Search results for: rules of civil procedure
2760 New Kinetic Approach to the Enzymatic Hydrolysis of Proteins: A Case of Thermolysin-Catalyzed Albumin
Authors: Anna Trusek-Holownia, Andrzej Noworyta
Abstract:
Using an enzyme of known specificity the hydrolysis of protein was carried out in a controlled manner. The aim was to obtain oligopeptides being the so-called active peptides or their direct precursors. An original way of expression of the protein hydrolysis kinetics was introduced. Peptide bonds contained in the protein were recognized as a diverse-quality substrate for hydrolysis by the applied protease. This assumption was positively verified taking as an example the hydrolysis of albumin by thermolysin. Peptide linkages for this system should be divided into at least four groups. One of them is a group of bonds non-hydrolyzable by this enzyme. These that are broken are hydrolyzed at a rate that differs even by tens of thousands of times. Designated kinetic constants were k'F = 10991.4 L/g.h, k'M = 14.83L/g.h, k'S about 10-1 L/g.h for fast, medium and slow bonds, respectively. Moreover, a procedure for unfolding of the protein, conducive to the improved susceptibility to enzymatic hydrolysis (approximately three-fold increase in the rate) was proposed.Keywords: peptide bond hydrolysis, kinetics, enzyme specificity, biologically active peptides
Procedia PDF Downloads 4402759 Tracing the History of Indian Legal System Vis-A-Vis the Code of Hammurabi
Authors: Vandana Kumari
Abstract:
One of the most ancient and detailed legal codes proclaimed the Babylonian King Hammurabi during his reign in the erstwhile Mesopotamian society, provides a fascinating account of the social and justice system of Babylon. The 282 laws intricately carved on eight feet black stone stela serve as an important source of contemporary commercial, family and criminals laws. This paper attempts an inquiry into the contemporary relevance of this legal code to our current legal system. An exhaustive study of one of ancient legal system based on a series of practical experiences rather than being founded on mere theoretical ideologies can be assumed pertinent to the promulgation of practically viable laws in our country. The first chapter of the paper focuses on law seven which established the rules of commerce and the role of government in overseeing justice and honesty regarding the law of property. The second chapter deals with the laws of family, marriages, divorce and adoption prevailing in the Babylonian era. The third chapter traces the earliest known history of criminal jurisprudence which impregnated the principle of an eye for an eye. The paper is not merely a theoretical account of the Mesopotamian way of living but a novice attempt to discover the roots of Indian laws in the ruins of the courtrooms of the Hammurabi Empire.Keywords: Babylonian legal system, Contemporary relevance, criminal jurisprudence, Hammurabi Code
Procedia PDF Downloads 3082758 Numerical Evaluation of Lateral Bearing Capacity of Piles in Cement-Treated Soils
Authors: Reza Ziaie Moayed, Saeideh Mohammadi
Abstract:
Soft soil is used in many of civil engineering projects like coastal, marine and road projects. Because of low shear strength and stiffness of soft soils, large settlement and low bearing capacity will occur under superstructure loads. This will make the civil engineering activities more difficult and costlier. In the case of soft soils, improvement is a suitable method to increase the shear strength and stiffness for engineering purposes. In recent years, the artificial cementation of soil by cement and lime has been extensively used for soft soil improvement. Cement stabilization is a well-established technique for improving soft soils. Artificial cementation increases the shear strength and hardness of the natural soils. On the other hand, in soft soils, the use of piles to transfer loads to the depths of ground is usual. By using cement treated soil around the piles, high bearing capacity and low settlement in piles can be achieved. In the present study, lateral bearing capacity of short piles in cemented soils is investigated by numerical approach. For this purpose, three dimensional (3D) finite difference software, FLAC 3D is used. Cement treated soil has a strain hardening-softening behavior, because of breaking of bonds between cement agent and soil particle. To simulate such behavior, strain hardening-softening soil constitutive model is used for cement treated soft soil. Additionally, conventional elastic-plastic Mohr Coulomb constitutive model and linear elastic model are used for stress-strain behavior of natural soils and pile. To determine the parameters of constitutive models and also for verification of numerical model, the results of available triaxial laboratory tests on and insitu loading of piles in cement treated soft soil are used. Different parameters are considered in parametric study to determine the effective parameters on the bearing of the piles on cemented treated soils. In the present paper, the effect of various length and height of the artificial cemented area, different diameter and length of the pile and the properties of the materials are studied. Also, the effect of choosing a constitutive model for cemented treated soils in the bearing capacity of the pile is investigated.Keywords: bearing capacity, cement-treated soils, FLAC 3D, pile
Procedia PDF Downloads 1302757 Structural Optimization Method for 3D Reinforced Concrete Building Structure with Shear Wall
Authors: H. Nikzad, S. Yoshitomi
Abstract:
In this paper, an optimization procedure is applied for 3D Reinforced concrete building structure with shear wall. In the optimization problem, cross sections of beams, columns and shear wall dimensions are considered as design variables and the optimal cross sections can be derived to minimize the total cost of the structure. As for final design application, the most suitable sections are selected to satisfy ACI 318-14 code provision based on static linear analysis. The validity of the method is examined through numerical example of 15 storied 3D RC building with shear wall. This optimization method is expected to assist in providing a useful reference in design early stage, and to be an effective and powerful tool for structural design of RC shear wall structures.Keywords: structural optimization, linear static analysis, ETABS, MATLAB, RC moment frame, RC shear wall structures
Procedia PDF Downloads 2582756 A Morphological Analysis of Swardspeak in the Philippines
Authors: Carlo Gadingan
Abstract:
Swardspeak, as a language, highlights the exclusive identity of the Filipino gay men and the oppression they are confronted in the society. This paper presents a morphological analysis of swardspeak in the Philippines. Specifically, it aims to find out the common morphological processes involved in the construction of codes that may unmask the nature of swardspeak as a language. 30 purposively selected expert users of swardspeak from Luzon, Visayas, and Mindanao were asked to codify 30 natural words through the Facebook Messenger application. The results of the structural analysis affirm that swardspeak follows no specific rules revealing complicated combinations of clipping/stylized clipping, borrowing, connotation through images, connotation through actions, connotation through sounds, affixation, repetition, substitution, and simple reversal. Moreover, it was also found out that most of these word formation processes occur in all word classes which indicate that swardspeak is very unpredictable. Although different codes are used for the same words, there are still codes that are really common to all homosexuals and these are Chaka (ugly), Crayola (cry), and Aida (referring to a person with AIDS). Hence, the prevailing word formation processes explored may be termed as observed time-specific patterns because the codes documented in this study may turn obsolete and may be replaced with novel ones in a matter of weeks to month, knowing the creativity of homosexuals and the multiplicity of societal resources which can be used to make the codes more opaque and more confusing for non-homosexuals.Keywords: codes, homosexuals, morphological processes, swardspeak
Procedia PDF Downloads 1862755 An Examination of Criminology and Cyber Crime in Contemporary Society
Authors: Uche A. Nnawulezi
Abstract:
The evolving global environment has as of late seen formative difficulties bordering on cyber crime and its attendant effects. This paper looks at what constitutes an offense of cyber crime under the tenets of International Law as no nation can lay bona-fide claim in managing cyber crime as a criminal phenomenon. Therefore, there has been a plethora of ideological, conceptual and mental propositions of policies aimed at domesticating cyber crimes – an international crime. These policies were as a result of parochial consideration and social foundations which negate the spirit of internationally accepted procedures. The study also noted that the non-domestication of cyber crime laws by most countries has led to an increase in cyber crimes and its attendant effects have remained unabated. The author has pointed out emerging international rules as a panacea for a sustainable cyber crime-free society. The paper relied on documentary evidence and hence scooped much of the data from secondary sources such as text books, journals, articles and periodicals and more so, opinion papers, emanating from international criminal court. It concludes that the necessary recommendations made in this paper, if fully adopted, shall go a long way in maintaining a cyber crime-free society. Ultimately, the domestic and international law mechanisms capable of dealing with cyber crime offenses should be expanded and be made proactive in order to deal with the demands of modern day challenges.Keywords: criminology, cyber crime, domestic law, international law
Procedia PDF Downloads 1972754 Expanding the Evaluation Criteria for a Wind Turbine Performance
Authors: Ivan Balachin, Geanette Polanco, Jiang Xingliang, Hu Qin
Abstract:
The problem of global warming raised up interest towards renewable energy sources. To reduce cost of wind energy is a challenge. Before building of wind park conditions such as: average wind speed, direction, time for each wind, probability of icing, must be considered in the design phase. Operation values used on the setting of control systems also will depend on mentioned variables. Here it is proposed a procedure to be include in the evaluation of the performance of a wind turbine, based on the amplitude of wind changes, the number of changes and their duration. A generic study case based on actual data is presented. Data analysing techniques were applied to model the power required for yaw system based on amplitude and data amount of wind changes. A theoretical model between time, amplitude of wind changes and angular speed of nacelle rotation was identified.Keywords: field data processing, regression determination, wind turbine performance, wind turbine placing, yaw system losses
Procedia PDF Downloads 3932753 Interplay of Imaginary, Symbolic and Real In Shakespeare's Hamlet, Disturbance of Nature
Authors: Mahnaz Poorshahidi
Abstract:
This article is a psychological reading of Shakespeare’s Hamlet applying Lacan’s ideas to work with a new look. Lacan entitled Hamlet ‘tragedy of desire’. He believes that Hamlet is caught up in the desire of his mother. So he is the universal symbol of all human beings, regardless of their sex, who desire their mother, but based on the rules of Nature and Father, this unity is impossible. Hamlet hesitates in fulfilling the task of revenge and the text says nothing about the reasons and motives behind it. However, this essay tries to answer the question and justify Hamlet’s hesitation. There is one question for the readers, which is why Hamlet appears to delay in killing his uncle, despite the fact that this is precisely what he seems to want to do. In 1958-59 Lacan delivered a series of lectures on Hamlet entitled ‘Desire and Its Interpretations’ and called it ‘tragedy of desire’. However, this article will have a new representation of Hamlet’s decision not to take revenge. The research demonstrates that Hamlet has passed through imaginary, symbolic and real stages, which are the natural process of life. Eliminating father means disturbing this natural process. This essay is going to conclude that killing Claudius can break the natural order of life. On the other hand, Claudius has also disturbed nature and is regretful about his deed. Hamlet’s ever-present speech ‘To be or not to be’ reflects his mental turmoil and disturbance of the natural life cycle: Nature.Keywords: desire, father figure, lacan, nature
Procedia PDF Downloads 2402752 Extreme Rainfall Frequency Analysis For Meteorological Sub-Division 4 Of India Using L-Moments.
Authors: Arti Devi, Parthasarthi Choudhury
Abstract:
Extreme rainfall frequency analysis for Meteorological Sub-Division 4 of India was analysed using L-moments approach. Serial Correlation and Mann Kendall tests were conducted for checking serially independent and stationarity of the observations. The discordancy measure for the sites was conducted to detect the discordant sites. The regional homogeneity was tested by comparing with 500 generated homogeneous regions using a 4 parameter Kappa distribution. The best fit distribution was selected based on ZDIST statistics and L-moments ratio diagram from the five extreme value distributions GPD, GLO, GEV, P3 and LP3. The LN3 distribution was selected and regional rainfall frequency relationship was established using index-rainfall procedure. A regional mean rainfall relationship was developed using multiple linear regression with latitude and longitude of the sites as variables.Keywords: L-moments, ZDIST statistics, serial correlation, Mann Kendall test
Procedia PDF Downloads 4452751 Smartphone Video Source Identification Based on Sensor Pattern Noise
Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Abstract:
An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification
Procedia PDF Downloads 4312750 Medical Neural Classifier Based on Improved Genetic Algorithm
Authors: Fadzil Ahmad, Noor Ashidi Mat Isa
Abstract:
This study introduces an improved genetic algorithm procedure that focuses search around near optimal solution corresponded to a group of elite chromosome. This is achieved through a novel crossover technique known as Segmented Multi Chromosome Crossover. It preserves the highly important information contained in a gene segment of elite chromosome and allows an offspring to carry information from gene segment of multiple chromosomes. In this way the algorithm has better possibility to effectively explore the solution space. The improved GA is applied for the automatic and simultaneous parameter optimization and feature selection of artificial neural network in pattern recognition of medical problem, the cancer and diabetes disease. The experimental result shows that the average classification accuracy of the cancer and diabetes dataset has improved by 0.1% and 0.3% respectively using the new algorithm.Keywords: genetic algorithm, artificial neural network, pattern clasification, classification accuracy
Procedia PDF Downloads 4762749 Neuro-Connectivity Analysis Using Abide Data in Autism Study
Authors: Dulal Bhaumik, Fei Jie, Runa Bhaumik, Bikas Sinha
Abstract:
Human brain is an amazingly complex network. Aberrant activities in this network can lead to various neurological disorders such as multiple sclerosis, Parkinson’s disease, Alzheimer’s disease and autism. fMRI has emerged as an important tool to delineate the neural networks affected by such diseases, particularly autism. In this paper, we propose mixed-effects models together with an appropriate procedure for controlling false discoveries to detect disrupted connectivities in whole brain studies. Results are illustrated with a large data set known as Autism Brain Imaging Data Exchange or ABIDE which includes 361 subjects from 8 medical centers. We believe that our findings have addressed adequately the small sample inference problem, and thus are more reliable for therapeutic target for intervention. In addition, our result can be used for early detection of subjects who are at high risk of developing neurological disorders.Keywords: ABIDE, autism spectrum disorder, fMRI, mixed-effects model
Procedia PDF Downloads 2922748 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 2392747 Dogmatic Instrumant in Financing Micro Project
Authors: Adel Fatima Zohra, Guendouz Abdelkader
Abstract:
The solitary sector seems to appear nowadays as a third sector along the private and public ones, because of their ineptitude to take in charge the social exigency of the society regarding the lack in their local assets and the weakness of their financial institutions. The role of this sector is promoting a set of activities in the field of the charity, without aiming neither the individual profit nor a power practice. With the rise in the need of domestic resources, it is possible to count on the Zakat funding to realize some investment projects in order to develop the local society in many sectors as health, agriculture … etc. In the Islamic financial system, the Zakat is likely one of the most important instruments in financing the local development with the respect of the “Charia” rules: the amount of the Zakat is 2.5% of a wealth equivalent of each 85 gr of gold possessed since one year at least. In Algeria a fund of Zakat, was created since 2003 as an alternative to the public finding of development. This fund is a religious and social institution under the supervision of the ministry of religious affairs. This supervision covers two tasks: the first is traditional witch concern the distribution and the forwarding of the zakat to the poor people, and the second is modern concerning the financing of microcredits in the aim to enhance social and economic development. In this paper, we try to highlight the main role of the Zakat fund and its impact on the both social and economic development in Algeria.Keywords: dogmatic instrument, solidary sector, zakat fund, micro project
Procedia PDF Downloads 2792746 The Effect on Some Plant Traits of Cutting Frequency Applied in Species of Grass
Authors: Mehmet Ali Avcı, Medine Çopur Doğrusöz
Abstract:
This study has been carried out in the Selcuk University, Department of Fields Crops Research and Application Greenhouse. 4 different grass genotypes (1 Lolium perenne L., 1 Poa trivialis L., 1 Festuca ovina L., and 1 Festuca arundinacea Scheb.) have been used in the application. It has been done with four repetition according to design of random parcel test. The research have been started with the implementation of 3 clones to each pot of each kind on 07.12.2009. It has been processed normally. When the plants have filled % 80 of the pot and have grown to the height of 7-10 cm, 5 cm has cut. After the first cutting, there have been applied 4 cutting frequency within the periods of 5, 10, 15, 20 days. Number of tillers, the degree of filling the bottom, the height of plant, the length of leaf and the width of the leaf have been measured. This procedure have been repeated in once a-five-day-periods, once a-ten-day-periods, once a-fifteen-day-periods, once a-twenty-day-periods, the data have been taken, and it has completed in 60 days. All the plants in the pots have been reaped from the 5cm height on 16.08.2010. The first measures have been taken for each quality. It is aimed to set the effects of different cutting frequency on the some grass kinds’ some plant characteristics.Keywords: cutting frequency, Festuca, Lolium, Poa
Procedia PDF Downloads 3402745 Changing Landscape of International Law of Governance: ‘One Belt One Road Initiative’ as a Case Study
Authors: Tikumporn Rodkhunmuang
Abstract:
The importance of ‘international law of governance’ is the means and end to deal with international affairs. This research paper seeks to first study the historical development of international law of governance from the classical period of the international legal framework of global governance until the contemporary period of its framework. Second, the international law of governance is extremely turning into the crucial point in its long history because of the changing of China's foreign policies towards ‘One Belt One Road Initiative’. Third, the proposing model of the existing international law of governance within Chinese characteristics will be the new rules and modalities of modern diplomacy and governed international affairs. Methodologically speaking, this research paper is conducting under mixed methods research, which are also included numerical analysis and theoretical considerations. As a result, this research paper is the critical point of the international legal framework of global governance that changing the diplomatic paradigm as well as turning China into a great-power in international politics. So, this research paper is useful for international legal scholars and diplomats for slightly changing their understanding of the rapidly changing their norms from western norms to the eastern norms of international law. Therefore, the outcome of the research is the modern model of China to make a diplomatic relationship with other countries in the global society.Keywords: global governance, international law, landscape, one belt one road
Procedia PDF Downloads 1902744 Improving Research by the Integration of a Collaborative Dimension in an Information Retrieval (IR) System
Authors: Amel Hannech, Mehdi Adda, Hamid Mcheick
Abstract:
In computer science, the purpose of finding useful information is still one of the most active and important research topics. The most popular application of information retrieval (IR) are Search Engines, they meet users' specific needs and aim to locate the effective information in the web. However, these search engines have some limitations related to the relevancy of the results and the ease to explore those results. In this context, we proposed in previous works a Multi-Space Search Engine model that is based on a multidimensional interpretation universe. In the present paper, we integrate an additional dimension that allows to offer users new research experiences. The added component is based on creating user profiles and calculating the similarity between them that then allow the use of collaborative filtering in retrieving search results. To evaluate the effectiveness of the proposed model, a prototype is developed. The experiments showed that the additional dimension has improved the relevancy of results by predicting the interesting items of users based on their experiences and the experiences of other similar users. The offered personalization service allows users to approve the pertinent items, which allows to enrich their profiles and further improve research.Keywords: information retrieval, v-facets, user behavior analysis, user profiles, topical ontology, association rules, data personalization
Procedia PDF Downloads 2652743 Importance of Access to Public Information on Modern Slavery for Brazil's Livestock Sector
Authors: Juliana Brandao, Holly Gibbs, Lisa Naughton, Lisa Rausch
Abstract:
The Brazilian Amazon continues to be plagued by modern day slave labor, specifically within the cattle production industry. In response to this issue, modern day anti-slavery activists have implemented additional regulations designed to combat slave labor associated with cattle. These regulations have been incorporated into existing agreements designed to control deforestation. The goal of these rules is to prevent the trade of beef contaminated with modern slave labor between supplier farms and slaughterhouses. In this study, we identify farms that make use of modern slave labor, and we use cattle transaction data to track the sale of cattle between farms and slaughterhouses. Our analysis reveals that slaughterhouses, which have signed cattle agreements that include requirements to refuse cattle associated with modern slave labor, have avoided buying cattle from suppliers that were on the dirty list. This trend is especially evident when the "dirty lists" that identify modern-day slave labor users are made publicly accessible online. We conclude that the "dirty list" of modern-day slave labor users should be maintained on publicly available websites to allow slaughterhouses, retailers, and consumers to send powerful market signals that discourage the use of modern-day slave labor.Keywords: cattle ranchers, modern slave labor, deforestation, brazilian amazon
Procedia PDF Downloads 1232742 A Corpus Based Study of Eileen Chang’s Self-Translating Style: A Case Study on The Rice Sprout Song
Authors: Yi-Wei Huang
Abstract:
Eileen Chang is a well-known writer of modern Chinese literature. She is also a translator that publishes her self-translation The Rice Sprout Song. The purpose of the study is to identify the style of Eileen Chang’s self-translations by corpora, especially in the case of The Rice Sprout Song. The Rice Sprout Song is first written in English and then translated into Chinese by the author herself. The procedure of translation is complicated due to the bilingual transition by the same person. Therefore, the aim of the study is to identify Eileen Chang’s style on her self-translation by comparing her works The Old Man and the Sea, The Rice Sprout Song, and The Rouge of The North. The study uses computer-aided software like AntConc, Notepad++, StanfordCoreNLP, and Python to analyze the style of the works, especially focuses on reduplications and the composition of the sentences. Reduplications are commonly seen in Eileen Chang’s works, and they often appear with colors or onomatopoeia. With these criteria, the style of self-translating can be detected and analyzed.Keywords: corpora, Eileen Chang, reduplications, self-translation
Procedia PDF Downloads 2472741 Surface Modified Electrospun Expanded Polystyrene Fibre with Superhydrophobic/Superoleophillic Properties as Potential Oil Membrane
Authors: S. Oluwagbemiga Alayande, E. Olugbenga Dare, Titus A. M. Msagati, A. Kehinde Akinlabi , P. O. Aiyedun
Abstract:
This paper presents a cheap route procedure for the preparation of a potential oil membrane with superhydrophobic /superoleophillic properties for selective removal of crude oil from water. In these study, expanded polystyrene (EPS) was electrospun to produce beaded fibers in which zeolite was introduced to the polymer matrix in order to impart rough surface to non-beaded fiber. Films of the EPS and EPS/Zeolite solutions were also made for comparative study. The electrospun fibers EPS, EPS/Zeolite and resultant films were characterized using SEM, BET, FTIR and optical contact angle. The fibers exhibited superhydrophic and superoleophillic wetting properties with water and crude oil. The selective removal of crude oil presents new opportunity for the re-use of EPS as adsorbent in petroleum/petrochemical industry.Keywords: expanded polystyrene, superhydrophobic, superoleophillic, oil-membrane
Procedia PDF Downloads 4742740 Human Security as a Tool of Protecting International Human Rights Law
Authors: Arenca Trashani
Abstract:
20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.Keywords: human security, international human rights law, development, Albania, international law
Procedia PDF Downloads 7612739 A Secure System for Handling Information from Heterogeous Sources
Authors: Shoohira Aftab, Hammad Afzal
Abstract:
Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.Keywords: information integration, semantic data, interoperability, security, access control system
Procedia PDF Downloads 3612738 Evaluation of Cryoablation Procedures in Treatment of Atrial Fibrillation from 3 Years' Experiences in a Single Heart Center
Authors: J. Yan, B. Pieper, B. Bucsky, B. Nasseri, S. Klotz, H. H. Sievers, S. Mohamed
Abstract:
Cryoablation is evermore applied for interventional treatment of paroxysmal (PAAF) or persistent atrial fibrillation (PEAF). In the cardiac surgery, this procedure is often combined with coronary arterial bypass graft (CABG) and valve operations. Three different methods are feasible in this sense in respect to practicing extents and mechanisms such as lone left atrial cryoablation, Cox-Maze IV and III in our heart center. 415 patients (68 ± 0.8ys, male 68.2%) with predisposed atrial fibrillation who initially required either coronary or valve operations were enrolled and divided into 3 matched groups according to deployed procedures: CryoLA-group (cryoablation of lone left atrium, n=94); Cox-Maze-IV-group (n=93) and Cox-Maze-III-group (n=8). All patients additionally received closure of the left atrial appendage (LAA) and regularly underwent three-year ambulant follow-up assessments (3, 6, 9, 12, 18, 24, 30 and 36 months). Burdens of atrial fibrillation were assessed directly by means of cardiac monitor (Reveal XT, Medtronic) or of 3-day Holter electrocardiogram. Herewith, attacks frequencies of AF and their circadian patterns were systemically analyzed. Furthermore, anticoagulants and regular rate-/rhythm-controlling medications were evaluated and listed in terms of anti-rate and anti-rhythm regimens. Concerning PAAF treatment, Cox Maze IV procedure provided therapeutically acceptable effect as lone left atrium (LA) cryoablation did (5.25 ± 5.25% vs. 10.39 ± 9.96% AF-burden, p > 0.05). Interestingly, Cox Maze III method presented a better short-term effect in the PEAF therapy in comparison to lone cryoablation of LA and Cox Maze IV (0.25 ± 0.23% vs. 15.31 ± 5.99% and 9.10 ± 3.73% AF-burden within the first year, p < 0.05). But this therapeutic advantage went lost during ongoing follow-ups (26.65 ± 24.50% vs. 8.33 ± 8.06% and 15.73 ± 5.88% in 3rd follow-up year). In this way, lone LA-cryoablation established its antiarrhythmic efficacy and 69.5% patients were released from the Vit-K-antagonists, while Cox Maze IV liberated 67.2% patients from continuous anticoagulant medication. The AF-recurrences mostly performed such attacks property as less than 60min duration for all 3 procedures (p > 0.05). In the sense of the circadian distribution of the recurrence attacks, weighted by ongoing follow-ups, lone LA cryoablation achieved and stabilized the antiarrhythmic effects over time, which was especially observed in the treatment of PEAF, while Cox Maze IV and III had their antiarrhythmic effects weakened progressively. This phenomenon was likewise evaluable in the therapy of circadian rhythm of reverting AF-attacks. Furthermore, the strategy of rate control was much more often applied to support and maintain therapeutic successes obtained than the one of rhythm control. Derived from experiences in our heart center, lone LA cryoablation presented equivalent effects in the treatment of AF in comparison to Cox Maze IV and III procedures. These therapeutic successes were especially investigable in the patients suffering from persistent AF (PEAF). Additional supportive strategies such as rate control regime should be initialized and implemented to improve the therapeutic effects of the cryoablations according to appropriate criteria.Keywords: AF-burden, atrial fibrillation, cardiac monitor, COX MAZE, cryoablation, Holter, LAA
Procedia PDF Downloads 2062737 From Forked Tongues to Tinkerbell Ears: Rethinking the Criminalization of Alternative Body Modification in the UK
Authors: Luci V. Hyett
Abstract:
The criminal law of England and Wales currently deems that a person cannot consent to the infliction of injury upon their own body, where the level of harm is considered to be Actual or Grevious. This renders the defence of consent of the victim as being unavailable to those persons carrying out an Alternative Body Modification procedure. However, the criminalization of consensual injury is more appropriately deemed as being categorized as an offense against public morality and not one against the person, which renders the State’s involvement in the autonomous choices of a consenting adult, when determining what can be done to one’s own body, an arbitrary one. Furthermore, to recognise in law that a person is capable of giving a valid consent to socially acceptable cosmetic interventions that largely consist of procedures designed to aesthetically please men and, not those of people who want to modify their bodies for other reasons means that patriarchal attitudes are continuing to underpin public repulsion and inhibit social acceptance of such practices. Theoretical analysis will begin with a juridical examination of R v M(B) [2019] QB 1 where the High Court determined that Alternative Body Modification was not a special category exempting a person so performing from liability for Grevious Bodily Harm using the defence of consent. It will draw from its reasoning which considered that ‘the removal of body parts were medical procedures being carried out for no medical reason by someone not qualified to carry them out’ which will form the basis of this enquiry. It will consider the philosophical work of Georgio Agamben when analysing whether the biopolitical climate in the UK, which places the optimization of the perfect, healthy body at the centre of political concern can explain why those persons who wish to engage in Alternative Body Modification are treated as the ‘Exception’ to that which is normal using the ‘no medical reason’ canon to justify criminalisation, rather than legitimising the industry through regulation. It will consider, through a feminist lens, the current conflict in law between traditional cosmetic interventions which alter one’s physical appearance for socially accepted aesthetic purposes such as those to the breast, lip and buttock and, modifications described as more outlandish such as earlobe stretching, tooth filing and transdermal implants to create horns and spikes under the skin. It will assert that ethical principles relating to the psychological impact of body modification described as ‘alternative’ is used as a means to exclude person’s seeking such a procedure from receiving safe and competent treatment via a registered cosmetic surgeon which leads to these increasingly popular surgery’s being performed in Tattoo parlours throughout the UK as an extension to other socially acceptable forms of self-modification such as piercings. It will contend that only by ‘inclusive exclusion’ will those ‘othered’ through ostracisation be welcomed into the fold of normality and this can only be achieved through recognition of alternative body modification as a legitimate cosmetic intervention, subject to the same regulatory framework as existing practice. This would assist in refocusing the political landscape by erring on the side of liberty rather than that of biology.Keywords: biopolitics, body modification, consent, criminal law
Procedia PDF Downloads 1102736 Corporate Governance and Business Ethical Values in Organisation: AStudyof Unilag Holdings
Authors: Aribisala Oluwadamilare Olufolarin
Abstract:
The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things.Keywords: business ethics, business ethical values, corporate governance, organization
Procedia PDF Downloads 182735 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2282734 Redefining Surgical Innovation in Urology: A Historical Perspective of the Original Publications on Pioneering Techniques in Urology
Authors: Samuel Sii, David Homewood, Brendan Dittmer, Tony Nzembela, Jonathan O’Brien, Niall Corcoran, Dinesh Agarwal
Abstract:
Introduction: Innovation is key to the advancement of medicine and improvement in patient care. This is particularly true in surgery, where pioneering techniques have transformed operative management from a historically highly risky peri-morbid and disfiguring to the contemporary low-risk, sterile and minimally invasive treatment modality. There is a delicate balance between enabling innovation and minimizing patient harm. Publication and discussion of novel surgical techniques allow for independent expert review. Recent journals have increasingly stringent requirements for publications and often require larger case volumes for novel techniques to be published. This potentially impairs the initial publication of novel techniques and slows innovation. The historical perspective provides a better understanding of how requirements for the publication of new techniques have evolved over time. This is essential in overcoming challenges in developing novel techniques. Aims and Objectives: We explore how novel techniques in Urology have been published over the past 200 years. Our objective is to describe the trend and publication requirements of novel urological techniques, both historical and present. Methods: We assessed all major urological operations using multipronged historical analysis. An initial literature search was carried out through PubMed and Google Scholar for original literature descriptions, followed by reference tracing. The first publication of each pioneering urological procedure was recorded. Data collected includes the year of publication, description of the procedure, number of cases and outcomes. Results: 65 papers describing pioneering techniques in Urology were identified. These comprised of 2 experimental studies, 17 case reports and 46 case series. These papers described various pioneering urological techniques in urological oncology, reconstructive urology and endourology. We found that, historically, techniques were published with smaller case numbers. Often, the surgical technique itself was a greater focus of the publication than patient outcome data. These techniques were often adopted prior to larger publications. In contrast, the risks and benefits of recent novel techniques are often well-defined prior to adoption. This historical perspective is important as recent journals have requirements for larger case series and data outcomes. This potentially impairs the initial publication of novel techniques and slows innovation. Conclusion: A better understanding of historical publications and their effect on the adoption of urological techniques into common practice could assist the current generation of Urologists in formulating a safe, efficacious process in promoting surgical innovation and the development of novel surgical techniques. We propose the reassessment of requirements for the publication of novel operative techniques by splitting technical perspectives and data-orientated case series. Existing frameworks such as IDEAL and ASERNIP-S should be integrated into current processes when investigating and developing new surgical techniques to ensure efficacious and safe innovation within surgery is encouraged.Keywords: urology, surgical innovation, novel surgical techniques, publications
Procedia PDF Downloads 532733 An Automated Business Process Management for Smart Medical Records
Authors: K. Malak, A. Nourah, S.Liyakathunisa
Abstract:
Nowadays, healthcare services are facing many challenges since they are becoming more complex and more needed. Every detail of a patient’s interactions with health care providers is maintained in Electronic Health Records (ECR) and Healthcare information systems (HIS). However, most of the existing systems are often focused on documenting what happens in manual health care process, rather than providing the highest quality patient care. Healthcare business processes and stakeholders can no longer rely on manual processes, to provide better patient care and efficient utilization of resources, Healthcare processes must be automated wherever it is possible. In this research, a detail survey and analysis is performed on the existing health care systems in Saudi Arabia, and an automated smart medical healthcare business process model is proposed. The business process management methods and rules are followed in discovering, collecting information, analysis, redesign, implementation and performance improvement analysis in terms of time and cost. From the simulation results, it is evident that our proposed smart medical records system can improve the quality of the service by reducing the time and cost and increasing efficiencyKeywords: business process management, electronic health records, efficiency, cost, time
Procedia PDF Downloads 3462732 Experimental Chip/Tool Temperature FEM Model Calibration by Infrared Thermography: A Case Study
Authors: Riccardo Angiuli, Michele Giannuzzi, Rodolfo Franchi, Gabriele Papadia
Abstract:
Temperature knowledge in machining is fundamental to improve the numerical and FEM models used for the study of some critical process aspects, such as the behavior of the worked material and tool. The extreme conditions in which they operate make it impossible to use traditional measuring instruments; infrared thermography can be used as a valid measuring instrument for temperature measurement during metal cutting. In the study, a large experimental program on superduplex steel (ASTM A995 gr. 5A) cutting was carried out, the relevant cutting temperatures were measured by infrared thermography when certain cutting parameters changed, from traditional values to extreme ones. The values identified were used to calibrate a FEM model for the prediction of residual life of the tools. During the study, the problems related to the detection of cutting temperatures by infrared thermography were analyzed, and a dedicated procedure was developed that could be used during similar processing.Keywords: machining, infrared thermography, FEM, temperature measurement
Procedia PDF Downloads 1862731 A Case Study of Kick Control in Tough Potohar Region
Authors: Iftikhar Raza
Abstract:
Well control is the management of the hazardous effects caused by the unexpected release of formation fluid, such as natural gas and/or crude oil, upon surface equipment of oil or gas drilling rigs and escaping into the atmosphere. Technically, oil well control involves preventing the formation fluid, usually referred to as kick, from entering into the wellbore during drilling. Oil well control is one of the most important aspects of drilling operations. Improper handling of kicks in oil well control can result in blowouts with very grave consequences, including the loss of valuable resources. Even though the cost of a blowout (as a result of improper/no oil well control) can easily reach several millions of US dollars, the monetary loss is not as serious as the other damages that can occur: irreparable damage to the environment, waste of valuable resources, ruined equipment, and most importantly, the safety and lives of personnel on the drilling rig. In this paper, case study of a well is discussed with field data showing the properties of the well. The whole procedure of controlling this well is illustrated in this which may be helpful for professional dealing with such kind of problems.Keywords: kick control, kill sheet, oil well, gas drilling
Procedia PDF Downloads 515