Search results for: traffic dominance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1430

Search results for: traffic dominance

710 Chemical Composition and Biological Investigation of Halpophyllum tuberculatum A. Juss (Rutaceae) Essential Oils Growing in Libya

Authors: O. M. M. Sabry, Abeer M. El Sayed

Abstract:

The essential oils from the aerial parts and flowers of Haplophyllum tuberculatum (Forsskal) Adr. Juss (Rutaceae) growing in Libya were obtained separately by hydro-distillation using a Clevenger-type apparatus. The essential oils yield were (0.4, 1.5w/w%) respectively based on the dry weight of the plant. The oils were analyzed by GC-MS. Twenty four constituents, amounting to 96.6%, were identified in the oil of the aerial parts. The predominant compounds were among the non oxygenated terpenoids (82.4%) as monoterpene hydrocarbons, represented by sabinen (26.4 %), δ-terpinen (26 %), β-phellandrene (10.4%) and 3-carene (3.86%). Zingiberine (0.4%) and β-sesquiphellandrene (0.12%) were the major sesquiterpene hydrocarbons identified. Oxygenated monoterpenes were represented by eucalyptol (5.5%) and piperitone (5.55%). Twenty six constituents, equivalent to 99.5%, were identified in the oil of the flowers. The dominance of monoterpene hydrocarbons in the flowers oil can be attributed to the high percentage of γ-terpinen (38.44%), β-phellandrene (10.0%), α- phellandrene (2.33%), 3,4-dimethyl-1,5-cyclooctadiene (6.67%), β-myrecene (6.04%), 3-carene (5.43%) and α-pinene (1.3%).While the oxygenated monoterpenes can be contributed to the trans-piperitol (4.67%) and piperitone (2.07%). Sesquiterpene hydrocarbons were not identified in the oil of the flower of H. tuberculatum. Variation in constitution between oils of Libyan H. tuberculatum and that obtained from other countries can be due to both environmental and genetic factors. The essential oils have demonstrated variable antimicrobial activities against certain micro-organisms. Also have revealed marked in vitro cytotoxicity against lung (H1299), liver (HEPG2) carcinoma cell line and variably effective as anti-inflammatory and antioxidant.

Keywords: Halpophyllum tuberculatum, rutaceae, essential oil, antimicrobial, anti-inflammatory, antitumor, antioxidant, Libya

Procedia PDF Downloads 473
709 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 497
708 Heavy Metal Contamination of Mining-Impacted Mangrove Sediments and Its Correlation with Vegetation and Sediment Attributes

Authors: Jumel Christian P. Nicha, Severino G. Salmo III

Abstract:

This study investigated the concentration of heavy metals (HM) in mangrove sediments of Lake Uacon, Zambales, Philippines. The relationship among the studied HM (Cr, Ni, Pb, Cu, Cd, Fe) and the mangrove vegetation and sediment characteristics were assessed. Fourteen sampling plots were designated across the lake (10 vegetated and 4 un-vegetated) based on distance from the mining effluents. In each plot, three sediment cores were collected at 20 cm depth. Among the dominant mangrove species recorded were (in order of dominance): Sonneratia alba, Rhizophora stylosa, Avicennia marina, Excoecaria agallocha and Bruguiera gymnorrhiza. Sediment samples were digested with aqua regia, and the HM concentrations were quantified using Atomic Absorption Spectroscopy (AAS). Results showed that HM concentrations were higher in the vegetated plots as compared to the un-vegetated sites. Vegetated sites had high Ni (mean: 881.71 mg/kg) and Cr (mean: 776.36 mg/kg) that exceeded the threshold values (cf. by the United States Environmental Protection Agency; USEPA). Fe, Pb, Cu and Cd had a mean concentration of 2597.92 mg/kg, 40.94 mg/kg, 36.81 mg/kg and 2.22 mg/kg respectively. Vegetation variables were not significantly correlated with HM concentration. However, the HM concentration was significantly correlated with sediment variables particularly pH, redox, particle size, nitrogen, phosphorus, moisture and organic matter contents. The Pollution Load Index (PLI) indicated moderate to high pollution in the lake. Risk assessment and management should be designed in order to mitigate the ecological risk posed by HM. The need of a regular monitoring scheme for lake and mangrove rehabilitation programs and management should be designed.

Keywords: heavy metals, mangrove vegetation, mining, Philippines, sediment

Procedia PDF Downloads 155
707 Study and Construction on Signalling System during Reverse Motion Due to Obstacle

Authors: S. M. Yasir Arafat

Abstract:

Driving models are needed by many researchers to improve traffic safety and to advance autonomous vehicle design. To be most useful, a driving model must state specifically what information is needed and how it is processed. So we developed an “Obstacle Avoidance and Detection Autonomous Car” based on sensor application. The ever increasing technological demands of today call for very complex systems, which in turn require highly sophisticated controllers to ensure that high performance can be achieved and maintained under adverse conditions. Based on a developed model of brakes operation, the controller of braking system operation has been designed. It has a task to enable solution to the problem of the better controlling of braking system operation in a more accurate way then it was the case now a day.

Keywords: automobile, obstacle, safety, sensing

Procedia PDF Downloads 361
706 Approximation of Geodesics on Meshes with Implementation in Rhinoceros Software

Authors: Marian Sagat, Mariana Remesikova

Abstract:

In civil engineering, there is a problem how to industrially produce tensile membrane structures that are non-developable surfaces. Nondevelopable surfaces can only be developed with a certain error and we want to minimize this error. To that goal, the non-developable surfaces are cut into plates along to the geodesic curves. We propose a numerical algorithm for finding approximations of open geodesics on meshes and surfaces based on geodesic curvature flow. For practical reasons, it is important to automatize the choice of the time step. We propose a method for automatic setting of the time step based on the diagonal dominance criterion for the matrix of the linear system obtained by discretization of our partial differential equation model. Practical experiments show reliability of this method. Because approximation of the model is made by numerical method based on classic derivatives, it is necessary to solve obstacles which occur for meshes with sharp corners. We solve this problem for big family of meshes with sharp corners via special rotations which can be seen as partial unfolding of the mesh. In practical applications, it is required that the approximation of geodesic has its vertices only on the edges of the mesh. This problem is solved by a specially designed pointing tracking algorithm. We also partially solve the problem of finding geodesics on meshes with holes. We implemented the whole algorithm in Rhinoceros (commercial 3D computer graphics and computer-aided design software ). It is done by using C# language as C# assembly library for Grasshopper, which is plugin in Rhinoceros.

Keywords: geodesic, geodesic curvature flow, mesh, Rhinoceros software

Procedia PDF Downloads 141
705 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers

Authors: Pankhudi Khandelwal

Abstract:

The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.

Keywords: data protection, dominance, ex ante regulation, ex post regulation

Procedia PDF Downloads 169
704 Improving the Quality of Transport Management Services with Fuzzy Signatures

Authors: Csaba I. Hencz, István Á. Harmati

Abstract:

Nowadays the significance of road transport is gradually increasing. All transport companies are working in the same external environment where the speed of transport is defined by traffic rules. The main objective is to accelerate the speed of service and it is only dependent on the individual abilities of the managing members. These operational control units make decisions quickly (in a typically experiential and/or intuitive way). For this reason, support for these decisions is an important task. Our goal is to create a decision support model based on fuzzy signatures that can assist the work of operational management automatically. If the model sets parameters properly, the management of transport could be more economical and efficient.

Keywords: freight transport, decision support, information handling, fuzzy methods

Procedia PDF Downloads 252
703 Causes of Road Crashes Among Students Attending Schools in Huye District and Kigali City

Authors: Ami Nkumbuye

Abstract:

Background: Every year 1.3 million people die due to Road crashes, according to the Global status report. Road crashes remain the greatest killer aged between 15-29 years. Young people are paying an unacceptable price for their own safer mobility. 23,498 students attending class daily from home crossing the roads of 3 districts Kigali and Southern province is showing a similar trend with 40320 cross road daily. As most of them don't have any idea about the safety, they should have when they are crossing roads and traffic rules and signs as well. Despite the high number of mortality related to road crashes in Rwanda, we don't have any approved calendar to teach young people road safety as the most affected age group. Objective: The objective of this study was to identify the causes of road crashes and the outcome of victims after being involved in road crashes over a period of two years, from January 2020 to December 2021, in Huye district and Kigali City. Methods: A retrospective descriptive study with open questions and then data analysis, students were identified from 15 schools in Kigali City and Southern Province and through the Local Action Project supported by Global Youth Coalition for Road Safety and Youth for Road Safety (YOURS), students asked about the cause of road crashes through open and closed question and data analyzed. Result: There were 354 students from 15 schools: 198 males and 156 females. Their age ranged from 10 to 25 years. The commonest cause of road crashes among students attending schools daily was: high speed, lack of education on safe behavior on the road, drinking and driving, and poor road infrastructures, with 47%, 32%, 13% and 8 %, respectively. The hospital admission after road crashes for the victims was 32.3%. In most scenes where road crashes occur, students report that they didn't see any person who could provide post-crash care until the ambulance came, in some cases, resulted in bad outcomes for the victims after road crashes. Conclusion: This study revealed that high speed and lack of education n road safety are the major cause of road crashes among young people in Rwanda. If local Non-Governmental Organization and Decision makers work on these issues like never before, we can see a decrease in road crash among young people and adult as well. We would like to give a recommendation to two institutions: the first is the Rwanda National Police Traffic department to set 30km/m as the maximum speed limit in City and near schools. The second is for the Ministry of Education to put Road Safety and Post Crash Care curricula in both Primary and Secondary schools.

Keywords: road safety, post-crash care, young people, students

Procedia PDF Downloads 83
702 Portfolio Optimization with Reward-Risk Ratio Measure Based on the Mean Absolute Deviation

Authors: Wlodzimierz Ogryczak, Michal Przyluski, Tomasz Sliwinski

Abstract:

In problems of portfolio selection, the reward-risk ratio criterion is optimized to search for a risky portfolio with the maximum increase of the mean return in proportion to the risk measure increase when compared to the risk-free investments. In the classical model, following Markowitz, the risk is measured by the variance thus representing the Sharpe ratio optimization and leading to the quadratic optimization problems. Several Linear Programming (LP) computable risk measures have been introduced and applied in portfolio optimization. In particular, the Mean Absolute Deviation (MAD) measure has been widely recognized. The reward-risk ratio optimization with the MAD measure can be transformed into the LP formulation with the number of constraints proportional to the number of scenarios and the number of variables proportional to the total of the number of scenarios and the number of instruments. This may lead to the LP models with huge number of variables and constraints in the case of real-life financial decisions based on several thousands scenarios, thus decreasing their computational efficiency and making them hardly solvable by general LP tools. We show that the computational efficiency can be then dramatically improved by an alternative model based on the inverse risk-reward ratio minimization and by taking advantages of the LP duality. In the introduced LP model the number of structural constraints is proportional to the number of instruments thus not affecting seriously the simplex method efficiency by the number of scenarios and therefore guaranteeing easy solvability. Moreover, we show that under natural restriction on the target value the MAD risk-reward ratio optimization is consistent with the second order stochastic dominance rules.

Keywords: portfolio optimization, reward-risk ratio, mean absolute deviation, linear programming

Procedia PDF Downloads 400
701 ‘Undressed Star’, Sexual Scenes and Discourses in Mass Media: Exploring 1980s Taiwan Female Film Stars’ Onscreen Erotic Acting

Authors: Xinchen Zhu

Abstract:

In the history of Chinese-language film, female stars’ acting is connected with issues of national ideology, consumerism, and sexual politics. In the 1980s, Taiwan entered a period of ‘soft authoritarianism’ in which the economy prospered politics became more democratic, and mass culture became more diverse. Film censorship was more flexible and sexual scenes were increasingly shown on screen. Female stars’ bodies were eroticized and commercialized through sexual and nude scenes and, by challenging conservative film censorship and social taboos, became the focus of mass media. This article will explore how discourses in mass media constructed the erotic images of female stars and, conversely, impacted film censorship, filmmakers and film actresses in 1980s’ Taiwan. This article will regard the eroticized female film stars’ acting as a ‘field’ of internal interaction and continuous reproduction, where the ideology of male dominance and voices of female film stars conflict with each other. Based on textual analysis of female stars’ sexual acting and the debate in mass media, the argument is that the eroticized female bodies were gazed upon on and off the screen. In the discourses of mass media, the artistry of actresses’ erotic acting was not only ignored, devalued and delegitimized, these stars were also labelled as ‘undressed star’ or ‘nude star’ and construed as victims of the film industry. However, the female stars were able to speak through mass media platforms, emphasizing their efforts in erotic acting and highlighting modern female subjectivity.

Keywords: sexual scenes, Taiwan female stars, erotic acting, discourses in mass media, female subjectivity

Procedia PDF Downloads 180
700 Using Neural Networks for Click Prediction of Sponsored Search

Authors: Afroze Ibrahim Baqapuri, Ilya Trofimov

Abstract:

Sponsored search is a multi-billion dollar industry and makes up a major source of revenue for search engines (SE). Click-through-rate (CTR) estimation plays a crucial role for ads selection, and greatly affects the SE revenue, advertiser traffic and user experience. We propose a novel architecture of solving CTR prediction problem by combining artificial neural networks (ANN) with decision trees. First, we compare ANN with respect to other popular machine learning models being used for this task. Then we go on to combine ANN with MatrixNet (proprietary implementation of boosted trees) and evaluate the performance of the system as a whole. The results show that our approach provides a significant improvement over existing models.

Keywords: neural networks, sponsored search, web advertisement, click prediction, click-through rate

Procedia PDF Downloads 566
699 The Exchange Rate Exposure of Exporting and Domestic Firms in Central and Eastern European Countries Controlling for Regime Effect and Recent Crisis

Authors: Raheel Asif, Michael Frommel

Abstract:

This paper focuses on analyzing the exchange rate exposure of exporting & domestic firms in (the so far rarely addressed) largest Eastern European transition economies, i.e., Russia and the three EU accession countries, Poland, Hungary, and Czech Republic (CEEC-3). It also controls for possible effects of different exchange rate regimes, Great Financial crisis (2007-08), Russian Financial crisis (2014-15), the formation of EU & turn of year effect. Substantially improving the results from the existing literature on these transition economies, we find for more than 51% of our sample firms in CEEC-3 countries and 29% in Russia shows a significant exchange rate exposure. However, the magnitude and direction of firms’ exposure depends on the particular bilateral exchange rate and differs between CEEC-3 and Russia. We find that share price increases with an appreciation of the domestic currency against the EURO and US Dollar (USD) in CEEC-3; however, the effect is more pronounced for EURO as expected. Whereas, for Russian firms share price increases with a depreciation of the domestic currency against the USD only. Those differences may result from a differing dominance of exposure channels in the respective economies, such as the country-specific export structure, competitiveness channels, and dependence on foreign debt. Finally, the switch from a pegged to a flexible exchange rate regime appears to have a less pronounced effect for the exchange rate exposure of firms in all countries except for USD in Poland and Russia.

Keywords: exchange rate exposure, transition economies, central and eastern Europe, international finance

Procedia PDF Downloads 122
698 Constructing Masculinity through Images: Content Analysis of Lifestyle Magazines in Croatia

Authors: Marija Lončar, Zorana Šuljug Vučica, Magdalena Nigoević

Abstract:

Diverse social, cultural and economic trends and changes in contemporary societies influence the ways masculinity is represented in a variety of media. Masculinity is constructed within media images as a dynamic process that changes slowly over time and is shaped by various social factors. In many societies, dominant masculinity is still associated with authority, heterosexuality, marriage, professional and financial success, ethnic dominance and physical strength. But contemporary media depict men in ways that suggest a change in the approach to media images. The number of media images of men, which promote men’s identity through their body, have increased. With the male body more scrutinized and commodified, it is necessary to highlight how the body is represented and which visual elements are crucial since the body has an important role in the construction of masculinities. The study includes content analysis of male body images in the advertisements of different men’s and women’s lifestyle magazines available in Croatia. The main aim was to explore how masculinities are currently being portrayed through body regarding age, physical appearance, fashion, touch and gaze. The findings are also discussed in relation to female images since women are central in many of the processes constructing masculinities and according to the recent conceptualization of masculinity. Although the construction of male images varies through body features, almost all of them convey the message that men’s identity could be managed through manipulation and by enhancing the appearance. Furthermore, they suggest that men should engage in “bodywork” through advertised products, activities and/or practices, in order to achieve their preferred social image.

Keywords: body images, content analysis, lifestyle magazines, masculinity

Procedia PDF Downloads 242
697 Analysis of Collision Avoidance System

Authors: N. Gayathri Devi, K. Batri

Abstract:

The advent of technology has increased the traffic hazards and the road accidents take place. Collision detection system in automobile aims at reducing or mitigating the severity of an accident. This project aims at avoiding Vehicle head on collision by means of collision detection algorithm. This collision detection algorithm predicts the collision and the avoidance or minimization have to be done within few seconds on confirmation. Under critical situation collision minimization is made possible by turning the vehicle to the desired turn radius so that collision impact can be reduced. In order to avoid the collision completely, the turning of the vehicle should be achieved at reduced speed in order to maintain the stability.

Keywords: collision avoidance system, time to collision, time to turn, turn radius

Procedia PDF Downloads 542
696 Pride and Prejudice in Higher Education: Countering Elitist Perspectives in the Curriculum at Imperial College London

Authors: Mark R. Skopec, Hamdi M. Issa, Henock B. Taddese, Kate Ippolito, Matthew J. Harris

Abstract:

In peer review, there is a skew toward research from high-income countries, otherwise known as geographic bias. Research from well-known and prestigious institutions is often favored in the peer review process and is more frequently cited in biomedical research. English clinicians have been found to rate research from low-income countries worse compared to the same research presented as if from high-income countries. This entrenched bias, which is rooted in the perceived superiority of academic institutions in high-income countries is damaging in many regards. Crucially, it reinforces colonial roots by strengthening the dominance of knowledge bases in high-income contexts and perpetuates the perceived inferiority of research from low-income settings. We report on the interventions that Imperial College London is conducting to “decolonize” the higher education curriculum – a root and branch review of reading material in the Masters of Public Health course; identification of unconscious bias against low-income country research in faculty and staff; in-depth interviews with faculty members on their experiences and practices with respect to inclusion of low-income country research in their own teaching and learning practice; and exploring issues surrounding entrenched biases and structural impediments for enabling desirable changes. We intend to use these findings to develop frameworks and approaches, including workshops and online resources, to effect sustainable changes to diversify the curriculum at Imperial College London.

Keywords: curriculum design, diversity, geographic bias, higher education, implicit associations, inclusivity

Procedia PDF Downloads 165
695 Molecular Characterization of Polyploid Bamboo (Dendrocalamus hamiltonii) Using Microsatellite Markers

Authors: Rajendra K. Meena, Maneesh S. Bhandari, Santan Barthwal, Harish S. Ginwal

Abstract:

Microsatellite markers are the most valuable tools for the characterization of plant genetic resources or population genetic analysis. Since it is codominant and allelic markers, utilizing them in polyploid species remained doubtful. In such cases, the microsatellite marker is usually analyzed by treating them as a dominant marker. In the current study, it has been showed that despite losing the advantage of co-dominance, microsatellite markers are still a powerful tool for genotyping of polyploid species because of availability of large number of reproducible alleles per locus. It has been studied by genotyping of 19 subpopulations of Dendrocalamus hamiltonii (hexaploid bamboo species) with 17 polymorphic simple sequence repeat (SSR) primer pairs. Among these, ten primers gave typical banding pattern of microsatellite marker as expected in diploid species, but rest 7 gave an unusual pattern, i.e., more than two bands per locus per genotype. In such case, genotyping data are generally analyzed by considering as dominant markers. In the current study, data were analyzed in both ways as dominant and co-dominant. All the 17 primers were first scored as nonallelic data and analyzed; later, the ten primers giving standard banding patterns were analyzed as allelic data and the results were compared. The UPGMA clustering and genetic structure showed that results obtained with both the data sets are very similar with slight variation, and therefore the SSR marker could be utilized to characterize polyploid species by considering them as a dominant marker. The study is highly useful to widen the scope for SSR markers applications and beneficial to the researchers dealing with polyploid species.

Keywords: microsatellite markers, Dendrocalamus hamiltonii, dominant and codominant, polyploids

Procedia PDF Downloads 135
694 Contribution of Foraminifers in Biostratigraphy and Paleoecology Interpretations of the Basal Eocene from the Phosphatic Sra Ouertaine Basin, in the Southern Tethys(Tunisia)

Authors: Oum Elkhir Mahmoudi, Nebiha Ben Haj Ali

Abstract:

Micropaleontological, sedimentological and statistical studies were carried out on the late Paleocene-early Eocene succession of Sra Ouertaine and Dyr El Kef in Northern open phosphatic Basin of Tunisia. Based on the abundance and stratigraphic distribution of planktic foraminiferal species, five planktic zones have been recognized from the base to the top of the phosphatic layers. The El Acarinina sibaiyaensis Zone, the E2 Pseudohastigerina wilcoxensis Zone, the E3 Morozovella marginodentata Zone, the E4 Morozovella formosa Zones and the E5 Morozovella subbotinae Zone. The placement of Paleocene-Eocene boundary (PETM) is just below the base of the phosphatic interval. The ETM-2 event may be detectable in the analyzed biotic record of Sra Ouertaine. Based on benthic assemblages, abundances, cluster and multivariate statistical analyses, two biofacies were recognized for each section. The recognized ecozones are typical of warm and shallow water inner neritic setting (dominance of epifaunal fauna Anomalinoides, Dentalina and Cibicidoides associated with Frondicularia phosphatica, Trochamminoides globigeriniformis and Eponides elevatus). The paleoenvironment is eutrophic (presence of several bolivinitids and verneuilinids). For the Dyr El Kef section and P5 and E2 of Sra Ouertaine section, our records indicate that paleoenvironment is influenced by coastal upwelling without oxygen-deficiency, the paleodepth is estimated to be around 50 m. The paleoecosystem is diversified and balanced with a general tendency to stressed condition. While the upper part of Sra Ouertaine section is more eutrophic, influenced by coastal upwelling with oxygen-deficiency, the paleodepth is estimated to be less than 50 m and the ecosystem is unsettled.

Keywords: Tunisia, Sra ouertaine Dyr el kef, early Eocene, foraminifera, chronostratigraphy, paleoecology, paleoenvironment

Procedia PDF Downloads 43
693 Disrupting Patriarchy: Transforming Gender Oppression through Dialogue between Women and Men at a South African University

Authors: S. van Schalkwyk

Abstract:

On international levels and across disciplines gender scholars have argued that patriarchal scripts of masculinity and femininity are harmful as they negatively impact constructions of selfhood and relations between women and men. Patriarchal ideologies serve as a scaffolding for dominance and subordination and fuel violence against women. Toxic masculinity—social discourses of men as violent, unemotional, and sexually dominant—are embedded in South African culture and are rooted in the high rates of gender violence occurring in the country. Finding strategies that can open up space for the interrogation of toxic masculinity is crucial in order to disrupt the destructive consequences of patriarchy in educational and social contexts. The University of the Free State (UFS) in South Africa in collaboration with the non-profit organization Gender Reconciliation International conducted a year-long series of workshops with male and female students. The aim of these workshops was to facilitate healing between men and women through collective dialogue processes. Drawing on a collective biography methodology outlined by feminist poststructuralists, this paper explores the impact of these workshops on gender relations. Findings show that the students experienced significant psychological connections with others during these dialogues, through which they began to interrogate their own gendered conditioning and harmful patriarchal assumptions and practices. This paper enhances insights into the possibilities for disrupting patriarchy in South African universities through feminist collective research efforts.

Keywords: collective biography methodology, South Africa, toxic masculinity, transforming gender oppression, violence against women

Procedia PDF Downloads 473
692 Data Presentation of Lane-Changing Events Trajectories Using HighD Dataset

Authors: Basma Khelfa, Antoine Tordeux, Ibrahima Ba

Abstract:

We present a descriptive analysis data of lane-changing events in multi-lane roads. The data are provided from The Highway Drone Dataset (HighD), which are microscopic trajectories in highway. This paper describes and analyses the role of the different parameters and their significance. Thanks to HighD data, we aim to find the most frequent reasons that motivate drivers to change lanes. We used the programming language R for the processing of these data. We analyze the involvement and relationship of different variables of each parameter of the ego vehicle and the four vehicles surrounding it, i.e., distance, speed difference, time gap, and acceleration. This was studied according to the class of the vehicle (car or truck), and according to the maneuver it undertook (overtaking or falling back).

Keywords: autonomous driving, physical traffic model, prediction model, statistical learning process

Procedia PDF Downloads 250
691 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 483
690 Designing the Maturity Model of Smart Digital Transformation through the Foundation Data Method

Authors: Mohammad Reza Fazeli

Abstract:

Nowadays, the fourth industry, known as the digital transformation of industries, is seen as one of the top subjects in the history of structural revolution, which has led to the high-tech and tactical dominance of the organization. In the face of these profits, the undefined and non-transparent nature of the after-effects of investing in digital transformation has hindered many organizations from attempting this area of this industry. One of the important frameworks in the field of understanding digital transformation in all organizations is the maturity model of digital transformation. This model includes two main parts of digital transformation maturity dimensions and digital transformation maturity stages. Mediating factors of digital maturity and organizational performance at the individual (e.g., motivations, attitudes) and at the organizational level (e.g., organizational culture) should be considered. For successful technology adoption processes, organizational development and human resources must go hand in hand and be supported by a sound communication strategy. Maturity models are developed to help organizations by providing broad guidance and a roadmap for improvement. However, as a result of a systematic review of the literature and its analysis, it was observed that none of the 18 maturity models in the field of digital transformation fully meet all the criteria of appropriateness, completeness, clarity, and objectivity. A maturity assessment framework potentially helps systematize assessment processes that create opportunities for change in processes and organizations enabled by digital initiatives and long-term improvements at the project portfolio level. Cultural characteristics reflecting digital culture are not systematically integrated, and specific digital maturity models for the service sector are less clearly presented. It is also clearly evident that research on the maturity of digital transformation as a holistic concept is scarce and needs more attention in future research.

Keywords: digital transformation, organizational performance, maturity models, maturity assessment

Procedia PDF Downloads 86
689 Wireless Network and Its Application

Authors: Henok Mezemr Besfat, Haftom Gebreslassie Gebregwergs

Abstract:

wireless network is one of the most important mediums of transmission of information from one device to another devices. Wireless communication has a broad range of applications, including mobile communications through cell phones and satellites, Internet of Things (IoT) connecting several devices, wireless sensor networks for traffic management and environmental monitoring, satellite communication for weather forecasting and TV without requiring any cable or wire or other electronic conductors, by using electromagnetic waves like IR, RF, satellite, etc. This paper summarizes different wireless network technologies, applications of different wireless technologies and different types of wireless networks. Generally, wireless technology will further enhance operations and experiences across sectors with continued innovation. This paper suggests different strategies that can improve wireless networks and technologies.

Keywords: wireless senser, wireless technology, wireless network, internet of things

Procedia PDF Downloads 45
688 A United Nations Safety Compliant Urban Vehicle Design

Authors: Marcelo R. G. Duarte, Marcilio Alves

Abstract:

Pedestrians are the fourth group among road traffic users that most suffer accidents. Their death rate is even higher than the motorcyclists group. This gives motivation for the development of an urban vehicle capable of complying with the United Nations Economic Commission for Europe pedestrian regulations. The conceptual vehicle is capable of transporting two passengers and small parcels for 100 km at a maximum speed of 90 km/h. This paper presents the design of this vehicle using the finite element method specially in connection with frontal crash test and car to pedestrian collision. The simulation is based in a human body FE.

Keywords: electric urban vehicle, finite element method, global human body model, pedestrian safety, road safety

Procedia PDF Downloads 183
687 Water Governance Perspectives on the Urmia Lake Restoration Process: Challenges and Achievements

Authors: Jalil Salimi, Mandana Asadi, Naser Fathi

Abstract:

Urmia Lake (UL) has undergone a significant decline in water levels, resulting in severe environmental, socioeconomic, and health-related challenges. This paper examines the restoration process of UL from a water governance perspective. By applying a water governance model, the study evaluates the process based on six selected principles: stakeholder engagement, transparency and accountability, effectiveness, equitable water use, adaptation capacity, and water usage efficiency. The dominance of structural and physicalist approaches to water governance has led to a weak understanding of social and environmental issues, contributing to social crises. Urgent efforts are required to address the water crisis and reform water governance in the country, making water-related issues a top national priority. The UL restoration process has achieved significant milestones, including stakeholder consensus, scientific and participatory planning, environmental vision, intergenerational justice considerations, improved institutional environment for NGOs, investments in water infrastructure, transparency promotion, environmental effectiveness, and local issue resolutions. However, challenges remain, such as power distribution imbalances, bureaucratic administration, weak conflict resolution mechanisms, financial constraints, accountability issues, limited attention to social concerns, overreliance on structural solutions, legislative shortcomings, program inflexibility, and uncertainty management weaknesses. Addressing these weaknesses and challenges is crucial for the successful restoration and sustainable governance of UL.

Keywords: evaluation, restoration process, Urmia Lake, water governance, water resource management

Procedia PDF Downloads 63
686 Multi-Criteria Evolutionary Algorithm to Develop Efficient Schedules for Complex Maintenance Problems

Authors: Sven Tackenberg, Sönke Duckwitz, Andreas Petz, Christopher M. Schlick

Abstract:

This paper introduces an extension to the well-established Resource-Constrained Project Scheduling Problem (RCPSP) to apply it to complex maintenance problems. The problem is to assign technicians to a team which has to process several tasks with multi-level skill requirements during a work shift. Here, several alternative activities for a task allow both, the temporal shift of activities or the reallocation of technicians and tools. As a result, switches from one valid work process variant to another can be considered and may be selected by the developed evolutionary algorithm based on the present skill level of technicians or the available tools. An additional complication of the observed scheduling problem is that the locations of the construction sites are only temporarily accessible during a day. Due to intensive rail traffic, the available time slots for maintenance and repair works are extremely short and are often distributed throughout the day. To identify efficient working periods, a first concept of a Bayesian network is introduced and is integrated into the extended RCPSP with pre-emptive and non-pre-emptive tasks. Thereby, the Bayesian network is used to calculate the probability of a maintenance task to be processed during a specific period of the shift. Focusing on the domain of maintenance of the railway infrastructure in metropolitan areas as the most unproductive implementation process at construction site, the paper illustrates how the extended RCPSP can be applied for maintenance planning support. A multi-criteria evolutionary algorithm with a problem representation is introduced which is capable of revising technician-task allocations, whereas the duration of the task may be stochastic. The approach uses a novel activity list representation to ensure easily describable and modifiable elements which can be converted into detailed shift schedules. Thereby, the main objective is to develop a shift plan which maximizes the utilization of each technician due to a minimization of the waiting times caused by rail traffic. The results of the already implemented core algorithm illustrate a fast convergence towards an optimal team composition for a shift, an efficient sequence of tasks and a high probability of the subsequent implementation due to the stochastic durations of the tasks. In the paper, the algorithm for the extended RCPSP is analyzed in experimental evaluation using real-world example problems with various size, resource complexity, tightness and so forth.

Keywords: maintenance management, scheduling, resource constrained project scheduling problem, genetic algorithms

Procedia PDF Downloads 227
685 Thermophysical Properties of Glycine/L-Alanine in 1-Butyl-3-Methylimidazolium Bromide and in 1-Butyl-3-Methylimidazolium Chloride

Authors: Tarnveer Kaur

Abstract:

Amino acids, as fundamental structural units of peptides and proteins, have an important role in biological systems by affecting solubility, denaturation, and activity of biomolecules. A study of these effects on thermophysical properties of model compounds in the presence of electrolytes solutions provides information about solute-solvent and solute-solute interactions on biomolecules. Ionic liquids (ILs) as organic electrolytes and green solvents are composed of an organic cation and an inorganic anion, which are liquid at ambient conditions. In the past decade, extensive investigations showed that the use of ILs as reaction media for processes involving biologically relevant compounds is promising in view of their successful application in kinetic resolution, biocatalysis, biosynthesis, separation, and purification processes. The scope of this information is valuable to explore the interactions of amino acids in ILs. To reach this purpose, apparent molar volumes of glycine/L-alanine in aqueous solutions of 1-butyl-3-methylimidazolium bromide/chloride were determined from precise density measurements at temperatures T = (288.15-318.15) K and at atmospheric pressure. Positive values for all the studied amino acids indicate the dominance of hydrophilic-ionic interactions between amino acids and Ionic liquids. The effect of temperature on volumetric properties of glycine/L-alanine in solutions has been determined from the partial molar expansibility and second-order partial molar expansibility. Further, volumetric interaction parameters and hydration number have been calculated, which have been interpreted in terms of possible solute-solvent interactions.

Keywords: ILs, amino acids, volumetric properties, hydration numbers

Procedia PDF Downloads 163
684 Coding of RMAC and Its Theoretical and Simulation-Based Performance Comparison with SMAC

Authors: Hamida Qumber Ali, Waseem Muhammad Arain, Shama Siddiqui, Sayeed Ghani

Abstract:

We present an implementing of RMAC in TinyOS 1.x. RMAC is a cross layer and Duty-cycle MAC protocols that was proposed to provide energy efficient transmission services for wireless sensor networks. The protocol has a unique and efficient packet transmission scheduling mechanism that enables it to overcome delivery latency and overcome traffic congestion. Design details and implementation challenges are divulged. Experiments are conducted to show the correctness of our implementation with numerous assumptions. Simulations are performed to compare the performance of RMAC and SMAC. Our results show that RMAC outperforms SMAC in energy efficiency and delay.

Keywords: MAC protocol, performance, RMAC, wireless sensor networks

Procedia PDF Downloads 317
683 Vehicle to Vehicle Communication: Collision Avoidance Scenarios

Authors: Ahmed Emad, Ahmed Salah, Abdelrahman Magdy, Omar Rashid, Mohammed Adel

Abstract:

This research paper discusses vehicle-to-vehicle technology as an important application of linear algebra. This communication technology represents an efficient and promising application to help to ensure the safety of the drivers by warning them when a crash possibility is close. The major link that combines our topic with linear algebra is the Laplacian matrix. Some main definitions used in the V2V were illustrated, such as VANET and its characteristics. The V2V technology could be applied in different applications with different traffic scenarios and various ways to warn car drivers. These scenarios were simulated programs such as MATLAB and Python to test how the V2V system would respond to the different scenarios and warn the car drivers exposed to the threat of collisions.

Keywords: V2V communication, vehicle to vehicle scenarios, VANET, FCW, EEBL, IMA, Laplacian matrix

Procedia PDF Downloads 151
682 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 68
681 Looking beyond Lynch's Image of a City

Authors: Sandhya Rao

Abstract:

Kevin Lynch’s Theory on Imeageability, let on explore a city in terms of five elements, Nodes, Paths, Edges, landmarks and Districts. What happens when we try to record the same data in an Indian context? What happens when we apply the same theory of Imageability to a complex shifting urban pattern of the Indian cities and how can we as Urban Designers demonstrate our role in the image building ordeal of these cities? The organizational patterns formed through mental images, of an Indian city is often diverse and intangible. It is also multi layered and temporary in terms of the spirit of the place. The pattern of images formed is loaded with associative meaning and intrinsically linked with the history and socio-cultural dominance of the place. The embedded memory of a place in one’s mind often plays an even more important role while formulating these images. Thus while deriving an image of a city one is often confused or finds the result chaotic. The images formed due to its complexity are further difficult to represent using a single medium. Under such a scenario it’s difficult to derive an output of an image constructed as well as make design interventions to enhance the legibility of a place. However, there can be a combination of tools and methods that allows one to record the key elements of a place through time, space and one’s user interface with the place. There has to be a clear understanding of the participant groups of a place and their time and period of engagement with the place as well. How we can translate the result obtained into a design intervention at the end, is the main of the research. Could a multi-faceted cognitive mapping be an answer to this or could it be a very transient mapping method which can change over time, place and person. How does the context influence the process of image building in one’s mind? These are the key questions that this research will aim to answer.

Keywords: imageability, organizational patterns, legibility, cognitive mapping

Procedia PDF Downloads 308