Search results for: strong invariant approximation property
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5316

Search results for: strong invariant approximation property

4596 TA6V Selective Laser Melting as an Innovative Method Produce Complex Shapes

Authors: Rafał Kamiński, Joel Rech, Philippe Bertrand, Christophe Desrayaud

Abstract:

Additive manufacturing is a hot topic for industry. Among the additive techniques, Selective Laser Melting (SLM) becomes even more popular, especially for making parts for aerospace applications, thanks to its design freedom (customized and light structures) and its reduced time to market. However, some functional surfaces have to be machined to achieve small tolerances and low surface roughness to fulfill industry specifications. The complex shapes designed for SLM (ex: titanium turbine blades) necessitate the use of ball end milling operations like in the conventional process after forging. However, the metallurgical state of TA6V is very different from the one obtained usually from forging, because of the laser sintering layer by layer. So this paper aims to investigate the influence of new TA6V metallurgies produced by SLM on the machinability in ball end milling. Machinability is considered as the property of a material to obtain easily and by a cheap way a functional surface. This means, for instance, the property to limit cutting tool wear rate and to get smooth surfaces. So as to reach this objective, SLM parts have been produced and heat treated with various conditions leading to various metallurgies that are compared with a standard equiaxed α+β wrought microstructure. The machinability is analyzed by measuring surface roughness, tool wear and cutting forces for a range of cutting conditions (depth of cut 'ap', feed per tooth 'fz', spindle speed 'N') in accordance with industrial practices. This work has revealed that TA6V produced by SLM can lead to a better machinability that standard wrought alloys.

Keywords: ball milling, selective laser melting, surface roughness, titanium, wear

Procedia PDF Downloads 275
4595 Solving Stochastic Eigenvalue Problem of Wick Type

Authors: Hassan Manouzi, Taous-Meriem Laleg-Kirati

Abstract:

In this paper we study mathematically the eigenvalue problem for stochastic elliptic partial differential equation of Wick type. Using the Wick-product and the Wiener-Ito chaos expansion, the stochastic eigenvalue problem is reformulated as a system of an eigenvalue problem for a deterministic partial differential equation and elliptic partial differential equations by using the Fredholm alternative. To reduce the computational complexity of this system, we shall use a decomposition-coordination method. Once this approximation is performed, the statistics of the numerical solution can be easily evaluated.

Keywords: eigenvalue problem, Wick product, SPDEs, finite element, Wiener-Ito chaos expansion

Procedia PDF Downloads 348
4594 Formal Ontology of Quality Space. Location, Subordination and Determination

Authors: Claudio Calosi, Damiano Costa, Paolo Natali

Abstract:

Determination is the relation that holds between certain kinds of properties, determinables – such as “being colored”, and others, determinates – such as “being red”. Subordination is the relation that holds between genus properties – such as “being an animal”, and others, species properties – such as “being human”'. It is widely held that Determination and Subordination share important similarities, yet also crucial differences. But what grounds such similarities and differences? This question is hardly ever addressed. The present paper provides the first step towards filling this gap in the literature. It argues that a locational theory of instantiation, roughly the view that to have a property is to occupy a location in quality space, holds the key for such an answer. More precisely, it argues that both principles of Determination and Subordination are just examples of more general principles of location. Consider Determination. The principle that everything that has a determinate has a determinable boils down to the claim that everything that has a precise location in quality space is in quality space – an eminently reasonable principle. The principle that nothing can have two determinates (at the same level of determination) boils down to the principle that nothing can be “multilocated” in quality space. In effect, the following provides a “translation table” between principles of location and determination: LOCATION DETERMINATION Functionality At Most One Determination Focus At Most One Determination & Requisite Determination* Exactness Requisite Determination* Super-Exactness Requisite Determination Exactitude Requisite Determination Converse-Exactness Determinable Inehritance This grounds the similarity between Determination and Subordination. What about the differences? The paper argues that the differences boil down to the mereological structure of the regions that are occupied in quality space, in particular whether they are simple or complex. The key technical detail is that Determination and Subordination induce a “set-theoretic rooted tree” structure over the domain of properties. Interestingly, the analysis also provides a possible justification for the Aristotelian claim that being is not a genus property – an argument that the paper develops in some detail.

Keywords: determinables/determinates, genus/species, location, Aristotle on being is not a genus

Procedia PDF Downloads 67
4593 Comparative Study of Antimicrobial Activity of Bacteriocin Producing Lactic Acid Bacteria from Fermented Batter of Green Gram And Bengal Gram Against Food-Borne Pathogens

Authors: Bandi Aruna

Abstract:

The increase of multidrug-resistant pathogens and the restriction on the use of antibiotics due to its side effects have drawn attention to the search for possible alternatives. Bacteriocins are ribosomally synthesized antimicrobial peptides that are active against Gram-positive and Gram-negative bacteria. The bacteriocins from lactic acid bacteria represent an important application of these peptides as clinical drugs or as food biopreservatives. The present study describes the isolation of bacteriocin producing lactic acid bacteria (LAB) from fermented batter of green gram and bengal gram using Man, Rogosa and Sharpe (MRS) media. The bacteriocin produced by these organisms inhibited the growth of Staphylococcus aureus, Escherichia coli, Klebsiella species, Pseudomonas aeruginosa, The isolates G1, G2 were isolated from green gram; B1 and B2 were isolated from fermented bengal gram batter. G1 and G2 were identified as Lactobacillus casie and B1 and B2 were identified as Streptococcus species. Antimicrobial activity of the bacteriocin produced by these strains was studied by agar well diffusion method. Bacteriocins produced by the Lactobacillus casie and Streptococcus secies retained their antagonistic property at pH of 5 and pH of 7. Exposure of bacteriocin to UV light for 4 min showed antibacterial activity. The antagonistic property was observed even at 100°C demonstrating stability at higher temperatures of the bacteriocin. The bacteriocins were stable for a period of 15 days at 27°C. The bacteriocins of G1, G2, and B2 exhibited highest antagonistic activity at pH of 5 and B1 at pH of 7. Therefore, the bacteriocins of the isolates may find important application in controlling the food-borne pathogens.

Keywords: Keywords: Antibacterial activity, Lactic acid bacteria, Bacteriocin

Procedia PDF Downloads 390
4592 Influences of Emerging Beauty Industry for Men on Construction of Masculinities of Male Students of Dhaka City

Authors: Abu Saleh Mohammad Sowad

Abstract:

Back in history, muscular and strong male body has always been used to promulgate masculinity; for physically representing supreme manliness there were not many other options. This idealized male figure was proliferated mainly for spreading the notion of male superiority in relation to power and to give a strong base to the social construction of masculinity. This study targets to disclose the perception about the attributes masculinities among the male students of Dhaka city regarding male beautification. It is an attempt to unveil young men’s perspectives regarding their masculinities and beauty. Till the very recent past, beauty was always seen as sole feminine trait in Bangladeshi society. From history we can see men have always been assumed as the ambassador of roughness but in recent time the emergence of fashion-conscious men can be seen, who are slowly occupying a handsome position in the society. Concerning study attempts to bring out the way in which such changing trend of male beauty is perceived among the male students of Dhaka city. What could be the ideologies of these young men who are being involved with it? What is influencing them to be part of such arena which, to a great extent, is still considered as female domain? Is their perception about construction of masculinity is shifting from the so called idealized masculinity? The study tries to find out the answers.

Keywords: masculinity, male beauty, Bangladesh, identity, body

Procedia PDF Downloads 465
4591 Comparative Analysis of Dissimilarity Detection between Binary Images Based on Equivalency and Non-Equivalency of Image Inversion

Authors: Adnan A. Y. Mustafa

Abstract:

Image matching is a fundamental problem that arises frequently in many aspects of robot and computer vision. It can become a time-consuming process when matching images to a database consisting of hundreds of images, especially if the images are big. One approach to reducing the time complexity of the matching process is to reduce the search space in a pre-matching stage, by simply removing dissimilar images quickly. The Probabilistic Matching Model for Binary Images (PMMBI) showed that dissimilarity detection between binary images can be accomplished quickly by random pixel mapping and is size invariant. The model is based on the gamma binary similarity distance that recognizes an image and its inverse as containing the same scene and hence considers them to be the same image. However, in many applications, an image and its inverse are not treated as being the same but rather dissimilar. In this paper, we present a comparative analysis of dissimilarity detection between PMMBI based on the gamma binary similarity distance and a modified PMMBI model based on a similarity distance that does distinguish between an image and its inverse as being dissimilar.

Keywords: binary image, dissimilarity detection, probabilistic matching model for binary images, image mapping

Procedia PDF Downloads 148
4590 Numerical Reproduction of Hemodynamic Change Induced by Acupuncture to ST-36

Authors: Takuya Suzuki, Atsushi Shirai, Takashi Seki

Abstract:

Acupuncture therapy is one of the treatments in traditional Chinese medicine. Recently, some reports have shown the effectiveness of acupuncture. However, its full acceptance has been hindered by the lack of understanding on mechanism of the therapy. Acupuncture applied to Zusanli (ST-36) enhances blood flow volume in superior mesenteric artery (SMA), yielding peripheral vascular resistance – regulated blood flow of SMA dominated by the parasympathetic system and inhibition of sympathetic system. In this study, a lumped-parameter approximation model of blood flow in the systemic arteries was developed. This model was extremely simple, consisting of the aorta, carotid arteries, arteries of the four limbs and SMA, and their peripheral vascular resistances. Here, the individual artery was simplified to a tapered tube and the resistances were modelled by a linear resistance. We numerically investigated contribution of the peripheral vascular resistance of SMA to the systemic blood distribution using this model. In addition to the upstream end of the model, which correlates with the left ventricle, two types of boundary condition were applied; mean left ventricular pressure which correlates with blood pressure (BP) and mean cardiac output which corresponds to cardiac index (CI). We examined it to reproduce the experimentally obtained hemodynamic change, in terms of the ratio of the aforementioned hemodynamic parameters from their initial values before the acupuncture, by regulating the peripheral vascular resistances and the upstream boundary condition. First, only the peripheral vascular resistance of SMA was changed to show contribution of the resistance to the change in blood flow volume in SMA, expecting reproduction of the experimentally obtained change. It was found, however, this was not enough to reproduce the experimental result. Then, we also changed the resistances of the other arteries together with the value given at upstream boundary. Here, the resistances of the other arteries were changed simultaneously in the same amount. Consequently, we successfully reproduced the hemodynamic change to find that regulation of the upstream boundary condition to the value experimentally obtained after the stimulation is necessary for the reproduction, though statistically significant changes in BP and CI were not observed in the experiment. It is generally known that sympathetic and parasympathetic tones take part in regulation of whole the systemic circulation including the cardiac function. The present result indicates that stimulation to ST-36 could induce vasodilation of peripheral circulation of SMA and vasoconstriction of that of other arteries. In addition, it implies that experimentally obtained small changes in BP and CI induced by the acupuncture may be involved in the therapeutic response.

Keywords: acupuncture, hemodynamics, lumped-parameter approximation, modeling, systemic vascular resistance

Procedia PDF Downloads 216
4589 Heavy Metal Removal by Green Microalgae Biofilms from Industrial Wastewater

Authors: B. N. Makhanya, S. F. Ndulini, M. S. Mthembu

Abstract:

Heavy metals are hazardous pollutants present in both industrial and domestic wastewater. They are usually disposed directly into natural streams, and when left untreated, they are a major cause of natural degradation and diseases. This study aimed to determine the ability of microalgae to remove heavy metals from coal mine wastewater. The green algae were grown and used for heavy metal removal in a laboratory bench. The physicochemical parameters and heavy metal removal were determined at 24 hours intervals for 5 days. The highest removal efficiencies were found to be 85%, 95%, and 99%, for Fe, Zn, and Cd, respectively. Copper and aluminium both had 100%. The results also indicated that the correlation between physicochemical parameters and all heavy metals were ranging from (0.50 ≤ r ≤ 0.85) for temperature, which indicated moderate positive to a strong positive correlation, pH had a very weak negative to a very weak positive correlation (-0.27 ≤ r ≤ 0.11), and chemical oxygen demand had a fair positive to a very strong positive correlation (0.69 ≤ r ≤ 0.98). The paired t-test indicated the removal of heavy metals to be statistically significant (0.007 ≥ p ≥ 0.000). Therefore, results showed that the microalgae used in the study were capable of removing heavy metals from industrial wastewater using possible mechanisms such as binding and absorption. Compared to the currently used technology for wastewater treatment, the microalgae may be the alternative to industrial wastewater treatment.

Keywords: heavy metals, industrial wastewater, microalgae, physiochemical parameters

Procedia PDF Downloads 129
4588 An Approximation Algorithm for the Non Orthogonal Cutting Problem

Authors: R. Ouafi, F. Ouafi

Abstract:

We study the problem of cutting a rectangular material entity into smaller sub-entities of trapezoidal forms with minimum waste of the material. This problem will be denoted TCP (Trapezoidal Cutting Problem). The TCP has many applications in manufacturing processes of various industries: pipe line design (petro chemistry), the design of airfoil (aeronautical) or cuts of the components of textile products. We introduce an orthogonal build to provide the optimal horizontal and vertical homogeneous strips. In this paper we develop a general heuristic search based upon orthogonal build. By solving two one-dimensional knapsack problems, we combine the horizontal and vertical homogeneous strips to give a non orthogonal cutting pattern.

Keywords: combinatorial optimization, cutting problem, heuristic

Procedia PDF Downloads 534
4587 Algorithms for Fast Computation of Pan Matrix Profiles of Time Series Under Unnormalized Euclidean Distances

Authors: Jing Zhang, Daniel Nikovski

Abstract:

We propose an approximation algorithm called LINKUMP to compute the Pan Matrix Profile (PMP) under the unnormalized l∞ distance (useful for value-based similarity search) using double-ended queue and linear interpolation. The algorithm has comparable time/space complexities as the state-of-the-art algorithm for typical PMP computation under the normalized l₂ distance (useful for shape-based similarity search). We validate its efficiency and effectiveness through extensive numerical experiments and a real-world anomaly detection application.

Keywords: pan matrix profile, unnormalized euclidean distance, double-ended queue, discord discovery, anomaly detection

Procedia PDF Downloads 240
4586 The Convention of Culture: A Comprehensive Study on Dispute Resolution Pertaining to Heritage and Related Issues

Authors: Bhargavi G. Iyer, Ojaswi Bhagat

Abstract:

In recent years, there has been a lot of discussion about ethnic imbalance and diversity in the international context. Arbitration is now subject to the hegemony of a small number of people who are constantly reappointed. When a court system becomes exclusionary, the quality of adjudication suffers significantly. In such a framework, there is a misalignment between adjudicators' preconceived views and the interests of the parties, resulting in a biased view of the proceedings. The world is currently witnessing a slew of intellectual property battles around cultural appropriation. The term "cultural appropriation" refers to the industrial west's theft of indigenous culture, usually for fashion, aesthetic, or dramatic purposes. Selena Gomez exemplifies cultural appropriation by commercially using the “bindi,” which is sacred to Hinduism, as a fashion symbol. In another case, Victoria's Secret insulted indigenous peoples' genocide by stealing native Indian headdresses. In the case of yoga, a similar process can be witnessed, with Vedic philosophy being reduced to a type of physical practice. Such a viewpoint is problematic since indigenous groups have worked hard for generations to ensure the survival of their culture, and its appropriation by the western world for purely aesthetic and theatrical purposes is upsetting to those who practise such cultures. Because such conflicts involve numerous jurisdictions, they must be resolved through international arbitration. However, these conflicts are already being litigated, and the aggrieved parties, namely developing nations, do not believe it prudent to use the World Intellectual Property Organization's (WIPO) already established arbitration procedure. This practise, it is suggested in this study, is the outcome of Europe's exclusionary arbitral system, which fails to recognise the non-legal and non-commercial nature of indigenous culture issues. This research paper proposes a more comprehensive, inclusive approach that recognises the non-legal and non-commercial aspects of IP disputes involving cultural appropriation, which can only be achieved through an ethnically balanced arbitration structure. This paper also aspires to expound upon the benefits of arbitration and other means of alternative dispute resolution (ADR) in the context of disputes pertaining to cultural issues; positing that inclusivity is a solution to the existing discord between international practices and localised cultural points of dispute. This paper also hopes to explicate measures that will facilitate ensuring inclusion and ideal practices in the domain of arbitration law, particularly pertaining to cultural heritage and indigenous expression.

Keywords: arbitration law, cultural appropriation, dispute resolution, heritage, intellectual property

Procedia PDF Downloads 135
4585 Comparing Repaired and Undamaged Specimens Test Results of Post-Tensioned Beam to Column Connections

Authors: Mustafa Kaya

Abstract:

After the 1999 Marmara earthquake in Turkey research by the Turkish Precast Union stated that 24.50% of the precast structures were damaged with some of this damage being observed in the beam to column connections of the structures. Since it is essential to provide those rendered homeless by the earthquake with safe, habitable accommodation repairing medium and slight levels of damage at the connection parts should be undertaken. In order to prove that a repaired connection was sufficiently strong, a precast beam to column post tensioned connection was tested in three phases. In phase one, the middle level damage was observed at 6% drift at these connections. As a result of the extra loads applied, little damage was observed. In the last phase, the four connections tested in the first phase were repaired using epoxy resin and then retested. The results from the tests on the repaired precast and the undamaged specimens showed that the repaired specimens were sufficiently strong, thus proving that repair to damaged precast beam to column post tensioned connections can be undertaken.

Keywords: precast beam to column connection, moment-resisting connection, post-tensioned connections, repair of precast connections

Procedia PDF Downloads 435
4584 Wound Healing and Antioxidant Properties of 80% Methanol Leaf Extract of Verbascum sinaiticum (Scrophulariaceae), an Ethiopian Medicinal Plant

Authors: Solomon Assefa Huluka

Abstract:

Wounds account for severe morbidity, socioeconomic distress, and mortality around the globe.For several years, various herbal products are used to expediteand augment the innate wound healing process. In Ethiopian folkloricmedicine, Verbascum sinaiticum L. (V. sinaiticum) is commonlyapplied as a wound-healing agent. The present study investigated the potential wound healing and antioxidant properties of hydroalcoholic leaf extract of V. sinaiticum. The 80% methanol extract, formulated as 5% (w/w) and 10% (w/w) ointments, was evaluated in excision and incision wound models using nitrofurazone and simple ointment as positive and negative controls, respectively. Parameters such as wound contraction, period of epithelialization, and tensile strength were determined. Moreover, its in vitro antioxidant property was evaluated using a DPPH assay. In the excision model, both doses (5% and 10% w/w) of the extract showed a significant (p<0.001) wound healing efficacy compared to the negative control, as evidenced by enhanced wound contraction rate and shorter epithelialization time records. In the incision model, the lower dose (5% w/w) ointment formulation of the extract exhibited the maximum increment in tensile strength (85.6%) that was significant (p<0.001)compared to negative and untreated controls. Animals treated with 5% w/wointment, furthermore, showed a significantly (p < 0.05) higher percentage of tensile strength than nitrofurazone treated ones. Moreover, the hydroalcoholic extract of the plant showed a noticeable free radical scavenging property. The result of the present study upholds the folkloric use of V. sinaiticum in the treatment of wounds.

Keywords: wound healing, antioxidant, excision wound model, incision wound model, verbascum sinaiticum

Procedia PDF Downloads 77
4583 Optimal Control of Volterra Integro-Differential Systems Based on Legendre Wavelets and Collocation Method

Authors: Khosrow Maleknejad, Asyieh Ebrahimzadeh

Abstract:

In this paper, the numerical solution of optimal control problem (OCP) for systems governed by Volterra integro-differential (VID) equation is considered. The method is developed by means of the Legendre wavelet approximation and collocation method. The properties of Legendre wavelet accompany with Gaussian integration method are utilized to reduce the problem to the solution of nonlinear programming one. Some numerical examples are given to confirm the accuracy and ease of implementation of the method.

Keywords: collocation method, Legendre wavelet, optimal control, Volterra integro-differential equation

Procedia PDF Downloads 379
4582 Vulnerability and Risk Assessment, and Preparedness to Natural Disasters of Schools in Southern Leyte, Philippines

Authors: Lorifel Hinay

Abstract:

Natural disasters have increased in frequency and severity in the Philippines over the years resulting to detrimental impacts in school properties and lives of learners. The topography of the Province of Southern Leyte is a hotspot for inevitable natural disaster-causing hazards that could affect schools, cripple the educational system and cause environmental, cultural and social detrimental impacts making Disaster Risk Reduction and Management (DRRM) an indispensable platform to keep learners safe, secure and resilient. This study determined the schools’ vulnerability and risk assessment to earthquake, landslide, flood, storm surge and tsunami hazards, and its relationship to status in disaster preparedness. Descriptive-correlational research design was used where the respondents were School DRRM Coordinators/School Administrators and Municipal DRRM Officers. It was found that schools’ vulnerability and risk were high in landslide, medium in earthquake, and low in flood, storm surge and tsunami. Though schools were moderately prepared in disasters across all hazards, they were less accomplished in group organization and property security. Less planning preparation and less implementation of DRRM measures were observed in schools highly at risk of earthquake and landslide. Also, schools vulnerable to landslide and flood have very high property security. Topography and location greatly contributed to schools’ vulnerability to hazards, thus, a school-based disaster preparedness plan is hoped to help ensure that hazard-exposed schools can build a culture of safety, disaster resiliency and education continuity.

Keywords: disaster risk reduction and management, earthquake, flood, landslide, storm surge, tsunami

Procedia PDF Downloads 112
4581 Green-synthesized of Selenium Nanoparticles Using Garlic Extract and Their Application for Rapid Detection of Salicylic Acid in Milk

Authors: Kashif Jabbar

Abstract:

Milk adulteration is a global concern, and the current study was plan to synthesize Selenium nanoparticles by green method using plant extract of garlic, Allium Sativum, and to characterize Selenium nanoparticles through different analytical techniques and to apply Selenium nanoparticles as fast and easy technique for the detection of salicylic acid in milk. The highly selective, sensitive, and quick interference green synthesis-based sensing of possible milk adulterants i.e., salicylic acid, has been reported here. Salicylic acid interacts with nanoparticles through strong bonding interactions, hence resulting in an interruption within the formation of selenium nanoparticles which is confirmed by UV-VIS spectroscopy, scanning electron microscopy, and x-ray diffraction. This interaction in the synthesis of nanoparticles resulted in transmittance wavelength that decrease with the increasing amount of salicylic acid, showing strong binding of selenium nanoparticles with adulterant, thereby permitting in-situ fast detection of salicylic acid from milk having a limit of detection at 10-3 mol and linear coefficient correlation of 0.9907. Conclusively, it can be draw that colloidal selenium could be synthesize successfully by garlic extract in order to serve as a probe for fast and cheap testing of milk adulteration.

Keywords: adulteration, green synthesis, selenium nanoparticles, salicylic acid, aggregation

Procedia PDF Downloads 71
4580 Free and Open Source Licences, Software Programmers, and the Social Norm of Reciprocity

Authors: Luke McDonagh

Abstract:

Over the past three decades, free and open source software (FOSS) programmers have developed new, innovative and legally binding licences that have in turn enabled the creation of innumerable pieces of everyday software, including Linux, Mozilla Firefox and Open Office. That FOSS has been highly successful in competing with 'closed source software' (e.g. Microsoft Office) is now undeniable, but in noting this success, it is important to examine in detail why this system of FOSS has been so successful. One key reason is the existence of networks or communities of programmers, who are bound together by a key shared social norm of 'reciprocity'. At the same time, these FOSS networks are not unitary – they are highly diverse and there are large divergences of opinion between members regarding which licences are generally preferable: some members favour the flexible ‘free’ or 'no copyleft' licences, such as BSD and MIT, while other members favour the ‘strong open’ or 'strong copyleft' licences such as GPL. This paper argues that without both the existence of the shared norm of reciprocity and the diversity of licences, it is unlikely that the innovative legal framework provided by FOSS would have succeeded to the extent that it has.

Keywords: open source, copyright, licensing, copyleft

Procedia PDF Downloads 366
4579 Food Strategies in the Mediterranean Basin, Possible for Food Safety and Security

Authors: Lorenza Sganzetta, Nunzia Borrelli

Abstract:

The research intends to reflect on the current mapping of the Food Strategies, on the reasons why in the planning objectives panorama, such sustainability priorities are located in those geographic areas and on the evolutions of these priorities of the Mediterranean planning dispositions. The whirling population growth that is affecting global cities is causing an enormous challenge to conventional resource-intensive food production and supply and the urgent need to face food safety, food security and sustainability concerns. Urban or Territorial Food Strategies can provide an interesting path for the development of this new agenda within the imperative principle of sustainability. In the specific, it is relevant to explore what ‘sustainability’ means within these policies. Most of these plans include actions related to four main components and interpretations of sustainability that are food security and safety, food equity, environmental sustainability itself and cultural identity and, at the designing phase, they differ slightly from each other according to the degree of approximation to one of these dimensions. Moving from these assumptions, the article would analyze some practices and policies representatives of different Food Strategies of the world and focus on the Mediterranean ones, on the problems and negative externalities from which they start, on the first interventions that are implementing and on their main objectives. We will mainly use qualitative data from primary and secondary collections. So far, an essential observation could have been made about the relationship between these sustainability dimensions and geography. In statistical terms, the US and Canadian policies tended to devote a large research space to health issues and access to food; those northern European showed a special attention to the environmental issues and the shortening of the chain; and finally the policies that, even in limited numbers, were being developed in the Mediterranean basin, were characterized by a strong territorial and cultural imprint and their major aim was to preserve local production and the contact between the productive land and the end consumer. Recently, though, Mediterranean food planning strategies are focusing more on health related and food accessibility issues and analyzing our diets not just as a matter of culture and territorial branding but as tools for reducing public health costs and accessibility to fresh food for everyone. The article would reflect then on how Food Safety, Food Security and Health are entering the new agenda of the Mediterranean Food Strategies. The research hypothesis suggests that the economic crisis that in the last years invested both producers and consumers had a significant impact on the nutrition habits and on the redefinition of food poverty, even in the fatherland of the healthy Mediterranean diet. This trend and other variables influenced the orientation and the objectives of the food strategies.

Keywords: food security, food strategy, health, sustainability

Procedia PDF Downloads 211
4578 Indigeneity of Transgender Cultures: Traditional Knowledge and Appropriation

Authors: Priyanka Sinnarkar

Abstract:

The appropriation of traditional knowledge has already deprived vast indigenous communities of material benefits. One such industry in India responsible for the extensive exploitation of the indigenous communities is Bollywood or the film industry. Indigenous communities are usually marginalized and exploited, whilst the beneficiary is always the third part. Transgender culture in India dates back to 400 AD with a precise description in the Kama Sutra. Since then, with escalating evolution in governance, the community lost its glory and was criminalized until late 2014. However, the traditional knowledge and cultural practices never diminished. The formation of cults (gharanas) and peculiar folklore has remained in place. This study is intended to highlight the culture of the hijra gharanas and their contribution to intangible cultural heritage. Whilst adhering to the norms of the United Nations pertaining to traditional knowledge and indigenous communities, these papers focuses on the fact that one of the most marginalized and ostracized communities in India treasures a huge amount of rituals and practices that are appropriated by the film industry, leaving the transgender community to indulge into odd jobs and commercial sex work leading to poverty and illiteracy. A comparison between caste reservations and no reservation for this community will bring to light the lacuna in the democratic system. Also, through empirical findings, it can be inferred that a creative sector of the society is not properly exploited to its complete potential, thereby restricting a good contribution to intellectual property. It is important to state that the roots of this problem are not in modern practices. Thus an etymological analysis from mythology to the present will help understand that appropriate application of human rights in this segment will be useful to render justice to this community and thereby recognize the IP that has been succumbed since ages.

Keywords: indigenous, intellectual property, traditional knowedge, transgender

Procedia PDF Downloads 116
4577 Role of Fracturing, Brecciation and Calcite Veining in Fluids Flow and Permeability Enhancement in Low-Porosity Rock Masses: Case Study of Boulaaba Aptian Dolostones, Kasserine, Central Tunisia

Authors: Mohamed Khali Zidi, Mohsen Henchiri, Walid Ben Ahmed

Abstract:

In the context of a hypogene hydrothermal travertine system, including low-porosity brittle bedrock and rock-mass permeability in Aptian dolostone of Boulaaba, Kasserine is enhanced through faulting and fracturing. This permeability enhancement related to the deformation modes along faults and fractures is likely to be in competition with permeability reduction when microcracks, fractures, and faults all become infilled with breccias and low-permeability hydrothermal precipitates. So that, fault continual or intermittent reactivation is probably necessary for them to keep their potential as structural high-permeability conduits. Dilational normal faults in strong mechanical stratigraphy associated with fault segments with dip changes are sites for porosity and permeability in groundwater infiltration and flow, hydrocarbon reservoirs, and also may be important sources of mineralization. The brecciation mechanism through dilational faulting and gravitational collapse originates according to hosting lithologies chaotic clast-supported breccia in strong lithologies such as sandstones, limestones, and dolostones, and matrix-supported cataclastic in weaker lithologies such as marls and shales. Breccias contribute to controlling fluid flow when the porosity is sealed either by low-permeability hydrothermal precipitates or by fine matrix materials. All these mechanisms of fault-related rock-mass permeability enhancement and reduction can be observed and analyzed in the region of Sidi Boulaaba, Kasserine, central Tunisia, where dilational normal faulting occurs in mechanical strong dolostone layering alternating with more weak marl and shale lithologies, has originated a variety of fault voids (fluid conduits) breccias (chaotic, crackle and mosaic breccias) and carbonate cement.

Keywords: travertine, Aptian dolostone, Boulaaba, fracturing

Procedia PDF Downloads 52
4576 A Hyperexponential Approximation to Finite-Time and Infinite-Time Ruin Probabilities of Compound Poisson Processes

Authors: Amir T. Payandeh Najafabadi

Abstract:

This article considers the problem of evaluating infinite-time (or finite-time) ruin probability under a given compound Poisson surplus process by approximating the claim size distribution by a finite mixture exponential, say Hyperexponential, distribution. It restates the infinite-time (or finite-time) ruin probability as a solvable ordinary differential equation (or a partial differential equation). Application of our findings has been given through a simulation study.

Keywords: ruin probability, compound poisson processes, mixture exponential (hyperexponential) distribution, heavy-tailed distributions

Procedia PDF Downloads 331
4575 Diethylsulfoxide versus Dimethylsulfoxide: Properties and Biomedical Applications

Authors: Shiraz A. Markarian

Abstract:

Our systematic studies of diethylsulfoxide (DESO), the nearest homologue of dimethylsulfoxide (DMSO), reveal new physicochemical features. DESO has already received worthy biomedical applications: in some cases even are more pronounced compare with DMSO. The several important physicochemical characteristics of DESO including aqueous solutions have been verified and first reported: melting point of pure substance, density, dielectric relaxation data, vapor pressure and volumetric properties. Analysis of the complete vibrational spectra also leads to the conclusion that very strong interactions take place between DESO and water, even stronger than those between DMSO and water. The simultaneous existence of strong DESO-H₂O and DESO-DESO interactions suggest the coexistence of many types of structural molecular aggregates, the presence of which plays a significant role also in diluted water solutions. Our recent investigations have shown that aqueous solution of DESO could provide amorphous, glassy systems, thus avoiding ice crystallization, in a wide range of concentrations and even at very low cooling rates. The ability of DESO to act as an effective cryoprotectant on E. coli survival was also studied and compared with other commonly used cryoprotective agents. The results also confirm that DESO, more than DMSO, is able to penetrate living tissues without causing significant damage.

Keywords: diethylsulfoxide, dimethylsulfoxide, cryoprotectant, properties

Procedia PDF Downloads 156
4574 A New Fuzzy Fractional Order Model of Transmission of Covid-19 With Quarantine Class

Authors: Asma Hanif, A. I. K. Butt, Shabir Ahmad, Rahim Ud Din, Mustafa Inc

Abstract:

This paper is devoted to a study of the fuzzy fractional mathematical model reviewing the transmission dynamics of the infectious disease Covid-19. The proposed dynamical model consists of susceptible, exposed, symptomatic, asymptomatic, quarantine, hospitalized and recovered compartments. In this study, we deal with the fuzzy fractional model defined in Caputo’s sense. We show the positivity of state variables that all the state variables that represent different compartments of the model are positive. Using Gronwall inequality, we show that the solution of the model is bounded. Using the notion of the next-generation matrix, we find the basic reproduction number of the model. We demonstrate the local and global stability of the equilibrium point by using the concept of Castillo-Chavez and Lyapunov theory with the Lasalle invariant principle, respectively. We present the results that reveal the existence and uniqueness of the solution of the considered model through the fixed point theorem of Schauder and Banach. Using the fuzzy hybrid Laplace method, we acquire the approximate solution of the proposed model. The results are graphically presented via MATLAB-17.

Keywords: Caputo fractional derivative, existence and uniqueness, gronwall inequality, Lyapunov theory

Procedia PDF Downloads 95
4573 Key Success Factors for Malaysian SMES Companies’ Entrepreneurial Leader

Authors: Zainal Abu Zarim, Hafizah Omar Zaki

Abstract:

The objective of this study is to analyse the success factors of entrepreneurs in the Malaysian SMEs in the urge to discover their entrepreneurial leadership characteristics. Data has been collected from top 50 SME award winning companies. The study has used the qualitative approach to data collection, where interviews are dispersed on these selected companies. From these 50 SMEs, only 25 accepted the interview request where one entrepreneur from each SME answered the questions. To successfully run this study, we administered some questions based on Hornaday 42 characteristics of an entrepreneurs, as well some structured questions to determine a successful of a company. The result shows that, entrepreneurs are confident, determine, diligent, flexible, responsive to challenges, responsible, foresight, courageous, aggressive, and committed. Consistent to this, several elements that makes the company successful includes (1) strong financial control, (2) continuous improvement, (3) product quality and product safety as top priority, (4) hard work and team work, and (5) eagerness in taking challenges. These results has deemed that entrepreneurs in many aspects are also leaders that are risk averse and determine, and are eager to work on continuous improvement in a financially strong company.

Keywords: characteristics of entrepreneurs, success of a company, key success factors, Malaysian SMEs

Procedia PDF Downloads 586
4572 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 164
4571 Understanding Children’s Visual Attention to Personal Protective Equipment Using Eye-Tracking

Authors: Vanessa Cho, Janet Hsiao, Nigel King, Robert Anthonappa

Abstract:

Background: The personal protective equipment (PPE) requirements for health care workers (HCWs) have changed significantly during the COVID-19 pandemic. Aim: To ascertain, using eye-tracking technology, what children notice the most when seeing HCWs in various PPE. Design: A Tobii nano pro-eye-tracking camera tracked 156 children's visual attention while they viewed photographs of HCWs in various PPEs. Eye Movement analysis with Hidden Markov Models (EMHMM) was employed to analyse 624 recordings using two approaches, namely (i) data-driven where children's fixation determined the regions of interest (ROIs), and (ii) fixed ROIs where the investigators predefined the ROIs. Results: Two significant eye movement patterns, namely distributed(85.2%) and selective(14.7%), were identified(P<0.05). Most children fixated primarily on the face regardless of the different PPEs. Children fixated equally on all PPE images in the distributed pattern, while a strong preference for unmasked faces was evident in the selective pattern (P<0.01). Conclusion: Children as young as 2.5 years used a top-down visual search behaviour and demonstrated their face processing ability. Most children did not show a strong visual preference for a specific PPE, while a minority preferred PPE with distinct facial features, namely without masks and loupes.

Keywords: COVID-19, PPE, dentistry, pediatric

Procedia PDF Downloads 79
4570 The Effect of Job Insecurity on Attitude towards Change and Organizational Citizenship Behavior: Moderating Role of Islamic Work Ethics

Authors: Khurram Shahzad, Muhammad Usman

Abstract:

The main aim of this study is to examine the direct and interactive effects of job insecurity and Islamic work ethics on employee’s attitude towards change and organizational citizenship behavior. Design/methodology/approach: The data was collected from 171 male and female university teachers of Pakistan. Self administered, close ended questionnaires were used to collect the data. Data was analyzed through correlation and regression analysis. Findings: Through the analysis of data, it was found that job insecurity has a strong negative effect on the attitude towards change of university teachers. On the contrary, job insecurity has no significant effect on organizational citizenship behavior of university teachers. Our results also show that Islamic work ethics does not moderate the relationship of job insecurity and attitude towards change, while a strong moderation effect of Islamic wok ethics is found on the relationship of job insecurity and organizational citizenship behavior. Originality/value: This study for the first time examines the relationship of job insecurity with employee’s attitude towards change and organizational citizenship behavior with the moderating effect of Islamic work ethics.

Keywords: job security, islamic work ethics, attitude towards change, organizational citizenship behavior

Procedia PDF Downloads 464
4569 Assessing Economic Losses Of 2104 Flood Disaster: A Case Study on Dabong, Kelantan, Malaysia

Authors: Ahmad Hamidi Mohamed, Jamaluddin Othman, Mashitah Suid, Mohd Zaim Mohd Shukri

Abstract:

Floods are considered an annual natural disaster in Kelantan. However, the record-setting flood of 2014 was a 'tsunami-like disaster'. A study has been conducted with the objectives to assess the economic impact of the flood to the resident of Dabong area in Kelantan Darul Naim, Malaysia. This area was selected due to the severity during the flood. The impacts of flood on local people were done by conducting structured interviews with the use of questionnaires. The questionnaire was intended to acquire information on losses faced by Dabong residence. Questionnaires covered various areas of inconveniences suffered with respect to health effects, including illnesses suffered, their intensities, duration and their associated costs. Loss of productivity and quality of life was also assessed. Inquiries were made to Government agencies to obtain relevant statistical data regarding the loss due to the flood tragedy. The data collected by giving formal request to the governmental agencies and formal meetings were done. From the study a staggering amount of losses were calculated. This figure comes from losses of property, Farmers/Agriculture, Traders/Business, Health, Insurance and Governmental losses. Flood brings hardship to the people of Dabong and these losses of home will cause inconveniences to the society. The huge amount of economic loss extracted from this study shows that federal and state government of Kelantan need to find out the cause of the major flood in 2014. Fast and effective measures have to be planned and implemented in flood prone area to prevent same tragedy happens in the future.

Keywords: economic impact, flood tragedy, Malaysia, property losses

Procedia PDF Downloads 259
4568 Rescaled Range Analysis of Seismic Time-Series: Example of the Recent Seismic Crisis of Alhoceima

Authors: Marina Benito-Parejo, Raul Perez-Lopez, Miguel Herraiz, Carolina Guardiola-Albert, Cesar Martinez

Abstract:

Persistency, long-term memory and randomness are intrinsic properties of time-series of earthquakes. The Rescaled Range Analysis (RS-Analysis) was introduced by Hurst in 1956 and modified by Mandelbrot and Wallis in 1964. This method represents a simple and elegant analysis which determines the range of variation of one natural property (the seismic energy released in this case) in a time interval. Despite the simplicity, there is complexity inherent in the property measured. The cumulative curve of the energy released in time is the well-known fractal geometry of a devil’s staircase. This geometry is used for determining the maximum and minimum value of the range, which is normalized by the standard deviation. The rescaled range obtained obeys a power-law with the time, and the exponent is the Hurst value. Depending on this value, time-series can be classified in long-term or short-term memory. Hence, an algorithm has been developed for compiling the RS-Analysis for time series of earthquakes by days. Completeness time distribution and locally stationarity of the time series are required. The interest of this analysis is their application for a complex seismic crisis where different earthquakes take place in clusters in a short period. Therefore, the Hurst exponent has been obtained for the seismic crisis of Alhoceima (Mediterranean Sea) of January-March, 2016, where at least five medium-sized earthquakes were triggered. According to the values obtained from the Hurst exponent for each cluster, a different mechanical origin can be detected, corroborated by the focal mechanisms calculated by the official institutions. Therefore, this type of analysis not only allows an approach to a greater understanding of a seismic series but also makes possible to discern different types of seismic origins.

Keywords: Alhoceima crisis, earthquake time series, Hurst exponent, rescaled range analysis

Procedia PDF Downloads 314
4567 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis

Authors: R. Rama Kishore, Sunesh

Abstract:

This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.

Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy

Procedia PDF Downloads 241