Search results for: environment and society
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11801

Search results for: environment and society

3761 Door Fan Test in New CED at Portopalo Test Site

Authors: F. Noto, M. Castro, R. Garraffo, An. Mirabella, A. Rizzo, G. Cuttone

Abstract:

The door fan test is a verification procedure on the tightness of a room, necessary following the installation of saturation extinguishing systems and made mandatory according to the UNI 15004-1: 2019 standard whenever a gas extinguishing system is designed and installed. The door fan test was carried out at the Portopalo di Capo Passero headquarters of the Southern National Laboratories and highlighted how the Data Processing Center is perfectly up to standard, passing the door fan test in an excellent way. The Southern National Laboratories constitute a solid research reality, well established in the international scientific panorama. The CED in the Portopalo site has been expanded, so the extinguishing system has been expanded according to a detailed design. After checking the correctness of the design to verify the absence of air leaks, we carried out the door fan test. The activities of the LNS are mainly aimed at basic research in the field of Nuclear Physics, Nuclear and Particle Astrophysics. The Portopalo site will host some of the largest submarine wired scientific research infrastructures built in Europe and in the world, such as KM3NeT and EMSO ERIC; in particular, the site research laboratory in Portopalo will host the power supply and data acquisition systems of the underwater infrastructures, and a technological backbone will be created, unique in the Mediterranean, capable of allowing the connection, at abyssal depths, of dozens of real-time surveying and research structures of the marine environment deep.

Keywords: KM3Net, fire protection, door fan test, CED

Procedia PDF Downloads 99
3760 Design of a Cooperative Neural Network, Particle Swarm Optimization (PSO) and Fuzzy Based Tracking Control for a Tilt Rotor Unmanned Aerial Vehicle

Authors: Mostafa Mjahed

Abstract:

Tilt Rotor UAVs (Unmanned Aerial Vehicles) are naturally unstable and difficult to maneuver. The purpose of this paper is to design controllers for the stabilization and trajectory tracking of this type of UAV. To this end, artificial intelligence methods have been exploited. First, the dynamics of this UAV was modeled using the Lagrange-Euler method. The conventional method based on Proportional, Integral and Derivative (PID) control was applied by decoupling the different flight modes. To improve stability and trajectory tracking of the Tilt Rotor, the fuzzy approach and the technique of multilayer neural networks (NN) has been used. Thus, Fuzzy Proportional Integral and Derivative (FPID) and Neural Network-based Proportional Integral and Derivative controllers (NNPID) have been developed. The meta-heuristic approach based on Particle Swarm Optimization (PSO) method allowed adjusting the setting parameters of NNPID controller, giving us an improved NNPID-PSO controller. Simulation results under the Matlab environment show the efficiency of the approaches adopted. Besides, the Tilt Rotor UAV has become stable and follows different types of trajectories with acceptable precision. The Fuzzy, NN and NN-PSO-based approaches demonstrated their robustness because the presence of the disturbances did not alter the stability or the trajectory tracking of the Tilt Rotor UAV.

Keywords: neural network, fuzzy logic, PSO, PID, trajectory tracking, tilt-rotor UAV

Procedia PDF Downloads 120
3759 Assisted Approach as a Tool for Increasing Attention When Using the iPad in a Special Elementary School: Action Research

Authors: Vojtěch Gybas, Libor Klubal, Kateřina Kostolányová

Abstract:

Nowadays, mobile touch technologies, such as tablets, are an integral part of teaching and learning in many special elementary schools. Many special education teachers tend to choose an iPad tablet with iOS. The reason is simple; the iPad has a function for pupils with special educational needs. If we decide to use tablets in teaching, in general, first we should try to stimulate the cognitive abilities of the pupil at the highest level, while holding the pupil’s attention on the task, when working with the device. This paper will describe how student attention can be increased by eliminating the working environment of selected applications, while using iPads with pupils in a special elementary school. Assisted function approach is highly effective at eliminating unwanted touching by a pupil when working on the desktop iPad, thus actively increasing the pupil´s attention while working on specific educational applications. During the various stages of the action, the research was conducted via data collection and interpretation. After a phase of gaining results and ideas for practice and actions, we carried out the check measurement, this time using the tool-assisted approach. In both cases, the pupils worked in the Math Board application and the resulting differences were evident.

Keywords: special elementary school, a mobile touch device, iPad, attention, Math Board

Procedia PDF Downloads 254
3758 Childhood Adversity and Delinquency in Youth: Self-Esteem and Depression as Mediators

Authors: Yuhui Liu, Lydia Speyer, Jasmin Wertz, Ingrid Obsuth

Abstract:

Childhood adversities refer to situations where a child's basic needs for safety and support are compromised, leading to substantial disruptions in their emotional, cognitive, social, or neurobiological development. Given the prevalence of adversities (8%-39%), their impact on developmental outcomes is challenging to completely avoid. Delinquency is an important consequence of childhood adversities, given its potential causing violence and other forms of victimisation, influencing victims, delinquents, their families, and the whole of society. Studying mediators helps explain the link between childhood adversity and delinquency, which aids in designing effective intervention programs that target explanatory variables to disrupt the path and mitigate the effects of childhood adversities on delinquency. The Dimensional Model of Adversity and Psychopathology suggests that threat-based adversities influence outcomes through emotion processing, while deprivation-based adversities do so through cognitive mechanisms. Thus, considering a wide range of threat-based and deprivation-based adversities and their co-occurrence and their associations with delinquency through cognitive and emotional mechanisms is essential. This study employs the Millennium Cohort Study, tracking the development of approximately 19,000 individuals born across England, Scotland, Wales and Northern Ireland, representing a nationally representative sample. Parallel mediation models compare the mediating roles of self-esteem (cognitive) and depression (affective) in the associations between childhood adversities and delinquency. Eleven types of childhood adversities were assessed both individually and through latent class analysis, considering adversity experiences from birth to early adolescence. This approach aimed to capture how threat-based, deprived-based, or combined threat and deprived-based adversities are associated with delinquency. Eight latent classes were identified: three classes (low adversity, especially direct and indirect violence; low childhood and moderate adolescent adversities; and persistent poverty with declining bullying victimisation) were negatively associated with delinquency. In contrast, three classes (high parental alcohol misuse, overall high adversities, especially regarding household instability, and high adversity) were positively associated with delinquency. When mediators were included, all classes showed a significant association with delinquency through depression, but not through self-esteem. Among the eleven single adversities, seven were positively associated with delinquency, with five linked through depression and none through self-esteem. The results imply the importance of affective variables, not just for threat-based but also deprivation-based adversities. Academically, this suggests exploring other mechanisms linking adversities and delinquency since some adversities are linked through neither depression nor self-esteem. Clinically, intervention programs should focus on affective variables like depression to mitigate the effects of childhood adversities on delinquency.

Keywords: childhood adversity, delinquency, depression, self-esteem

Procedia PDF Downloads 32
3757 Fabrication and Characterization of PPy/rGO|PPy/ZnO Composite with Varying Zno Concentration as Anode for Fuel Cell Applications

Authors: Bryan D. Llenarizas, Maria Carla F. Manzano

Abstract:

The rapid growth of electricity demand has led to a pursuit of alternative energy sources with high power output and not harmful to the environment. The fuel cell is a device that generates electricity via chemical reactions between the fuel and oxidant. Fuel cells have been known for decades, but the development of high-power output and durability was still one of the drawbacks of this energy source. This study investigates the potential of layer-by-layer composite for fuel cell applications. A two-electrode electrochemical cell was used for the galvanostatic electrochemical deposition method to fabricate a Polypyrrole/rGO|Polypyrrole/ZnO layer-by-layer composite material for fuel cell applications. In the synthesis, the first layer comprised 0.1M pyrrole monomer and 1mg of rGO, while the second layer had 0.1M pyrrole monomer and variations of ZnO concentration ranging from 0.08M up to 0.12M. A constant current density of 8mA/cm² was applied for 1 hour in fabricating each layer. Scanning electron microscopy (SEM) for the fabricated LBL material shows a globular surface with white spots. These white spots are the ZnO particles confirmed by energy-dispersive X-ray spectroscopy, indicating a successful deposition of the second layer onto the first layer. The observed surface morphology was consistent for each variation of ZnO concentrations. AC measurements were conducted to obtain the AC resistance of the fabricated film. Results show a decrease in AC resistance as the concentration of ZnO increases.

Keywords: anode, composite material, electropolymerization, fuel cell, galvanostatic, polypyrrole

Procedia PDF Downloads 82
3756 Effect of Tensile Strain on Microstructure of Irradiated Core Internal Material

Authors: Hygreeva Kiran Namburi, Anna Hojna, Edita Lecianova, Fencl Zdenek

Abstract:

Irradiation Assisted Stress Corrosion Cracking [IASCC] is one of the most significant environmental degradation in the internal components made from Austenitic stainless steel. This mechanism is still not fully understood and there are no suitable criteria for prediction of the damage during operation. In this work, core basket material 08Ch18N10T austenitic stainless steel acquired from decommissioned NPP Nord / Greifswald Unit 1, VVER 440-230 type, operated for 15 years and irradiated at 5.2 dpa is studied. This material was tensile tested at two different test temperatures and strain rates in air and at the elevated temperature under the water environment. SEM observations of the fracture surface documented ductile fracture of the samples tested in air, but areas of IASCC tested in water. This paper emphasizes on the microscopic examination results from the mechanically tested samples to determine the underlying IASCC physical damage process. TEM observations of thin foils made from the gauge sections that are closer to the fractured surface of the specimen aimed to find variances in interaction of dislocations and grain boundaries owing to different test conditions.

Keywords: irradiation assisted stress corrosion cracking, core basket material, SEM observations of the fracture surface, microscopic examination results

Procedia PDF Downloads 350
3755 A Novel Approach to Design and Implement Context Aware Mobile Phone

Authors: G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.

Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability

Procedia PDF Downloads 366
3754 Exposure to Violence and Its Association with Mental Health in Swedish Prospective Exchange Students and Campus Students

Authors: Emil Danehorn, Ulla Peterson, Marie Oscarsson, Goldina Smirthwaite, Katarina Swahnberg

Abstract:

Swedish students who choose to study abroad are common, but there has been limited research on exchange students. There are indications that some Swedish exchange students have been exposed to violence, but it is not known if they, already before their semester abroad, are more exposed to violence than students who remain on campus. Our aim was to investigate potential differences in exposure to physical, sexual, and emotional violence between prospective exchange students and campus students and between male and female students in general, as well as to determine any associations between mental health and exposure to violence among students in the total sample. Method: Comparative cross-sectional design using an online survey containing the NorVold Abuse Questionnaire and the General Health Questionnaire 12. A total of 565 participants took part in the study. Results: Prospective exchange students were less exposed to emotional violence compared to campus students. About one-half of all the participating female students had been exposed to sexual violence and about one-third of all the male students had been exposed to physical violence. The results also indicated that exposure to more than one form of violence was associated with poor mental health for students as a group. Conclusion: Prospective exchange students as a group do not report more exposure to physical and sexual violence than campus students but do report less exposure to emotional violence. However, the overall frequency of exposure to violence among the students was high. This highlights the need for proactive efforts for everyone, not least for exchange students who will be staying in a new environment unknown to them.

Keywords: sexual violence, physical violence, emotional violence, exchange students, mental health

Procedia PDF Downloads 123
3753 Safety Validation of Black-Box Autonomous Systems: A Multi-Fidelity Reinforcement Learning Approach

Authors: Jared Beard, Ali Baheri

Abstract:

As autonomous systems become more prominent in society, ensuring their safe application becomes increasingly important. This is clearly demonstrated with autonomous cars traveling through a crowded city or robots traversing a warehouse with heavy equipment. Human environments can be complex, having high dimensional state and action spaces. This gives rise to two problems. One being that analytic solutions may not be possible. The other is that in simulation based approaches, searching the entirety of the problem space could be computationally intractable, ruling out formal methods. To overcome this, approximate solutions may seek to find failures or estimate their likelihood of occurrence. One such approach is adaptive stress testing (AST) which uses reinforcement learning to induce failures in the system. The premise of which is that a learned model can be used to help find new failure scenarios, making better use of simulations. In spite of these failures AST fails to find particularly sparse failures and can be inclined to find similar solutions to those found previously. To help overcome this, multi-fidelity learning can be used to alleviate this overuse of information. That is, information in lower fidelity can simulations can be used to build up samples less expensively, and more effectively cover the solution space to find a broader set of failures. Recent work in multi-fidelity learning has passed information bidirectionally using “knows what it knows” (KWIK) reinforcement learners to minimize the number of samples in high fidelity simulators (thereby reducing computation time and load). The contribution of this work, then, is development of the bidirectional multi-fidelity AST framework. Such an algorithm, uses multi-fidelity KWIK learners in an adversarial context to find failure modes. Thus far, a KWIK learner has been used to train an adversary in a grid world to prevent an agent from reaching its goal; thus demonstrating the utility of KWIK learners in an AST framework. The next step is implementation of the bidirectional multi-fidelity AST framework described. Testing will be conducted in a grid world containing an agent attempting to reach a goal position and adversary tasked with intercepting the agent as demonstrated previously. Fidelities will be modified by adjusting the size of a time-step, with higher-fidelity effectively allowing for more responsive closed loop feedback. Results will compare the single KWIK AST learner with the multi-fidelity algorithm with respect to number of samples, distinct failure modes found, and relative effect of learning after a number of trials.

Keywords: multi-fidelity reinforcement learning, multi-fidelity simulation, safety validation, falsification

Procedia PDF Downloads 157
3752 Marketing Practices of the Urban and Recycled Wood Industry in the United States

Authors: Robert Smith, Omar Espinoza, Anna Pitta

Abstract:

In the United States, trees felled in urban areas and wood generated through construction and demolition are primarily disposed of as low-value resources, such as biomass for energy, landscaping mulch, composting, or landfilled. An emerging industry makes use of these underutilized resources to produce high value-added products, with associated benefits for the environment, the local economy, and consumers. For the circular economy to be successful, markets must be created for sustainable, reusable natural materials. Research was carried out to increase the understanding of the marketing practices of urban and reclaimed wood industries. This paper presents the results of a nationwide survey of these companies. The results indicate that a majority of companies in this industry are small firms, operating for less than 10 years, which produce mostly to order and sell their products at comparatively higher prices than competing products made from virgin natural resources. Promotional messages included quality, aesthetics, and customization, conveyed through company webpages, word of mouth, and social media. Distribution channels used include direct sales, online sales, and retail sales. Partnerships are critical for effective raw material procurement. Respondents indicated optimistic growth expectations, despite barriers associated with urban and reclaimed wood materials and production.

Keywords: urban and reclaimed wood, circular economy, marketing, wood products

Procedia PDF Downloads 125
3751 Optimization of End Milling Process Parameters for Minimization of Surface Roughness of AISI D2 Steel

Authors: Pankaj Chandna, Dinesh Kumar

Abstract:

The present work analyses different parameters of end milling to minimize the surface roughness for AISI D2 steel. D2 Steel is generally used for stamping or forming dies, punches, forming rolls, knives, slitters, shear blades, tools, scrap choppers, tyre shredders etc. Surface roughness is one of the main indices that determines the quality of machined products and is influenced by various cutting parameters. In machining operations, achieving desired surface quality by optimization of machining parameters, is a challenging job. In case of mating components the surface roughness become more essential and is influenced by the cutting parameters, because, these quality structures are highly correlated and are expected to be influenced directly or indirectly by the direct effect of process parameters or their interactive effects (i.e. on process environment). In this work, the effects of selected process parameters on surface roughness and subsequent setting of parameters with the levels have been accomplished by Taguchi’s parameter design approach. The experiments have been performed as per the combination of levels of different process parameters suggested by L9 orthogonal array. Experimental investigation of the end milling of AISI D2 steel with carbide tool by varying feed, speed and depth of cut and the surface roughness has been measured using surface roughness tester. Analyses of variance have been performed for mean and signal-to-noise ratio to estimate the contribution of the different process parameters on the process.

Keywords: D2 steel, orthogonal array, optimization, surface roughness, Taguchi methodology

Procedia PDF Downloads 544
3750 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 170
3749 Trafficking of Women in Assam: The Untold Violation of Women's Human Rights

Authors: Mridula Devi

Abstract:

Trafficking of women is a slur on human dignity and a shameful act to human civilization and development. Trafficking of women is one of worst brazen abuses which violate the women’s human rights. In India, more particularly in Assam, human trafficking and infringement of human rights of individual includes mainly the women and girl child of the State. Trafficking in North East region of India, more particularly in Assam occurs in two different ways – one is the internal trafficking of women and girl child from conflict affected rural areas of Assam for domestic work and prostitution. Secondly, there is trafficking of women to other south-East Asiatic countries like Bangladesh, Bhutan, Bangkok, Myanmar (Burma) for various purposes such as drug trafficking, labor, bar girl and prostitution.Historically, trafficking in human beings is associated with slavery and bonded or forced labor. Since the period of Roman Civilization, there was the practice of traffic in persons in the form of slave trade among the nations. With the rise of new imperialism, slavery had become an integral part of the colonial system of European Countries. With time, it almost became synonymous with prostitution or commercial sexual exploitation. Finally, the United Nation adopted the Convention for the Suppression of the Traffic in Persons and of the Prostitution of others, 1949 by the G.A.Res.No.-317(iv). The Convention totally denounces the traffic in persons for the purpose of prostitution. However, it is important to note that, now a days trafficking is not confined to commercial sexual exploitation of women and children alone. It has myriad forms and the number of victims has been steadily on the rise over the past few decades. In Assam, it takes place through and for marriage, sexual exploitation, begging, organ trading, militancy conflicts, drug padding and smuggling, labour, adoption, entertainment, and sports. In this paper, empirical methodology has been used. The study is based on primary and secondary sources. Data’s are collected from different books, publications, newspaper, journals etc. For empirical analysis, some random samples are collected and systematized for better result. India suffers from the ignominy of being one of the biggest hubs of women trafficking in the world. Over the years, Assam: the north east part of India has been bearing the brunt of the rapidly rising evil of trafficking of women which threaten the life, dignity and human rights of women. Though different laws are adopted at international and national level to restore trafficking, still the menace of trafficking of women in Assam is not decreased, rather it increased. This causes a serious violation of women’s human right in Assam. Human trafficking or women’s trafficking is a serious crime against society. To curb this in Assam it is required to take some effective and dedicated measure at state level as well as national and international level.

Keywords: Assam, human trafficking, sexual exploitation, India

Procedia PDF Downloads 516
3748 New Technologies in Corporate Finance Management in the Digital Economy: Case of Kyrgyzstan

Authors: Marat Kozhomberdiev

Abstract:

The research will investigate the modern corporate finance management technologies currently used in the era of digitalization of the global economy and the degree to which financial institutions are utilizing these new technologies in the field of corporate finance management in Kyrgyzstan. The main purpose of the research is to reveal the role of financial management technologies as joint service centers, intercompany banks, specialized payment centers in the third-world country. Particularly, the analysis of the implacability of automated corporate finance management systems such as enterprise resource planning system (ERP) and treasury management system (TMS) will be carried out. Moreover, the research will investigate the role of cloud accounting systems in corporate finance management in Kyrgyz banks and whether it has any impact on the field of improving corporate finance management. The study will utilize a data collection process via surveying 3 banks in Kyrgyzstan, namely Mol-Bulak, RSK, and KICB. The banks were chosen based on their ownerships, such as state banks, private banks with local authorized capital, and private bank with international capital. The regression analysis will be utilized to reveal the correlation between the ownership of the bank and the use of new financial management technologies. The research will provide policy recommendations to both private and state banks on developing strategies for switching and utilizing modern corporate finance management technologies in their daily operations.

Keywords: digital economy, corporate finance, digital environment, digital technologies, cloud technologies, financial management

Procedia PDF Downloads 70
3747 Enhancing Urban Sustainability through Integrated Green Spaces: A Focus on Tehran

Authors: Azadeh Mohajer Milani

Abstract:

Urbanization constitutes an irreversible global trend, presenting myriad challenges such as heightened energy consumption, pollution, congestion, and the depletion of natural resources. Today's urban landscapes have emerged as focal points for economic, social, and environmental challenges, underscoring the pressing need for sustainable development. This article delves into the realm of sustainable urban development, concentrating on the pivotal role played by integrated green spaces as an optimal solution to address environmental concerns within cities. The study utilizes Tehran as a case study. Our findings underscore the imperative of preserving and expanding green spaces in urban areas, coupled with the establishment of well-designed ecological networks, to enhance environmental quality and elevate the sustainability of cities. Notably, Tehran's urban green spaces exhibit a disjointed design, lacking a cohesive network to connect various patches and corridors, resulting in significant environmental impacts. The results emphasize the necessity of a balanced and proportional distribution of urban green spaces and the creation of a cohesive patch-corridor-matrix network tailored to the ecological and social needs of residents. This approach is crucial for fostering a more sustainable and livable urban environment for all species, with a specific focus on humans.

Keywords: ecology, sustainable urban development, sustainable landscape, urban green space network

Procedia PDF Downloads 83
3746 Expression of Hypoxia-Inducible Transmembrane Carbonic Anhydrases IX, Ca XII and Glut 1 in Ovarian Cancer

Authors: M. Sunitha, B. Nithyavani, Mathew Yohannan, S. Thiruvieni Balajji, M. A. Rathi, C. Arul Raj, P. Ragavendran, V. K. Gopalkrishnan

Abstract:

Establishment of an early and reliable biomarker for ovarian carcinogenesis whose expression can be monitored through noninvasive techniques will enable early diagnosis of cancer. Carbonic anhydrases (CA) isozymes IX and XII have been suggested to play a role in oncogenic processes. In von Hippel-Lindau (VHL)-defective tumors, the cell surface transmembrane carbonic anhydrase (CA) CA XI and CA XII genes are overexpressed because of the absence of pVHL. These enzymes are involved in causing a hypoxia condition, thereby providing an environment for metastasis. Aberrant expression of the facilitative glucose transporter GLUT I is found in a wide spectrum of epithelial malignancies. Studying the mRNA expression of CA IX, CA XII and Glut I isozymes in ovarian cancer cell lines (OAW-42 and PA-1) revealed the expression of these hypoxia genes. Immunohistochemical staining of carbonic anhydrases was also performed in 40 ovarian cancer tissues. CA IX and CA XII were expressed at 540 bp and 520 bp in OAW42, PA1 in ovarian cancer cell lines. GLUT-1 was expressed at 325bp in OAW 42, PA1 genes in ovarian cancer cell lines. Immunohistochemistry revealed high to moderate levels of expression of these enzymes. The immuostaining was seen predominantly on the cell surface membrane. The study concluded that these genes CA IX, CA XII and Glut I are expressed under hypoxic condition in tumor cells. From the present results expression of CA IX, XII and Glut I may represent potential targets in ovarian cancer therapy.

Keywords: ovarian cancer, carbonic anhydrase IX, XII, Glut I, tumor markers

Procedia PDF Downloads 369
3745 A Hill Town in Nature to Urban Sprawl: Shimla (HP) India

Authors: Minakshi Jain, I. P. Singh

Abstract:

The mountain system makes the one fifth of the world’s landscape and is the home to the 600 million people. Though hills and mountains contain about 10 percent of the total population of the country, yet almost half of the country’s population living in or adjacent to the mountain areas depend directly or indirectly on the resources of the hills. Mountain environments are essential to the survival of the global ecosystems, as they sustain the economy of India through its perennial river system and precious forest wealth. Hill areas, with distinct climate, diverse vegetation and valuable flora & fauna are distinguished primarily by unique eco-system, rich both in bio-diversity and visual resources. These areas have special significance in terms of environment and economy. Still the irony is that these mountain ecosystems are fragile and highly susceptible to disturbance, with a low ability to rebound and heal after damage. Hills are home to endangered species, biological diversity and an essential part of the ecosystem. They are extremely sensitive to any human related development. Natural systems are the most ignored in the hills. The way the cities and towns have encroached them today has the serious repercussions on the climate. Amidst immense resources and constraints of nature, the town had a fantastic diversity of cultural and ethnic characteristics nurtured through ages along river basin and valley strung across the length and breadth of this Himalayan setting.

Keywords: eco-system, bio-diversity, urban sprawl, vernacular landscape

Procedia PDF Downloads 527
3744 Damage to Strawberries Caused by Simulated Transport

Authors: G. La Scalia, M. Enea, R. Micale, O. Corona, L. Settanni

Abstract:

The quality and condition of perishable products delivered to the market and their subsequent selling prices are directly affected by the care taken during harvesting and handling. Mechanical injury, in fact, occurs at all stages, from pre-harvest operations through post-harvest handling, packing and transport to the market. The main implications of this damage are the reduction of the product’s quality and economical losses related to the shelf life diminution. For most perishable products, the shelf life is relatively short and it is typically dictated by microbial growth related to the application of dynamic and static loads during transportation. This paper presents the correlation between vibration levels and microbiological growth on strawberries and woodland strawberries and detects the presence of volatile organic compounds (VOC) in order to develop an intelligent logistic unit capable of monitoring VOCs using a specific sensor system. Fresh fruits were exposed to vibrations by means of a vibrating table in a temperature-controlled environment. Microbiological analyses were conducted on samples, taken at different positions along the column of the crates. The values obtained were compared with control samples not exposed to vibrations and the results show that different positions along the column influence the development of bacteria, yeasts and filamentous fungi.

Keywords: microbiological analysis, shelf life, transport damage, volatile organic compounds

Procedia PDF Downloads 425
3743 Exploring Methods and Strategies for Sustainable Urban Development

Authors: Klio Monokrousou, Maria Giannopoulou

Abstract:

Urban areas, as they have been developed and operate today, are areas of accumulation of a significant amount of people and a large number of activities that generate desires and reasons for traveling. The territorial expansion of the cities as well as the need to preserve the importance of the central city areas lead to the continuous increase of transportation needs which in the limited urban space results in creating serious traffic and operational problems. The modern perception of urban planning is directed towards more holistic approaches and integrated policies that make it economically competitive, socially just and more environmentally friendly. Over the last 25 years, the goal of sustainable transport development has been central to the agenda of any plan or policy for the city. The modern planning of urban space takes into account the economic and social aspects of the city and the importance of the environment to sustainable urban development. In this context, the European Union promotes direct or indirect related interventions according to the cohesion and environmental policies; many countries even had the chance to actually test them. This paper is part of a wider research still in progress and it explores the methods and processes that have been developed towards this direction and presents a review and systematic presentation of this work. The ultimate purpose of this research is to effectively use this review to create a decision making methodological framework which can be the basis of a useful operational tool for sustainable urban planning.

Keywords: methods, sustainable urban development, urban mobility, methodological framework

Procedia PDF Downloads 442
3742 Disclosure on Adherence of the King Code's Audit Committee Guidance: Cluster Analyses to Determine Strengths and Weaknesses

Authors: Philna Coetzee, Clara Msiza

Abstract:

In modern society, audit committees are seen as the custodians of accountability and the conscience of management and the board. But who holds the audit committee accountable for their actions or non-actions and how do we know what they are supposed to be doing and what they are doing? The purpose of this article is to provide greater insight into the latter part of this problem, namely, determine what best practises for audit committees and the disclosure of what is the realities are. In countries where governance is well established, the roles and responsibilities of the audit committee are mostly clearly guided by legislation and/or guidance documents, with countries increasingly providing guidance on this topic. With high cost involved to adhere to governance guidelines, the public (for public organisations) and shareholders (for private organisations) expect to see the value of their ‘investment’. For audit committees, the dividends on the investment should reflect in less fraudulent activities, less corruption, higher efficiency and effectiveness, improved social and environmental impact, and increased profits, to name a few. If this is not the case (which is reflected in the number of fraudulent activities in both the private and the public sector), stakeholders have the right to ask: where was the audit committee? Therefore, the objective of this article is to contribute to the body of knowledge by comparing the adherence of audit committee to best practices guidelines as stipulated in the King Report across public listed companies, national and provincial government departments, state-owned enterprises and local municipalities. After constructs were formed, based on the literature, factor analyses were conducted to reduce the number of variables in each construct. Thereafter, cluster analyses, which is an explorative analysis technique that classifies a set of objects in such a way that objects that are more similar are grouped into the same group, were conducted. The SPSS TwoStep Clustering Component was used, being capable of handling both continuous and categorical variables. In the first step, a pre-clustering procedure clusters the objects into small sub-clusters, after which it clusters these sub-clusters into the desired number of clusters. The cluster analyses were conducted for each construct and the measure, namely the audit opinion as listed in the external audit report, were included. Analysing 228 organisations' information, the results indicate that there is a clear distinction between the four spheres of business that has been included in the analyses, indicating certain strengths and certain weaknesses within each sphere. The results may provide the overseers of audit committees’ insight into where a specific sector’s strengths and weaknesses lie. Audit committee chairs will be able to improve the areas where their audit committee is lacking behind. The strengthening of audit committees should result in an improvement of the accountability of boards, leading to less fraud and corruption.

Keywords: audit committee disclosure, cluster analyses, governance best practices, strengths and weaknesses

Procedia PDF Downloads 167
3741 Soil and Environmental Management Awareness as Professional Competency of the Agricultural Extension Officers for Their Plans Implementation

Authors: Muhammad Zafarullah Khan

Abstract:

Agricultural Extension Officers’ (AEOs) competency level in soil and environmental management awareness is important for interacting with farming communities of different types of soil. Questionnaire was developed for all AEOs for data collection to know the present position and needed position of competency on Likert scale from 01-05 by assigning very low (01) and very high (05). Wide gap was found in competency of suitability of various soil types for horticultural and agronomic crops and reclamation of saline soil. We observed that suitability ranking of various soil types for horticultural crops (Diff. = 1.21), agronomic crops (Diff. = 1.20) and soil borne diseases (Diff. = 1.19) were the top three important competencies where training or improvement is needed. To better fill this gap we recommend that professional qualification of AEOs should be enhanced and training opportunities should be provided to them particularly to deal with soil and environmental management awareness. Thus training opportunities may increase their competency and will add highly skilled manpower to the system for sustainable development to protect environment. It is therefore, recommended that AEOs may be provided pre and in service trainings of soil environmental management in order to equip them with a capacity to work with farming community effectively to boost the living standard of farming community and alleviate poverty for environmental protection.

Keywords: professional competency, agricultural extension officers, soil and environmental management awareness, plans implementation

Procedia PDF Downloads 393
3740 Field Trips inside Digital Game Environments

Authors: Amani Alsaqqaf, Frederick W. B. Li

Abstract:

Field trips are essential methods of learning in different subjects, and in recent times, there has been a reduction in the number of field trips (FTs) across all learning levels around the world. Virtual field trips (VFTs) in game environments provide FT experience based on the experiential learning theory (ELT). A conceptual framework for designing virtual field trip games (VFTGs) is developed with an aim to support game designers and educators to produce an effective FT experience where technology would enhance education. The conceptual framework quantifies ELT as an internal economy to link learning elements to game mechanics such as feedback loops which leads to facilitating VFTGs design and implementation. This study assesses the conceptual framework for designing VFTGs by investigating the possibility of applying immersive VFTGs in a secondary classroom and compare them with traditional learning that uses video clips and PowerPoint slides from the viewpoint of students’ perceived motivation, presence, and learning. The assessment is achieved by evaluating the learning performance and learner experience of a prototype VFT game, Island of Volcanoes. A quasi-experiment was conducted with 60 secondary school students. The findings of this study are that the VFTG enhanced learning performance to a better level than did the traditional way of learning, and in addition, it provided motivation and a general feeling of presence in the VFTG environment.

Keywords: conceptual framework, game-based learning, game design, virtual field trip game

Procedia PDF Downloads 235
3739 Lectures in Higher Education Using Teaching Strategies and Digital Tools to Overcome Challenges Faced in South Africa by Implementing Blended Learning

Authors: Thaiurie Govender, Shannon Verne

Abstract:

The Fourth Industrial Revolution has ushered in an era where technology significantly impacts various aspects of life, including higher education. Blended learning, which combines synchronous and asynchronous learning, has gained popularity as a pedagogical approach. However, its effective implementation is a challenge, particularly in the context of the COVID-19 pandemic and technological obstacles faced in South Africa. This study focused on lecturers' teaching and learning practices to implement blended learning, aiming to understand the teaching and learning strategies used with the integration of digital tools to facilitate the blended learning approach within a private higher educational institution in South Africa. Using heutagogy and constructivism theoretical frameworks, the study aimed to uncover insights into the lecturer’s teaching and learning practices to overcome challenges in designing and facilitating blended learning modules. Through a qualitative analysis, the themes of student engagement, teaching and learning strategies, digital tools, and feedback emerged, highlighting the complexities and opportunities in a blended learning classroom. The findings emphasize the importance of tailoring methods to students' needs and subject matter, aligning with constructivist principles. Recommendations include promoting professional development opportunities, addressing infrastructure issues, and fostering a supportive learning environment.

Keywords: blended learning, digital tools, higher education, teaching strategies

Procedia PDF Downloads 53
3738 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 334
3737 Qualitative and Quantitative Research Methodology Theoretical Framework and Descriptive Theory: PhD Construction Management

Authors: Samuel Quashie

Abstract:

PhDs in Construction Management often designs their methods based on those established in social sciences using theoretical models, to collect, gather and analysis data to answer research questions. Work aim is to apply qualitative and quantitative as a data analysis method, and as part of the theoretical framework - descriptive theory. To improve the ability to replicate the contribution to knowledge the research. Using practical triangulation approach, which covers, interviews and observations, literature review and (archival) document studies, project-based case studies, questionnaires surveys and review of integrated systems used in, construction and construction related industries. The clarification of organisational context and management delivery that influences organizational performance and quality of product and measures are achieved. Results illustrate improved reliability in this research approach when interpreting real world phenomena; cumulative results of research can be applied with confidence under similar environments. Assisted validity of the PhD research outcomes and strengthens the confidence to apply cumulative results of research under similar conditions in the Built Environment research systems, which have been criticised for the lack of reliability in approaches when interpreting real world phenomena.

Keywords: case studies, descriptive theory, theoretical framework, qualitative and quantitative research

Procedia PDF Downloads 386
3736 The Territorial Expression of Religious Identity: A Case Study of Catholic Communities

Authors: Margarida Franca

Abstract:

The influence of the ‘cultural turn’ movement and the consequent deconstruction of scientific thought allowed geography and other social sciences to open or deepen their studies based on the analysis of multiple identities, on singularities, on what is particular or what marks the difference between individuals. In the context of postmodernity, the geography of religion has gained a favorable scientific, thematic and methodological focus for the qualitative and subjective interpretation of various religious identities, sacred places, territories of belonging, religious communities, among others. In the context of ‘late modernity’ or ‘net modernity’, sacred places and the definition of a network of sacred territories allow believers to attain the ‘ontological security’. The integration on a religious group or a local community, particularly a religious community, allows human beings to achieve a sense of belonging, familiarity or solidarity and to overcome, in part, some of the risks or fears that society has discovered. The importance of sacred places comes not only from their inherent characteristics (eg transcendent, mystical and mythical, respect, intimacy and abnegation), but also from the possibility of adding and integrating members of the same community, creating bonds of belonging, reference and individual and collective memory. In addition, the formation of different networks of sacred places, with multiple scales and dimensions, allows the human being to identify and structure his times and spaces of daily life. Thus, each individual, due to his unique identity and life and religious paths, creates his own network of sacred places. The territorial expression of religious identity allows to draw a variable and unique geography of sacred places. Through the case study of the practicing Catholic population in the diocese of Coimbra (Portugal), the aim is to study the territorial expression of the religious identity of the different local communities of this city. Through a survey of six parishes in the city, we sought to identify which factors, qualitative or not, define the different territorial expressions on a local, national and international scale, with emphasis on the socioeconomic profile of the population, the religious path of the believers, the religious group they belong to and the external interferences, religious or not. The analysis of these factors allows us to categorize the communities of the city of Coimbra and, for each typology or category, to identify the specific elements that unite the believers to the sacred places, the networks and religious territories that structure the religious practice and experience and also the non-representational landscape that unifies and creates memory. We conclude that an apparently homogeneous group, the Catholic community, incorporates multitemporalities and multiterritorialities that are necessary to understand the history and geography of a whole country and of the Catholic communities in particular.

Keywords: geography of religion, sacred places, territoriality, Catholic Church

Procedia PDF Downloads 324
3735 Storage Method for Parts from End of Life Vehicles' Dismantling Process According to Sustainable Development Requirements: Polish Case Study

Authors: M. Kosacka, I. Kudelska

Abstract:

Vehicle is one of the most influential and complex product worldwide, which affects people’s life, state of the environment and condition of the economy (all aspects of sustainable development concept) during each stage of lifecycle. With the increase of vehicles’ number, there is growing potential for management of End of Life Vehicle (ELV), which is hazardous waste. From one point of view, the ELV should be managed to ensure risk elimination, but from another point, it should be treated as a source of valuable materials and spare parts. In order to obtain materials and spare parts, there are established recycling networks, which are an example of sustainable policy realization at the national level. The basic object in the polish recycling network is dismantling facility. The output material streams in dismantling stations include waste, which very often generate costs and spare parts, that have the biggest potential for revenues creation. Both outputs are stored into warehouses, according to the law. In accordance to the revenue creation and sustainability potential, it has been placed a strong emphasis on storage process. We present the concept of storage method, which takes into account the specific of the dismantling facility in order to support decision-making process with regard to the principles of sustainable development. The method was developed on the basis of case study of one of the greatest dismantling facility in Poland.

Keywords: dismantling, end of life vehicles, sustainability, storage

Procedia PDF Downloads 270
3734 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 238
3733 In vitro Disaggregation and Dissolution of Four IR Lamotrigine Solid Dosage Forms

Authors: Ilaria Manca, Ilaria Manca, Francesca Pettinau, Ignazia Mocci, Elisabetta M. Usai, Barbara Pittau

Abstract:

Lamotrigine is a phenyltriazine used in the treatment of epilepsy and bipolar disorder type I. The purpose of this study was to test and compare various solid forms of immediate release (IR) lamotrigine products, at different strenghts, in order to study their disaggregation and dissolution behavior. IR products are designed to release their active substance promptly after administration. Concentration of hydrochloric acid in gastric juice is about 0.1-0.001 M, so FDA (Food and Drug Administration) recommends, for lamotrigine regular tablets, dissolution tests in HCl 0.1 M.Toinvestigate the pH dependency of drug release in the entire gastrointestinal tract, we worked at two additional media with different pH values (4.5 and 6.8), that reflect conditions in it. To afford acceptable dissolution rates, tablets must disintegrate. Disaggregation of constituent particles increases the surface area and substantially increases the dissolution rate. For this reason availability of an active substance from tablets depends on its ability to disintegrate fast in dissolution media. pH of gastrointestinal fluid affects drug absorption by conditioning its solubility and dissolution, but also tablet disintegration may be influenced by it. To obtain information about the quantitative relationship between different mixture components, Nuclear Magnetic Resonance (NMR) spectroscopy was used. We also investigate tablet hardness. The investigation carried out confirms pH 1.2 as the ideal environment for the immediate availability of the active substance.

Keywords: dissolution, disaggregation, Lamotrigine, bioequivalence

Procedia PDF Downloads 453
3732 Evaluating Language Loss Effect on Autobiographical Memory by Examining Memory Phenomenology in Bilingual Speakers

Authors: Anastasia Sorokina

Abstract:

Graduate language loss or attrition has been well documented in individuals who migrate and become emersed in a different language environment. This phenomenon of first language (L1) attrition is an example of non-pathological (not due to trauma) and can manifest itself in frequent pauses, search for words, or grammatical errors. While the widely experienced loss of one’s first language might seem harmless, there is convincing evidence from the disciplines of Developmental Psychology, Bilingual Studies, and even Psychotherapy that language plays a crucial role in the memory of self. In fact, we remember, store, and share personal memories with the help of language. Dual-Coding Theory suggests that language memory code deterioration could lead to forgetting. Yet, no one has investigated a possible connection between language loss and memory. The present study aims to address this research gap by examining a corpus of 1,495 memories of Russian-English bilinguals who are on a continuum of L1 (first language) attrition. Since phenomenological properties capture how well a memory is remembered, the following descriptors were selected - vividness, ease of recall, emotional valence, personal significance, and confidence in the event. A series of linear regression statistical analyses were run to examine the possible negative effects of L1 attrition on autobiographical memory. The results revealed that L1 attrition might compromise perceived vividness and confidence in the event, which is indicative of memory deterioration. These findings suggest the importance of heritage language maintenance in immigrant communities who might be forced to assimilate as language loss might negatively affect the memory of self.

Keywords: L1 attrition, autobiographical memory, language loss, memory phenomenology, dual coding

Procedia PDF Downloads 119