Search results for: returning-oriented programming attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1504

Search results for: returning-oriented programming attacks

334 Synthesis of Highly Stable Near-Infrared FAPbI₃ Perovskite Doped with 5-AVA and Its Applications in NIR Light-Emitting Diodes for Bioimaging

Authors: Nasrud Din, Fawad Saeed, Sajid Hussain, Rai Muhammad Dawood Sultan, Premkumar Sellan, Qasim Khan, Wei Lei

Abstract:

The continuously increasing external quantum efficiencies of Perovskite light-emitting diodes (LEDs) have received significant interest in the scientific community. The need for monitoring and medical diagnostics has experienced a steady growth in recent years, primarily caused by older people and an increasing number of heart attacks, tumors, and cancer disorders among patients. The application of Perovskite near-infrared light-emitting diode (PeNIRLEDs) has exhibited considerable efficacy in bioimaging, particularly in the visualization and examination of blood arteries, blood clots, and tumors. PeNIRLEDs exhibit exciting potential in the field of blood vessel imaging because of their advantageous attributes, including improved depth penetration and less scattering in comparison to visible light. In this study, we synthesized FAPbI₃ Perovskite doped with different concentrations of 5-Aminovaleric acid (5-AVA) 1-6 mg. The incorporation of 5-AVA as a dopant during the FAPbI₃ Perovskite formation influences the FAPbI3 Perovskite’s structural and optical properties, improving its stability, photoluminescence efficiency, and charge transport characteristics. We found a resulting PL emission peak wavelength of 850 nm and bandwidth of 44 nm, along with a calculated quantum yield of 75%. The incorporation of 5-AVA-modified FAPbI₃ Perovskite into LEDs will show promising results, enhancing device efficiency, color purity, and stability. Making it suitable for various medical applications, including subcutaneous deep vein imaging, blood flow visualization, and tumor illumination.

Keywords: perovskite light-emitting diodes, deep vein imaging, blood flow visualization, tumor illumination

Procedia PDF Downloads 47
333 Adequacy of Advanced Earthquake Intensity Measures for Estimation of Damage under Seismic Excitation with Arbitrary Orientation

Authors: Konstantinos G. Kostinakis, Manthos K. Papadopoulos, Asimina M. Athanatopoulou

Abstract:

An important area of research in seismic risk analysis is the evaluation of expected seismic damage of structures under a specific earthquake ground motion. Several conventional intensity measures of ground motion have been used to estimate their damage potential to structures. Yet, none of them was proved to be able to predict adequately the seismic damage of any structural system. Therefore, alternative advanced intensity measures which take into account not only ground motion characteristics but also structural information have been proposed. The adequacy of a number of advanced earthquake intensity measures in prediction of structural damage of 3D R/C buildings under seismic excitation which attacks the building with arbitrary incident angle is investigated in the present paper. To achieve this purpose, a symmetric in plan and an asymmetric 5-story R/C building are studied. The two buildings are subjected to 20 bidirectional earthquake ground motions. The two horizontal accelerograms of each ground motion are applied along horizontal orthogonal axes forming 72 different angles with the structural axes. The response is computed by non-linear time history analysis. The structural damage is expressed in terms of the maximum interstory drift as well as the overall structural damage index. The values of the aforementioned seismic damage measures determined for incident angle 0° as well as their maximum values over all seismic incident angles are correlated with 9 structure-specific ground motion intensity measures. The research identified certain intensity measures which exhibited strong correlation with the seismic damage of the two buildings. However, their adequacy for estimation of the structural damage depends on the response parameter adopted. Furthermore, it was confirmed that the widely used spectral acceleration at the fundamental period of the structure is a good indicator of the expected earthquake damage level.

Keywords: damage indices, non-linear response, seismic excitation angle, structure-specific intensity measures

Procedia PDF Downloads 490
332 Mental Health Stigma: Barriers to Treatment and Participation in Mental Health Care among University Students in Kenya

Authors: Scholastic Nangila Adeli, Francisca Mbutitia Ngithi

Abstract:

Stigma is commonly associated with mental health patients and may act as a barrier to individuals who may seek or engage in treatment services. Stigmatization among university students is common whether they know someone with a mental health problem, or have a good knowledge and experience of mental health issues. The objective of this study was to establish the various barriers that prevent university students who have mental health challenges from seeking treatment and care. The study was a descriptive in nature where 320 respondents helped to establish the barriers to treatment or participation in mental health care among university students. A questionnaire was used to help establish the barriers and attitude towards mental illness among the respondents. Results from this study revealed that mental illnesses are common among university students and they are manifested in different forms like; anxiety and panic attacks, mood and eating disorders, Impulse control leading to gambling, alcohol and drug addictions, anger and depression leading to loneliness. Mental stigma (both social and self) was the major barrier with 62% of the respondents stating that social stigma was worse than self-stigma. This is because of the social discrimination towards the victim of mental challenges. On issues of attitude, 71% of the respondents said that they can never admit that they have a mental issue and would rather secretly seek clinical or psychological help for fear of being discriminated or excluded by peers. This view is informed by the societal belief that people with mental health challenges were dangerous (associating them with criminal behavior) and hard to socialize with or help. From the findings of this study, it is concluded that mental health problems are real among university students in Kenya and it is important for the university environment to minimize or eradicate stigma within the social circles. Stigma can be minimized or eradicated by creating awareness among university students and fostering social inclusion so that the students who have mental health challenges can experience a sense of belonging and acceptance hence build their self-esteem.

Keywords: disorders, impulse control, mental health problems, stigma

Procedia PDF Downloads 257
331 Genuine Domestic Change or Fake Compliance: Political Pervasiveness in the Serbian Media

Authors: Aleksandra Dragojlov

Abstract:

Since the election of Aleksandar Vučić and the Progressives, Serbia has witnessed a slow decline in media freedom, which has been worse than in the 1990s. Although the government adopted a package of three laws in August 2014 to bring the media landscape up to European standards, the implementation of the laws has been limited and marginal, with the progressives engaging in fake compliance. The adoption of the new media strategy for 2020-2025 in 2020 has not led to genuine domestic reform and compliance with EU conditionality. In fact, the EU Commission and journalists’ associations in Serbia have criticised the decline in Serbia’s media freedom citing continued attacks on journalists and indirect political and economic control through advertising and project co-financing, which continue to be features of the Serbian media landscape. In the absence of clear and credible EU conditionality, the decline of media freedom is in the eye of the beholder, where the gap between public engagements with Serbian politicians and the critical stance of progress reports regarding the degradation of the media have enabled Serbian elites to exploit this ambiguity to continue their strategy of fake compliance vis-a-vis rule of law. This study used a mixed methods approach combining both primary and secondary sources with those semi-structured interviews via Zoom, email, and in person with EU and Serbian officials and journalists. Our findings add to the studies where the lack of clear and credible conditionality has allowed Serbia politicians to exploit them in a manner that would suit their own interests, finding new means to retain their control over the media. We argued and concluded that it is this discrepancy between public engagements with Serbia and the progress reports in the area of freedom of expression that has not led to genuine domestic media reforms in Serbia and instead allowed Serbian elites to engage in a strategy of fake and even non-compliance towards media freedom conditionality.

Keywords: media freedom, EU conditionality, Serbia, fake compliance, EU integration, Chapter 23, justice and fundamental rights

Procedia PDF Downloads 89
330 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 106
329 Navigating Government Finance Statistics: Effortless Retrieval and Comparative Analysis through Data Science and Machine Learning

Authors: Kwaku Damoah

Abstract:

This paper presents a methodology and software application (App) designed to empower users in accessing, retrieving, and comparatively exploring data within the hierarchical network framework of the Government Finance Statistics (GFS) system. It explores the ease of navigating the GFS system and identifies the gaps filled by the new methodology and App. The GFS, embodies a complex Hierarchical Network Classification (HNC) structure, encapsulating institutional units, revenues, expenses, assets, liabilities, and economic activities. Navigating this structure demands specialized knowledge, experience, and skill, posing a significant challenge for effective analytics and fiscal policy decision-making. Many professionals encounter difficulties deciphering these classifications, hindering confident utilization of the system. This accessibility barrier obstructs a vast number of professionals, students, policymakers, and the public from leveraging the abundant data and information within the GFS. Leveraging R programming language, Data Science Analytics and Machine Learning, an efficient methodology enabling users to access, navigate, and conduct exploratory comparisons was developed. The machine learning Fiscal Analytics App (FLOWZZ) democratizes access to advanced analytics through its user-friendly interface, breaking down expertise barriers.

Keywords: data science, data wrangling, drilldown analytics, government finance statistics, hierarchical network classification, machine learning, web application.

Procedia PDF Downloads 61
328 Assessment of Korea's Natural Gas Portfolio Considering Panama Canal Expansion

Authors: Juhan Kim, Jinsoo Kim

Abstract:

South Korea cannot import natural gas in any form other than LNG because of the division of South and North Korea. Further, the high proportion of natural gas in the national energy mix makes this resource crucial for energy security in Korea. Expansion of Panama Canal will allow for reducing the cost of shipping between the Far East and U.S East. Panama Canal expansion can have significant impacts on South Korea. Due to this situation, we review the natural gas optimal portfolio by considering the uniqueness of the Korean Natural gas market and expansion of Panama Canal. In order to assess Korea’s natural gas optimal portfolio, we developed natural gas portfolio model. The model comprises two steps. First, to obtain the optimal long-term spot contract ratio, the study examines the price level and the correlation between spot and long-term contracts by using the Markowitz, portfolio model. The optimal long-term spot contract ratio follows the efficient frontier of the cost/risk level related to this price level and degree of correlation. Second, by applying the obtained long-term contract purchase ratio as the constraint in the linear programming portfolio model, we determined the natural gas optimal import portfolio that minimizes total intangible and tangible costs. Using this model, we derived the optimal natural gas portfolio considering the expansion of Panama Canal. Based on these results, we assess the portfolio for natural gas import to Korea from the perspective of energy security and present some relevant policy proposals.

Keywords: natural gas, Panama Canal, portfolio analysis, South Korea

Procedia PDF Downloads 285
327 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 291
326 Non-Convex Multi Objective Economic Dispatch Using Ramp Rate Biogeography Based Optimization

Authors: Susanta Kumar Gachhayat, S. K. Dash

Abstract:

Multi objective non-convex economic dispatch problems of a thermal power plant are of grave concern for deciding the cost of generation and reduction of emission level for diminishing the global warming level for improving green-house effect. This paper deals with ramp rate constraints for achieving better inequality constraints so as to incorporate valve point loading for cost of generation in thermal power plant through ramp rate biogeography based optimization involving mutation and migration. Through 50 out of 100 trials, the cost function and emission objective function were found to have outperformed other classical methods such as lambda iteration method, quadratic programming method and many heuristic methods like particle swarm optimization method, weight improved particle swarm optimization method, constriction factor based particle swarm optimization method, moderate random particle swarm optimization method etc. Ramp rate biogeography based optimization applications prove quite advantageous in solving non convex multi objective economic dispatch problems subjected to nonlinear loads that pollute the source giving rise to third harmonic distortions and other such disturbances.

Keywords: economic load dispatch, ELD, biogeography-based optimization, BBO, ramp rate biogeography-based optimization, RRBBO, valve-point loading, VPL

Procedia PDF Downloads 374
325 Configuration as a Service in Multi-Tenant Enterprise Resource Planning System

Authors: Mona Misfer Alshardan, Djamal Ziani

Abstract:

Enterprise resource planning (ERP) systems are the organizations tickets to the global market. With the implementation of ERP, organizations can manage and coordinate all functions, processes, resources and data from different departments by a single software. However, many organizations consider the cost of traditional ERP to be expensive and look for alternative affordable solutions within their budget. One of these alternative solutions is providing ERP over a software as a service (SaaS) model. This alternative could be considered as a cost effective solution compared to the traditional ERP system. A key feature of any SaaS system is the multi-tenancy architecture where multiple customers (tenants) share the system software. However, different organizations have different requirements. Thus, the SaaS developers accommodate each tenant’s unique requirements by allowing tenant-level customization or configuration. While customization requires source code changes and in most cases a programming experience, the configuration process allows users to change many features within a predefined scope in an easy and controlled manner. The literature provides many techniques to accomplish the configuration process in different SaaS systems. However, the nature and complexity of SaaS ERP needs more attention to the details regarding the configuration process which is merely described in previous researches. Thus, this research is built on strong knowledge regarding the configuration in SaaS to define specifically the configuration borders in SaaS ERP and to design a configuration service with the consideration of the different configuration aspects. The proposed architecture will ensure the easiness of the configuration process by using wizard technology. Also, the privacy and performance are guaranteed by adopting the databases isolation technique.

Keywords: configuration, software as a service, multi-tenancy, ERP

Procedia PDF Downloads 390
324 A Convolutional Neural Network-Based Model for Lassa fever Virus Prediction Using Patient Blood Smear Image

Authors: A. M. John-Otumu, M. M. Rahman, M. C. Onuoha, E. P. Ojonugwa

Abstract:

A Convolutional Neural Network (CNN) model for predicting Lassa fever was built using Python 3.8.0 programming language, alongside Keras 2.2.4 and TensorFlow 2.6.1 libraries as the development environment in order to reduce the current high risk of Lassa fever in West Africa, particularly in Nigeria. The study was prompted by some major flaws in existing conventional laboratory equipment for diagnosing Lassa fever (RT-PCR), as well as flaws in AI-based techniques that have been used for probing and prognosis of Lassa fever based on literature. There were 15,679 blood smear microscopic image datasets collected in total. The proposed model was trained on 70% of the dataset and tested on 30% of the microscopic images in avoid overfitting. A 3x3x3 convolution filter was also used in the proposed system to extract features from microscopic images. The proposed CNN-based model had a recall value of 96%, a precision value of 93%, an F1 score of 95%, and an accuracy of 94% in predicting and accurately classifying the images into clean or infected samples. Based on empirical evidence from the results of the literature consulted, the proposed model outperformed other existing AI-based techniques evaluated. If properly deployed, the model will assist physicians, medical laboratory scientists, and patients in making accurate diagnoses for Lassa fever cases, allowing the mortality rate due to the Lassa fever virus to be reduced through sound decision-making.

Keywords: artificial intelligence, ANN, blood smear, CNN, deep learning, Lassa fever

Procedia PDF Downloads 110
323 Comparative Study and Parallel Implementation of Stochastic Models for Pricing of European Options Portfolios using Monte Carlo Methods

Authors: Vinayak Bassi, Rajpreet Singh

Abstract:

Over the years, with the emergence of sophisticated computers and algorithms, finance has been quantified using computational prowess. Asset valuation has been one of the key components of quantitative finance. In fact, it has become one of the embryonic steps in determining risk related to a portfolio, the main goal of quantitative finance. This study comprises a drawing comparison between valuation output generated by two stochastic dynamic models, namely Black-Scholes and Dupire’s bi-dimensionality model. Both of these models are formulated for computing the valuation function for a portfolio of European options using Monte Carlo simulation methods. Although Monte Carlo algorithms have a slower convergence rate than calculus-based simulation techniques (like FDM), they work quite effectively over high-dimensional dynamic models. A fidelity gap is analyzed between the static (historical) and stochastic inputs for a sample portfolio of underlying assets. In order to enhance the performance efficiency of the model, the study emphasized the use of variable reduction methods and customizing random number generators to implement parallelization. An attempt has been made to further implement the Dupire’s model on a GPU to achieve higher computational performance. Furthermore, ideas have been discussed around the performance enhancement and bottleneck identification related to the implementation of options-pricing models on GPUs.

Keywords: monte carlo, stochastic models, computational finance, parallel programming, scientific computing

Procedia PDF Downloads 156
322 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 110
321 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: Abdur Raheem, Ado Yakub

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the north eastern parts have ignited violence, bloodshed, refuge exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of these social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for prompt response, encourage community and neighbourhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, property market, economy, resources, north-eastern Nigeria

Procedia PDF Downloads 319
320 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 110
319 Prenatal Lead Exposure and Postpartum Depression: An Exploratory Study of Women in Mexico

Authors: Nia McRae, Robert Wright, Ghalib Bello

Abstract:

Introduction: Postpartum depression is a prevalent mood disorder that is detrimental to the mental and physical health of mothers and their newborns. Lead (Pb) is a toxic metal that is associated with hormonal imbalance and mental impairments. The hormone changes that accompany pregnancy and childbirth may be exacerbated by Pb and increase new mothers’ susceptibility to postpartum depression. To the best of the author’s knowledge, this is the only study that investigates the association between prenatal Pb exposure and postpartum depression. Identifying risk factors can contribute to improved prevention and treatment strategies for postpartum depression. Methods: Data was derived from the Programming Research in Obesity, Growth, Environment and Social Stress (PROGRESS) study which is an ongoing longitudinal birth cohort. Postpartum depression was identified by a score of 13 or above on the 10-Item Edinburg Postnatal Depression Scale (EPDS) 6-months and 12-months postpartum. Pb was measured in the blood (BPb) in the second and third trimester and in the tibia and patella 1-month postpartum. Quantile regression models were used to assess the relationship between BPb and postpartum depression. Results: BPb in the second trimester was negatively associated with the 80th percentile of depression 6-months postpartum (β: -0.26; 95% CI: -0.51, -0.01). No significant association was found between BPb in the third trimester and depression 6-months postpartum. BPb in the third trimester exhibited an inverse relationship with the 60th percentile (β: -0.23; 95% CI: -0.41, -0.06), 70th percentile (β: -0.31; 95% CI: -0.52, -0.10), and 90th percentile of depression 12-months postpartum (β: -0.36; 95% CI: -0.69, -0.03). There was no significant association between BPb in the second trimester and depression 12-months postpartum. Bone Pb concentrations were not significantly associated with postpartum depression. Conclusion: The negative association between BPb and postpartum depression may support research which demonstrates lead is a nontherapeutic stimulant. Further research is needed to verify these results and identify effect modifiers.

Keywords: depression, lead, postpartum, prenatal

Procedia PDF Downloads 220
318 Community, Identity, and Resistance in Minority Literature: Arab American Poets - Samuel Hazo, Nathalie Handal, and Naomi Shihab Nye

Authors: Reem Saad Alqahtani

Abstract:

Drawing on minority literature, this research highlights the role of three contemporary Arab American writers, considering the significance of the historical and cultural contexts of the brutal attacks of 9/11. The focus of the research is to draw attention to the poetry of Samuel Hazo, Nathalie Handal, and Naomi Shihab Nye as representatives of the identity crisis, whose experiences left them feeling marginalized and alienated in both societies, and reflected as one of the ethnic American minority groups, as demonstrated in their poetry, with a special focus on hybridity, resistance, identity, and empowerment. The study explores the writers’ post-9/11 experience, affected by the United States’ long history of marginalization and discrimination against people of colour, placing Arab American literature with that of other ethnic American groups who share the same experience and contribute to composing literature characterized by the aesthetics of cultural hybridity, cultural complexity, and the politics of minorities to promote solidarity and coalition building. Indeed, the three selected Arab American writers have found a link between their narration and the identity of the exiled by establishing an identity that is a kind of synthesis of diverse identities of Western reality and Eastern nostalgia. The approaches applied in this study will include historical/biographical, postcolonial, and discourse analysis. The first will be used to emphasize the influence of the biographical aspects related to the community, identity, and resistance of the three poets on their poetry. The second is used to investigate the effects of postcolonialism on the poets and their responses to it, while the third understand the sociocultural, political, and historical dimensions of the texts, establishing these poets as representative of the Arab American experience. This study is significant because it will help shed light on the importance of the Arabic hybrid identity in creating resistance to minority communities within American society.

Keywords: Arab American, identity, hybridity, post-9/11

Procedia PDF Downloads 164
317 Enhancement of Aircraft Longitudinal Stability Using Tubercles

Authors: Muhammad Umer, Aishwariya Giri, Umaiyma Rakha

Abstract:

Mimicked from the humpback whale flippers, the application of tubercle technology is seen to be particularly advantageous at high angles of attack. This particular advantage is of paramount importance when it comes to structures producing lift at high angles of attack. This characteristic of the technology makes it ideal for horizontal stabilizers and selecting the same as the subject of study to identify and exploit the advantage highlighted by researchers on airfoils, this project aims in establishing a foundation for the application of the bio-mimicked technology on an existing aircraft. Using a baseline and 2 tubercle configuration integrated models, the project targets to achieve the twin aim of highlighting the possibility and merits over the base model and also choosing the right configuration in providing the best characteristic suitable for high angles of attack. To facilitate this study, the required models are generated using Solidworks followed by trials in a virtual aerodynamic environment using Fluent in Ansys for resolving the project objectives. Following a structured plan, the aim is to initially identify the advantages mathematically and then selecting the optimal configuration, simulate the end configuration at angles mimicking the actual operation envelope for the particular structure. Upon simulating the baseline configuration at various angles of attack, the stall angle was determined to be 22 degrees. Thus, the tubercle configurations will be simulated and compared at 4 different angles of attacks: 0, 10, 20, and 24. Further, after providing the optimum configuration of horizontal stabilizers, this study aims at the integration of aircraft structure so that the results better imply the end deliverables of real life application. This draws the project scope closer at this point into longitudinal static stability considerations and improvements in the manoeuvrability characteristics. The objective of the study is to achieve a complete overview ready for real life application with marked benefits obtainable from bio morphing of the tubercle technology.

Keywords: flow simulation, horizontal stabilizer, stability enhancement, tubercle

Procedia PDF Downloads 314
316 Synthesis and Characterization of Cobalt Oxide and Cu-Doped Cobalt Oxide as Photocatalyst for Model Dye Degradation

Authors: Vrinda P. S. Borker

Abstract:

Major water pollutants are dyes from effluents of industries. Different methods have been tried to degrade or treat the effluent before it is left to the environment. In order to understand the degradation process and later apply it to effluents, solar degradation study of methylene blue (MB) and methyl red (MR), the model dyes was carried out in the presence of photo-catalysts, the oxides of cobalt oxide Co₃O₄, and copper doped cobalt oxides (Co₀.₉Cu₀.₁)₃O₄ and (Co₀.₉₅Cu₀.₀₅)₃O₄. They were prepared from oxalate complex and hydrazinated oxalate complex of cobalt as well as mix metals, copper, and cobalt. The complexes were synthesized and characterized by FTIR. Complexes were decomposed to form oxides and were characterized by XRD. They were found to be monophasic. Solar degradation of MR and MB was carried out in presence of these oxides in acidic and basic medium. Degradation was faster in alkaline medium in the presence of Co₃O₄ obtained from hydrazinated oxalate. Doping of nanomaterial oxides modifies their characteristics. Doped cobalt oxides are found to photo-decolourise MR in alkaline media efficiently. In the absence of photocatalyst, solar degradation of alkaline MR does not occur. In acidic medium, MR is minimally decolorized even in the presence of photocatalysts. The industrial textile effluent contains chemicals like NaCl and Na₂CO₃ along with the unabsorbed dye. It is reported that these two chemicals hamper the degradation of dye. The chemicals like K₂S₂O₈ and H₂O₂ are reported to enhance degradation. The solar degradation study of MB in presence of photocatalyst (Co₀.₉Cu₀.₁)₃O₄ and these four chemicals reveals that presence of K₂S₂O₈ and H₂O₂ enhances degradation. It proves that H₂O₂ generates hydroxyl ions required for degradation of dye and the sulphate anion radical being strong oxidant attacks dye molecules leading to its fragmentation rapidly. Thus addition of K₂S₂O₈ and H₂O₂ during solar degradation in presence of (Co₀.₉Cu₀.₁)₃O₄ helps to break the organic moiety efficiently.

Keywords: cobalt oxides, Cu-doped cobalt oxides, H₂O₂ in dye degradation, photo-catalyst, solar dye degradation

Procedia PDF Downloads 171
315 The Relevance of Bioinspired Architecture and Programmable Materials for Development of 4D Printing

Authors: Daniela Ribeiro, Silvia Lenyra Meirelles Campos Titotto

Abstract:

Nature has long served as inspiration for humans, since various technologies present in society are a mirror of the natural world. This is due to the fact that nature has adapted for millions of years to possess the characteristics they have today. In this sense, man takes advantage of this situation and uses it to produce his own objects and solve his problems. This concept, which is known as biomimetics, is something relatively new, once it was only denominated in 1957. Nature, in turn, responds directly and consistently to environmental conditions. For example, plants that have touch sensitivity contract with this stimulus. Such a situation resembles a technology that has been gaining ground in the contemporary world of scientific innovation: 4D printing. 4D printing technology emerged in 2012 as a complement to 3D printing and presents numerous benefits since it provides a deficiency in the second kind of printing mentioned. This type of technology reaches several areas, since it is capable of producing materials that change over time, be it in its composition, form or properties and is such a characteristic that determines the additional dimension of the material. Precisely because of these factors, this type of impression resembles nature and is related to biomimetics. However, only certain types of ‘intelligent’ materials are generally employed in this type of impression, since only they will respond well to such stimuli, one of which is the hydrogel. The hydrogel is a biocompatible polymer that presents several applications, these in turn will be briefly mentioned in this article to exemplify its importance and the reason for choosing this material as object of study. In addition, aspects that configure 4D printing will be treated here, such as the importance of architecture, programming language and the reversibility of printed materials.

Keywords: 4D printing, biomimetic, hydrogel, materials

Procedia PDF Downloads 164
314 Modeling Operating Theater Scheduling and Configuration: An Integrated Model in Health-Care Logistics

Authors: Sina Keyhanian, Abbas Ahmadi, Behrooz Karimi

Abstract:

We present a multi-objective binary programming model which considers surgical cases are scheduling among operating rooms and the configuration of surgical instruments in limited capacity hospital trays, simultaneously. Many mathematical models have been developed previously in the literature addressing different challenges in health-care logistics such as assigning operating rooms, leveling beds, etc. But what happens inside the operating rooms along with the inventory management of required instruments for various operations, and also their integration with surgical scheduling have been poorly discussed. Our model considers the minimization of movements between trays during a surgery which recalls the famous cell formation problem in group technology. This assumption can also provide a major potential contribution to robotic surgeries. The tray configuration problem which consumes surgical instruments requirement plan (SIRP) and sequence of surgical procedures based on required instruments (SIRO) is nested inside the bin packing problem. This modeling approach helps us understand that most of the same-output solutions will not be necessarily identical when it comes to the rearrangement of surgeries among rooms. A numerical example has been dealt with via a proposed nested simulated annealing (SA) optimization approach which provides insights about how various configurations inside a solution can alter the optimal condition.

Keywords: health-care logistics, hospital tray configuration, off-line bin packing, simulated annealing optimization, surgical case scheduling

Procedia PDF Downloads 275
313 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 34
312 An Application of Integrated Multi-Objective Particles Swarm Optimization and Genetic Algorithm Metaheuristic through Fuzzy Logic for Optimization of Vehicle Routing Problems in Sugar Industry

Authors: Mukhtiar Singh, Sumeet Nagar

Abstract:

Vehicle routing problem (VRP) is a combinatorial optimization and nonlinear programming problem aiming to optimize decisions regarding given set of routes for a fleet of vehicles in order to provide cost-effective and efficient delivery of both services and goods to the intended customers. This paper proposes the application of integrated particle swarm optimization (PSO) and genetic optimization algorithm (GA) to address the Vehicle routing problem in sugarcane industry in India. Suger industry is very prominent agro-based industry in India due to its impacts on rural livelihood and estimated to be employing around 5 lakhs workers directly in sugar mills. Due to various inadequacies, inefficiencies and inappropriateness associated with the current vehicle routing model it costs huge money loss to the industry which needs to be addressed in proper context. The proposed algorithm utilizes the crossover operation that originally appears in genetic algorithm (GA) to improve its flexibility and manipulation more readily and avoid being trapped in local optimum, and simultaneously for improving the convergence speed of the algorithm, level set theory is also added to it. We employ the hybrid approach to an example of VRP and compare its result with those generated by PSO, GA, and parallel PSO algorithms. The experimental comparison results indicate that the performance of hybrid algorithm is superior to others, and it will become an effective approach for solving discrete combinatory problems.

Keywords: fuzzy logic, genetic algorithm, particle swarm optimization, vehicle routing problem

Procedia PDF Downloads 390
311 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 54
310 Non-State Actors and Their Liabilities in International Armed Conflicts

Authors: Shivam Dwivedi, Saumya Kapoor

Abstract:

The Israeli Supreme Court in Public Committee against Torture in Israel v. Government of Israel observed the presence of non-state actors in cross-border terrorist activities thereby making the role of non-state actors in terrorism the center of discussion under the scope of International Humanitarian Law. Non-state actors and their role in a conflict have also been traversed upon by the Tadic case decided by the International Criminal Tribunal for the former Yugoslavia. However, there still are lacunae in International Humanitarian Law when it comes to determining the nature of a conflict, especially when non-state groups act within the ambit of various states, for example, Taliban in Afghanistan or the groups operating in Ukraine and Georgia. Thus, the objective of writing this paper would be to observe the ways by which non-state actors particularly terrorist organizations could be brought under the ambit of Additional Protocol I. Additional Protocol I is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of international conflicts which basically outlaws indiscriminate attacks on civilian populations, forbids conscription of children and preserves various other human rights during the war. In general, the Additional Protocol I reaffirms the provisions of the original four Geneva Conventions. Since provisions of Additional Protocol I apply only to cases pertaining to International Armed Conflicts, the answer to the problem should lie in including the scope for ‘transnational armed conflict’ in the already existing definition of ‘International Armed Conflict’ within Common Article 2 of the Geneva Conventions. This would broaden the applicability of the provisions in cases of non-state groups and render an international character to the conflict. Also, the non-state groups operating or appearing to operate should be determined by the test laid down in the Nicaragua case by the International Court of Justice and not under the Tadic case decided by the International Criminal Tribunal for Former Yugoslavia in order to provide a comprehensive system to deal with such groups. The result of the above proposal, therefore, would enhance the scope of the application of International Humanitarian Law to non-state groups and individuals.

Keywords: Geneva Conventions, International Armed Conflict, International Humanitarian Law, non-state actors

Procedia PDF Downloads 373
309 Bi-Criteria Vehicle Routing Problem for Possibility Environment

Authors: Bezhan Ghvaberidze

Abstract:

A multiple criteria optimization approach for the solution of the Fuzzy Vehicle Routing Problem (FVRP) is proposed. For the possibility environment the levels of movements between customers are calculated by the constructed simulation interactive algorithm. The first criterion of the bi-criteria optimization problem - minimization of the expectation of total fuzzy travel time on closed routes is constructed for the FVRP. A new, second criterion – maximization of feasibility of movement on the closed routes is constructed by the Choquet finite averaging operator. The FVRP is reduced to the bi-criteria partitioning problem for the so called “promising” routes which were selected from the all admissible closed routes. The convenient selection of the “promising” routes allows us to solve the reduced problem in the real-time computing. For the numerical solution of the bi-criteria partitioning problem the -constraint approach is used. An exact algorithm is implemented based on D. Knuth’s Dancing Links technique and the algorithm DLX. The Main objective was to present the new approach for FVRP, when there are some difficulties while moving on the roads. This approach is called FVRP for extreme conditions (FVRP-EC) on the roads. Also, the aim of this paper was to construct the solving model of the constructed FVRP. Results are illustrated on the numerical example where all Pareto-optimal solutions are found. Also, an approach for more complex model FVRP with time windows was developed. A numerical example is presented in which optimal routes are constructed for extreme conditions on the roads.

Keywords: combinatorial optimization, Fuzzy Vehicle routing problem, multiple objective programming, possibility theory

Procedia PDF Downloads 477
308 Argumentation Frameworks and Theories of Judging

Authors: Sonia Anand Knowlton

Abstract:

With the rise of artificial intelligence, computer science is becoming increasingly integrated in virtually every area of life. Of course, the law is no exception. Through argumentation frameworks (AFs), computer scientists have used abstract algebra to structure the legal reasoning process in a way that allows conclusions to be drawn from a formalized system of arguments. In AFs, arguments compete against each other for logical success and are related to one another through the binary operation of the attack. The prevailing arguments make up the preferred extension of the given argumentation framework, telling us what set of arguments must be accepted from a logical standpoint. There have been several developments of AFs since its original conception in the early 90’s in efforts to make them more aligned with the human reasoning process. Generally, these developments have sought to add nuance to the factors that influence the logical success of competing arguments (e.g., giving an argument more logical strength based on the underlying value it promotes). The most cogent development was that of the Extended Argumentation Framework (EAF), in which attacks can themselves be attacked by other arguments, and the promotion of different competing values can be formalized within the system. This article applies the logical structure of EAFs to current theoretical understandings of judicial reasoning to contribute to theories of judging and to the evolution of AFs simultaneously. The argument is that the main limitation of EAFs, when applied to judicial reasoning, is that they require judges to themselves assign values to different arguments and then lexically order these values to determine the given framework’s preferred extension. Drawing on John Rawls’ Theory of Justice, the examination that follows is whether values are lexical and commensurable to this extent. The analysis that follows then suggests a potential extension of the EAF system with an approach that formalizes different “planes of attack” for competing arguments that promote lexically ordered values. This article concludes with a summary of how these insights contribute to theories of judging and of legal reasoning more broadly, specifically in indeterminate cases where judges must turn to value-based approaches.

Keywords: computer science, mathematics, law, legal theory, judging

Procedia PDF Downloads 57
307 A Systematic Mapping of the Use of Information and Communication Technology (ICT)-Based Remote Agricultural Extension for Women Smallholders

Authors: Busiswa Madikazi

Abstract:

This systematic mapping study explores the underrepresentation of women's contributions to farming in the Global South within the development of Information and Communication Technologies (ICT)-based extension methods. Despite women farmers constituting 70% of the agricultural labour force, their productivity is hindered by various constraints, including illiteracy, household commitments, and limited access to credit and markets. A systematic mapping approach was employed with the aim of identifying evidence gaps in existing ICT extension for women farmers. The data collection protocol follows a structured approach, incorporating key criteria for inclusion, exclusion, search strategy, and coding and the PICO strategy (Population, Intervention, Comparator, and Outcome). The results yielded 119 articles that qualified for inclusion. The findings highlight that mobile phone apps (WhatsApp) and radio/television programming are the primary extension methods employed while integrating ICT with training, field visits, and demonstrations are underutilized. Notably, the study emphasizes the inadequate attention to critical issues such as food security, gender equality, and attracting youth to farming within ICT extension efforts. These findings indicate a significant policy and practice gap, neglecting community-driven approaches that cater to women's specific needs and enhance their agricultural production. Map highlights the importance of refocusing ICT extension efforts to address women farmers’ unique challenges, thereby contributing to their empowerment and improving agricultural practices.

Keywords: agricultural extension, ICT, women farmers, smallholders

Procedia PDF Downloads 60
306 A Model for Helicopter Routing Problem

Authors: Aydin Sipahioglu, Gokhan Celik

Abstract:

Helicopter routing problem (HRP) is finding good tours for helicopter so as to pick up and deliver personnel or material among specified nodes, mutually. It can be encountered in case of being lots of supply and demand points for different commodities and requiring delivering commodities with helicopter. For instance, to deliver personnel or material from shore to oil rig is a good example. In fact, HRP is a branch of vehicle routing problem with pickup and delivery (VRPPD). However, it has additional constraints such that fuel capacity, performance of helicopter in different altitude and temperature, and the number of maximum takeoff and landing allowed. This kind of pickup and delivery problems can be classified into 3 groups, basically. 1-1 (one to one), M-M (many to many) and 1-M-1 (one to many to one). 1-1 means each commodity has only one supply and one demand point. M-M means there can be more than one supply and demand points for each kind of commodity. 1-M-1 means commodities at depot are delivered to demand points and commodities at customers are delivered to depot. In this case helicopter takes off from its own base, complete its tour and return to its own base. In this study, we define 1-M-M-1 type HRP. That means helicopter takes off from its home base, deliver commodities among the nodes as well as between depot and customers and return to its home base. These problems have NP-hard nature. Therefore, obtaining a good solution in a reasonable time is not easy. In this study, a model is offered for 1-M-M-1 type HRP. It is shown on small scale test instances that the model can find the optimal solution.

Keywords: helicopter routing problem, vehicle routing with pickup and delivery, integer programming

Procedia PDF Downloads 425
305 Disaster Victim Identification: A Social Science Perspective

Authors: Victor Toom

Abstract:

Albeit it is never possible to anticipate the full range of difficulties after a catastrophe, efforts to identify victims of mass casualty events have become institutionalized and standardized with the aim of effectively and efficiently addressing the many challenges and contingencies. Such ‘disaster victim identification’ (DVI) practices are dependent on the forensic sciences, are subject of national legislation, and are reliant on technical and organizational protocols to mitigate the many complexities in the wake of catastrophe. Apart from such technological, legal and bureaucratic elements constituting a DVI operation, victims’ families and their emotions are also part and parcel of any effort to identify casualties of mass human fatality incidents. Take for example the fact that forensic experts require (antemortem) information from the group of relatives to make identification possible. An identified body or body part is also repatriated to kin. Relatives are thus main stakeholders in DVI operations. Much has been achieved in years past regarding facilitating victims’ families’ issues and their emotions. Yet, how families are dealt with by experts and authorities is still considered a difficult topic. Due to sensitivities and required emphatic interaction with families on the one hand, and the rationalized DVI efforts, on the other hand, there is still scope for improving communication, providing information and meaningful inclusion of relatives in the DVI effort. This paper aims to bridge the standardized world of DVI efforts and families’ experienced realities and makes suggestions to further improve DVI efforts through inclusion of victims’ families. Based on qualitative interviews, the paper narrates involvement and experiences of inter alia DVI practitioners, victims’ families, advocates and clergy in the wake of the 1995 Srebrenica genocide which killed approximately 8,000 men, and the 9/11 in New York City with 2,750 victims. The paper shows that there are several models of including victims’ families into a DVI operation, and it argues for a model of where victims’ families become a partner in DVI operations.

Keywords: disaster victim identification (DVI), victims’ families, social science (qualitative), 9/11 attacks, Srebrenica genocide

Procedia PDF Downloads 230