Search results for: basic business-forces
1689 Parameter Estimation for Contact Tracing in Graph-Based Models
Authors: Augustine Okolie, Johannes Müller, Mirjam Kretzchmar
Abstract:
We adopt a maximum-likelihood framework to estimate parameters of a stochastic susceptible-infected-recovered (SIR) model with contact tracing on a rooted random tree. Given the number of detectees per index case, our estimator allows to determine the degree distribution of the random tree as well as the tracing probability. Since we do not discover all infectees via contact tracing, this estimation is non-trivial. To keep things simple and stable, we develop an approximation suited for realistic situations (contract tracing probability small, or the probability for the detection of index cases small). In this approximation, the only epidemiological parameter entering the estimator is the basic reproduction number R0. The estimator is tested in a simulation study and applied to covid-19 contact tracing data from India. The simulation study underlines the efficiency of the method. For the empirical covid-19 data, we are able to compare different degree distributions and perform a sensitivity analysis. We find that particularly a power-law and a negative binomial degree distribution meet the data well and that the tracing probability is rather large. The sensitivity analysis shows no strong dependency on the reproduction number.Keywords: stochastic SIR model on graph, contact tracing, branching process, parameter inference
Procedia PDF Downloads 781688 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4051687 A Comparison Study of Different Methods Used in the Detection of Giardia lamblia on Fecal Specimen of Children
Authors: Muhammad Farooq Baig
Abstract:
Objective: The purpose of this study was to compare results obtained using a single fecal specimen for O&P examination, direct immunofluorescence assay (DFA), and two conventional staining methods. Design: Hundred and fifty children fecal specimens were collected and examined by each method. The O&P and the DFA were used as the reference method. Setting: The study was performed at the laboratory in the Basic Medical Science Institute JPMC Karachi. Patients or Other Participants: The fecal specimens were collected from children with a suspected Giardia lamblia infection. Main Outcome Measures: The amount of agreement and disagreement between methods.1) Presence of giardiasis in our population. 2) The sensitivity and specificity of each method. Results: There was 45(30%) positive 105 (70%) negative on DFA, 41 (27.4%) positive 109 (72.6%) negative on iodine and 34 (22.6%) positive 116(77.4%) on saline method. The sensitivity and specificity of DFA in comparision to iodine were 92.2%, 92.7% respectively. The sensitivity and specificity of DFA in comparisoin to saline method were 91.2%, 87.9% respectively. The sensitivity of iodine method and saline method in compariosn to DFA were 82.2%, 68.8% respectively. There is mark diffrence in sensitivity of DFA to conventional method. Conclusion: The study supported findings of other investigators who concluded that DFA method have the greater sensitivity. The immunologic methods were more efficient and quicker than the conventional O&P method.Keywords: direct immunofluorescence assay (DFA), ova and parasite (O&P), Giardia lamblia, children, medical science
Procedia PDF Downloads 4231686 An Analytical Study of Social Problems of Women Related to Sports
Authors: Shagufta Jahangir, Raisa Jahangir, Nadeemullah
Abstract:
In many societies sports is considered inappropriate for women. It traditionally associated with mascunity. The proposed study aims at undertaking a critical situation analysis of sports women in Pakistan from a gender perspective by examining various aspects of sports women by gender including wrong social values, unstable economical position, wrong religious perspective and the role of media towards women in sports, while sports can provide a channel for informing women about their social and legal rights as well as their health issues, productive health and others. A major concern of the study is to identify the basic causes which depriving Pakistani women from sports. The Human Rights Commission of Pakistan and the Joint Action Committee for People’s Rights organized a symbolic mini marathon on 21 May 2005 in Pakistan to challenge arbitrary curbs on women’s public participation in sport and to highlight rising violence against women. Historically, sport has engaged the perception of gender-hierarchy in order to reproduce the ideology of male superiority, a notion which is often translated into ‘usual superiority’ within the superior communal order. However, it is argued here that we are presently in a state of communal instability with esteem to women's participation in sport.Keywords: mascunity, gender, productive health, inappropriate, rights
Procedia PDF Downloads 3641685 Ageing in Place: Facing the Challenges
Authors: Daniella Arieli
Abstract:
As human population is ageing, globally, we are faced with the need to find solutions for the care of older people who have reached the stage of needing full-time nursing care. Basically, there are two basic alternatives: 1. moving the individual to an institutional setting, a care home, or other form of residency, and 2. Arranging care for them in their own home, what is known as “ageing in place”. As ageing in place is becoming popular in many parts of the world, there is a need to understand its’ everyday consequences for all the involved parties: the care recipient, her/his family members and the live-in care workers. This is crucial because choosing home care means that the role of the care recipient’s relatives becomes very demanding and requires a level of support and responsibility that is often beyond what families can offer. This is particularly challenging when the older person faces dementia. While most Western countries offer a range of social services, many citizens around the world find the care provided by governments and associated social support structures insufficient. Individuals and families find themselves in the position of having to take on the responsibility themselves and find a path for the care of frail members, while facing considerable personal burdens and challenging dilemmas. The aim of this work is to discuss those challenges. The study is based on an ethnographic study of home care for older people in Israel.Keywords: aging in place, family caregivers, policy making, qualitative research
Procedia PDF Downloads 1431684 Applications Using Geographic Information System for Planning and Development of Energy Efficient and Sustainable Living for Smart-Cities
Authors: Javed Mohammed
Abstract:
As urbanization process has been and will be happening in an unprecedented scale worldwide, strong requirements from academic research and practical fields for smart management and intelligent planning of cities are pressing to handle increasing demands of infrastructure and potential risks of inhabitants agglomeration in disaster management. Geo-spatial data and Geographic Information System (GIS) are essential components for building smart cities in a basic way that maps the physical world into virtual environment as a referencing framework. On higher level, GIS has been becoming very important in smart cities on different sectors. In the digital city era, digital maps and geospatial databases have long been integrated in workflows in land management, urban planning and transportation in government. People have anticipated GIS to be more powerful not only as an archival and data management tool but also as spatial models for supporting decision-making in intelligent cities. The purpose of this project is to offer observations and analysis based on a detailed discussion of Geographic Information Systems( GIS) driven Framework towards the development of Smart and Sustainable Cities through high penetration of Renewable Energy Technologies.Keywords: digital maps, geo-spatial, geographic information system, smart cities, renewable energy, urban planning
Procedia PDF Downloads 5261683 Morphometry of Cervical Spinal Cord in Rabbit Using Design-Based Stereology
Authors: Hamed Chavoshi Pour, Javad Sadeghinejad
Abstract:
The spinal cord is a long structure that starts at the end of the medulla oblongata and is located within the vertebral canal. Physiologically, the spinal cord connects the brain with the peripheral nervous system for sensory and motor activities. The cervical spinal cord is an area of particular interest in medicine and veterinary medicine due to the high prevalence of diseases in this region. This study describes the morphometric features of the cervical spinal cord in rabbits using design-unbiased stereology. The cervical spinal cords of five male rabbits were dissected, and slabs were taken according to systematic uniform random sampling. Each slab was embedded in paraffin and cut into a 6-µm thick section, and stained with cresyl violet 0.1% for stereological estimations. The total spinal cord volume, volume fraction of grey and white matter, and also dorsal and ventral horns were estimated using point counting and Cavalieri's estimator. The total cervical spinal cord volume was 0.98 ± 0.07 cm³. The relative volume of white matter and grey matter was 70.6 ± 1.7% and 29.31 ± 1.67%, respectively. The dorsal horn and ventral horn volume were 13.86 ± 1.36% and 14.9 ± 0.62% of the whole cervical spinal cord. This knowledge of rabbit spinal cord findings may serve as a foundation for a translational model in spinal cord experimental research and provide basic findings for the diagnosis and treatment of spinal cord disorders.Keywords: stereology, spinal cord, rabbit, cervical
Procedia PDF Downloads 761682 Efficient Photocatalytic Degradation of Tetracycline Hydrochloride Using Modified Carbon Nitride CCN/Bi₂WO₆ Heterojunction
Authors: Syed Najeeb-Uz-Zaman Haider, Yang Juan
Abstract:
Antibiotic overuse raises environmental concerns, boosting the demand for efficient removal from pharmaceutical wastewater. Photocatalysis, particularly using semiconductor photocatalysts, offers a promising solution and garners significant scientific interest. In this study, a Z-scheme 0.15BWO/CCN heterojunction was developed, analyzed, and employed for the photocatalytic degradation of tetracycline hydrochloride (TC) under visible light. The study revealed that the dosage of 0.15BWO@CCN and the presence of coexisting ions significantly influenced the degradation efficiency, achieving up to 87% within 20 minutes under optimal conditions (at pH 9-11/strongly basic conditions) while maintaining 84% efficiency under standard conditions (unaltered pH). Photoinduced electrons gathered on the conduction band of BWO while holes accumulated on the valence band of CCN, creating more favorable conditions to produce superoxide and hydroxyl radicals. Additionally, through comprehensive experimental analysis, the degradation pathway and mechanism were thoroughly explored. The superior photocatalytic performance of 0.15BWO@CCN was attributed to its Z-scheme heterojunction structure, which significantly reduced the recombination of photoinduced electrons and holes. The radicals produced were identified using ESR, and their involvement in tetracycline degradation was further analyzed through active species trapping experiments.Keywords: CCN, Bi₂WO₆, TC, photocatalytic degradation, heterojunction
Procedia PDF Downloads 441681 The Impact of Alumina Cement on Properties of Portland Cement Slurries and Mortars
Authors: Krzysztof Zieliński, Dariusz Kierzek
Abstract:
The addition of a small amount of alumina cement to Portland cement results in immediate setting, a rapid increase in the compressive strength and a clear increase of the adhesion to concrete substrate. This phenomenon is used, among others, for the production of liquid floor self-levelling compounds. Alumina cement is several times more expensive than Portland cement and is a component having a significant impact on prices of products manufactured with its use. For the production of liquid floor self-levelling compounds, low-alumina cement containing approximately 40% Al2O3 is normally used. The aim of the study was to determine the impact of Portland cement with the addition of alumina cement on the basic physical and mechanical properties of cement slurries and mortars. CEM I 42.5R and three types of alumina cement containing 40%, 50% and 70% of Al2O3 were used for the tests. Mixes containing 4%, 6%, 8%, 10% and 12% of different varieties of alumina cement were prepared; for which, the time of initial and final setting, compressive and flexural strength and adhesion to concrete substrate were determined. The analysis of the obtained test results showed that a similar immediate setting effect and clearly better adhesion strength can be obtained using the addition of 6% of high-alumina cement than 12% of low-alumina cement. As the prices of these cements are similar, this can give significant financial savings in the production of liquid floor self-levelling compounds.Keywords: alumina cement, immediate setting, compression strength, adhesion to substrate
Procedia PDF Downloads 1521680 Effect of pH-Dependent Surface Charge on the Electroosmotic Flow through Nanochannel
Authors: Partha P. Gopmandal, Somnath Bhattacharyya, Naren Bag
Abstract:
In this article, we have studied the effect of pH-regulated surface charge on the electroosmotic flow (EOF) through nanochannel filled with binary symmetric electrolyte solution. The channel wall possesses either an acidic or a basic functional group. Going beyond the widely employed Debye-Huckel linearization, we develop a mathematical model based on Nernst-Planck equation for the charged species, Poisson equation for the induced potential, Stokes equation for fluid flow. A finite volume based numerical algorithm is adopted to study the effect of key parameters on the EOF. We have computed the coupled governing equations through the finite volume method and our results found to be in good agreement with the analytical solution obtained from the corresponding linear model based on low surface charge condition or strong electrolyte solution. The influence of the surface charge density, reaction constant of the functional groups, bulk pH, and concentration of the electrolyte solution on the overall flow rate is studied extensively. We find the effect of surface charge diminishes with the increase in electrolyte concentration. In addition for strong electrolyte, the surface charge becomes independent of pH due to complete dissociation of the functional groups.Keywords: electroosmosis, finite volume method, functional group, surface charge
Procedia PDF Downloads 4191679 The Relation between Authenticity at Work and Job Satisfaction
Authors: Godiva Kwan, Winton Au, Fanny Cheung
Abstract:
Authenticity, being true to oneself and acting in congruence with one’s values and beliefs, is a basic human strength, and is instrumental to understanding well-being. While dispositional authenticity was found to be associated with positive affect and subjective well-being, others have demonstrated that individuals assumed different levels of authenticity when they took up different social roles, suggesting that state authenticity can be an alternative mechanism. This study examined the relation between workplace authenticity and job satisfaction. We hypothesize that state authenticity at work will be predicted by psychological safety climate (organizational climate where employees feel safe to speak up without being embarrassed or rejected). Employees are expected to experience higher subjective well-being and job satisfaction as a result of being authentic at work. Survey results provided support to the hypotheses. Psychological safety climate enhanced employees’ authenticity state at work, which in turn improved well-being and job satisfaction. In conclusion, we found that employees become more authentic at work in an organizational climate where they feel safe to express themselves, leading to a higher job satisfaction and well-being. The current study contributes to the understanding of underlying mechanisms behind experiencing authenticity at work among employees in Hong Kong. Our findings are expected to provide insights and to raise organizations’ awareness of creating an open and trustful culture in order to enhance job satisfaction of employees through encouraging them to “be themselves”.Keywords: authenticity, job satisfaction, psychological safety climate, organizational climate
Procedia PDF Downloads 4281678 Research on the Influence of Robot Teaching on the Creativity of Primary and Secondary School Students under the Background of STEM Education
Authors: Chu Liu
Abstract:
With the development of society and the changes of the times, the requirements for the cultivation of learners are different. In the 21st century, STEM education has become a boom in the development of education in various countries, aiming to improve the comprehensive ability of learners in science, technology, engineering, and mathematics. The rise of robot education provides an effective way for STEM education to cultivate computational thinking ability, interdisciplinary ability, problem-solving ability, and teamwork ability. Although robot education has been developed in China for several years, it still lacks a standard curriculum system. This article uses programming software as a platform, through the research and analysis of 'Basic Education Information Technology Curriculum Standards (2012 Edition)', combines with the actual learning situation of learners, tries to conduct teaching project design research, and aims at providing references for the teaching ideas and method of robot education courses. In contemporary society, technological advances increasingly require creativity. Innovative comprehensive talents urgently need a radical and effective education reform to keep up with social changes. So in this context, robot teaching design can be used for students. The tendency of creativity to influence is worth to be verified.Keywords: STEM education, robot teaching, primary and secondary school students, tendency of creativity
Procedia PDF Downloads 1201677 Chemical and Sensory Properties of Chardonnay Wines Produced in Different Oak Barrels
Authors: Valentina Obradović, Josip Mesić, Maja Ergović Ravančić, Kamila Mijowska, Brankica Svitlica
Abstract:
French oak and American oak barrels are most famous all over the world, but barrels of different origin can also be used for obtaining high quality wines. The aim of this research was to compare the influence of different Slavonian (Croatian) and French oak barrels on the quality of Chardonnay wine. Grapes were grown in Croatian wine growing region of Kutjevo in 2015. Chardonnay wines were tested for basic oenological parameters (alcohol, extract, reducing sugar, SO2, acidity), total polyphenols content (Folin-Ciocalteu method), antioxidant activity (ABTS and DPPH method) and color density. Sensory evaluation was performed by students of viticulture/oenology. Samples produced by classical fermentation and ageing in French oak barrels, had better results for polyphenols and sensory evaluation (especially low toasting level) than samples in Slavonian barrels. All tested samples were scored as a “quality” or “premium quality” wines. Sur lie method of fermentation and ageing in Slavonian oak barrel had very good extraction of polyphenols and high antioxidant activity with the usage of authentic yeasts, while commercial yeast strain resulted in worse chemical and sensory parameters.Keywords: chardonnay, French oak, Slavonian oak, sur lie
Procedia PDF Downloads 2421676 A Range of Steel Production in Japan towards 2050
Authors: Reina Kawase
Abstract:
Japan set the goal of 80% reduction in GHG emissions by 2050. To consider countermeasures for reducing GHG emission, the production estimation of energy intensive materials, such as steel, is essential. About 50% of steel production is exported in Japan, so it is necessary to consider steel production including export. Steel productions from 2005-2050 in Japan were estimated under various global assumptions based on combination of scenarios such as goods trade scenarios and steel making process selection scenarios. Process selection scenarios decide volume of steel production by process (basic oxygen furnace and electric arc furnace) with considering steel consumption projection, supply-demand balance of steel, and scrap surplus. The range of steel production by process was analyzed. Maximum steel production was estimated under the scenario which consumes scrap in domestic steel production at maximum level. In 2035, steel production reaches 149 million ton because of increase in electric arc furnace steel. However, it decreases towards 2050 and amounts to 120 million ton, which is almost same as a current level. Minimum steel production is under the scenario which assumes technology progress in steel making and supply-demand balance consideration in each region. Steel production decreases from base year and is 44 million ton in 2050.Keywords: goods trade scenario, steel making process selection scenario, steel production, global warming
Procedia PDF Downloads 3831675 Catalytic Deoxygenation of Non-Edible Oil to Renewable Fuel by Using Calcium-Based Nanocatalyst
Authors: Hwei Voon Lee, N. Asikin-Mijana, Y. H. Taufiq-Yap, J. C. Juan, N. A. Rahman
Abstract:
Cracking–Deoxygenation process is one of the important reaction pathways for the production of bio-fuel with desirable n-C17 hydrocarbon chain via removal of oxygen compounds. Calcium-based catalyst has attracted much attention in deoxygenation process due to its relatively high capacity in removing oxygenated compounds in the form of CO₂ and CO under decarboxylation and decarbonylation reaction, respectively. In the present study, deoxygenation of triolein was investigated using Ca(OH)₂ nanocatalyst derived from low cost natural waste shells. The Ca(OH)₂ nanocatalyst was prepared via integration techniques between surfactant treatment (anionic and non-ionic) and wet sonochemical effect. Results showed that sonochemically assisted surfactant treatment has successfully enhanced the physicochemical properties of Ca(OH)₂ nanocatalyst in terms of nanoparticle sizes (∼50 nm), high surface area(∼130 m²g⁻¹), large porosity (∼18.6 nm) and strong basic strength. The presence of superior properties from surfactant treated Ca(OH)₂ nanocatalysts rendered high deoxygenation degree, which is capable of producing high alkane and alkene selectivity in chain length of n-C17(high value of C17/(n-C17+ n-C18)ratio = 0.88). Furthermore, both Ca(OH)₂–EG and Ca(OH)₂–CTAB nanocatalysts showed high reactivity with 47.37% and 44.50%, respectively in total liquid hydrocarbon content of triolein conversion with high H/C and low O/C ratio.Keywords: clamshell, cracking, decarboxylation-decarbonylation, hydrocarbon
Procedia PDF Downloads 1871674 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks
Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali
Abstract:
To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility
Procedia PDF Downloads 1971673 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 3761672 Checking Energy Efficiency by Simulation Tools: The Case of Algerian Ksourian Models
Authors: Khadidja Rahmani, Nahla Bouaziz
Abstract:
Algeria is known for its rich heritage. It owns an immense historical heritage with a universal reputation. Unfortunately, this wealth is withered because of abundance. This research focuses on the Ksourian model, which constitutes a large portion of this wealth. In fact, the Ksourian model is not just a witness to a great part of history or a vernacular culture, but also it includes a panoply of assets in terms of energetic efficiency. In this context, the purpose of our work is to evaluate the performance of the old techniques which are derived from the Ksourian model , and that using the simulation tools. The proposed method is decomposed in two steps; the first consists of isolate and reintroduce each device into a basic model, then run a simulation series on acquired models. And this in order to test the contribution of each of these dialectal processes. In another scale of development, the second step consists of aggregating all these processes in an aboriginal model, then we restart the simulation, to see what it will give this mosaic on the environmental and energetic plan .The model chosen for this study is one of the ksar units of Knadsa city of Bechar (Algeria). This study does not only show the ingenuity of our ancestors in their know-how, and their adapting power to the aridity of the climate, but also proves that their conceptions subscribe in the current concerns of energy efficiency, and respond to the requirements of sustainable development.Keywords: dialectal processes, energy efficiency, evaluation, Ksourian model, simulation tools
Procedia PDF Downloads 1951671 Code Evaluation on Web-Shear Capacity of Presstressed Hollow-Core Slabs
Authors: Min-Kook Park, Deuck Hang Lee, Hyun Mo Yang, Jae Hyun Kim, Kang Su Kim
Abstract:
Prestressed hollow-core slabs (HCS) are structurally optimized precast units with light-weight hollowed-sections and very economical due to the mass production by a unique production method. They have been thus widely used in the precast concrete constructions in many countries all around the world. It is, however, difficult to provide shear reinforcement in HCS units produced by the extrusion method, and thus all the shear forces should be resisted solely by concrete webs in the HCS units. This means that, for the HCS units, it is very important to estimate the contribution of web concrete to the shear resistance accurately. In design codes, however, the shear strengths for HCS units are estimated by the same equations that are used for typical prestressed concrete members, which were determined from the calibrations to experimental results of conventional prestressed concrete members other than HCS units. In this study, therefore, shear test results of HCS members with a wide range of influential variables were collected, and the shear strength equations in design codes were thoroughly examined by comparing to the experimental results in the shear database of HCS members. Acknowledgement: This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT & Future Planning(NRF-2016R1A2B2010277).Keywords: hollow-core, web-shear, precast concrete, prestress, capacity
Procedia PDF Downloads 5061670 Absolute Liability in International Human Rights Law
Authors: Gassem Alfaleh
Abstract:
In Strict liability, a person can be held liable for any harm resulting from certain actions or activities without any mistake. The liability is strict because a person can be liable when he or she commits any harm with or without his intention. The duty owed is the duty to avoid causing the plaintiff any harm. However, “strict liability is imposed at the International level by two types of treaties, namely those limited to giving internal effect to treaty provisions and those that impose responsibilities on states. The basic principle of strict liability is that there is a liability on the operator or the state (when the act concerned is attributable to the state) for damage inflicted without there being a need to prove unlawful behavior”. In international human rights law, strict liability can exist when a defendant is in legal jeopardy by virtue of an internationally wrongful act, without any accompanying intent or mental state. When the defendant engages in an abnormally dangerous activity against the environment, he will be held liable for any harm it causes, even if he was not at fault. The paper will focus on these activities under international human rights law. First, the paper will define important terms in the first section of the paper. Second, it will focus on state and non-state actors in terms of strict liability. Then, the paper will cover three major areas in which states should be liable for hazardous activities: (1) nuclear energy, (2) maritime pollution, (3) Space Law, and (4) other hazardous activities which damage the environment.Keywords: human rights, law, legal, absolute
Procedia PDF Downloads 1481669 Design of Seismically Resistant Tree-Branching Steel Frames Using Theory and Design Guides for Eccentrically Braced Frames
Authors: R. Gary Black, Abolhassan Astaneh-Asl
Abstract:
The International Building Code (IBC) and the California Building Code (CBC) both recognize four basic types of steel seismic resistant frames; moment frames, concentrically braced frames, shear walls and eccentrically braced frames. Based on specified geometries and detailing, the seismic performance of these steel frames is well understood. In 2011, the authors designed an innovative steel braced frame system with tapering members in the general shape of a branching tree as a seismic retrofit solution to an existing four story “lift-slab” building. Located in the seismically active San Francisco Bay Area of California, a frame of this configuration, not covered by the governing codes, would typically require model or full scale testing to obtain jurisdiction approval. This paper describes how the theories, protocols, and code requirements of eccentrically braced frames (EBFs) were employed to satisfy the 2009 International Building Code (IBC) and the 2010 California Building Code (CBC) for seismically resistant steel frames and permit construction of these nonconforming geometries.Keywords: eccentrically braced frame, lift slab construction, seismic retrofit, shear link, steel design
Procedia PDF Downloads 4691668 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 1151667 The Data-Driven Localized Wave Solution of the Fokas-Lenells Equation using PINN
Authors: Gautam Kumar Saharia, Sagardeep Talukdar, Riki Dutta, Sudipta Nandy
Abstract:
The physics informed neural network (PINN) method opens up an approach for numerically solving nonlinear partial differential equations leveraging fast calculating speed and high precession of modern computing systems. We construct the PINN based on strong universal approximation theorem and apply the initial-boundary value data and residual collocation points to weekly impose initial and boundary condition to the neural network and choose the optimization algorithms adaptive moment estimation (ADAM) and Limited-memory Broyden-Fletcher-Golfard-Shanno (L-BFGS) algorithm to optimize learnable parameter of the neural network. Next, we improve the PINN with a weighted loss function to obtain both the bright and dark soliton solutions of Fokas-Lenells equation (FLE). We find the proposed scheme of adjustable weight coefficients into PINN has a better convergence rate and generalizability than the basic PINN algorithm. We believe that the PINN approach to solve the partial differential equation appearing in nonlinear optics would be useful to study various optical phenomena.Keywords: deep learning, optical Soliton, neural network, partial differential equation
Procedia PDF Downloads 1271666 Women Executives' Career Success in the Office of the Basic Education
Authors: Nipon Sasithornsaowapa
Abstract:
This research aims to study the impact of personality and family status on women executives’ career success of the primary education department of Thailand. The independent variable includes three factors, namely family status, personality, and knowledge-skill-experience, while the dependent variable is the career success. The population of this study includes 2,179 female management officials in the department of primary education. A total of 400 female managers is interviewed and utilized as a sample group. A questionnaire is developed and used as a research tool for data collection. Content analysis is performed to get the quantitative data. Descriptive statistics in this research is conducted by SPSS program. The findings revealed that personality and family status of samples have an influence on the overall career success of women executives in terms of their objective career success. However, in terms of specific factors of personality or family status, it is found that there is no relevance of each factor on the women executives’ career success. It can be concluded that the factor affecting the women executives’ career success is subjective career success including the happiness and enjoyment with the job not factor concerning materials. Their success is the result of each individual working experience. However, their personal characteristics do not affect their success.Keywords: career success, women executives, primary education, knowledge-skill-experience
Procedia PDF Downloads 4811665 Internet Memes: A Mirror of Culture and Society
Authors: Alexandra-Monica Toma
Abstract:
As the internet became a ruling force of society, computer-mediated communication has enriched its methods to convey meaning by combining linguistic means to visual means of expressivity. One of the elements of cyberspace is what we call a meme, a succinct, visually engaging tool used to communicate ideas or emotions, usually in a funny or ironic manner. Coined by Richard Dawkings in the late 1970s to refer to cultural genes, this term now denominates a special type of vernacular language used to share content on the internet. This research aims to analyse the basic mechanism that stands at the basis of meme creation as a blend of innovation and imitation and will approach some of the most widely used image macros remixed to generate new content while also pointing out success strategies. Moreover, this paper discusses whether memes can transcend the light-hearted and playful mood they mirror and become biting and sharp cultural comments. The study also uses the concept of multimodality and stresses how the text interacts with image, discussing three types of relations between the two: symmetry, amplification, and contradiction. We will furthermore show that memes are cultural artifacts and virtual tropes highly dependent on context and societal issues by using a corpus of memes created related to the COVID-19 pandemic.Keywords: context, computer-mediated communication, memes, multimodality
Procedia PDF Downloads 1841664 Study of Slum Redevelopment Initiatives for Dharavi Slum, Mumbai and Its Effectiveness in Implementation in Other Cities
Authors: Anurag Jha
Abstract:
Dharavi is the largest slum in Asia, for which many redevelopment projects have been put forth, to improve the housing conditions of the locals. And yet, these projects are met with much-unexpected resistance from the locals. The research analyses the why and the how of the resistances these projects face and analyses these programs and points out the flaws and benefits of such projects, by predicting its impact on the regulars of Dharavi. The research aims to analyze various aspects of Dharavi, which affect its socio-cultural backdrops, such as its history, and eventual growth into a mega slum. Through various surveys, the research aims to analyze the life of a slum dweller, the street life, and the effect of such settlement on the urban fabric. Various development projects such as Dharavi Museum Movement, are analyzed, and a feasibility and efficiency analysis of the proposals for redevelopment of Dharavi Slums has been theorized. Flaws and benefits of such projects, by predicting its impact on the regulars of Dharavi has been the major approach to the research. Also, prediction the implementation of these projects in another prominent slum area, Anand Nagar, Bhopal, with the use of generated hypothetical model has been done. The research provides a basic framework for a comparative analysis of various redevelopment projects and the effect of implementation of such projects on the general populace. Secondly, it proposes a hypothetical model for feasibility of such projects in certain slum areas.Keywords: Anand Nagar, Bhopal slums, Dharavi, slum redevelopment programmes
Procedia PDF Downloads 3311663 Riemannain Geometries Of Visual Space
Authors: Jacek Turski
Abstract:
The visual space geometries are constructed in the Riemannian geometry framework from simulated iso-disparity conics in the horizontalvisual plane of the binocular system with the asymmetric eyes (AEs). For the eyes fixating at the abathic distance, which depends on the AE’s parameters, the iso-disparity conics are frontal straight lines in physical space. For allother fixations, the iso-disparity conics consist of families of the ellipses or hyperbolas depending on both the AE’s parameters and the bifoveal fixation. However, the iso-disparity conic’s arcs are perceived in the gaze direction asthe frontal lines and are referred to as visual geodesics. Thus, geometriesof physical and visual spaces are different. A simple postulate that combines simulated iso-disparity conics with basic anatomy od the human visual system gives the relative depth for the fixation at the abathic distance that establishes the Riemann matric tensor. The resulting geodesics are incomplete in the gaze direction and, therefore, give thefinite distances to the horizon that depend on the AE’s parameters. Moreover, the curvature vanishes in this eyes posture such that visual space is flat. For all other fixations, only the sign of the curvature canbe inferred from the global behavior of the simulated iso-disparity conics: the curvature is positive for the elliptic iso-disparity curves and negative for the hyperbolic iso-disparity curves.Keywords: asymmetric eye model, iso-disparity conics, metric tensor, geodesics, curvature
Procedia PDF Downloads 1451662 An Optimized Association Rule Mining Algorithm
Authors: Archana Singh, Jyoti Agarwal, Ajay Rana
Abstract:
Data Mining is an efficient technology to discover patterns in large databases. Association Rule Mining techniques are used to find the correlation between the various item sets in a database, and this co-relation between various item sets are used in decision making and pattern analysis. In recent years, the problem of finding association rules from large datasets has been proposed by many researchers. Various research papers on association rule mining (ARM) are studied and analyzed first to understand the existing algorithms. Apriori algorithm is the basic ARM algorithm, but it requires so many database scans. In DIC algorithm, less amount of database scan is needed but complex data structure lattice is used. The main focus of this paper is to propose a new optimized algorithm (Friendly Algorithm) and compare its performance with the existing algorithms A data set is used to find out frequent itemsets and association rules with the help of existing and proposed (Friendly Algorithm) and it has been observed that the proposed algorithm also finds all the frequent itemsets and essential association rules from databases as compared to existing algorithms in less amount of database scan. In the proposed algorithm, an optimized data structure is used i.e. Graph and Adjacency Matrix.Keywords: association rules, data mining, dynamic item set counting, FP-growth, friendly algorithm, graph
Procedia PDF Downloads 4211661 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 2661660 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report
Authors: Elizabeta Krstić Vukelja
Abstract:
Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.Keywords: regulation, healthcare system, personal dana protection, quality data assurance
Procedia PDF Downloads 38