Search results for: consumer privacy and protection law
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3795

Search results for: consumer privacy and protection law

2505 Applying Wavelet Transform to Ferroresonance Detection and Protection

Authors: Chun-Wei Huang, Jyh-Cherng Gu, Ming-Ta Yang

Abstract:

Non-synchronous breakage or line failure in power systems with light or no loads can lead to core saturation in transformers or potential transformers. This can cause component and capacitance matching resulting in the formation of resonant circuits, which trigger ferroresonance. This study employed a wavelet transform for the detection of ferroresonance. Simulation results demonstrate the efficacy of the proposed method.

Keywords: ferroresonance, wavelet transform, intelligent electronic device, transformer

Procedia PDF Downloads 487
2504 An Overview of Thermal Storage Techniques for Solar Thermal Applications

Authors: Talha Shafiq

Abstract:

The traditional electricity operation in solar thermal plants is designed to operate on a single path initiating at power plant and executes at the consumer. Due to lack of energy storage facilities during this operation, a decrease in the efficiency is often observed with the power plant performance. This paper reviews the significance of energy storage in supply design and elaborates various methods that can be adopted in this regard which are equally cost effective and environmental friendly. Moreover, various parameters in thermal storage technique are also critically analyzed to clarify the pros and cons in this facility. Discussing the different thermal storage system, their technical and economical evaluation has also been reviewed.

Keywords: thermal energy storage, sensible heat storage, latent heat storage, thermochemical heat storage

Procedia PDF Downloads 548
2503 The Determination of Co, Cd and Pb in Seafoods of Thewet Market, Bangkok to Develop Quality of Life of Consumer

Authors: Chinnawat Satsananan

Abstract:

The amount of heavy metals in our environment has been of great concern because of their toxicity when their concentration is more than the permissible level. These metals enter the environment by different ways such as industrial activities, soil pollution. We have used flame atomic absorption spectrometry technique for determination of the concentration of Co, Cd and Pb in different tissues of five samples of seafoods (mackerel, squid, mussels, scallops and shrimp). The concentrations of Co, Cd and Pb in all examined seafoods were less than the reported literature values (WHO). The results mentioned that the seafoods obtained from Thewet Market were safety to consumption and make the quality of life of people in the community look better.

Keywords: heavy metals, seafood, atomic absorption spectrometry, Bangkok

Procedia PDF Downloads 324
2502 Lactational Amenorrhea Method for Family Planning: An Evaluation of Compliance in the Philippines

Authors: Ellen Bautista, Rebecca M. Flueckiger, Easter Dasmarinas, Rajeev Colaco, Fulbert Alec R. Gillego, Alma M. Lozada, Cristina Bisson

Abstract:

Lactational Amenorrhea Method (LAM) for family planning is at least 98% effective at preventing pregnancy when all criteria are met; (1) the mother is exclusively or nearly exclusively breastfeeding, (2) the mother is amenorrheic (not menstruating), and (3) the baby is six months old or younger. LAM is particularly suited for women interested in family planning accepted by religious authorities. As a majority catholic nation, LAM is a common and accepted form of family planning in the Philippines. The USAID funded, LuzonHealth project conducted a prospective evaluation in Legazpi City to inform the enhancement of guidelines aimed at increasing LAM compliance and encouraging a second form of contraceptive once LAM protection expires. LAM compliance, reasons for non-compliance, family planning referral and uptake of secondary modern family planning methods were tracked over a nine-month period among 521 postpartum women. The evaluation found that at three months postpartum, 97% of women either met LAM criteria or had shifted to a non-LAM modern family planning method. In month six 87% of women no longer met LAM criteria and of these only 35% had shifted to an alternative modern family planning method. This means that at six-months postpartum 65% of the women in this evaluation were not protected against pregnancy through modern family planning methods. By postpartum month nine, 70% of the women had been referred to family planning counseling, yet of those referred only 34% reported using modern family planning methods. This evaluation clearly indicates scale-up of non-LAM modern family planning does not sufficiently complement the scale-down of LAM compliance. There is a need to increase client knowledge and understanding of LAM as a temporary family planning method with a strong focus on preparing to shift to another form of modern family planning once LAM protection expires. Additionally, there is great need to restructure the referral mechanism to ensure efficacy and quality of care.

Keywords: Philippines, family planning, lactational amenorrhea method, contraceptives

Procedia PDF Downloads 230
2501 The Influence of Consumer and Brand-Oriented Capabilities on Business Performance in Young Firms: A Quantitative Causal Model Analysis

Authors: Katharina Buttenberg

Abstract:

Customer and brand-oriented capabilities have been identified as key influencing capabilities for business performance. Especially in the early years of the firm, it is crucial to develop and consciously manage these capabilities. In this paper, the results of a quantitative analysis, investigating the causal relationship between customer- and brand-oriented (marketing) capabilities and business performance will be presented. The research displays the dependencies between the constructs and will provide practical implications for young firms in the acquisition and management of these capabilities.

Keywords: brand-oriented capabilities, customer-oriented capabilities, entrepreneurship, resource-based theory, young firms

Procedia PDF Downloads 337
2500 Influence of Freeze-Thaw Cycles on Protein Integrity and Quality of Chicken Meat

Authors: Nafees Ahmed, Nur Izyani Kamaruzman, Saralla Nathan, Mohd Ezharul Hoque Chowdhury, Anuar Zaini Md Zain, Iekhsan Othman, Sharifah Binti Syed Hassan

Abstract:

Meat quality is always subject to consumer scrutiny when purchasing from retail markets on mislabeling as fresh meat. Various physiological and biochemical changes influence the quality of meat. As a major component of muscle tissue, proteins play a major role in muscle foods. In meat industry, freezing is the most common form of storage of meat products. Repeated cycles of freezing and thawing are common in restaurants, kitchen, and retail outlets and can also occur during transportation or storage. Temperature fluctuation is responsible for physical, chemical, and biochemical changes. Repeated cycles of ‘freeze-thaw’ degrade the quality of meat by stimulating the lipid oxidation and surface discoloration. The shelf life of meat is usually determined by its appearance, texture, color, flavor, microbial activity, and nutritive value and is influenced by frozen storage and subsequent thawing. The main deterioration of frozen meat during storage is due to protein. Due to the large price differences between fresh and frozen–thawed meat, it is of great interest to consumer to know whether a meat product is truly fresh or not. Researchers have mainly focused on the reduction of moisture loss due to freezing and thawing cycles of meat. The water holding capacity (WHC) of muscle proteins and reduced water content are key quality parameters of meat that ultimately changes color and texture. However, there has been limited progress towards understanding the actual mechanisms behind the meat quality changes under the freeze–thaw cycles. Furthermore, effect of freeze-thaw process on integrity of proteins is ignored. In this paper, we have studied the effect of ‘freeze-thawing’ on physicochemical changes of chicken meat protein. We have assessed the quality of meat by pH, spectroscopic measurements, Western Blot. Our results showed that increase in freeze-thaw cycles causes changes in pH. Measurements of absorbance (UV-visible and IR) indicated the degradation of proteins. The expression of various proteins (CREB, AKT, MAPK, GAPDH, and phosphorylated forms) were performed using Western Blot. These results indicated the repeated cycles of freeze-thaw is responsible for deterioration of protein, thus causing decrease in nutritious value of meat. It damges the use of these products in Islamic Sharia.

Keywords: chicken meat, freeze-thaw, halal, protein, western blot

Procedia PDF Downloads 398
2499 Social and Peer Influences in College Choice

Authors: Ali Bhayani

Abstract:

College is a high involvement decision making where students are expected to evaluate several college offerings before selecting a college or a course to study. However, even in high involvement product like college, students get influenced by opinion leaders and suffer from social contagion. This narrative style study, involving 98 first year students, was able to demonstrate that social contagion differs with regards to gender, ethnicity and personality. Recommendations from students with academically strong background would impact on the college choice of the undergraduate students and limit information search. Study was able to identify the incidence of anchoring heuristics amongst the students. Managerial implications with regards to design of marketing campaign follows at the end of the study.

Keywords: social contagion, opinion leaders, higher education, consumer behavior

Procedia PDF Downloads 356
2498 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 223
2497 Consumer Load Profile Determination with Entropy-Based K-Means Algorithm

Authors: Ioannis P. Panapakidis, Marios N. Moschakis

Abstract:

With the continuous increment of smart meter installations across the globe, the need for processing of the load data is evident. Clustering-based load profiling is built upon the utilization of unsupervised machine learning tools for the purpose of formulating the typical load curves or load profiles. The most commonly used algorithm in the load profiling literature is the K-means. While the algorithm has been successfully tested in a variety of applications, its drawback is the strong dependence in the initialization phase. This paper proposes a novel modified form of the K-means that addresses the aforementioned problem. Simulation results indicate the superiority of the proposed algorithm compared to the K-means.

Keywords: clustering, load profiling, load modeling, machine learning, energy efficiency and quality

Procedia PDF Downloads 151
2496 Cross-border Data Transfers to and from South Africa

Authors: Amy Gooden, Meshandren Naidoo

Abstract:

Genetic research and transfers of big data are not confined to a particular jurisdiction, but there is a lack of clarity regarding the legal requirements for importing and exporting such data. Using direct-to-consumer genetic testing (DTC-GT) as an example, this research assesses the status of data sharing into and out of South Africa (SA). While SA laws cover the sending of genetic data out of SA, prohibiting such transfer unless a legal ground exists, the position where genetic data comes into the country depends on the laws of the country from where it is sent – making the legal position less clear.

Keywords: cross-border, data, genetic testing, law, regulation, research, sharing, South Africa

Procedia PDF Downloads 118
2495 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 29
2494 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 372
2493 Climate Change and Perceived Socialization: The Role of Parents’ Climate Change Coping Style and Household Communication

Authors: Estefanya Vazquez-Casaubon, Veroline Cauberghe, Dieneke Van de Sompel, Hayley Pearce

Abstract:

Working together to reduce the anthropogenic impact should be a collective action, including effort within the household. In the matter, children are considered to have an important role in influencing the household to reduce the environmental impact through reversed socialization where children motivate and increase the concern of the parents towards environmental protection. Previous studies reveal that communication between parents and kids is key for effective reversed socialization. However, multiple barriers have been identified in the literature, such as the acceptance of the influence from the kids, the properties of the communication, among other factors. Based on the previous evidence, the present study aims to assess barriers and facilitators of communication at the household level that have an impact on reversed socialization. More precisely, the study examines how parents’ climate change coping strategy (problem-focused, meaning-focused, disregarding) influences the valence and the type of the communication related to climate change, and eventually the extent to which they report their beliefs and behaviours to be influenced by the pro-environmental perspectives of their children; i.e. reversed socialization. Via an online survey, 723 Belgian parents self-reported on communication about environmental protection and risk within their household (such as the frequency of exchange about topics related to climate change sourced from school, the household rules, imparting knowledge to the children, and outer factors like media or peer pressure, the emotional valence of the communication), their perceived socialization, and personal factors (coping mechanisms towards climate change). The results, using structural equation modelling, revealed that parents applying a problem-solving coping strategy related to climate change, appear to communicate more often in a positive than in a negative manner. Parents with a disregarding coping style towards climate change appear to communicate less often in a positive way within the household. Parents that cope via meaning-making of climate change showed to communicate less often in either a positive or negative way. Moreover, the perceived valence of the communication (positive or negative) influenced the frequency and type of household communication. Positive emotions increased the frequency of the communication overall. However, the direct effect of neither of the coping mechanisms on the reversed socialization was significant. High frequency of communication about the media, environmental views of the household members among other external topics had a positive impact on the perceived socialization, followed by discussions school-related; while parental instructing had a negative impact on the perceived socialization. Moreover, the frequency of communication was strongly affected by the perceived valence of the communication (positive or negative). The results go in line with previous evidence that a higher frequency of communication facilitates reversed socialization. Hence the results outstand how the coping mechanisms of the parents can be either a facilitator when they cope via problem-solving, while parents that disregard might avert frequent communication about climate change at the household.

Keywords: communication, parents’ coping mechanisms, environmental protection, household, perceived socialization

Procedia PDF Downloads 72
2492 The Documentary Analysis of Meta-Analysis Research in Violence of Media

Authors: Proud Arunrangsiwed

Abstract:

The part of “future direction” in the findings of meta-analysis could provide the great direction to conduct the future studies. This study, “The Documentary Analysis of Meta-Analysis Research in Violence of Media” would conclude “future directions” out of 10 meta-analysis papers. The purposes of this research are to find an appropriate research design or an appropriate methodology for the future research related to the topic, “violence of media”. Further research needs to explore by longitudinal and experimental design, and also needs to have a careful consideration about age effects, time spent effects, enjoyment effects, and ordinary lifestyle of each media consumer.

Keywords: aggressive, future direction, meta-analysis, media, violence

Procedia PDF Downloads 398
2491 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline

Authors: Zainab Khalifah, Wong Chiet Bing, Noor Hazarina Hashim

Abstract:

The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer e-satisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.

Keywords: website quality, customer e-satisfaction, low cost airline, e-ticketing

Procedia PDF Downloads 411
2490 Design Consideration of a Plastic Shredder in Recycling Processes

Authors: Tolulope A. Olukunle

Abstract:

Plastic waste management has emerged as one of the greatest challenges facing developing countries. This paper describes the design of various components of a plastic shredder. This machine is widely used in industries and recycling plants. The introduction of plastic shredder machine will promote reduction of post-consumer plastic waste accumulation and serves as a system for wealth creation and empowerment through conversion of waste into economically viable products. In this design research, a 10 kW electric motor with a rotational speed of 500 rpm was chosen to drive the shredder. A pulley size of 400 mm is mounted on the electric motor at a distance of 1000 mm away from the shredder pulley. The shredder rotational speed is 300 rpm.

Keywords: design, machine, plastic waste, recycling

Procedia PDF Downloads 309
2489 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 254
2488 Artificial Intelligence Impact on the Australian Government Public Sector

Authors: Jessica Ho

Abstract:

AI has helped government, businesses and industries transform the way they do things. AI is used in automating tasks to improve decision-making and efficiency. AI is embedded in sensors and used in automation to help save time and eliminate human errors in repetitive tasks. Today, we saw the growth in AI using the collection of vast amounts of data to forecast with greater accuracy, inform decision-making, adapt to changing market conditions and offer more personalised service based on consumer habits and preferences. Government around the world share the opportunity to leverage these disruptive technologies to improve productivity while reducing costs. In addition, these intelligent solutions can also help streamline government processes to deliver more seamless and intuitive user experiences for employees and citizens. This is a critical challenge for NSW Government as we are unable to determine the risk that is brought by the unprecedented pace of adoption of AI solutions in government. Government agencies must ensure that their use of AI complies with relevant laws and regulatory requirements, including those related to data privacy and security. Furthermore, there will always be ethical concerns surrounding the use of AI, such as the potential for bias, intellectual property rights and its impact on job security. Within NSW’s public sector, agencies are already testing AI for crowd control, infrastructure management, fraud compliance, public safety, transport, and police surveillance. Citizens are also attracted to the ease of use and accessibility of AI solutions without requiring specialised technical skills. This increased accessibility also comes with balancing a higher risk and exposure to the health and safety of citizens. On the other side, public agencies struggle with keeping up with this pace while minimising risks, but the low entry cost and open-source nature of generative AI led to a rapid increase in the development of AI powered apps organically – “There is an AI for That” in Government. Other challenges include the fact that there appeared to be no legislative provisions that expressly authorise the NSW Government to use an AI to make decision. On the global stage, there were too many actors in the regulatory space, and a sovereign response is needed to minimise multiplicity and regulatory burden. Therefore, traditional corporate risk and governance framework and regulation and legislation frameworks will need to be evaluated for AI unique challenges due to their rapidly evolving nature, ethical considerations, and heightened regulatory scrutiny impacting the safety of consumers and increased risks for Government. Creating an effective, efficient NSW Government’s governance regime, adapted to the range of different approaches to the applications of AI, is not a mere matter of overcoming technical challenges. Technologies have a wide range of social effects on our surroundings and behaviours. There is compelling evidence to show that Australia's sustained social and economic advancement depends on AI's ability to spur economic growth, boost productivity, and address a wide range of societal and political issues. AI may also inflict significant damage. If such harm is not addressed, the public's confidence in this kind of innovation will be weakened. This paper suggests several AI regulatory approaches for consideration that is forward-looking and agile while simultaneously fostering innovation and human rights. The anticipated outcome is to ensure that NSW Government matches the rising levels of innovation in AI technologies with the appropriate and balanced innovation in AI governance.

Keywords: artificial inteligence, machine learning, rules, governance, government

Procedia PDF Downloads 62
2487 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 211
2486 Radioprotective Efficacy of Costus afer against the Radiation-Induced Hematology and Histopathology Damage in Mice

Authors: Idowu R. Akomolafe, Naven Chetty

Abstract:

Background: The widespread medical application of ionizing radiation has raised public concern about radiation exposure and, thus, associated cancer risk. The production of reactive oxygen species and free radicals as a result of radiation exposure can cause severe damage to deoxyribonucleic acid (DNA) of cells, thus leading to biological effect. Radiotherapy is an excellent modality in the treatment of cancerous cells, comes with a few challenges. A significant challenge is the exposure of healthy cells surrounding the tumour to radiation. The last few decades have witnessed lots of attention shifted to plants, herbs, and natural product as an alternative to synthetic compound for radioprotection. Thus, the study investigated the radioprotective efficacy of Costus afer against whole-body radiation-induced haematological, histopathological disorder in mice. Materials and Method: Fifty-four mice were randomly divided into nine groups. Animals were pretreated with the extract of Costus afer by oral gavage for six days before irradiation. Control: 6 mice received feed and water only; 6 mice received feed, water, and 3Gy; 6 mice received feed, water, and 6Gy; experimental: 6 mice received 250 mg/kg extract; 6 mice received 500 mg/kg extract; 6 mice received 250 mg/kg extract and 3Gy; 6 mice received 500 mg/kg extract and 3Gy; 6 mice received 250 mg/kg extract and 6Gy; 6 mice received 500 mg/kg extract and 6Gy in addition to feeding and water. The irradiation was done at the Radiotherapy and Oncology Department of Grey's Hospital using linear accelerator (LINAC). Thirty-six mice were sacrificed by cervical dislocation 48 hours after irradiation, and blood was collected for haematology tests. Also, the liver and kidney of the sacrificed mice were surgically removed for histopathology tests. The remaining eighteen (18) mice were used for mortality and survival studies. Data were analysed by one-way ANOVA, followed by Tukey's multiple comparison test. Results: Prior administration of Costus afer extract decreased the symptoms of radiation sickness and caused a significant delay in the mortality as demonstrated in the experimental mice. The first mortality was recorded on day-5 post irradiation, and this happened to the group E- that is, mice that received 6Gy but no extract. There was significant protection in the experimental mice, as demonstrated in the blood counts against hematopoietic and gastrointestinal damage when compared with the control. The protection was seen in the increase in blood counts of experimental animals and the number of survivor. The protection offered by Costus afer may be due to its ability to scavenge free radicals and restore gastrointestinal and bone marrow damage produced by radiation. Conclusions: The study has demonstrated that exposure of mice to radiation could cause modifications in the haematological and histopathological parameters of irradiated mice. However, the changes were relieved by the methanol extract of Costus afer, probably through its free radical scavenging and antioxidant properties.

Keywords: costus afer, hematological, mortality, radioprotection, radiotherapy

Procedia PDF Downloads 132
2485 Determination of Authorship of the Works Created by the Artificial Intelligence

Authors: Vladimir Sharapaev

Abstract:

This paper seeks to address the question of the authorship of copyrighted works created solely by the artificial intelligence or with the use thereof, and proposes possible interpretational or legislative solutions to the problems arising from the plurality of the persons potentially involved in the ultimate creation of the work and division of tasks among such persons. Being based on the commonly accepted assumption that a copyrighted work can only be created by a natural person, the paper does not deal with the issues regarding the creativity of the artificial intelligence per se (or the lack thereof), and instead focuses on the distribution of the intellectual property rights potentially belonging to the creators of the artificial intelligence and/or the creators of the content used for the formation of the copyrighted work. Moreover, the technical development and rapid improvement of the AI-based programmes, which tend to be reaching even greater independence on a human being, give rise to the question whether the initial creators of the artificial intelligence can be entitled to the intellectual property rights to the works created by such AI at all. As the juridical practice of some European courts and legal doctrine tends to incline to the latter opinion, indicating that the works created by the AI may not at all enjoy copyright protection, the questions of authorships appear to be causing great concerns among the investors in the development of the relevant technology. Although the technology companies dispose with further instruments of protection of their investments, the risk of the works in question not being copyrighted caused by the inconsistency of the case law and a certain research gap constitutes a highly important issue. In order to assess the possible interpretations, the author adopted a doctrinal and analytical approach to the research, systematically analysing the European and Czech copyright laws and case law in some EU jurisdictions. This study aims to contribute to greater legal certainty regarding the issues of the authorship of the AI-created works and define possible clues for further research.

Keywords: artificial intelligence, copyright, authorship, copyrighted work, intellectual property

Procedia PDF Downloads 114
2484 The Role of Microfinance in Economic Development

Authors: Babak Salekmahdy

Abstract:

Microfinance is often seen as a means of repairing credit markets and unleashing the potential contribution of impoverished people who rely on self-employment. Since the 1990s, the microfinance industry has expanded rapidly, opening the path for additional kinds of social entrepreneurship and social investment. However, current data indicate relatively few average consumer effects, opposing pushback against microfinance. This research reconsiders microfinance statements, stressing the variety of data on impacts and the essential (but limited) role of reimbursements. The report finishes by explaining a shift in thinking: from microfinance as a strictly defined enterprise finance to microfinance as a more widely defined home finance. Microfinance, under this perspective, provides advantages by providing liquidity for various requirements rather than just by increasing income.

Keywords: microfinance, small business, economic development, credit markets

Procedia PDF Downloads 73
2483 An Intellectual Capital as a Driver for Branding

Authors: Shyam Shukla

Abstract:

A brand is the identity of a specific product, service or business. A brand can take many forms, including a name, sign, symbol, color, combination or slogan. The word brand began simply as a way to tell one person's identity from another by means of a hot iron stamp. A legally protected brand name is called a trademark. The word brand has continued to evolve to encompass identity - it affects the personality of a product, company or service. A concept brand is a brand that is associated with an abstract concept, like AIDS awareness or environmentalism, rather than a specific product, service, or business. A commodity brand is a brand associated with a commodity1. In this paper, it is tried to explore the significance of an intellectual capital for the branding of an Institution.

Keywords: brand, commodity, consumer, cultural values, intellectual capital, zonal cluster

Procedia PDF Downloads 454
2482 Bartlett Factor Scores in Multiple Linear Regression Equation as a Tool for Estimating Economic Traits in Broilers

Authors: Oluwatosin M. A. Jesuyon

Abstract:

In order to propose a simpler tool that eliminates the age-long problems associated with the traditional index method for selection of multiple traits in broilers, the Barttlet factor regression equation is being proposed as an alternative selection tool. 100 day-old chicks each of Arbor Acres (AA) and Annak (AN) broiler strains were obtained from two rival hatcheries in Ibadan Nigeria. These were raised in deep litter system in a 56-day feeding trial at the University of Ibadan Teaching and Research Farm, located in South-west Tropical Nigeria. The body weight and body dimensions were measured and recorded during the trial period. Eight (8) zoometric measurements namely live weight (g), abdominal circumference, abdominal length, breast width, leg length, height, wing length and thigh circumference (all in cm) were recorded randomly from 20 birds within strain, at a fixed time on the first day of the new week respectively with a 5-kg capacity Camry scale. These records were analyzed and compared using completely randomized design (CRD) of SPSS analytical software, with the means procedure, Factor Scores (FS) in stepwise Multiple Linear Regression (MLR) procedure for initial live weight equations. Bartlett Factor Score (BFS) analysis extracted 2 factors for each strain, termed Body-length and Thigh-meatiness Factors for AA, and; Breast Size and Height Factors for AN. These derived orthogonal factors assisted in deducing and comparing trait-combinations that best describe body conformation and Meatiness in experimental broilers. BFS procedure yielded different body conformational traits for the two strains, thus indicating the different economic traits and advantages of strains. These factors could be useful as selection criteria for improving desired economic traits. The final Bartlett Factor Regression equations for prediction of body weight were highly significant with P < 0.0001, R2 of 0.92 and above, VIF of 1.00, and DW of 1.90 and 1.47 for Arbor Acres and Annak respectively. These FSR equations could be used as a simple and potent tool for selection during poultry flock improvement, it could also be used to estimate selection index of flocks in order to discriminate between strains, and evaluate consumer preference traits in broilers.

Keywords: alternative selection tool, Bartlet factor regression model, consumer preference trait, linear and body measurements, live body weight

Procedia PDF Downloads 198
2481 Study of Lamination Quality of Semi-Flexible Solar Modules with Special Textile Materials

Authors: K. Drabczyk, Z. Starowicz, S. Maleczek, P. Zieba

Abstract:

The army, police and fire brigade commonly use dedicated equipment based on special textile materials. The properties of these textiles should ensure human life and health protection. Equally important is the ability to use electronic equipment and this requires access to the source of electricity. Photovoltaic cells integrated with such textiles can be solution for this problem in the most of outdoor circumstances. One idea may be to laminate the cells to textile without changing their properties. The main goal of this work was analyzed lamination quality of special designed semi-flexible solar module with special textile materials as a backsheet. In the first step of investigation, the quality of lamination was determined using device equipped with dynamometer. In this work, the crystalline silicon solar cells 50 x 50 mm and thin chemical tempered glass - 62 x 62 mm and 0.8 mm thick - were used. The obtained results showed the correlation between breaking force and type of textile weave and fiber. The breaking force was in the ranges: 4.5-5.5 N, 15-20 N and 30-33 N depending on the type of wave and fiber type. To verify these observations the microscopic and FTIR analysis of fibers was performed. The studies showed the special textile can be used as a backsheet of semi-flexible solar modules. This work presents a new composition of solar module with special textile layer which, to our best knowledge, has not been published so far. Moreover, the work presents original investigations on adhesion of EVA (ethylene-vinyl acetate) polymer to textile with respect to fiber structure of laminated substrate. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management.

Keywords: flexible solar modules, lamination process, solar cells, textile for photovoltaics

Procedia PDF Downloads 350
2480 Time-Series Load Data Analysis for User Power Profiling

Authors: Mahdi Daghmhehci Firoozjaei, Minchang Kim, Dima Alhadidi

Abstract:

In this paper, we present a power profiling model for smart grid consumers based on real time load data acquired smart meters. It profiles consumers’ power consumption behaviour using the dynamic time warping (DTW) clustering algorithm. Due to the invariability of signal warping of this algorithm, time-disordered load data can be profiled and consumption features be extracted. Two load types are defined and the related load patterns are extracted for classifying consumption behaviour by DTW. The classification methodology is discussed in detail. To evaluate the performance of the method, we analyze the time-series load data measured by a smart meter in a real case. The results verify the effectiveness of the proposed profiling method with 90.91% true positive rate for load type clustering in the best case.

Keywords: power profiling, user privacy, dynamic time warping, smart grid

Procedia PDF Downloads 137
2479 Anthropomorphic Brand Mascot Serve as the Vehicle: To Quickly Remind Customers Who You Are and What You Stand for in Indian Cultural Context

Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabati

Abstract:

For many years organization have been exercising a creative technique of applying brand mascots, which results in making a visual ‘ambassador’ of a brand. The goal of mascot’s is just not confined to strengthening the brand identity, improving customer perception, but also acting as a vehicle of anthropomorphic translation towards the consumer. Such that it helps in embracing the power of recognition and processing the experiences happening in our daily lives. The study examines the relationship between the specific mascot features and brand attitude. It eliminates that mascot trust is an important mediator of the mascot features on brand attitude. Anthropomorphic characters turn out to be the key players despite the application of brand mascots in today’s marketing.

Keywords: advertising, mascot, branding, recall

Procedia PDF Downloads 324
2478 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 148
2477 The Evaluation of the Performance of CaCO3/Polymer Nano-Composites for the Preservation of Historic Limestone Monuments

Authors: Mohammed Badereldien, Rezk Diab, Mohamoud Ali, Ayman Aboelkassem

Abstract:

The stone surfaces of historical architectural heritage in Egypt are under threat from of various environmental factors such as temperature fluctuation, humidity, pollution, and microbes. Due to these factors, the facades of buildings are deteriorating deformation and disfiguration of external decoration and the formation of black accretion also often from the stone works. The aim of this study is to evaluate the effectiveness of CaCO₃ nano-particles as consolidation and protection material for calcareous stone monuments. Selected tests were carried out in order to estimate the superficial consolidating and protective effect of the treatment. When applied the nanoparticles dispersed in the acrylic copolymer; poly ethylmethacrylate (EMA)/methylacrylate (MA) (70/30, respectively) (EMA)/methylacrylate (MA) (70/30, respectively). The synthesis process of CaCO₃ nanoparticles/polymer nano-composite was prepared using in situ emulsion polymerization system. The consolidation and protection were characterized by TEM, while the penetration depth, re-aggregating effects of the deposited phase, and the surface morphology before and after treatment were examined by SEM (Scanning Electron Microscopy). Improvement of the stones' mechanical properties was evaluated by compressive strength tests. Changes in water-interaction properties were evaluated by water absorption capillarity measurements, and colorimetric measurements were used to evaluate the optical appearance. Together the results appear to demonstrate that CaCO₃/polymer nanocomposite is an efficient material for the consolidation of limestone architecture and monuments. As compared with samples treated with pure acrylic copolymer without Calcium carbonate nanoparticles, for example, CaCO₃ nanoparticles are completely compatible, strengthening limestone against thermal aging and improving its mechanical properties.

Keywords: calcium carbonate nanoparticles, consolidation, nanocomposites, calcareous stone, colorimetric measurements, compressive strength

Procedia PDF Downloads 124
2476 Detection of Resistive Faults in Medium Voltage Overhead Feeders

Authors: Mubarak Suliman, Mohamed Hassan

Abstract:

Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).

Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder

Procedia PDF Downloads 106