Search results for: suction caisson foundation
660 Sustainability of Ecotourism Related Activities in the Town of Yercaud: A Modeling Study
Authors: Manoj Gupta Charan Pushparaj
Abstract:
Tourism related activities are getting popular day by day and tourism has become an integral part of everyone’s life. Ecotourism initiatives have grown enormously in the past decade, and the concept of ecotourism has shown to bring great benefits in terms of environment conservation and to improve the livelihood of local people. However, the potential of ecotourism to sustain improving the livelihood of the local population in the remote future is a topic of active debate. A primary challenge that exists in this regard is the enormous costs of limiting the impacts of tourism related activities on the environment. Here we employed systems modeling approach using computer simulations to determine if ecotourism activities in the small hill town of Yercaud (Tamil Nadu, India) can be sustained over years in improving the livelihood of the local population. Increasing damage to the natural environment as a result of tourism-related activities have plagued the pristine hill station of Yercaud. Though ecotourism efforts can help conserve the environment and enrich local population, questions remain if this can be sustained in the distant future. The vital state variables in the model are the existing tourism foundation (labor, services available to tourists, etc.,) in the town of Yercaud and its natural environment (water, flora and fauna). Another state variable is the textile industry that drives the local economy. Our results would help to understand if environment conservation efforts are sustainable in Yercaud and would also offer suggestions to make it sustainable over the course of several years.Keywords: ecotourism, simulations, modeling, Yercaud
Procedia PDF Downloads 275659 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems
Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu
Abstract:
Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system
Procedia PDF Downloads 297658 Determinants of Travel to Western Countries by Kuwaiti Nationals
Authors: Yvette Reisinger
Abstract:
Relatively little is known about the Arab travel market, especially the outbound travel market from Arab countries in the Middle East. The Kuwaiti travel market is the smallest yet fastest growing in the Gulf Cooperation Council (GCC) region. The Kuwaiti travel market represents a great potential for the international tourism industry. Kuwaiti nationals have a very high spending power due to the Kuwaiti dinar being the highest-valued currency unit in the world. Although Europe, North America, and Asia/Pacific try to attract the Arab tourist market the number of Kuwaiti travellers attracted to these destinations is very low. The success in attracting the Kuwaiti travel market to Western countries must be guided by an analysis of the factors that affect its travel decisions. The objective of the study is to identify major factors that influence Kuwaiti nationals’ intentions to travel to Western countries. A model is developed and empirically tested on a sample of 343 Kuwaiti nationals. A series of regression analyses are run to determine the effects of different factors on Kuwaiti’s travel decisions. A Herman’s single factor test and Durbin-Watson test are used to assess the validity of the regression model. Analysis is controlled for socio-demographics. The results show that the Muslim friendly amenities and destination cognitive image exert significant effects on Kuwaiti nationals’ intentions to travel to Western countries. The study provides a better understanding of the factors that attract Kuwaiti tourists to Western countries. By knowing what encourages Kuwaitis to travel to Western countries marketers can plan and promote these countries accordingly. The study provides a foundation of future empirical research into the Kuwaiti/Arab travel market.Keywords: Kuwaiti travel market, travel decisions, Western countries
Procedia PDF Downloads 192657 Intertextuality in Choreography: Investigation of Text and Movements in Making Choreography
Authors: Muhammad Fairul Azreen Mohd Zahid
Abstract:
Speech, text, and movement intensify aspects of creating choreography by connecting with emotional entanglements, tradition, literature, and other texts. This research focuses on the practice as research that will prioritise the choreography process as an inquiry approach. With the driven context, the study intervenes in critical conjunctions of choreographic theory, bringing together new reflections on the moving body, spaces of action, as well as intertextuality between text and movements in making choreography. Throughout the process, the researcher will introduce the level of deliberation from speech through movements and text to express emotion within a narrative context of an “illocutionary act.” This practice as research will produce a different meaning from the “utterance text” to “utterance movements” in the perspective of speech acts theory by J.L Austin based on fragmented text from “pidato adat” which has been used as opening speech in Randai. Looking at the theory of deconstruction by Jacque Derrida also will give a different meaning from the text. Nevertheless, the process of creating the choreography will also help to lay the basic normative structure implicit in “constative” (statement text/movement) and “performative” (command text/movement). Through this process, the researcher will also look at several methods of using text from two works by Joseph Gonzales, “Becoming King-The Pakyung Revisited” and Crystal Pite's “The Statement,” as references to produce different methods in making choreography. The perspective from the semiotic foundation will support how occurrences within dance discourses as texts through a semiotic lens. The method used in this research is qualitative, which includes an interview and simulation of the concept to get an outcome.Keywords: intertextuality, choreography, speech act, performative, deconstruction
Procedia PDF Downloads 96656 A Concept Analysis of Self-Efficacy for Cancer Pain Management
Authors: Yi-Fung Lin, Yuan-Mei Liao
Abstract:
Background: Pain is common among patients with cancer and is also one of the most disturbing symptoms. As this suffering is subjective, if patients proactively participate in their pain self-management, pain could be alleviated effectively. However, not everyone can carry out self-management very well because human behavior is a product of the cognition process. In this process, we can see that "self-efficacy" plays an essential role in affecting human behaviors. Methods: We used the eight steps of concept analysis proposed by Walker and Avant to clarify the concept of “self-efficacy for cancer pain management.” A comprehensive literature review was conducted for relevant publications that were published during the period of 1977 to 2021. We used several keywords, including self-efficacy, self-management, concept analysis, conceptual framework, and cancer pain, to search the following databases: PubMed, CINAHL, Web of Science, and Embase. Results: We identified three defining attributes for the concept of self-efficacy for cancer pain management, including pain management abilities, confidence, and continuous pain monitoring, and recognized six skills related to pain management abilities: problem-solving, decision-making, resource utilization, forming partnerships between medical professionals and patients, planning actions, and self-regulation. Five antecedents for the concept of self-efficacy for cancer pain management were identified: pain experience, existing cancer pain, pain-related knowledge, a belief in pain management, and physical/mental state. Consequences related to self-efficacy for cancer pain management were achievement of pain self-management, well pain control, satisfying quality of life, and containing motivation. Conclusions: This analysis provides researchers with a clearer understanding of the concept of “self-efficacy for cancer pain management.” The findings presented here provide a foundation for future research and nursing interventions to enhance self-efficacy for cancer pain management.Keywords: cancer pain, concept analysis, self-efficacy, self-management
Procedia PDF Downloads 70655 Evaluating the Implementation of Public Procurement Principles at Tendering Stage: SME Contractors' Perspective
Authors: Charles Poleni Mukumba, Kahilu Kajimo-Shakantu
Abstract:
Purpose: Principles of public procurement are the foundation of good public procurement, representing best practices in delivering public services by the government and its organs. They provide guidance in the public procurement cycle to achieve the best value for public resources. Tendering stage in the procurement cycle is the most critical, as tendering information is made available to bidders. The paper evaluates the implementation of public procurement principles at the tendering stage. Design/Methodology/Approach: The research was conducted by using qualitative methods with 18 SME contractors in Lusaka as the sample. The samples are business owners and managers of purposively selected SME contractors. The collected data was analysed using thematic and content analysis. Findings: The findings indicate inconsistency in accessing information critical for tendering success by bidders. Further, the findings suggest that adjustments to technical specifications are made to suit certain preferred bidders by procuring officials. Research Limitations/Implications: The interviews were limited to SME contractors registered with the national council for construction and involved in public sector construction works in Lusaka, Zambia. Practical Implications: Implementing principles of public procurement at the tendering stage creates equal, open, and fair competition for the bidders in cost terms to deliver standardised and quality works to the public sector. Original/Value: The findings reveal how principles of public procurement play a critical role in enhancing the efficient performance of the procurement cycle at the tendering stage.Keywords: evaluating, implementation, public procurement principles, tendering stage, SME contractors
Procedia PDF Downloads 84654 Arithmetic Operations Based on Double Base Number Systems
Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan
Abstract:
Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm
Procedia PDF Downloads 396653 Modular 3D Environmental Development for Augmented Reality
Authors: Kevin William Taylor
Abstract:
This work used industry-standard practices and technologies as a foundation to explore current and future advancements in modularity for 3D environmental production. Covering environmental generation, and AI-assisted generation, this study investigated how these areas will shape the industries goal to achieve full immersion within augmented reality environments. This study will explore modular environmental construction techniques utilized in large scale 3D productions. This will include the reasoning behind this approach to production, the principles in the successful development, potential pitfalls, and different methodologies for successful implementation of practice in commercial and proprietary interactive engines. A focus will be on the role of the 3D artists in the future of environmental development, requiring adaptability to new approaches, as the field evolves in response to tandem technological advancements. Industry findings and projections theorize how these factors will impact the widespread utilization of augmented reality in daily life. This will continue to inform the direction of technology towards expansive interactive environments. It will change the tools and techniques utilized in the development of environments for game, film, and VFX. This study concludes that this technology will be the cornerstone for the creation of AI-driven AR that is able to fully theme our world, change how we see and engage with one another. This will impact the concept of a virtual self-identity that will be as prevalent as real-world identity. While this progression scares or even threaten some, it is safe to say that we are seeing the beginnings of a technological revolution that will surpass the impact that the smartphone had on modern society.Keywords: virtual reality, augmented reality, training, 3D environments
Procedia PDF Downloads 122652 Ambivalence as Ethical Practice: Methodologies to Address Noise, Bias in Care, and Contact Evaluations
Authors: Anthony Townsend, Robyn Fasser
Abstract:
While complete objectivity is a desirable scientific position from which to conduct a care and contact evaluation (CCE), it is precisely the recognition that we are inherently incapable of operating objectively that is the foundation of ethical practice and skilled assessment. Drawing upon recent research from Daniel Kahneman (2021) on the differences between noise and bias, as well as different inherent biases collectively termed “The Elephant in the Brain” by Kevin Simler and Robin Hanson (2019) from Oxford University, this presentation addresses both the various ways in which our judgments, perceptions and even procedures can be distorted and contaminated while conducting a CCE, but also considers the value of second order cybernetics and the psychodynamic concept of ‘ambivalence’ as a conceptual basis to inform our assessment methodologies to limit such errors or at least better identify them. Both a conceptual framework for ambivalence, our higher-order capacity to allow for the convergence and consideration of multiple emotional experiences and cognitive perceptions to inform our reasoning, and a practical methodology for assessment relying on data triangulation, Bayesian inference and hypothesis testing is presented as a means of promoting ethical practice for health care professionals conducting CCEs. An emphasis on widening awareness and perspective, limiting ‘splitting’, is demonstrated both in how this form of emotional processing plays out in alienating dynamics in families as well as the assessment thereof. In addressing this concept, this presentation aims to illuminate the value of ambivalence as foundational to ethical practice for assessors.Keywords: ambivalence, forensic, psychology, noise, bias, ethics
Procedia PDF Downloads 87651 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 216650 From Transference Love to Self Alienation in the Therapeutic Relationship: A Case Study
Authors: Efi Koutantou
Abstract:
The foundation of successful therapy is the bond between the psychotherapist and the patient, Psychoanalysis would argue. The present study explores lived experiences of a psychotherapeutic relationship in different moments, initial and final with special reference to the transference love developed through the process. The fight between moments of ‘leaving a self’ behind and following ‘lines of flight’ in the process of creating a new subjectivity and ‘becoming-other’ will be explored. Moments between de-territorialisation – surpassing given constraints such as gender, family and religion, kinship bonds - freeing the space in favor of re-territorialisation – creation of oneself creation of oneself will also be analyzed. The generation of new possibilities of being, new ways of self-actualization for this patient will be discussed. The second part of this study will explore the extent to which this ‘transference love’ results for this specific patient to become ‘the discourse of the other’; it is a desideratum whether the patient finally becomes a subject of his/her own through his/her own self-exploration of new possibilities of existence or becomes alienated within the thought of the therapist. The way in which the patient uses or is (ab)used by the transference love in order to experience and undergo alienation from an ‘authority’ which may or may not sacrifice his/her own thought in favor of satisfying the therapist will be investigated. Finally, from an observer’s perspective and from the analysis of the results of this therapeutic relationship, the counter-transference will also be analyzed, in terms of an attempt of the analyst to relive and satisfy his/her own desires through the life of the analysand. The accession and fall of an idealized self will be analyzed, the turn of the transference love into ‘hate’ will conclude this case study through a lived experience in the therapeutic procedure; a relationship which can be called to be a mixture of a real relationship and remnants from a past object relationship.Keywords: alienation, authority, counter-transference, hate, transference love
Procedia PDF Downloads 211649 The Impact of Direct and Indirect Pressure Measuring Systems on the Pressure Mapping for the Medical Compression Garments
Authors: Arash M. Shahidi, Tilak Dias, Gayani K. Nandasiri
Abstract:
While graduated compression is the foundation of treatment and management of many medical complications such as leg ulcer, varicose veins, and lymphedema, monitoring the interface pressure has been conducted using different sensors that operate based on diverse approaches. The variations existed from the pressure readings collected using different interface pressure measurement systems would cause difficulties in taking a decision regarding the compression therapy. It is crucial to acknowledge the differences existing between direct and indirect pressure measurement systems while considering the commercially available systems such as AMI, Picopress and OPM which are under direct measurements systems, and HATRA (BSI), HOSY (RAL-GZ) and FlexiForce which comes under the indirect measurement system. Furthermore, Piezo-resistive sensors (Flexiforce) can measure the changes in resistance corresponding to the applied force on the sensing area. Direct pressure measuring systems are capable of measuring interface pressure on the three-dimensional states, while the indirect pressure measuring systems stretch the fabric in the two-dimensional direction and extrapolate pressure from surface tension measured on the device and neglect the vital factor which is the radius of curvature. In this study, a leg mannequin of known dimensions is selected with a knitted class 3 compression stocking. It has been decided to evaluate the data collected from different available systems (AMI, PicoPress, FlexiForce, and HATRA) and compare the results. The results showed a discrepancy between Hatra, AMI, Picopress, and Flexiforce against the pressure standard used to generate class 3 compression stocking. As predicted a higher pressure value with direct interface measuring systems were monitored against HATRA due to the effect of the radius of curvature.Keywords: AMI, FlexiForce, graduated compression, HATRA, interface pressure, PicoPress
Procedia PDF Downloads 352648 An Introduction to the Current Epistemology of Ethical Philosophy of Islamic Banking
Authors: Mohd Iqbal Malik
Abstract:
Ethical philosophy of Quran pinnacled virtue and economics as the part and parcel of human life. Human beings are to be imagined by the sign of morals. Soul and morality are both among the essences of human personality. Islam lays the foundation of ethics by installation of making a momentous variance between virtue and vice. It suggests for the distribution of wealth in-order to terminate accumulation of economic resources. Quran claims for the ambiguous pavement to attain virtue by saying, ‘Never will you attain the good (reward) until you spend (in the way of Allah) from that which you love. And whatever you spend indeed, Allah knows of it.’ The essence of Quran is to eliminate all the deep-seated approaches through which the wealth of nations is being accumulated within few hands. The paper will study the Quranic Philosophy Of Islamic Economic System. In recent times, to get out of the human resource development mystery of Muslims, Ismail Al-Raji Faruqi led the way in the so-called ‘Islamization’ of knowledge. Rahman and Faruqi formed opposite opinions on this project. Al-Faruqi thought of the Islamization of knowledge in terms of introducing Western learning into received Islamic values and vice versa. This proved to be a mere peripheral treatment of Islamic values in relation to Western knowledge. It is true that out of the programme of Islamization of knowledge arose Islamic universities in many Muslim countries. Yet the academic programmes of these universities were not founded upon a substantive understanding and application of the tawhidi epistemology.Keywords: ethical philosophy, modern Islamic finance, knowledge of finance, Islamic banking
Procedia PDF Downloads 306647 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion
Authors: Rui Liu, Klaus Greve
Abstract:
The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization
Procedia PDF Downloads 288646 Consent, Agency and Abuse: Intimate Partner Violence in the Indian Context: A Primary Study Based on Working Women from Lower Income Groups in Smart Cities across North India
Authors: Shirin Abbas, Sandeep Kumar Dubey
Abstract:
Intimate partner violence (IPV) is one of the most common forms of gender-based violence (GBV) and is classified as discrimination on the basis of gender. Article 2 of the non-binding UN Declaration on the Elimination of Violence against Women (DEVAW). This was adopted in 1993 as the first international pronouncement regarding violence against women, including physical, sexual, and psychological violence in the family (i.e., domestic violence, marital rape, battery, statutory rape, rape by male members of the family, etc.) While crime against women continues unabated, the Indian government has strongly refuted the 2018 study by the Thomson Reuters Foundation categorizing India as a risky country for women due to the high risk of sexual violence and being forced into slave labour, according to a poll of global experts. This paper has explored consent, agency, and abuse through the lens of intimate partner violence among women from lower income groups in smart cities in the state of Uttar Pradesh, India. Using focused mapping, the paper has explored the situation on IPV internationally and studied the status of working women from lower income groups to ascertain if their lot was any different where IPV was concerned to study. The findings of the study also vindicate global reports which rate India as a country unsafe for women, even within marriage.Keywords: consent and agency, domestic violence, gender based violence GBV, intimate partner violence IPV
Procedia PDF Downloads 74645 Stabilization of Spent Engine Oil Contaminated Lateritic Soil Admixed with Cement Kiln Dust for Use as Road Construction Materials
Authors: Johnson Rotimi Oluremi, A. Adedayo Adegbola, A. Samson Adediran, O. Solomon Oladapo
Abstract:
Spent engine oil contains heavy metals and polycyclic aromatic hydrocarbons which contribute to chronic health hazards, poor soil aeration, immobilisation of nutrients and lowering of pH in soil. It affects geotechnical properties of lateritic soil thereby constituting geotechnical and foundation problems. This study is therefore based on the stabilization of spent engine oil (SEO) contaminated lateritic soil using cement kiln dust (CKD) as a mean of restoring it to its pristine state. Geotechnical tests which include sieve analysis, atterberg limit, compaction, California bearing ratio and unconfined compressive strength tests were carried out on the natural, SEO contaminated and CKD stabilized SEO contaminated lateritic soil samples. The natural soil classified as A-2-7 (2) by AASHTO classification and GC according to the Unified Soil Classification System changed to A-4 non-plastic soil due to SEO contaminated even under the influence of CKD it remained unchanged. However, the maximum dry density (MDD) of the SEO contaminated soil increased while the optimum moisture content (OMC) behaved vice versa with the increase in the percentages of CKD. Similarly, the bearing strength of the stabilized SEO contaminated soil measured by California Bearing Ratio (CBR) increased with percentage increment in CKD. In conclusion, spent engine oil has a detrimental effect on the geotechnical properties of the lateritic soil sample but which can be remediated using 10% CKD as a stand alone admixture in stabilizing spent engine oil contaminated soil.Keywords: spent engine oil, lateritic soil, cement kiln dust, stabilization, compaction, unconfined compressive strength
Procedia PDF Downloads 389644 Geotechnical Properties and Compressibility Behavior of Organic Dredged Soils
Authors: Inci Develioglu, Hasan Firat Pulat
Abstract:
Sustainable development is one of the most important topics in today's world, and it is also an important research topic for geoenvironmental engineering. Dredging process is performed to expand the river and port channel, flood control and accessing harbors. Every year large amount of sediment are dredged for these purposes. Dredged marine soils can be reused as filling materials, road and foundation embankments, construction materials and wildlife habitat developments. In this study, geotechnical engineering properties and compressibility behavior of dredged soil obtained from the Izmir Bay were investigated. The samples with four different organic matter contents were obtained and particle size distributions, consistency limits, pH and specific gravity tests were performed. The consolidation tests were conducted to examine organic matter content (OMC) effects on compressibility behavior of dredged soil. This study has shown that the OMC has an important effect on the engineering properties of dredged soils. The liquid and plastic limits increased with increasing OMC. The lowest specific gravity belonged to sample which has the maximum OMC. The specific gravity values ranged between 2.76 and 2.52. The maximum void ratio difference belongs to sample with the highest OMC (De11% = 0.38). As the organic matter content of the samples increases, the change in the void ratio has also increased. The compression index increases with increasing OMC.Keywords: compressibility, consolidation, geotechnical properties, organic matter content, dredged soil
Procedia PDF Downloads 258643 Impact of Television on the Coverage of Lassa Fever Disease in Nigeria
Authors: H. Shola Adeosun, F. Ajoke Adebiyi
Abstract:
This study appraises the impact of television on the coverage of Lassa Fever disease. The objectives of the study are to find out whether television is an effective tool for raising awareness about Lassa fever shapes the perception of members of the public. The research work was based on the theoretical foundation of Agenda – setting and reinforcement theory. Survey research method was adopted in the study to elicit data from the residents of Obafemi Owode Local Government, area of Ogun state. Questionnaire and oral interview were adopted as a tool for data gathering. Simple random sampling techniques were used to draw a sample for this study. Out of filled 400 questionnaires distributed to the respondents. 37 of them were incorrectly filled and returned at the stipulated time. This is about (92.5% Tables, percentages, and figures were used to analyse and interpret the data and hypothesis formulation for this study revealed that Lassa fever diseases with higher media coverage were considered more serious and more representative of a disease and estimated to have lower incidents, than diseases less frequently found in the media. Thus, 92% of the respondents agree that they have access to television coverage of Lassa fever disease led to exaggerated perceptions of personal vulnerability. It, therefore, concludes that there is a need for relevant stakeholders to ensure better community health education and improved housing conditions in southwestern Nigeria, with an emphasis on slum areas and that Nigeria need to focus on the immediate response, while preparing for the future because a society or community is all about the people who inhabit. Therefore every effort must be geared towards their society and survival.Keywords: impact, television, coverage, Lassa fever disease
Procedia PDF Downloads 212642 Islamization of Knowledge with Special Reference to Mohd Kamal Hassan's Perspective
Authors: Abdul Latheef O. Mavukkandy
Abstract:
Islamization of knowledge (IOK) is an intellectual movement emerged in the middle of 1970s to address the threats by modern western civilizational onslaughts. This paper analyzes the discourse of Islamization of knowledge with special reference to the views of Kamal Hassan who prefers an alternative term called 'Islamicization'. First of all the theoretical and practical outlines of IOK movement were presented by Ismail Raji al-Faruqi in his book 'Islamization of Knowledge; General Principles and Work Plan' in 1982. He identified that the educational system in the Muslim world accounted for the decline of Muslim Ummah through de-Islamization and demoralization. So, the need for IOK was an academic challenge to reconstruct the Ummah. Kamal Hassan kept just different view from Ismail Raji al-Faruqi and Muhammed Naquib al-Attas that he coined the terms 'Relevantization and Contextualization'. So, he wanted the 'Islamization of Islamic Revealed Knowledge'. So, he used Islamization of Human Knowledge (IOHK) instead of IOK. As part of this movement, the IOK identified that the textbooks used in Muslim educational institutions systematically keep the students estranged from Islam and its heritage. Furthermore, the modern secular knowledge develops secular attitude devoid of Islamic moral philosophy and the sense of mission in life. Based upon the content analysis of some of the sources, this study found that Islamization of Knowledge is an important movement in Islamic world, but the IOK project is not practicable completely because of the lack of trained teachers and resources. Although, the project resulted in the foundation of some universities and publishing more works, journals and doctoral thesis on different dimensions of Islamization of Knowledge.Keywords: Islamization, Islamicization, releventization, human knowledge
Procedia PDF Downloads 428641 The Basic Teachings of the Buddha
Authors: Bhaddiya Tanchangya
Abstract:
This article discusses the Four Noble Truths, the foundational teachings of Buddhism, and their significance to Buddhist philosophy. The Four Noble Truths are the Noble Truth of Suffering, the Noble Truth of the Cause of Suffering, the Noble Truth of the End of Suffering, and the Noble Truth of the Path Leading to the End of Suffering. The first truth, the Noble Truth of Suffering, explains that suffering or dukkha is an inherent part of existence, including emotional, physical, and existential forms of suffering, including the Five Aggregates, which refer to the five components that make up a sentient being's experience of existence, as they are all conditioned, interdependent, subject to the Three Characteristics of Existence: impermanence, unsatisfactoriness and emptiness. The second truth, the Noble Truth of the Cause of Suffering, states that craving or attachment to the sensory experiences of the Five Aggregates leads to suffering and identifies three types of craving: craving for sensual pleasures, craving for existence, and craving for non-existence. Through the doctrine of Dependent Origination (Paṭiccasamuppāda), the Buddha graphically shows how the entire process of suffering arises and ceases. The third truth, the Noble Truth of the End of Suffering, asserts that there is a way to end suffering and attain a state of liberation called Nibbāna that marks the end of the cycle of birth and death by removing that very craving towards the sensory experiences by cultivating the Noble Eightfold Path. The fourth truth, the Noble Truth of the Path Leading to the End of Suffering, describes the Noble Eightfold Path, a set of guidelines to develop insight and wisdom to overcome craving and attachment and attain liberation from suffering. The article emphasizes that the Four Noble Truths are universal, applicable to all people regardless of culture, background, or beliefs, and form the foundation of Buddhist philosophy and practice.Keywords: four noble truths, impermanence, suffering, not-self-ness, interconnectedness, emptiness, morality, concentration, wisdom, nirvana, happiness
Procedia PDF Downloads 88640 Parental Separation and 'the Best Interests of the Child' at International Law: Guidance for Nation States in the 21st Century
Authors: Cassandra Seery
Abstract:
During the twentieth century, the notion of child rights at the international level began with the League of Nations’ Geneva Declaration of the Rights of the Child 1924, culminating in the development and adoption of the UN Convention on the Rights of the Child (‘the Convention’) in 1989. A key foundation of child rights lies in the development of the ‘best interests of the child’ principle and its subsequent incorporation into domestic legislation across the globe. This principle has become a key concept in child rights protection and has become a widely recognized principle in the protection of child rights. However, despite its status as the primary operating standard in child and family law and its ‘deepening hold in domestic and international instruments’, the meaning of the ‘best interests of the child’ principle has been criticised as open-ended and vague. This paper explores the evolution and development of the principle in the context of parental separation at international law throughout the 21st century and identifies opportunities for the Nation States to further improve legislative responses in associated child protection cases. An extensive review of relevant United Nations documentation (including instruments, resolutions and comments, jurisprudence, reports, guidelines and policies, training materials and so forth) explores: (i) what progress has been made to further develop the principle at the international level with regard to parental separation; and (ii) what developments participating the Nation States should consider as part of future legal and social policy reforms in this space. It will highlight opportunities for improvement and explore the benefit and relevance of international approaches for the Nation States moving forward.Keywords: international human rights, best interests of the child, legal and social policy, child rights
Procedia PDF Downloads 261639 Analysis to the Characterization of Self-Esteem of Students in Eulogio 'Amang' Rodriguez Institute of Science and Technology: A Foundation of Conceptualizing Substantial Plan of Action
Authors: Eriberto R. Astorga Jr., Herbert D. Vertucio, Evelyn M. Polison
Abstract:
This study was conducted in order to determine the analysis with regards to the Characterization of Self-Esteem of EARIST Students according to their origin of self-esteem and low self-esteem as well as its causes. The respondents of this study are three thousand three hundred twenty three (3,323) randomly selected students from eight colleges of EARIST such as Arts and Sciences, Education, Public Administration and Criminology, Business Administration, Hospitality Management, Architecture and Fine Arts, Engineering, and Industrial Technology. A survey was conducted by using a validated questionnaire for information gathering about respondents profile and different factors relating to self-esteem of students such as self-origin, familial and social relationship, financial situation and education. Frequency, percentage, ranking and standards deviation, standard t-test and ANOVA were applied to investigate the differences of the answers of the respondents to the origin of their self-esteem and the reasons for low self-esteem. The results revealed that there are no significant differences in the origin of their self-esteem and the reasons of low esteem as to the eight group of respondent’s. Moreover, most causes of low esteem are caused by hearing a comment or experiencing an incident that has a negative impact student mentally and emotionally, poor health, being bullied, lack of support from family, friends, and job loss, experiencing verbal and sexual abuse and are in a violent relationship, feelings of isolation, divorce, dysfunctional family, death and lack of achievement at work and at school, trying to conform to stereotypes and prove our independence from our parents.Keywords: characterization, plan of action, profile, self-esteem
Procedia PDF Downloads 175638 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention
Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis
Abstract:
The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.Keywords: cybercrime, disinformation, fake news, prevention
Procedia PDF Downloads 142637 Knowledge and Perceptions of Final-year Students towards Pharmacovigilance and Adverse Drug Reaction Reporting at the Faculty of Medical Sciences, Al-Razi University - Sana`a - Yemen
Authors: Nabil A. Albaser
Abstract:
Background: There is a serious problem with adverse drug reactions (ADRs) everywhere, including Yemen. Since it helps with the detection, assessment, reporting and prevention of ADRs, pharmacovigilance (PV) is an essential part of the healthcare system. The unbiased reporting of ADRs remains the foundation of PV. Students majoring in healthcare should acquire the knowledge and skills necessary to conduct PV in a range of clinical settings. The primary objective of this study was to evaluate the understanding and attitudes of final-year Pharmacy, Nursing, and Midwifery students at Al-Razi University in Sana'a, Yemen, regarding PV and ADRs reporting. Methods: The study followed descriptive cross-sectional approach. A validated, self-administered questionnaire with three parts—demographic information, knowledge, and perceptions of Pharmacovigilance was online distributed to final-year Pharmacy, Nursing, and Midwifery students. The questionnaire was given to 175 students; 122 of them responded with a percentage (69.7%). Results: The majority of respondents were male (79.5%). More than the tow-third of the students, 68.9%, were beyond the age of 23. Although the majority of students, 80%, heard about the terms of ADRs and PV, but only 50% and 57.4% of the respondents, respectively, could define the both terms correctly. However, only 11.48 % of them, nevertheless, took a PV course. More than a half of them (56.6%) had a positive perceptions towards pharmacovigilance and ADR reporting and had a moderate degree of knowledge (68.9%). Conclusion: The study demonstrated that the participants lacked sufficient knowledge of pharmacovigilance and ADR reporting. They showed a moderate level of understanding of reporting ADRs as well as a favorable opinion of dealing with and reporting ADRs. Yemen's health care curriculum should include lessons on pharmacovigilance.Keywords: adverse drug reaction reporting, pharmacovigilance, yemen, knowlegde
Procedia PDF Downloads 118636 Proposal for a Monster Village in Namsan Mountain, Seoul: Significance from a Phenomenological Perspective
Authors: Hyuk-Jin Lee
Abstract:
Korea is a country with thousands of years of history, like its neighbors China and Japan. However, compared to China, which is famous for its ancient fantasy novel "Journey to the West", and Japan, which is famous for its monsters, its “monster culture” is not actively used for tourism. The reason is that the culture closest to the present, from the 17th to 20th centuries, was the Joseon Dynasty, when Neo-Confucianism, which suppressed a monster culture, was the strongest. This trend became stronger after Neo-Confucianism became dogmatic in the mid-17th century. However, Korea, which has a history of Taoism for thousands of years, clearly has many literatures on monsters that can be used as tourism resources. The problem is that these data are buried in texts and are unfamiliar even to Koreans. This study examines the possibility of developing them into attractive tourism resources based on the literary records of the so-called 'monsters densely located in Namsan Mountain, located in the center of Seoul' buried in texts from the 16th to early 17th centuries. In particular, we introduce the surprising consistency in the description of the area north of Namsan Mountain in terms of 'feng shui geography', an oriental philosophy, in a contemporary Korean newspaper. Finally, based on the theoretical foundation through the phenomenological classification table of cultural heritage, we examine phenomenologically how important this ‘visualization of imaginary or text-based entities’ is to changes in the perception of specific cultural resources in a society. In addition, we will deeply analyze related cases, including Japan's ninja culture.Keywords: monster culture, Namsan mountain, neo-confucianism, phenomenology, tourism
Procedia PDF Downloads 32635 Evaluation of Prestressed Reinforced Concrete Slab Punching Shear Using Finite Element Method
Authors: Zhi Zhang, Liling Cao, Seyedbabak Momenzadeh, Lisa Davey
Abstract:
Reinforced concrete (RC) flat slab-column systems are commonly used in residential or office buildings, as the flat slab provides efficient clearance resulting in more stories at a given height than regular reinforced concrete beam-slab system. Punching shear of slab-column joints is a critical component of two-way reinforced concrete flat slab design. The unbalanced moment at the joint is transferred via slab moment and shear forces. ACI 318 provides an equation to evaluate the punching shear under the design load. It is important to note that the design code considers gravity and environmental load when considering the design load combinations, while it does not consider the effect from differential foundation settlement, which may be a governing load condition for the slab design. This paper describes how prestressed reinforced concrete slab punching shear is evaluated based on ACI 318 provisions and finite element analysis. A prestressed reinforced concrete slab under differential settlements is studied using the finite element modeling methodology. The punching shear check equation is explained. The methodology to extract data for punching shear check from the finite element model is described and correlated with the corresponding code provisions. The study indicates that the finite element analysis results should be carefully reviewed and processed in order to perform accurate punching shear evaluation. Conclusions are made based on the case studies to help engineers understand the punching shear behavior in prestressed and non-prestressed reinforced concrete slabs.Keywords: differential settlement, finite element model, prestressed reinforced concrete slab, punching shear
Procedia PDF Downloads 130634 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students
Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah
Abstract:
Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.Keywords: obesity, food security, body image, self-esteem
Procedia PDF Downloads 77633 A Research on the Coordinated Development of Chengdu-Chongqing Economic Circle under the Background of New Urbanization
Authors: Deng Tingting
Abstract:
The coordinated and integrated development of regions is an inevitable requirement for China to move towards high-quality, sustainable development. As one of the regions with the best economic foundation and the strongest economic strength in western China, it is a typical area with national importance and strong network connection characteristics in terms of the comprehensive effect of linking the inland hinterland and connecting the western and national urban networks. The integrated development of the Chengdu-Chongqing economic circle is of great strategic significance for the rapid and high-quality development of the western region. In the context of new urbanization, this paper takes 16 urban units within the economic circle as the research object, based on the 5-year panel data of population, regional economy, and spatial construction and development from 2016 to 2020, using the entropy method and Theil index to analyze the three target layers, and cause analysis. The research shows that there are temporal and spatial differences in the Chengdu-Chongqing economic circle, and there are significant differences between the core city and the surrounding cities. Therefore, by reforming and innovating the regional coordinated development mechanism, breaking administrative barriers, and strengthening the "polar nucleus" radiation function to release the driving force for economic development, especially in the gully areas of economic development belts, not only promote the coordinated development of internal regions but also promote the coordinated and sustainable development of the western region and take a high-quality development path.Keywords: Chengdu-Chongqing economic circle, new urbanization, coordinated regional development, Theil Index
Procedia PDF Downloads 117632 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)
Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang
Abstract:
The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.
Procedia PDF Downloads 99631 Studying the Temperature Field of Hypersonic Vehicle Structure with Aero-Thermo-Elasticity Deformation
Authors: Geng Xiangren, Liu Lei, Gui Ye-Wei, Tang Wei, Wang An-ling
Abstract:
The malfunction of thermal protection system (TPS) caused by aerodynamic heating is a latent trouble to aircraft structure safety. Accurately predicting the structure temperature field is quite important for the TPS design of hypersonic vehicle. Since Thornton’s work in 1988, the coupled method of aerodynamic heating and heat transfer has developed rapidly. However, little attention has been paid to the influence of structural deformation on aerodynamic heating and structural temperature field. In the flight, especially the long-endurance flight, the structural deformation, caused by the aerodynamic heating and temperature rise, has a direct impact on the aerodynamic heating and structural temperature field. Thus, the coupled interaction cannot be neglected. In this paper, based on the method of static aero-thermo-elasticity, considering the influence of aero-thermo-elasticity deformation, the aerodynamic heating and heat transfer coupled results of hypersonic vehicle wing model were calculated. The results show that, for the low-curvature region, such as fuselage or center-section wing, structure deformation has little effect on temperature field. However, for the stagnation region with high curvature, the coupled effect is not negligible. Thus, it is quite important for the structure temperature prediction to take into account the effect of elastic deformation. This work has laid a solid foundation for improving the prediction accuracy of the temperature distribution of aircraft structures and the evaluation capacity of structural performance.Keywords: aerothermoelasticity, elastic deformation, structural temperature, multi-field coupling
Procedia PDF Downloads 341