Search results for: four common ethics/ virtues
4923 K-12 Students’ Digital Life: Activities and Attitudes
Authors: Meital Amzalag, Sharon Hardof-Jaffe
Abstract:
In the last few decades, children and youth have been immersed in digital technologies. Indeed, recent studies explored the implication of technology use in their leisure and learning activities. Educators face an essential need to utilize technology and implement them into the curriculum. To do that, educators need to understand how young people use digital technology. This study aims to explore K12 students' digital lives from their point of view, to reveal their digital activities, age and gender differences with respect to digital activities, and to present the students' attitudes towards technologies in learning. The study approach is quantitative and includes354 students ages 6-16 from three schools in Israel. The online questionnaire was based on self-reports and consists of four parts: Digital activities: leisure time activities (such as social networks, gaming types), search activities (information types and platforms), and digital application use (e.g., calendar, notes); Digital skills (requisite digital platform skills such as evaluation and creativity); Social and emotional aspects of digital use (conducting digital activities alone and with friends, feelings, and emotions during digital use such as happiness, bullying); Digital attitudes towards digital integration in learning. An academic ethics board approved the study. The main findings reveal the most popular K12digital activities: Navigating social network sites, watching TV, playing mobile games, seeking information on the internet, and playing computer games. In addition, the findings reveal age differences in digital activities, such as significant differences in the use of social network sites. Moreover, the finding raises gender differences as girls use more social network sites and boys use more digital games, which are characterized by high complexity and challenges. Additionally, we found positive attitudes towards technology integration in school. Students perceive technology as enhancing creativity, promoting active learning, encouraging self-learning, and helping students with learning difficulties. The presentation will provide an up-to-date, accurate picture of the use of various digital technologies by k12 students. In addition, it will discuss the learning potentials of such use and how to implement digital technologies in the curriculum. Acknowledgments: This study is a part of a broader study about K-12 digital life in Israel and is supported by Mofet-the Israel Institute for Teachers'Development.Keywords: technology and learning, K-12, digital life, gender differences
Procedia PDF Downloads 1394922 Methodology to Affirm Driver Engagement in Dynamic Driving Task (DDT) for a Level 2 Adas Feature
Authors: Praneeth Puvvula
Abstract:
Autonomy in has become increasingly common in modern automotive cars. There are 5 levels of autonomy as defined by SAE. This paper focuses on a SAE level 2 feature which, by definition, is able to control the vehicle longitudinally and laterally at the same time. The system keeps the vehicle centred with in the lane by detecting the lane boundaries while maintaining the vehicle speed. As with the features from SAE level 1 to level 3, the primary responsibility of dynamic driving task lies with the driver. This will need monitoring techniques to ensure the driver is always engaged even while the feature is active. This paper focuses on the these techniques, which would help the safe usage of the feature and provide appropriate warnings to the driver.Keywords: autonomous driving, safety, adas, automotive technology
Procedia PDF Downloads 924921 Relations between the Internal Employment Conditions of International Organizations and the Characteristics of the National Civil Service
Authors: Renata Hrecska
Abstract:
This research seeks to fully examine the internal employment law of international organizations by comparing it with the characteristics of the national civil service. The aim of the research is to compare the legal system that has developed over many centuries and the relatively new internal staffing regulations to find out what solution schemes can help each other through mutual legal development in order to respond effectively to the social challenges of everyday life. Generally, the rules of civil service of any country or international entity have in common that they have, in their pragmatics inherently, the characteristic that makes them serving public interests. Though behind the common base there are many differences: there is the clear fragmentation of state regulation and the unity of organizational regulation. On the other hand, however, this difference disappears to some extent: the public service regulation of international organizations can be considered uniform until we examine it within, but not outside an organization. As soon as we compare the different organizations we may find many different solutions for staffing regulations. It is clear that the national civil service is a strong model for international organizations, but the question may be whether the staffing policy of international organizations can serve the national civil service as an example, too. In this respect, the easiest way to imagine a legislative environment would be to have a single comprehensive code, the general part of which is the Civil Service Act itself, and the specific part containing specific, necessarily differentiating rules for each layer of the civil service. Would it be advantageous to follow the footsteps of the leading international organizations, or is there any speciality in national level civil service that we cannot avoid during regulating processes? In addition to the above, the personal competencies of officials working in international organizations and public administrations also show a high degree of similarity, regardless of the type of employment. Thus, the whole public service system is characterized by the fundamental and special values that a person capable of holding a public office must be able to demonstrate, in some cases, even without special qualifications. It is also interesting how we can compare the two spheres of employment in light of the theory of Lawyer Louis Brandeis, a judge at the US Supreme Court, who formulated a complex theory of profession as distinguished from other occupations. From this point of view we can examine the continuous development of research and specialized knowledge at work; the community recognition and social status; that to what extent we can see a close-knit professional organization of altruistic philosophy; that how stability grows in the working conditions due to the stability of the profession; and that how the autonomy of the profession can prevail.Keywords: civil service, comparative law, international organizations, regulatory systems
Procedia PDF Downloads 1384920 Applications of Sulfur Nanoparticles: Synthesis and Characterizations
Authors: Sandeep K. Shukla, Roli Jain, Soumitra S. Pande, Archna Pandey
Abstract:
Sulfur nanoparticles were prepared by different methods with different sizes and shapes. When the sulfur is present as nanoparticles they have many practical applications in our life. This research discusses sulfur nanoparticles synthesis, characterizations and applications. With dandruff being a common everyday problem and the market is loaded with antidandruff shampoos and such skin care products, it is obvious to assume resourceful research into this area would be both objective to present scenario and potentially lucrative. Nanoparticles are frequently in use in some very powerful antimicrobial, antifungal cosmetics nowadays, especially silver. To check its antidandruff activity, experiments have been conducted on Malassezia furfur the causal organism for seborrheaic dermatitis or dandruff, which have been cultured for such study in our lab.Keywords: CTAB surfactant SEM, sulfur nanoparticles (S-NPs), XRD, polymeric surfactant
Procedia PDF Downloads 5944919 Development of Femoral Head Osteonecrosis Due to Corticosteroids Consumption; Probable Role of OCP: A Case Report
Authors: S. Alireza Mirghasemi, Shervin Rashidinia, Mohammad Saleh Sadeghi, Mohsen Talebizadeh, Narges Rahimi Gabaran, Seyed Shahin Eftekhari, Sara Shahmoradi
Abstract:
Avascular necrosis of femoral head is a pathologic condition that the main cause is decreased blood supply of femoral head. Among predisposing risk factors, chronic use of corticosteroids, alcoholism, smocking and hip traumas have more important role. Also we can mention OCP consumption as a risk factor among less common predisposing factors that lead to AVNF, in this study we introduce another cause of AVNF with a period of treatment with moderate dose of corticosteroids accompanied by OCP as a probable facilitating factor that leads to AVNF.Keywords: AVN, corticosteroids consumption, femoral head osteonecrosis, OCP
Procedia PDF Downloads 4744918 A Lightning Strike Mimic: The Abusive Use of Dog Shock Collar Presents as Encephalopathy, Respiratory Arrest, Cardiogenic Shock, Severe Hypernatremia, Rhabdomyolysis, and Multiorgan Injury
Authors: Merrick Lopez, Aashish Abraham, Melissa Egge, Marissa Hood, Jui Shah
Abstract:
A 3 year old male with unknown medical history presented initially with encephalopathy, intubated for respiratory failure, and admitted to the pediatric intensive care unit (PICU) with refractory shock. During resuscitation in the emergency department, he was found to be in severe metabolic acidosis with a pH of 7.03 and escalated on vasopressor drips for hypotension. His initial sodium was 174. He was noted to have burn injuries to his scalp, forehead, right axilla, bilateral arm creases and lower legs. He had rhabdomyolysis (initial creatinine kinase 5,430 U/L with peak levels of 62,340 normal <335 U/L), cardiac injury (initial troponin 88 ng/L with peak at 145 ng/L, normal <15ng/L), hypernatremia (peak 174, normal 140), hypocalcemia, liver injury, acute kidney injury, and neuronal loss on magnetic resonance imaging (MRI). Soft restraints and a shock collar were found in the home. He was critically ill for 8 days, but was gradually weaned off drips, extubated, and started on feeds. Discussion Electrical injury, specifically lightning injury is an uncommon but devastating cause of injury in pediatric patients. This patient with suspected abusive use of a dog shock collar presented similar to a lightning strike. Common entrance points include the hands and head, similar to our patient with linear wounds on his forehead. When current enters, it passes through tissues with the least resistance. Nerves, blood vessels, and muscles, have high fluid and electrolyte content and are commonly affected. Exit points are extremities: our child who had circumferential burns around his arm creases and ankles. Linear burns preferentially follow areas of high sweat concentration, and are thought to be due to vaporization of water on the skin’s surface. The most common cause of death from a lightning strike is due to cardiopulmonary arrest. The massive depolarization of the myocardium can result in arrhythmias and myocardial necrosis. The patient presented in cardiogenic shock with evident cardiac damage. Electricity going through vessels can lead to vaporization of intravascular water. This can explain his severe hypernatremia. He also sustained other internal organ injuries (adrenal glands, pancreas, liver, and kidney). Electrical discharge also leads to direct skeletal muscle injury in addition to prolonged muscular spasm. Rhabdomyolysis, the acute damage of muscle, leads to release of potentially toxic components into the circulation which could lead to acute renal failure. The patient had severe rhabdomyolysis and renal injury. Early hypocalcemia has been consistently demonstrated in patients with rhabdomyolysis. This was present in the patient and led to increased vasopressor needs. Central nervous system injuries are also common which can include encephalopathy, hypoxic injury, and cerebral infarction. The patient had evidence of brain injury as seen on MRI. Conclusion Electrical injuries due to lightning strikes and abusive use of a dog shock collar are rare, but can both present in similar ways with respiratory failure, shock, hypernatremia, rhabdomyolysis, brain injury, and multiorgan damage. Although rare, it is essential for early identification and prompt management for acute and chronic complications in these children.Keywords: cardiogenic shock, dog shock collar, lightning strike, rhabdomyolysis
Procedia PDF Downloads 924917 An Investigation into the Isolation and Bandwidth Characteristics of X-Band Chireix Power Amplifier Combiners
Authors: Daniel P. Clayton, Edward A. Ball
Abstract:
This paper describes an investigation into the isolation characteristics and bandwidth performance of RF combiners that are used as part of Chireix PA architectures, designed for use in the X-Band range of frequencies. Combiner designs investigated are the typical Chireix and Wilkinson configurations which also include simulation of the Wilkinson using manufacturer’s data for the isolation resistor. Another simulation was the less common approach of using a Branchline coupler to form the combiner, as well as simulation results from adding an additional stage. This paper presents the findings of this investigation and compares the bandwidth performance and isolation characteristics to determine suitability.Keywords: bandwidth, Chireix, couplers, outphasing, power amplifiers, Wilkinson, X-Band
Procedia PDF Downloads 2634916 Evaluation of the Role of Simulation and Virtual Reality as High-Yield Adjuncts to Paediatric Education
Authors: Alexandra Shipley
Abstract:
Background: Undergraduate paediatric teaching must overcome two major challenges: 1) balancing patient safety with active student engagement and 2) exposing students to a comprehensive range of pathologies within a relatively short clinical placement. Whilst lectures and shadowing on paediatric wards constitute the mainstay of learning, Simulation and Virtual Reality (VR) are emerging as effective teaching tools, which - immune to the unpredictability and seasonal variation of hospital presentations - could expose students to the entire syllabus more reliably, efficiently, and independently. We aim to evaluate the potential utility of Simulation and VR in addressing gaps within the traditional paediatric curriculum from the perspective of medical students. Summary of Work: Exposure to and perceived utility of various learning opportunities within the Paediatric and Emergency Medicine courses were assessed through a questionnaire completed by 5th year medical students (n=23). Summary of Results: Students reported limited exposure to several common acute paediatric presentations, such as bronchiolitis (41%), croup (32%) or pneumonia (14%), and to clinical emergencies, including cardiac/respiratory arrests or trauma calls (27%). Across all conditions, average self-reported confidence in assessment and management to the level expected of an FY1 is greater amongst those who observed at least one case (e.g. 7.6/10 compared with 3.6/10 for croup). Students rated exposure through Simulation or VR to be of similar utility to witnessing a clinical scenario on the ward. In free text responses, students unanimously favoured being ‘challenged’ through ‘hands-on’ patient interaction over passive shadowing, where it is ‘easy to zone out.’ In recognition of the fact that such independence is only appropriate in certain clinical situations, many students reported wanting more Simulation and VR teaching. Importantly, students raised the necessity of ‘proper debriefs’ after these sessions to maximise educational value. Discussion and Conclusion: Our questionnaire elicited several student-perceived challenges in paediatric education, including incomplete exposure to common pathologies and limited opportunities for active involvement in patient care. Indeed, these experiences seem to be important predictors of confidence. Quantitative and qualitative feedback suggests that VR and Simulation satisfy students’ self-reported appetite for independent engagement with authentic clinical scenarios. Take-aways: Our findings endorse further development of VR and Simulation as high-yield adjuncts to paediatric education.Keywords: paediatric emergency education, simulation, virtual reality, medical education
Procedia PDF Downloads 764915 A Study of Chromatic Uniqueness of W14
Authors: Zainab Yasir Al-Rekaby, Abdul Jalil M. Khalaf
Abstract:
Coloring the vertices of a graph such that every two adjacent vertices have different color is a very common problem in the graph theory. This is known as proper coloring of graphs. The possible number of different proper colorings on a graph with a given number of colors can be represented by a function called the chromatic polynomial. Two graphs G and H are said to be chromatically equivalent, if they share the same chromatic polynomial. A Graph G is chromatically unique, if G is isomorphic to H for any graph H such that G is chromatically equivalent to H. The study of chromatically equivalent and chromatically unique problems is called chromaticity. This paper shows that a wheel W14 is chromatically unique.Keywords: chromatic polynomial, chromatically Equivalent, chromatically unique, wheel
Procedia PDF Downloads 4164914 Speciation of Bacteria Isolated from Clinical Canine and Feline Urine Samples by Using ChromID CPS Elite Agar: A Preliminary Study
Authors: Delsy Salinas, Andreia Garcês, Augusto Silva, Paula Brilhante Simões
Abstract:
Urinary tract infection (UTI) is a common disease affecting dogs and cats in both community and hospital environment. Bacteria is the most frequent agent isolated, fewer than 1% of infections are due to parasitic, fungal, or viral agents. Common symptoms and laboratory abnormalities includeabdominal pain, pyrexia, renomegaly, and neutrophilia with left shift. A rapid and precise identification of the bacterial agent is still a challenge in veterinarian laboratories. Therefore, this cross-sectional study aims to describe bacterial colony patterns of urine samples by using chromID™ CPS® EliteAgar (BioMérieux, France) from canine and feline specimens submitted to a veterinary laboratory in Portugal (INNO Veterinary Laboratory, Braga)from January to March2022. All urine samples were cultivated in CPS Elite Agar with calibrated 1 µL inoculating loop and incubated at 37ºC for 18-24h. Color,size, and shape (regular or irregular outline)were recorded for all samples. All colonies were classified as Gram-negative or Gram-positive bacteriausing Gram stain (PREVI® Color BioMérieux, France) and determined if they were pure colonies. Identification of bacteria species was performed using GP and GN cards inVitek 2® Compact(BioMérieux, France). A total of 256/1003 submitted urine samples presented bacterial growth, from which 172 isolates were included in this study. The sample’s population included 111 dogs (n=45 males and n=66 females) and 61 cats (n=35 males and n=26 females). The most frequent isolated bacteria wasEscherichia coli (44,7%), followed by Proteus mirabilis (13,4%). All Escherichia coli isolates presented red to burgundy colonies, a colony diameter between 2 to 6 mm, and regular or irregular outlines. Similarly, 100% of Proteus mirabilis isolates were dark yellow colonies with a diffuse pigment and the same size and shape as Escherichia coli. White and pink pale colonies where Staphylococcus species exclusively and S. pseudintermedius was the most frequent (8,2 %). Cian to blue colonies were mostly Enterococcusspp. (8,2%) and Streptococcus spp. (4,6%). Beige to brown colonies were Pseudomonas aeruginosa (2,9%) and Citrobacter spp. (1,2%).Klebsiella spp.,Serratia spp. and Enterobacter spp were green colonies. All Gram-positive isolates were 1 to 2 mm diameter long and had a regular outline, meanwhile, Gram-negative rods presented variable patterns. This results showed that theprevalence of E coli and P. mirabilis as uropathogenic agents follows the same trends in Europe as previously described in other studies. Both agents presented a particular color pattern in CPS Elite Agar to identify them without needing complementary tests. No other bacteria genus could be correlated strongly to a specific color pattern, and similar results have been observed instudies using human’s samples. Chromogenic media shows a great advantage for common urine bacteria isolation than traditional COS, McConkey, and CLEDAgar mediums in a routine context, especially when mixed fermentative Gram-negative agents grow simultaneously. In addition, CPS Elite Agar is versatile for Artificial Intelligent Reading Plates Systems. Routine veterinarian laboratories could use CPS Elite Agar for a rapid screening for bacteria identification,mainlyE coli and P.mirabilis, saving 6h to 10h of automatized identification.Keywords: cats, CPS elite agar, dogs, urine pathogens
Procedia PDF Downloads 1074913 Radiographic Evaluation of Odontogenic Keratocyst: A 14 Years Retrospective Study
Authors: Nor Hidayah Reduwan, Jira Chindasombatjaroen, Suchaya Pornprasersuk-Damrongsri, Sopee Pomsawat
Abstract:
INTRODUCTION: Odontogenic keratocyst (OKC) remain as a controversial pathologic entity under the scrutiny of many researchers and maxillofacial surgeons alike. The high recurrence rate and relatively aggressive nature of this lesion demand a meticulous analysis of the radiographic characteristic of OKC leading to the formulation of an accurate diagnosis. OBJECTIVE: This study aims to determine the radiographic characteristic of odontogenic keratocyst (OKC) using conventional radiographs and cone beam computed tomography (CBCT) images. MATERIALS AND METHODS: Patients histopathologically diagnosed as OKC from 2003 to 2016 by Oral and Maxillofacial Pathology Department were retrospectively reviewed. Radiographs of these cases from the archives of the Department of Oral and Maxillofacial Radiology, Faculty of Dentistry Mahidol University were retrieved. Assessment of the location, shape, border, cortication, locularity, the relationship of lesion to embedded tooth, displacement of adjacent tooth, root resorption and bony expansion of the lesion were conducted. RESULTS: Radiographs of 91 patients (44 males, 47 females) with the mean age of 31 years old (10 to 84 years) were analyzed. Among all patients, 5 cases were syndromic patients. Hence, a total of 103 OKCs were studied. The most common location was at the ramus of mandible (32%) followed by posterior maxilla (29%). Most cases presented as a well-defined unilocular radiolucency with smooth and corticated border. The lesion was in associated with embedded tooth in 48 lesions (47%). Eighty five percent of embedded tooth are impacted 3rd molar. Thirty-seven percentage of embedded tooth were entirely encapsulated in the lesion. The lesion attached to the embedded tooth at the cementoenamel junction (CEJ) in 40% and extended to part of root in 23% of cases. Teeth displacement and root resorption were found in 29% and 6% of cases, respectively. Bony expansion in bucco-lingual dimension was seen in 63% of cases. CONCLUSION: OKCs were predominant in the posterior region of the mandible with radiographic features of a well-defined, unilocular radiolucency with smooth and corticated margin. The lesions might relate to an embedded tooth by surrounding an entire tooth, attached to the CEJ level or extending to part of root. Bony expansion could be found but teeth displacement and root resorption were not common. These features might help in giving the differential diagnosis.Keywords: cone beam computed tomography, imaging dentistry, odontogenic keratocyst, radiographic features
Procedia PDF Downloads 1294912 Models of Innovation Processes and Their Evolution: A Literature Review
Authors: Maier Dorin, Maier Andreea
Abstract:
Today, any organization - regardless of the specific activity - must be prepared to face continuous radical changes, innovation thus becoming a condition of survival in a globalized market. Not all managers have an overall view on the real size of necessary innovation potential. Unfortunately there is still no common (and correct) understanding of the term of innovation among managers. Moreover, not all managers are aware of the need for innovation. This article highlights and analyzes a series of models of innovation processes and their evolution. The models analyzed encompass both the strategic level and the operational one within an organization, indicating performance innovation on each landing. As the literature review shows, there are no easy answers to the innovation process as there are no shortcuts to great results. Successful companies do not have a silver innovative bullet - they do not get results by making one or few things better than others, they make everything better.Keywords: innovation, innovation process, business success, models of innovation
Procedia PDF Downloads 4064911 Evaluation of Cytotoxic Effect of Two Diterpenes from Plectranthus barbatus
Authors: Nawal Al Musayeib, Musarat Amina, Perwez Alam
Abstract:
Plectranthus barbatus Andrews (Lamiaceae) is the most common species of genus Plectranthus. It is used for treating various ailments. In this study, two rare diterpenes 11,14-dihydroxy-8,11,13-abietatrien-7-one (1) and 12-hydroxyabieta-8(14),9(11),12-trien-7-one (2) were isolated for the first time from P. barbatus. Their chemical structures were verified utilizing various spectroscopic experiments. The effect of diterpenes against undifferentiated/anaplastic thyroid cancer cell line (FRO) was evaluated and they were quantitatively analysed using HPTLC method. The two diterpenes were found to be cytotoxic, however compound 1 showed significant cytotoxic effects where 95% reduction in the cell viability was observed in different time intervals. The quantity of compound 1 and compound 2 in PBCE were found to be 2.04 and15.97 μg/mg, respectively of dried weight of the extract.Keywords: abietatrien, cancer, diterpenes, Plectranthus barbatus
Procedia PDF Downloads 2574910 Inclusive Design for Regaining Lost Identity: Accessible, Aesthetic and Effortless Clothing
Authors: S. Tandon, A. Oussoren
Abstract:
Clothing is a need for all humans. Besides serving the commonly understood function of protection, it also is a means of self-expression and adornment. However, most clothing for people with disabilities is developed to respond to their functional needs merely. Such clothing aggravates feelings of inadequacy and lowers their self-esteem. Investigations into apparel-related barriers faced by women with disabilities and their expectations and desires about clothing pointed to a huge void in terms of well-designed inclusive clothing. The incredible stories and experiences shared by the participants in this research highlighted the fact that people with disabilities wanted to feel, dress, and look at how they wanted to look by wearing what they wanted to wear. Clothing should be about self-expression – reflecting their moods, taste, and style and not limited to fulfilling merely their functional needs. Inclusive Design for Regaining Lost Identity was undertaken to design and develop accessible clothing that is inclusive and fashionable to foster psycho-social well-being and to enhance the self-esteem of women with disabilities. The research explored inclusive design solutions for the saree – a traditional Indian garment for women. The saree is an elaborate garment that requires precise draping, which makes the saree complicated to wear and inconvenient to carry, particularly for women with physical disabilities. For many women in India, the saree remains the customary dress, especially for work and occasions, yet minimal advancement has been made to enhance its accessibility and ease of use. The project followed a qualitative research approach whilst incorporating a combination of methods, which consisted of a questionnaire, an interview, and co-creation workshops. The research adhered to the principles of applied research such that the designed products aim to solve a problem that is functional and purposeful. In order to reduce the complications and to simplify the wrapping of the garment fabric around the body, different combinations of pre-stitching of the layers of the saree were created to investigate the outcomes. The technology of 3D drawing and printing was employed to develop feasible fasteners keeping in mind the participants’ movement limitations and to enhance their agency with these newly designed fasteners. The underlying principle of the project is that every individual should be able to access life the way they wish to and should not have to compromise their desires due to their disability.Keywords: accessibility, co-creation, design ethics, inclusive
Procedia PDF Downloads 1184909 Towards a Standardization in Scheduling Models: Assessing the Variety of Homonyms
Authors: Marcel Rojahn, Edzard Weber, Norbert Gronau
Abstract:
Terminology is a critical instrument for each researcher. Different terminologies for the same research object may arise in different research communities. By this inconsistency, many synergistic effects get lost. Theories and models will be more understandable and reusable if a common terminology is applied. This paper examines the terminological (in) consistency for the research field of job-shop scheduling through a literature review. There is an enormous variety in the choice of terms and mathematical notation for the same concept. The comparability, reusability, and combinability of scheduling methods are unnecessarily hampered by the arbitrary use of homonyms and synonyms. The acceptance in the community of used variables and notation forms is shown by means of a compliance quotient. This is proven by the evaluation of 240 scientific publications on planning methods.Keywords: job-shop scheduling, terminology, notation, standardization
Procedia PDF Downloads 1124908 Evaluation of Mixtures of Recycled Concrete Aggregate and Reclaimed Asphalt Pavement Aggregate in Road Subbases
Authors: Vahid Ayan, Joshua R Omer, Alireza Khavandi, Mukesh C Limbachiya
Abstract:
In Iran, utilization of reclaimed asphalt pavement (RAP) aggregate has become a common practice in pavement rehabilitation during the last ten years. Such developments in highway engineering have necessitated several studies to clarify the technical and environmental feasibility of other alternative materials in road rehabilitation and maintenance. The use of recycled concrete aggregates (RCA) in asphalt pavements is one of the major goals of municipality of Tehran. Nevertheless little research has been done to examine the potential benefits of local RCA. The objective of this study is laboratory investigation of incorporating RCA into RAP for use in unbound subbase application. Laboratory investigation showed that 50%RCA+50%RAP is both technically and economically appropriate for subbase use.Keywords: Roads & highways, Sustainability, Recycling & reuse of materials
Procedia PDF Downloads 4984907 A Mixed Thought Pattern and the Question of Justification: A Feminist Project
Authors: Angana Chatterjee
Abstract:
The feminist scholars point out the various problematic issues in the traditional mainstream western thought and theories. The thought practices behind the discriminatory and oppressive social practices are based on concepts that play a pivotal role in theorisation. Therefore, many feminist philosophers take up reformation or reconceptualisation projects. Such projects have bearings on various aspects of philosophical thought, namely, ontology, epistemology, logic, ethics, social, political thought, and so on. In tune with this spirit, the present paper suggests a well-established thought pattern which is not western but has got the potential to deal with the problems of mainstream western thought culture that are identified by the feminist critics. The Indian thought pattern is theorised in the domain of Indian logic, which is a study of inference patterns. As, in the Indian context, the inference is considered as a source of knowledge, certain epistemological questions are linked with the discussion of inference. One of the key epistemological issues is one regarding justification. The study about the nature of derivation of knowledge from available evidence, and the nature of the evidence itself, are integral parts of the discipline called Indian logic. But if we contrast the western tradition of thought with the Indian one, we can find that the Indian logic has got some peculiar features which may be shown to deal with the problems identified by the feminist scholars in western thought culture more plausibly. The tradition of western logic, starting from Aristotle, has been maintaining sharp differences between two forms of reasoning, namely, deductive and inductive. These two different forms of reasoning have been theorised and dealt with separately within the domain of the study called ‘logic.’ There are various philosophical problems that are raised around concepts and issues regarding both deductive and inductive reasoning. Indian logic does not distinguish between deduction and induction as thought patterns, but their distinction is very usual to make in the western tradition. Though there can be found various interpretations about this peculiarity of Indian thought pattern, these mixed patterns were actually very close to the cross-cultural pattern in which human beings would tend to argue or infer from the available data or evidence. The feminist theories can successfully operate in the domain of lived experience if they make use of such a mixed pattern of reasoning or inference. By offering sound inferential knowledge on contextual evidences, the Indian thought pattern is potent to serve the feminist purposes in a meaningful way.Keywords: feminist thought, Indian logic, inference, justification, mixed thought pattern
Procedia PDF Downloads 1064906 Accidents and Close Call Situations Connected to the Use of Mobile Phones in Working-Age People ≥ 50 Years Old
Authors: Leena Korpinen, Rauno Pääkkönen, Fabriziomaria Gobba
Abstract:
The aim of this paper is to investigate accidents and close call situations connected to the use of mobile phones in working-age people ≥ 50 years old. The paper is part of a cross-sectional study that was carried out in 2002 in 15,000 working-age Finns. The study showed that mobile-phone-related accidents and close call situations, both at work and at leisure, are more common in people under 50 years that in people ≥ 50 years old. However, people under 50 use mobile phones more than those aged ≥ 50.Keywords: mobile phone, age, accident, close call situation
Procedia PDF Downloads 3544905 Comparison of the Distillation Curve Obtained Experimentally with the Curve Extrapolated by a Commercial Simulator
Authors: Lívia B. Meirelles, Erika C. A. N. Chrisman, Flávia B. de Andrade, Lilian C. M. de Oliveira
Abstract:
True Boiling Point distillation (TBP) is one of the most common experimental techniques for the determination of petroleum properties. This curve provides information about the performance of petroleum in terms of its cuts. The experiment is performed in a few days. Techniques are used to determine the properties faster with a software that calculates the distillation curve when a little information about crude oil is known. In order to evaluate the accuracy of distillation curve prediction, eight points of the TBP curve and specific gravity curve (348 K and 523 K) were inserted into the HYSYS Oil Manager, and the extended curve was evaluated up to 748 K. The methods were able to predict the curve with the accuracy of 0.6%-9.2% error (Software X ASTM), 0.2%-5.1% error (Software X Spaltrohr).Keywords: distillation curve, petroleum distillation, simulation, true boiling point curve
Procedia PDF Downloads 4454904 Mathematical Model for Defection between Two Political Parties
Authors: Abdullahi Mohammed Auwal
Abstract:
Formation and change or decamping from one political party to another have now become a common trend in Nigeria. Many of the parties’ members who could not secure positions and or win elections in their parties or are not very much satisfied with the trends occurring in the party’s internal democratic principles and mechanisms, change their respective parties. This paper developed/presented and analyzed the used of non linear mathematical model for defections between two political parties using epidemiological approach. The whole population was assumed to be a constant and homogeneously mixed. Equilibria have been analytically obtained and their local and global stability discussed. Conditions for the co-existence of both the political parties have been determined, in the study of defections between People Democratic Party (PDP) and All Progressive Congress (APC) in Nigeria using numerical simulations to support the analytical results.Keywords: model, political parties, deffection, stability, equilibrium, epidemiology
Procedia PDF Downloads 6404903 An Explanatory Practice Example: The Reasons of Students Not Doing Any Extra Work
Authors: Özge Özsoy
Abstract:
Teachers usually complain that their students do not study enough to further practice the subjects they have covered in class. Teachers tend to focus on how often and hard they should study rather than finding out the main reasons why most students avoid doing any extra work to improve their skills. In this study, with the use of exploratory practice method, 40 English preparatory class students at Anadolu University will discuss this puzzle through an in-class discussion and create posters describing the reasons for and solutions to it. The overlapping data from the posters will be categorized in two sections as reasons and solutions in a final poster. The study aims at revealing the student perspective of a common puzzle that troubles many teachers.Keywords: exploratory practice, extra work, puzzle, students, teachers
Procedia PDF Downloads 3444902 Antiglycemic Activity of Raw Plant Materials as Potential Components of Functional Food
Authors: Ewa Flaczyk, Monika Przeor, Joanna Kobus-Cisowska, Józef Korczak
Abstract:
The aim of this paper was to collect the information concerning the most popular raw plant materials of antidiabetic activity, in a context of functional food developing production. The elaboration discusses morphological elements possible for an application in functional food production of the plants such as: common bean, ginger, Ceylon cinnamon, white mulberry, fenugreek, French lilac, ginseng, jambolão, and bitter melon. An activity of bioactive substances contained in these raw plant materials was presented, pointing their antiglycemic and also hypocholesterolemic, antiarthritic, antirheumatic, antibacterial, and antiviral activity in the studies on humans and animals. Also the genesis of functional food definition was presented.Keywords: antiglycemic activity, raw plant materials, functional food, food, nutritional sciences
Procedia PDF Downloads 4764901 Accurate and Repeatable Pressure Control for Critical Testing of Advanced Ceramics Using Proportional and Derivative Controller
Authors: Benchalak Muangmeesri
Abstract:
The purpose of this paper is to discuss how to test the best control performance of a ceramics. Hydraulic press machine (HPM) is the most common shaping of advanced ceramic with products, dimensions, and ceramic products mainly from synthetic powders. A microcontroller can be achieved to control process and has set high standards in the shaping of raw materials in powder form. HPM was proposed to develop a position control system that linked to the embedded controller PIC16F877 via Proportional and Derivative (PD) controller. The model is performed using MATLAB/SIMULINK and the best control performance of an HPM. Finally, PD controller results, showing the best performance as it had the smallest overshoot and highest quality using a microcontroller control.Keywords: ceramics, hydraulic press, microcontroller, PD controller
Procedia PDF Downloads 3604900 Ethics and Military Defections in Nonviolent Resistance Campaigns
Authors: Adi Levy
Abstract:
Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.Keywords: culpability, defections, nonviolence, permissibility
Procedia PDF Downloads 1224899 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1434898 Low Power Consuming Electromagnetic Actuators for Pulsed Pilot Stages
Authors: M. Honarpardaz, Z. Zhang, J. Derkx, A. Trangärd, J. Larsson
Abstract:
Pilot stages are one of the most common positioners and regulators in industry. In this paper, we present two novel concepts for pilot stages with low power consumption to regulate a pneumatic device. Pilot 1, first concept, is designed based on a conventional frame core electro-magnetic actuator and a leaf spring to control the air flow and pilot 2 has an axisymmetric actuator and spring made of non-oriented electrical steel. Concepts are simulated in a system modeling tool to study their dynamic behavior. Both concepts are prototyped and tested. Experimental results are comprehensively analyzed and compared. The most promising concept that consumes less than 8 mW is highlighted and presented.Keywords: electro-magnetic actuator, multidisciplinary system, low power consumption, pilot stage
Procedia PDF Downloads 2584897 The Feminism of Data Privacy and Protection in Africa
Authors: Olayinka Adeniyi, Melissa Omino
Abstract:
The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment.Keywords: feminism, women, law, data, Africa
Procedia PDF Downloads 2134896 Comparing Community Detection Algorithms in Bipartite Networks
Authors: Ehsan Khademi, Mahdi Jalili
Abstract:
Despite the special features of bipartite networks, they are common in many systems. Real-world bipartite networks may show community structure, similar to what one can find in one-mode networks. However, the interpretation of the community structure in bipartite networks is different as compared to one-mode networks. In this manuscript, we compare a number of available methods that are frequently used to discover community structure of bipartite networks. These networks are categorized into two broad classes. One class is the methods that, first, transfer the network into a one-mode network, and then apply community detection algorithms. The other class is the algorithms that have been developed specifically for bipartite networks. These algorithms are applied on a model network with prescribed community structure.Keywords: community detection, bipartite networks, co-clustering, modularity, network projection, complex networks
Procedia PDF Downloads 6304895 Determination of Lead , Cadmium, Nickel and Zinc in Some Green Tea Samples Collected from Libyan Markets
Authors: Jamal A. Mayouf, Hashim Salih Al Bayati, Eltayeb M. Emmima
Abstract:
Green tea is one of the most common drinks in all cities of Libyan. Heavy metal contents such as cadmium (Cd), lead (Pb), nickel (Ni) and zinc (Zn) were determined in four green tea samples collected from Libyan market and their tea infusions by using atomic emission spectrophotometry after acid digestion. The results obtained indicate that the concentrations of Cd, Pb, Ni and Zn in tea infusions samples ranged from 0.07-0.12, 0.19-0.28, 0.09-0.15, 0.18-0.43 mg/l after boiling for 5 min., 0.06-0.08, 0.18-0.23, 0.08-0.14, 0.17-0.27 mg/l after boiling for 10 min., 0.07-0.11, 0.18-0.24, 0.08-0.14, 0.21-0.34 mg/l after boiling for 15 min. respectively. On the other hand, the concentrations of the same element mentioned above obtained in tea leaves ranged from 6.0-18.0, 36.0-42.0, 16.0-20.0, 44.0-132.0 mg/kg respectively. The concentrations of Cd, Pb, Ni and Zn in tea leaves samples were higher than Prevention of Food Adulteration (PFA) limit and World Health Organization(WHO) permissible limit.Keywords: boiling, infusion, metals, tea
Procedia PDF Downloads 4034894 The Effect of Artificial Intelligence on Banking Development and Progress
Authors: Mina Malak Hanna Saad
Abstract:
New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development
Procedia PDF Downloads 44