Search results for: visual media and computer network etc
3112 The Use of Emoticons in Polite Phrases of Greeting and Thanks
Authors: Zuzana Komrsková
Abstract:
This paper shows the connection between emoticons and politeness in written computer-mediated communication. It studies if there are some differences in the use of emoticon between Czech and English written tweets. My assumptions about the use of emoticons were based on the use of greetings and thanks in real, face to face situations. The first assumption, that welcome greeting phrase would be accompanied by positive emoticon was correct. But for the farewell greeting both positive and negative emoticons are possible. My results show lower frequency of negative emoticons in this context. I also found quite often both positive and negative emoticon in the same tweet. The expression of gratitude is associated with positive emotions. The results show that emoticons accompany polite phrases of greeting and thanks very often both in Czech and English. The use of emoticons with studied polite phrases shows that emoticons have become an integral part of these phrases.Keywords: Czech, emoticon, english, politeness, twitter
Procedia PDF Downloads 4053111 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 5813110 Development of Broad Spectrum Nitrilase Biocatalysts and Bioprocesses for Nitrile Biotransformation
Authors: Avinash Vellore Sunder, Shikha Shah, Pramod P. Wangikar
Abstract:
The enzymatic conversion of nitriles to carboxylic acids by nitrilases has gained significance in the green synthesis of several pharmaceutical precursors and fine chemicals. While nitrilases have been characterized from different sources, the industrial application requires the identification of nitrilases that possess higher substrate tolerance, wider specificity and better thermostability, along with the development of an efficient bioprocess for producing large amounts of nitrilase. To produce large amounts of nitrilase, we developed a fed-batch fermentation process on defined media for the high cell density cultivation of E. coli cells expressing the well-studied nitrilase from Alcaligenes fecalis. A DO-stat feeding approach was employed combined with an optimized post-induction strategy to achieve nitrilase titer of 2.5*105 U/l and 78 g/l dry cell weight. We also identified 16 novel nitrilase sequences from genome mining and analysis of substrate binding residues. The nitrilases were expressed in E. coli and their biocatalytic potential was evaluated on a panel of 22 industrially relevant nitrile substrates using high-throughput screening and HPLC analysis. Nine nitrilases were identified to exhibit high activity on structurally diverse nitriles including aliphatic and aromatic dinitriles, heterocyclic, -hydroxy and -keto nitriles. With fed-batch biotransformation, whole-cell Zobelia galactanivorans nitrilase achieved yields of 2.4 M nicotinic acid and 1.8 M isonicotinic acid from 3-cyanopyridine and 4-cyanopyridine respectively within 5 h, while Cupravidus necator nitrilase enantioselectively converted 740 mM mandelonitrile to (R)–mandelic acid. The nitrilase from Achromobacter insolitus could hydrolyze 542 mM iminodiacetonitrile in 1 h. The availability of highly active nitrilases along with bioprocesses for enzyme production expands the toolbox for industrial biocatalysis.Keywords: biocatalysis, isonicotinic acid, iminodiacetic acid, mandelic acid, nitrilase
Procedia PDF Downloads 2343109 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 613108 The Batteryless Wi-Fi Backscatter System and Method for Improving the Transmission Range
Authors: Young-Min Ko, Seung-Jun Yu, Seongjoo Lee, Hyoung-Kyu Song
Abstract:
The Internet of things (IoT) system has attracted attention. IoT is a technology to connect all the objects to the internet as well as computer. IoT makes it possible for providing more data interoperability methods for an application purpose. Among the IoT technology, the research of devices so that they can communicate without power supply has been actively conducted. Batteryless system permits us to communicate without power supply devices. In this paper, batteryless backscatter system is used as a tag. And mobile devices which are embedded wireless fidelity (Wi-Fi) chipset are used as a reader. The backscatter tag can be obtained Internet connectivity from the reader. Conventional Wi-Fi backscatter system has limitation in the transmission range. In this paper, the proposed algorithm can be obtained improved reliability as well as overcoming the limitation about transmission range.Keywords: Ambient RF, Backscatter, Batteryless communication, Energy-harvesting, IoT, RFID, Tag, Wi-Fi
Procedia PDF Downloads 3893107 Recommendations to Improve Classification of Grade Crossings in Urban Areas of Mexico
Authors: Javier Alfonso Bonilla-Chávez, Angélica Lozano
Abstract:
In North America, more than 2,000 people annually die in accidents related to railroad tracks. In 2020, collisions at grade crossings were the main cause of deaths related to railway accidents in Mexico. Railway networks have constant interaction with motor transport users, cyclists, and pedestrians, mainly in grade crossings, where is the greatest vulnerability and risk of accidents. Usually, accidents at grade crossings are directly related to risky behavior and non-compliance with regulations by motorists, cyclists, and pedestrians, especially in developing countries. Around the world, countries classify these crossings in different ways. In Mexico, according to their dangerousness (high, medium, or low), types A, B and C have been established, recommending for each one different type of auditive and visual signaling and gates, as well as horizontal and vertical signaling. This classification is based in a weighting, but regrettably, it is not explained how the weight values were obtained. A review of the variables and the current approach for the grade crossing classification is required, since it is inadequate for some crossings. In contrast, North America (USA and Canada) and European countries consider a broader classification so that attention to each crossing is addressed more precisely and equipment costs are adjusted. Lack of a proper classification, could lead to cost overruns in the equipment and a deficient operation. To exemplify the lack of a good classification, six crossings are studied, three located in the rural area of Mexico and three in Mexico City. These cases show the need of: improving the current regulations, improving the existing infrastructure, and implementing technological systems, including informative signals with nomenclature of the involved crossing and direct telephone line for reporting emergencies. This implementation is unaffordable for most municipal governments. Also, an inventory of the most dangerous grade crossings in urban and rural areas must be obtained. Then, an approach for improving the classification of grade crossings is suggested. This approach must be based on criteria design, characteristics of adjacent roads or intersections which can influence traffic flow through the crossing, accidents related to motorized and non-motorized vehicles, land use and land management, type of area, and services and economic activities in the zone where the grade crossings is located. An expanded classification of grade crossing in Mexico could reduce accidents and improve the efficiency of the railroad.Keywords: accidents, grade crossing, railroad, traffic safety
Procedia PDF Downloads 1083106 Mixed Tetravalent Cs₂RuₘPt₁-ₘX₆ (X = Cl-, Br-) Based Vacancy-Ordered Halide Double Perovskites for Enhanced Solar Water Oxidation
Authors: Jigar Shaileshumar Halpati, Aravind Kumar Chandiran
Abstract:
Vacancy ordered double perovskites (VOPs) have been significantly attracting researchers due to their chemical structure diversity and interesting optoelectronic properties. Some VOPs have been recently reported to be suitable photoelectrodes for photoelectrochemical water-splitting reactions due to their high stability and panchromatic absorption. In this work, we systematically synthesized mixed tetravalent VOPs based on Cs₂RuₘPt₁-ₘX₆ (X = Cl-, Br-) and reported their structural, optical, electrochemical and photoelectrochemical properties. The structural characterization confirms that the mixed tetravalent site intermediates formed their own phases. The parent materials, as well as their intermediates, were found to be stable in ambient conditions for over 1 year and also showed incredible stability in harsh pH media ranging from pH 1 to pH 11. Moreover, these materials showed panchromatic absorption with onset up to 1000 nm depending upon the mixture stoichiometry. The extraordinary stability and excellent absorption properties make them suitable materials for photoelectrochemical water-splitting applications. PEC studies of these series of materials showed a high water oxidation photocurrent of 0.56 mA cm-² for Cs₂Ru₀.₅Pt₀.₅Cl₆. Fundamental investigation from photoelectrochemical reactions revealed that the intrinsic ruthenium-based VOP showed enhanced hole transfer to the electrolyte, while the intrinsic platinum-based VOP showed higher photovoltage. The mix of these end members at the tetravalent site showed a synergic effect of reduced charge transfer resistance from the material to the electrolyte and increased photovoltage, which led to increased PEC performance of the intermediate materials.Keywords: solar water splitting, photo electrochemistry, photo absorbers, material characterization, device characterization, green hydrogen
Procedia PDF Downloads 753105 Context-Aware Recommender Systems Using User's Emotional State
Authors: Hoyeon Park, Kyoung-jae Kim
Abstract:
The product recommendation is a field of research that has received much attention in the recent information overload phenomenon. The proliferation of the mobile environment and social media cannot help but affect the results of the recommendation depending on how the factors of the user's situation are reflected in the recommendation process. Recently, research has been spreading attention to the context-aware recommender system which is to reflect user's contextual information in the recommendation process. However, until now, most of the context-aware recommender system researches have been limited in that they reflect the passive context of users. It is expected that the user will be able to express his/her contextual information through his/her active behavior and the importance of the context-aware recommender system reflecting this information can be increased. The purpose of this study is to propose a context-aware recommender system that can reflect the user's emotional state as an active context information to recommendation process. The context-aware recommender system is a recommender system that can make more sophisticated recommendations by utilizing the user's contextual information and has an advantage that the user's emotional factor can be considered as compared with the existing recommender systems. In this study, we propose a method to infer the user's emotional state, which is one of the user's context information, by using the user's facial expression data and to reflect it on the recommendation process. This study collects the facial expression data of a user who is looking at a specific product and the user's product preference score. Then, we classify the facial expression data into several categories according to the previous research and construct a model that can predict them. Next, the predicted results are applied to existing collaborative filtering with contextual information. As a result of the study, it was shown that the recommended results of the context-aware recommender system including facial expression information show improved results in terms of recommendation performance. Based on the results of this study, it is expected that future research will be conducted on recommender system reflecting various contextual information.Keywords: context-aware, emotional state, recommender systems, business analytics
Procedia PDF Downloads 2293104 Metabolomics Profile Recognition for Cancer Diagnostics
Authors: Valentina L. Kouznetsova, Jonathan W. Wang, Igor F. Tsigelny
Abstract:
Metabolomics has become a rising field of research for various diseases, particularly cancer. Increases or decreases in metabolite concentrations in the human body are indicative of various cancers. Further elucidation of metabolic pathways and their significance in cancer research may greatly spur medicinal discovery. We analyzed the metabolomics profiles of lung cancer. Thirty-three metabolites were selected as significant. These metabolites are involved in 37 metabolic pathways delivered by MetaboAnalyst software. The top pathways are glyoxylate and dicarboxylate pathway (its hubs are formic acid and glyoxylic acid) along with Citrate cycle pathway followed by Taurine and hypotaurine pathway (the hubs in the latter are taurine and sulfoacetaldehyde) and Glycine, serine, and threonine pathway (the hubs are glycine and L-serine). We studied interactions of the metabolites with the proteins involved in cancer-related signaling networks, and developed an approach to metabolomics biomarker use in cancer diagnostics. Our analysis showed that a significant part of lung-cancer-related metabolites interacts with main cancer-related signaling pathways present in this network: PI3K–mTOR–AKT pathway, RAS–RAF–ERK1/2 pathway, and NFKB pathway. These results can be employed for use of metabolomics profiles in elucidation of the related cancer proteins signaling networks.Keywords: cancer, metabolites, metabolic pathway, signaling pathway
Procedia PDF Downloads 4023103 Coding Considerations for Standalone Molecular Dynamics Simulations of Atomistic Structures
Authors: R. O. Ocaya, J. J. Terblans
Abstract:
The laws of Newtonian mechanics allow ab-initio molecular dynamics to model and simulate particle trajectories in material science by defining a differentiable potential function. This paper discusses some considerations for the coding of ab-initio programs for simulation on a standalone computer and illustrates the approach by C language codes in the context of embedded metallic atoms in the face-centred cubic structure. The algorithms use velocity-time integration to determine particle parameter evolution for up to several thousands of particles in a thermodynamical ensemble. Such functions are reusable and can be placed in a redistributable header library file. While there are both commercial and free packages available, their heuristic nature prevents dissection. In addition, developing own codes has the obvious advantage of teaching techniques applicable to new problems.Keywords: C language, molecular dynamics, simulation, embedded atom method
Procedia PDF Downloads 3053102 Old Community Spatial Integration: Discussion on the Mechanism of Aging Space System Replacement
Authors: Wan-I Chen, Tsung-I Pai
Abstract:
Future the society aging of population will create the social problem has not had the good mechanism solution in the Asian country, especially in Taiwan. In the future ten year the people in Taiwan must facing the condition which is localization aging social problem. In this situation, how to use the spatial in eco way to development space use to solve the old age spatial demand is the way which might develop in the future Taiwan society. Over the next 10 years, taking care of the aging people will become part of the social problem of aging phenomenon. The research concentrate in the feasibility of spatial substitution, secondary use of spatial might solve out of spatial problem for aging people. In order to prove the space usable, the research required to review the project with the support system and infill system for space experiment, by using network grid way. That defined community level of space elements location relationship, make new definitions of space and return to cooperation. Research to innovation in the the appraisal space causes the possibility, by spatial replacement way solution on spatial insufficient suitable condition. To evaluation community spatial by using the support system and infill system in order to see possibilities of use in replacement inner space and modular architecture into housing. The study is discovering the solution on the Eco way to develop space use to figure out the old age spatial demand.Keywords: sustainable use, space conversion, integration, replacement
Procedia PDF Downloads 1763101 Optimal Location of Unified Power Flow Controller (UPFC) for Transient Stability: Improvement Using Genetic Algorithm (GA)
Authors: Basheer Idrees Balarabe, Aminu Hamisu Kura, Nabila Shehu
Abstract:
As the power demand rapidly increases, the generation and transmission systems are affected because of inadequate resources, environmental restrictions and other losses. The role of transient stability control in maintaining the steady-state operation in the occurrence of large disturbance and fault is to describe the ability of the power system to survive serious contingency in time. The application of a Unified power flow controller (UPFC) plays a vital role in controlling the active and reactive power flows in a transmission line. In this research, a genetic algorithm (GA) method is applied to determine the optimal location of the UPFC device in a power system network for the enhancement of the power-system Transient Stability. Optimal location of UPFC has Significantly Improved the transient stability, the damping oscillation and reduced the peak over shoot. The GA optimization Technique proposed was iteratively searches the optimal location of UPFC and maintains the unusual bus voltages within the satisfy limits. The result indicated that transient stability is improved and achieved the faster steady state. Simulations were performed on the IEEE 14 Bus test systems using the MATLAB/Simulink platform.Keywords: UPFC, transient stability, GA, IEEE, MATLAB and SIMULINK
Procedia PDF Downloads 143100 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan
Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain
Abstract:
Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism
Procedia PDF Downloads 1103099 Performance of Fiber Reinforced Self-Compacting Concrete Containing Different Pozzolanic Materials
Authors: Ahmed Fathi Mohamed, Nasir Shafiq, Muhd Fadhil Nuruddin, Ali Elheber Ahmed
Abstract:
Steel fiber adds to Self-Compacting Concrete (SCC) to enhance it is properties and achieves the requirement. This research work focus on the using of different percentage of steel fiber in SCC mixture contains fly ash and microwave incinerator rice husk ash (MIRHA) as supplementary material. Fibers affect several characteristics of SCC in the fresh and the hardened state. To optimize fiber-reinforced self-compacting concrete (FSCC), The possible fiber content of a given mix composition is an essential input parameter. The aim of the research is to study the properties of fiber reinforced self–compacting (FRSCC) and to develop the expert system/computer program of mix proportion for calculating the steel fiber content and pozzolanic replacement that can be applied to investigate the compressive strength of FSCC mix.Keywords: self-compacting concrete, silica fume, steel fiber, fresh taste
Procedia PDF Downloads 5743098 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator
Authors: Amin Zabihinejad, Philippe Viarouge
Abstract:
In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.Keywords: direct power control, three level rectifier, real time simulator, high power application
Procedia PDF Downloads 5173097 The Determinant Factors of Technology Adoption for Improving Firm’s Performance; Toward a Conceptual Model
Authors: Zainal Arifin, Avanti Fontana
Abstract:
Considering that TOE framework is the most useful instrument for studying technology adoption in firm context, this paper will analyze the influence of technological, organizational and environmental (TOE) factors to the Dynamic capabilities (DCs) associated with technology adoption strategy for improving the firm’s performance. Focusing on the determinant factors of technology adoption at the firm level, the study will contribute to the broader study of resource base view (RBV) and dynamic capability (DC). There is no study connecting directly the TOE factors to the DCs, this paper proposes technology adoption as a functional competence/capability which mediates a relationship between technology adoptions with firm’s performance. The study wants to show a conceptual model of the indirect effects of DCs at the firm level, which can be key predictors of firm performance in dynamic business environment. The results of this research is mostly relevant to top corporate executives (BOD) or top management team (TMT) who seek to provide some supporting ‘hardware’ content and condition such as technological factors, organizational factors, environmental factors, and to improve firm's ‘software ‘ ability such as adaptive capability, absorptive capability and innovative capability, in order to achieve a successful technology adoption in organization. There are also mediating factors which are elaborated at this paper; timing and external network. A further research for showing its empirical results is highly recommended.Keywords: technology adoption, TOE framework, dynamic capability, resources based view
Procedia PDF Downloads 3333096 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks
Authors: Ruchi Makani, B. V. R. Reddy
Abstract:
Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system
Procedia PDF Downloads 1783095 Novel IPN Hydrogel Beads as pH Sensitive Drug Delivery System for an Anti-Ulcer Drug
Authors: Vishal Kumar Gupta
Abstract:
Purpose: This study has been undertaken to develop novel pH sensitive interpenetrating network hydrogel beads. Methods: The pH sensitive PAAM-g-Guar gum copolymer was synthesized by free radical polymerization followed by alkaline hydrolysis. Beads of guar gum-grafted-polyacrylamide and sodium Carboxy methyl cellulose (Na CMC) loaded with Pantoprazole sodium were prepared and evaluated for pH sensitivity, swelling properties, drug entrapment efficiency and in vitro drug release characteristics. Seven formulations were prepared for the drug with varying polymer and cross linker concentrations. Results: The grafting and alkaline hydrolysis reactions were confirmed by FT-IR spectroscopy. Differential scanning calorimetry was carried out to know the compatibility of encapsulated drug with the polymers. Scanning electron microscopic study revealed that the IPN beads were spherical. The entrapment efficiency was found to be in the range of 85-92%. Particle size analysis was carried out by optical microscopy. As the pH of the medium was changed from 1.2 to 7.4, a considerable increase in swelling was observed for all beads. Increase in the copolymer concentration showed sustained the drug release up to 12 hrs. Drug release from the beads followed super case II transport mechanism. Conclusion: It was concluded that guar gum-acrylamide beads, cross-linked with aluminum chloride offer an opportunity for controlled drug release of pantoprazole sodium.Keywords: IPN, hydrogels, DSC, SEM
Procedia PDF Downloads 2693094 Menopause Cultural Research: A Comparative Study of National and Diasporic Chinese Menopausal Women’s Perceptions and Lived Experience of Menopause
Authors: Yilin Wang, Ayumi Goto
Abstract:
Although most females will experience menopause due to social value habits of cultural factors, some Chinese women may lack the confidence to talk about the problems they are experiencing while going through menopause. Also, sometimes the inappropriateness of medical terminology leads to panic when women face the symptoms associated with menopause. On top of that, when women avoid discussing menopause as a topic, others are less likely to pay attention to the needs of menopausal women as their bodies change. This research will compare the experience of Chinese menopausal women and diasporic Chinese women's perceptions of menopause. A qualitative study will be conducted by collecting and analyzing experiences and perceptions to compare differences in women's perceptions of menopause, considering cultural and social factors. In addition, the study will gather information on the differences in the conceptualization of menopause between the Chinese and Canadian medical fields. Co-design sessions will be held to establish how to bring menopause to the attention of people other than women. Furthermore, a support network for menopause women will be created through these co-design sessions. It is hoped that this research will contribute to a proper understanding of menopause and provide support for Chinese women. This research is built upon feminist standpoint theory and inclusive design theory. The results of this study will be presented in this paper.Keywords: menopause, feminist standpoint theory, Chinese national & diasporic women, inclusive design
Procedia PDF Downloads 1073093 Survey Investigation of Perceptions of Technologists among Primary Students: Stereotypes, Diversity, and Their Use of Science, Technology, Engineering, and Mathematics
Authors: Tian Luo, Wing Mui Winnie So
Abstract:
Gaining career awareness in STEM is an important educational outcome in STEM education. While many studies focused on students’ understanding of scientists and engineers, very few studies explore students’ perceptions of technologists as a group of STEM professionals. In this study, 300 valid surveys which include drawing task and follow-up questions about technologist were collected from 4th to 6th grade students. The results showed that 75.1% of the students draw a technologist as a male and 19.3% draw a technologist as a female. Most students believe that technologists use math, science or engineering in their work and can name a few categories of technologists. The drawings also showed that students tend to present technologists as people who work with a computer.Keywords: STEM (Science, Technology, Engineering, and Mathematics) education, elementary students, technologist, STEM careers
Procedia PDF Downloads 2553092 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems
Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano
Abstract:
The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring
Procedia PDF Downloads 1513091 Origins of the Tattoo: Decoding the Ancient Meanings of Terrestrial Body Art to Establish a Connection between the Natural World and Humans Today
Authors: Sangeet Anand
Abstract:
Body art and tattooing have long been practiced as a form of self-expression for centuries, and this study studies and analyzes the pertinence of tattoo culture in our everyday lives and ancient past. Individuals of different cultures represent ideas, practices, and elements of their cultures through symbolic representation. These symbols come in all shapes and sizes and can be as simple as the makeup you put on every day to something more permanent such as a tattoo. In the long run, these individuals who choose to display art on their bodies are seeking to express their individuality. In addition, these visuals are ultimately a reflection of our own appropriate cultures deem as beautiful, important, and powerful to the human eye. They make us known to the world and give us a plausible identity in an ever-changing world. We have lived through and seen a rise in hippie culture today. This type of bodily decoration displayed by this fad has made it seem as though body art is a visual language that is relatively new. But quite to the contrary, it is not. Through cultural symbolic exploration, we can answer key questions to ideas that have been raised for centuries. Through careful, in-depth interviews, this study takes a broad subject matter-art, and symbolism-and culminates it into a deeper philosophical connection between the world and its past. The basic methodologies used in this sociocultural study include interview questionnaires and textual analysis, which encompass a subject and interviewer as well as source material. The major findings of this study contain a distinct connection between cultural heritage and the day-to-day likings of an individual. The participant that was studied during this project demonstrated a clear passion for hobbies that were practiced even by her ancestors. We can conclude, through these findings, that there is a deeper cultural connection between modern day humans, the first humans, and the surrounding environments. Our symbols today are a direct reflection of the elements of nature that our human ancestors were exposed to, and, through cultural acceptance, we can adorn ourselves with these representations to help others identify our pasts. Body art embraces the different aspects of different cultures and holds significance, tells stories, and persists, even as the human population rapidly integrates. With this pattern, our human descendents will continue to represent their cultures and identities in the future. Body art is an integral element in understanding how and why people identify with certain aspects of life over others and broaden the scope for conducting more analysis cross-culturally.Keywords: natural, symbolism, tattoo, terrestrial
Procedia PDF Downloads 1073090 Threshold Competency of Students in Graduate School
Authors: Terada Pinyo
Abstract:
This study is the survey research, designed to find out the threshold competency of graduate students in terms of knowledge excellency and professional skills proficiency based on Thai Qualifications Framework for Higher Education (TQF). The sample group consisted of 240 students. The results were collected by stratified sampling, using study programs for each stage. The results were analysed and calculated by computer program. Statistics used during analysing were percentage, mean, and standard deviation. From the study, the threshold competency of graduate students were in very high score range in both overall and specific category. The top category which received the most score was interpersonal skills and responsibility, following by ethics and morality, knowledge and skills, and numerical communication and information technology.Keywords: threshold competency, Thai qualifications framework for higher education, graduate school
Procedia PDF Downloads 4023089 Analysis of Risks of Adopting Integrated Project Delivery: Application of Bayesian Theory
Abstract:
Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasing attention from construction industry due to its reliability to deliver high-performing buildings. However, unavailable IPD specific insurance concerns the industry participants who are interested in IPD implementation. Even though the risk management capability can be enhanced using shared risk mechanism, some risks may occur when the partners do not commit themselves into the integrated practices in a desired manner. This is because the intense collaboration and close integration can not only create added value but bring new opportunistic behaviors and disputes. The study is aimed to investigate the risks of implementing IPD using Bayesian theory. IPD risk taxonomy is presented to identify all potential risks of implementing IPD and a risk network map is developed to capture the interdependencies between IPD risks. The conditional relations between risk occurrences and the impacts of IPD risks on project performances are evaluated and simulated based on Bayesian theory. The probability of project outcomes is predicted by simulation. In addition, it is found that some risks caused by integration are most possible occurred risks. This study can help the IPD project participants identify critical risks of adopting IPD to improve project performances. In addition, it is helpful to develop IPD specific insurance when the pertinent risks can be identified.Keywords: Bayesian theory, integrated project delivery, project risks, project performances
Procedia PDF Downloads 3003088 JaCoText: A Pretrained Model for Java Code-Text Generation
Authors: Jessica Lopez Espejel, Mahaman Sanoussi Yahaya Alassan, Walid Dahhane, El Hassane Ettifouri
Abstract:
Pretrained transformer-based models have shown high performance in natural language generation tasks. However, a new wave of interest has surged: automatic programming language code generation. This task consists of translating natural language instructions to a source code. Despite the fact that well-known pre-trained models on language generation have achieved good performance in learning programming languages, effort is still needed in automatic code generation. In this paper, we introduce JaCoText, a model based on Transformer neural network. It aims to generate java source code from natural language text. JaCoText leverages the advantages of both natural language and code generation models. More specifically, we study some findings from state of the art and use them to (1) initialize our model from powerful pre-trained models, (2) explore additional pretraining on our java dataset, (3) lead experiments combining the unimodal and bimodal data in training, and (4) scale the input and output length during the fine-tuning of the model. Conducted experiments on CONCODE dataset show that JaCoText achieves new state-of-the-art results.Keywords: java code generation, natural language processing, sequence-to-sequence models, transformer neural networks
Procedia PDF Downloads 2863087 Effect of Mannitol on in Vitro Conservation of Local and Exotic Taro-Genotypes (Colocasia Esculenta Var Esculenta)
Authors: Benjamin Bonsu Bruce, Marian Dorcas Quain David Appiah-Kubi, Gertrude Osei-Diko, Harrison Kwame Dapaah
Abstract:
Taro [Colocasia esculenta (L.) Schott] is a major staple food and remains a significant crop to many cultural and agricultural customs worldwide. In Ghana, taro is mostly propagated using vegetative material, which is conserved in field collection and recycled from their farms to establish new fields. However, this practice promotes the accumulation of systemic pathogens. Prior exposure to pests and subsequent expression of disease symptoms can also be a huge constraint to sustainable conservation and utilization of taro genetic resources. In vitro, slow growth is one of the most promising techniques to be utilized for conservation. The objective of this study was to find a medium-term in vitro conservation protocol for local and exotic taro genotypes. The medium-term conservation study was conducted using actively growing shoots obtained from in vitro cultures. Explants were cultured to full strength in complete Murashige and Skoog medium supplemented with Mannitol at different concentrations (0g/l, 20g/l, 25g/l, and 30g/l). Another medium that was tested as an additional treatment is the White’s medium. The highest number of shoots (6.33) and leaves (22.67) occurred on medium containing 20 and 25g/l mannitol in genotype SAO 006 as compared to other genotypes, whereas 30g/l mannitol was the best to restrict growth for the entire 6 months period in terms of shoot height (22.50cm). The study reveals that mannitol supplemented culture media could reduce the growth of Colocasia plantlets, especially in stem height. Culture growth following 6 months of conservation, showed that healthy shoot cultures of Taro were obtained after 6 months of storage in a medium containing 20gl⁻¹ and 25gl⁻¹ mannitol.Keywords: complete murashige, skoog medium, culture conditions, mannitol, slow growth conservation
Procedia PDF Downloads 1703086 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 3733085 Penetration Analysis for Composites Applicable to Military Vehicle Armors, Aircraft Engines and Nuclear Power Plant Structures
Authors: Dong Wook Lee
Abstract:
This paper describes a method for analyzing penetration for composite material using an explicit nonlinear Finite Element Analysis (FEA). This method may be used in the early stage of design for the protection of military vehicles, aircraft engines and nuclear power plant structures made of composite materials. This paper deals with simple ballistic penetration tests for composite materials and the FEA modeling method and results. The FEA was performed to interpret the ballistic field test phenomenon regarding the damage propagation in the structure subjected to local foreign object impact.Keywords: computer aided engineering, finite element analysis, impact analysis, penetration analysis, composite material
Procedia PDF Downloads 1233084 Alkali Silica Reaction Mitigation and Prevention Measures for Arkansas Local Aggregates
Authors: Amin Kamal Akhnoukh, Lois Zaki Kamel, Magued Mourad Barsoum
Abstract:
The objective of this research is to mitigate and prevent the alkali silica reactivity (ASR) in highway construction projects. ASR is a deleterious reaction initiated when the silica content of the aggregate reacts with alkali hydroxides in cement in the presence of relatively high moisture content. The ASR results in the formation of an expansive white colored gel-like material which forms the destructive tensile stresses inside hardened concrete. In this research, different types of local aggregates available in the State of Arkansas were mixed and mortar bars were poured according to the ASTM specifications. Mortar bars expansion was measured versus time and aggregates with potential ASR problems were detected. Different types of supplementary cementitious materials (SCMs) were used in remixing mortar bars with highly reactive aggregates. Length changes for remixed bars proved that different types of SCMs can be successfully used in reducing the expansive effect of ASR. SCMs percentage by weight is highly dependent on the SCM type. The result of this study will help avoiding future losses due to ASR cracking in construction project and reduce the maintenance, repair, and replacement budgets required for highways network.Keywords: alkali silica reaction, aggregates, misture, cracks, Mortar Bar Test, supplementary cementitious materials
Procedia PDF Downloads 3343083 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia
Authors: Logan Carmichael
Abstract:
As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis
Procedia PDF Downloads 112