. Knowledge management has been made synonymous with the use of software and technology leading to the management of explicit knowledge only ignoring personal interaction and forming of informal networks which are considered as the most successful means of sharing tacit knowledge. Factors responsible for effective sharing of tacit knowledge are grouped into –individual, organizational and technological factors. Different factors under each category have been identified. Creating a positive organizational culture, encouraging personal interaction, practicing reward system are some of the strategies that can help to overcome many of the barriers to effective sharing of tacit knowledge. Methodology applied here is completely secondary. Extensive review of relevant literature has been undertaken for the purpose.Keywords: knowledge, tacit knowledge, knowledge management, sustainable competitive advantage, organization, knowledge sharing
Procedia PDF Downloads 398429 Determining Design Parameters for Sizing of Hydronic Heating Systems in Concrete Thermally Activated Building Systems
Authors: Rahmat Ali, Inamullah Khan, Amjad Naseer, Abid A. Shah
Abstract:
Hydronic Heating and Cooling systems in concrete slab based buildings are increasingly becoming a popular substitute to conventional heating and cooling systems. In exploring the materials, techniques employed, and their relative performance measures, a fair bit of uncertainty exists. This research has identified the simplest method of determining the thermal field of a single hydronic pipe when acting as a part of a concrete slab, based on which the spacing and positioning of pipes for a best thermal performance and surface temperature control are determined. The pipe material chosen is the commonly used PEX pipe, which has an all-around performance and thermal characteristics with a thermal conductivity of 0.5W/mK. Concrete Test samples were constructed and their thermal fields tested under varying input conditions. Temperature sensing devices were embedded into the wet concrete at fixed distances from the pipe and other touch sensing temperature devices were employed for determining the extent of the thermal field and validation studies. In the first stage, it was found that the temperature along a specific distance was the same and that heat dissipation occurred in well-defined layers. The temperature obtained in concrete was then related to the different control parameters including water supply temperature. From the results, the temperature of water required for a specific temperature rise in concrete is determined. The thermally effective area is also determined which is then used to calculate the pipe spacing and positioning for the desired level of thermal comfort.Keywords: thermally activated building systems, concrete slab temperature, thermal field, energy efficiency, thermal comfort, pipe spacing
Procedia PDF Downloads 337