Search results for: genetic data protection issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30908

Search results for: genetic data protection issues

29288 Comparative Performance of Artificial Bee Colony Based Algorithms for Wind-Thermal Unit Commitment

Authors: P. K. Singhal, R. Naresh, V. Sharma

Abstract:

This paper presents the three optimization models, namely New Binary Artificial Bee Colony (NBABC) algorithm, NBABC with Local Search (NBABC-LS), and NBABC with Genetic Crossover (NBABC-GC) for solving the Wind-Thermal Unit Commitment (WTUC) problem. The uncertain nature of the wind power is incorporated using the Weibull probability density function, which is used to calculate the overestimation and underestimation costs associated with the wind power fluctuation. The NBABC algorithm utilizes a mechanism based on the dissimilarity measure between binary strings for generating the binary solutions in WTUC problem. In NBABC algorithm, an intelligent scout bee phase is proposed that replaces the abandoned solution with the global best solution. The local search operator exploits the neighboring region of the current solutions, whereas the integration of genetic crossover with the NBABC algorithm increases the diversity in the search space and thus avoids the problem of local trappings encountered with the NBABC algorithm. These models are then used to decide the units on/off status, whereas the lambda iteration method is used to dispatch the hourly load demand among the committed units. The effectiveness of the proposed models is validated on an IEEE 10-unit thermal system combined with a wind farm over the planning period of 24 hours.

Keywords: artificial bee colony algorithm, economic dispatch, unit commitment, wind power

Procedia PDF Downloads 373
29287 DNA Vaccine Study against Vaccinia Virus Using In vivo Electroporation

Authors: Jai Myung Yang, Na Young Kim, Sung Ho Shin

Abstract:

The adverse reactions of current live smallpox vaccines and potential use of smallpox as a bioterror weapon have heightened the development of new effective vaccine for this infectious disease. In the present study, DNA vaccine vector was produced which was optimized for expression of the vaccinia virus L1 antigen in the mouse model. A plasmid IgM-tL1R, which contains codon-optimized L1R gene, was constructed and fused with an IgM signal sequence under the regulation of a SV40 enhancer. The expression and secretion of recombinant L1 protein was confirmed in vitro 293 T cell. Mice were administered the DNA vaccine by electroporation and challenged with vaccinia virus. We observed that immunization with IgM-tL1R induced potent neutralizing antibody responses and provided complete protection against lethal vaccinia virus challenge. Isotyping studies reveal that immunoglobulin G2 (IgG2) antibody predominated after the immunization, indicative of a T helper type 1 response. Our results suggest that an optimized DNA vaccine, IgM-tL1R, can be effective in stimulating anti-vaccinia virus immune response and provide protection against lethal orthopoxvirus challenge.

Keywords: DNA vaccine, electroporation, L1R, vaccinia virus

Procedia PDF Downloads 261
29286 Optimizing Pediatric Pneumonia Diagnosis with Lightweight MobileNetV2 and VAE-GAN Techniques in Chest X-Ray Analysis

Authors: Shriya Shukla, Lachin Fernando

Abstract:

Pneumonia, a leading cause of mortality in young children globally, presents significant diagnostic challenges, particularly in resource-limited settings. This study presents an approach to diagnosing pediatric pneumonia using Chest X-Ray (CXR) images, employing a lightweight MobileNetV2 model enhanced with synthetic data augmentation. Addressing the challenge of dataset scarcity and imbalance, the study used a Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to generate synthetic CXR images, improving the representation of normal cases in the pediatric dataset. This approach not only addresses the issues of data imbalance and scarcity prevalent in medical imaging but also provides a more accessible and reliable diagnostic tool for early pneumonia detection. The augmented data improved the model’s accuracy and generalization, achieving an overall accuracy of 95% in pneumonia detection. These findings highlight the efficacy of the MobileNetV2 model, offering a computationally efficient yet robust solution well-suited for resource-constrained environments such as mobile health applications. This study demonstrates the potential of synthetic data augmentation in enhancing medical image analysis for critical conditions like pediatric pneumonia.

Keywords: pneumonia, MobileNetV2, image classification, GAN, VAE, deep learning

Procedia PDF Downloads 109
29285 The Diversity of DRB1 Locus of Exon 2 of MHC Molecule of Sudanese Indigenous Desert Sheep

Authors: Muna A. Eissawi, Safaa Abed Elfataah, Haytham Hago, Fatima E Abukunna, Ibtisam Amin Goreish, Nahid Gornas

Abstract:

The study examined and analyzed the genetic diversity of DRB1locus of exon 2 of major histocompatibility complex of Sudanese desert sheep using PCR-RFLP and DNA sequencing. Five hundred samples belonging to five ecotypes of Desert Sudanese sheep (Abrag (Ab), Ashgar (Ash), Hamari (H), Kabashi (K) and Watish (W) were included. Amplification of exon 2 of the DRB1 gene yielded (300bp) amplified product in different ecotypes. Nine different digestion patterns corresponding to Five distinct alleles were observed with Rsa1 digestion. Genotype (ag) was the most common among all ecotypes, with a percentage comprised (40.4 %). The Hardy-Weinberg equilibrium (HWE) test showed that the studied ecotypes have significantly deviated from the theoretical proportions of Rsa1 patterns; probability values of the Chi-square test for HWE for MHC-DRB1 gene in SDS were 0.00 in all ecotypes. The constructed phylogenetic tree revealed the relation of 22 Sudanese isolates with each other and showed the shared sequences with 47 published foreign sequences randomly selected from different geographic regions. The results of this study highlight the effect of heterozygosity of MHC genes of the Desert sheep of Sudan which may clarify some of genetic back ground of their disease resistance and adaptation to environment.

Keywords: desert sheep, MHC, Ovar-DRB1, polymerase chain reaction (PCR), restriction fragment length polymorphism (RFLP)

Procedia PDF Downloads 70
29284 2D Numerical Analysis for Determination of the Effect of Bored Piles Constructed against the Landslide near Karabuk University Stadium

Authors: Dogan Cetin, Burak Turk, Mahmut Candan

Abstract:

Landslides cause remarkable damage and loss of human life every year around the world. They may be made more likely by factors such as earthquakes, heavy precipitation, and incorrect construction activities near or on slopes. The stadium of Karabük University is located at the bottom of a very high slope. After construction of the stadium, severe deformations were observed on the social activity area surrounding the stadium. Some inclinometers were placed behind the stadium to detect the possible landslide activity. According to measurements of the inclinometers, irregular soil movements were detected at depths between 20 m and 45 m. Also, significant heaves and settlements were observed behind the stadium walls located at the toe of the slope. The heaves indicate that the stadium walls were under threat of a significant landslide. After inclinometer readings and field observations, the potential failure geometry was estimated. The protection system was designed based on numerous numerical analysis performed by 2-D Plaxis software. After the design was completed, protective geotechnical work was started. Before the geotechnical work began, new inclinometers were installed to monitor earth movement during the work and afterward. The total horizontal length of the possible failure surface is 220 m. Geotechnical work included two-row-pile construction and three-row-pile construction on the slope. The bored piles were 120 cm in diameter for two-row-pile construction, and 150 cm in diameter for three-row-pile construction. Pile length is 31.30 m for two-row-pile construction and 31.40 m for three-row-pile construction. The distance between two-row-pile and three-row-pile construction is 60 m. With these bored piles, the landslide was divided into three parts. In this way, the earth's pressure was reduced. After a number of inclinometer readings, it was seen that deformation continued during the work, but after the work was done, the movement reversed, and total deformation stayed in mm dimension. It can be said that the protection work eliminated the possible landslide.

Keywords: landslide, landslide protection, inclinometer measurement, bored piles

Procedia PDF Downloads 143
29283 Impact and Implementation of Privatization of State-Owned Enterprise Sustainability in Indonesia

Authors: Afri Ananda Nugroho

Abstract:

Privatization is one of the public policies closely related to the role of government in the economy due to the failure of the centralized system in the communist countries. This paper will discuss the basic issues of privatization as a global trend, the purpose of privatization, implementation, and impact on the success of State-Owned Enterprises (BUMN) in Indonesia. The analysis is done by looking at some important issues about the privatization problem, and some public policies are being applied such as why and how privatization is necessary and what impact it has. This paper also discusses the implications for top leaders of State-Owned Enterprises.

Keywords: privatization, state-owned enterprises, Indonesia, public policy

Procedia PDF Downloads 241
29282 An Empirical Analysis of Farmers Field Schools and Effect on Tomato Productivity in District Malakand Khyber Pakhtunkhwa-Pakistan

Authors: Mahmood Iqbal, Khalid Nawab, Tachibana Satoshi

Abstract:

Farmer Field School (FFS) is constantly aims to assist farmers to determine and learn about field ecology and integrated crop management. The study was conducted to examine the change in productivity of tomato crop in the study area; to determine increase in per acre yield of the crop, and find out reduction in per acre input cost. A study of tomato crop was conducted in ten villages namely Jabban, Bijligar Colony, Palonow, Heroshah, Zara Maira, Deghar Ghar, Sidra Jour, Anar Thangi, Miangano Korona and Wartair of district Malakand. From each village 15 respondents were selected randomly on the basis of identical allocation making sample size of 150 respondents. The research was based on primary as well as secondary data. Primary data was collected from farmers while secondary data were taken from Agriculture Extension Department Dargai, District Malakand. Interview schedule was planned and each farmer was interviewed personally. The study was based on comparison of cost, yield and income of tomato before and after FFS. Paired t-test and Statistical Package for Social Sciences (SPSS) was used for analysis; outcome of the study show that integrated pest management project has brought a positive change in the attitude of farmers of the project area through FFS approach. In district Malakand 66.0% of the respondents were between the age group of 31-50 years, 11.3% of respondents had primary level of education, 12.7% of middle level, 28.7% metric level, 3.3% of intermediate level and 2.0% of graduate level of education while 42.0% of respondents were illiterate and have no education. Average land holding size of farmers was 6.47 acres, cost of seed, crop protection from insect pest and crop protection from diseases was reduced by Rs. 210.67, Rs. 2584.43 and Rs. 3044.16 respectively, the cost of fertilizers and cost of farm yard manure was increased by Rs.1548.87 and Rs. 1151.40 respectively while tomato yield was increased by 1585.03 kg/acre from 7663.87 to 9248.90 kg/acre. The role of FFS initiate by integrated pest management project through department of agriculture extension for the development of agriculture was worth mentioning. It has brought enhancement in crop yield of tomato and their income through FFS approach. On the basis of results of the research studies, integrated pest management project should spread their developmental activities for maximum participation of the complete rural masses through participatory FFS approach.

Keywords: agriculture, Farmers field schools, extension education, tomato

Procedia PDF Downloads 607
29281 Machine learning Assisted Selective Emitter design for Solar Thermophotovoltaic System

Authors: Ambali Alade Odebowale, Andargachew Mekonnen Berhe, Haroldo T. Hattori, Andrey E. Miroshnichenko

Abstract:

Solar thermophotovoltaic systems (STPV) have emerged as a promising solution to overcome the Shockley-Queisser limit, a significant impediment in the direct conversion of solar radiation into electricity using conventional solar cells. The STPV system comprises essential components such as an optical concentrator, selective emitter, and a thermophotovoltaic (TPV) cell. The pivotal element in achieving high efficiency in an STPV system lies in the design of a spectrally selective emitter or absorber. Traditional methods for designing and optimizing selective emitters are often time-consuming and may not yield highly selective emitters, posing a challenge to the overall system performance. In recent years, the application of machine learning techniques in various scientific disciplines has demonstrated significant advantages. This paper proposes a novel nanostructure composed of four-layered materials (SiC/W/SiO2/W) to function as a selective emitter in the energy conversion process of an STPV system. Unlike conventional approaches widely adopted by researchers, this study employs a machine learning-based approach for the design and optimization of the selective emitter. Specifically, a random forest algorithm (RFA) is employed for the design of the selective emitter, while the optimization process is executed using genetic algorithms. This innovative methodology holds promise in addressing the challenges posed by traditional methods, offering a more efficient and streamlined approach to selective emitter design. The utilization of a machine learning approach brings several advantages to the design and optimization of a selective emitter within the STPV system. Machine learning algorithms, such as the random forest algorithm, have the capability to analyze complex datasets and identify intricate patterns that may not be apparent through traditional methods. This allows for a more comprehensive exploration of the design space, potentially leading to highly efficient emitter configurations. Moreover, the application of genetic algorithms in the optimization process enhances the adaptability and efficiency of the overall system. Genetic algorithms mimic the principles of natural selection, enabling the exploration of a diverse range of emitter configurations and facilitating the identification of optimal solutions. This not only accelerates the design and optimization process but also increases the likelihood of discovering configurations that exhibit superior performance compared to traditional methods. In conclusion, the integration of machine learning techniques in the design and optimization of a selective emitter for solar thermophotovoltaic systems represents a groundbreaking approach. This innovative methodology not only addresses the limitations of traditional methods but also holds the potential to significantly improve the overall performance of STPV systems, paving the way for enhanced solar energy conversion efficiency.

Keywords: emitter, genetic algorithm, radiation, random forest, thermophotovoltaic

Procedia PDF Downloads 59
29280 Assessment the Influence of Bitumen Emulsion PAHs Content in Arid Land

Authors: Jalil Badamfirooz

Abstract:

Soil wind erosion has a negative impact on the environment. Mulching is one of the most efficient soil protection techniques. Bitumen emulsion has recently been utilized as a soil cover that is sprayed directly over the soil and forms a thin film. The thin coating of bitumen emulsion prevents soil erosion and keeps moisture in the soil. Besides, some compounds release into the soil and cause environmental problems. In the present study, the effect of bitumen emulsion on the release of polycyclic aromatic hydrocarbons (PAHs) into the soil is studied in an arid land located in the central part of Iran. The soil was Loamy-Sand and saline with a pH of 8.03. Bitumen emulsion was used in this study as mulch at a rate of 4 L m2. The effect of this mulch on soil properties was investigated after 6 months of mulch application. Then PAHs concentrations were determined in samples collected from different depths in bitumen emulsion sprayed and control soils. In general, bitumen emulsion application on soil led to a significant increase in some PAHs, which was higher than soil pollution standards critical level of pollution for commerce, groundwater protection, pasture forest, and park and residence uses.

Keywords: mulch, bitumen emulsion, arid land, PAH

Procedia PDF Downloads 84
29279 Protecting Human Health under International Investment Law

Authors: Qiang Ren

Abstract:

In the past 20 years, under the high standard of international investment protection, there have been numerous cases of investors ignoring the host country's measures to protect human health. Examples include investment disputes triggered by the Argentine government's measures related to human health, quality, and price of drinking water under the North American Free Trade Agreement. Examples also include Philip Morris v. Australia, in which case the Australian government announced the passing of the Plain Packing of Cigarettes Act to address the threat of smoking to public health in 2010. In order to take advantage of the investment treaty protection between Hong Kong and Australia, Philip Morris Asia acquired Philip Morris Australia in February 2011 and initiated investment arbitration under the treaty before the passage of the Act in July 2011. Philip Morris claimed the Act constitutes indirect expropriation and violation of fair and equitable treatment and claimed 4.16 billion US dollars compensation. Fortunately, the case ended at the admissibility decision stage and did not enter the substantive stage. Generally, even if the host country raises a human health defense, most arbitral tribunals will rule that the host country revoke the corresponding policy and make huge compensation in accordance with the clauses in the bilateral investment treaty to protect the rights of investors. The significant imbalance in the rights and obligations of host states and investors in international investment treaties undermines the ability of host states to act in pursuit of human health and social interests beyond economic interests. This squeeze on the nation's public policy space and disregard for the human health costs of investors' activities raises the need to include human health in investment rulemaking. The current international investment law system that emphasizes investor protection fails to fully reflect the requirements of the host country for the healthy development of human beings and even often brings negative impacts to human health. At a critical moment in the reform of the international investment law system, in order to achieve mutual enhancement of investment returns and human health development, human health should play a greater role in influencing and shaping international investment rules. International investment agreements should not be limited to investment protection tools but should also be part of national development strategies to serve sustainable development and human health. In order to meet the requirements of the new sustainable development goals of the United Nations, human health should be emphasized in the formulation of international investment rules, and efforts should be made to shape a new generation of international investment rules that meet the requirements of human health and sustainable development.

Keywords: human health, international investment law, Philip Morris v. Australia, investor protection

Procedia PDF Downloads 173
29278 Tourist Attraction through Agricultural Way of Life: A Case Study at Tra Que Village, Quang Nam Province, Vietnam

Authors: Ha Van Trung, Suchint Simaraks

Abstract:

Agro-tourism is a form of rural tourism that has actively developed in recent years. Tra Que vegetable village has developed this type of tourism to meet the needs of visitors to visit and experience. However, in the process of agricultural tourism development, Tra Que village is facing many issues related to the agricultural way of life, affecting the attraction of tourists. The purpose of this study is to find those issues. The survey questionnaire of 71 households and a semi-structured group interview of 30 households has been applied for the data collection. Research results show that there is a shortage of young workers, lack of training in tourism and agricultural production, and households only exploit a few agricultural activities for tourism. The number of households receiving tourists tends to decrease, and the number of households selling products to tourists at farms accounts for a small proportion. These will affect sustainable agro-tourism development in the future. Focusing on training local households in tourism and agricultural production, encourage young generation to preserve the agricultural way of life, upgrade infrastructure and public services, develop agro-products and tourism services will contribute to the sustainable development of agro-tourism in Tra Que vegetable village in the future.

Keywords: agro-tourism, way of life, Vietnamese tourists, Tra Que vegetable village

Procedia PDF Downloads 125
29277 How Reverse Logistics Can Improve the Sustainability Performance of a Business?

Authors: Taknaz Banihashemi, Jiangang Fei, Peggy Shu-Ling Chen

Abstract:

Reverse logistics (RL) is a part of the logistics of companies and its aim is to reclaim value from the returned products in an environmentally friendly manner. In recent years, RL has attracted significant attention among both practitioners and academics due to environmental directives and governmental legislation, consumer concerns and social responsibilities for environment, awareness of the limits of natural resources and economic potential. Sustainability development is considered as a critical goal for organisations due to its impact on competitive advantage. With growing environmental concerns and legal regulations related to green and sustainability issues, product disposition through RL can be considered as an environmental, economic and social sound way to achieve sustainable development. When employed properly, RL can help firms to improve their sustainability performance. The aim of this paper is to investigate the sustainability issues in the context of RL in the perspective of the triple-bottom-line approach. Content analysis was used to collect the information. The findings show that there is a research gap to investigate the relationship between RL and sustainability performance. Most of the studies have focused on performance evaluation of RL by considering the factors related to economic and environmental performance. RL can have significant effects on social issues along with economic and environmental issues. The inclusion of the social aspect in the sustainability performance will provide a complete and holistic picture of how RL may impact on the sustainability performance of firms. Generally, there is a lack of research on investigating the relationship between RL and sustainability by integrating the three pillars of triple-bottom-line sustainability performance. This paper provides academics and researchers a broad view of the correlations between RL and sustainability performance.

Keywords: verse Logistics, review, sustainability, sustainability performance

Procedia PDF Downloads 150
29276 The New Educators: The Reasons for Saudi Arabia to Invest More in Student Counseling Programs

Authors: Turki Alotaibi

Abstract:

Student counseling programs can provide many benefits to students in schools all around the world. In theory, the government of the Kingdom of Saudi Arabia (Saudi Arabia) has committed itself to school counseling programs in educational institutions throughout the country. Student counselors face a number of burdens and obstacles that impact student counseling programs. It is also widely known that Saudi Arabia has extremely high prevalence rates for overweight and obesity, anxiety and depression, and diabetes in children. It has also been demonstrated that teachers and staff are inadequately prepared when dealing with health issues relating to diabetes in schools in Saudi Arabia. This study will clearly demonstrate how student counselors in Saudi Arabia could become 'New Educators' in Saudi schools in relation to these health issues. This would allow them to leverage their position as student counselor to improve the management of these health issues in Saudi schools, to improve the quality of care provided to school children, and to overcome burdens and obstacles that are currently negatively affecting student counseling in Saudi schools.

Keywords: anxiety and depression, diabetes, overweight and obesity, policy recommendations, student counseling, The Kingdom of Saudi Arabia

Procedia PDF Downloads 354
29275 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 372
29274 Development and Verification of the Idom Shielding Optimization Tool

Authors: Omar Bouhassoun, Cristian Garrido, César Hueso

Abstract:

The radiation shielding design is an optimization problem with multiple -constrained- objective functions (radiation dose, weight, price, etc.) that depend on several parameters (material, thickness, position, etc.). The classical approach for shielding design consists of a brute force trial-and-error process subject to previous designer experience. Therefore, the result is an empirical solution but not optimal, which can degrade the overall performance of the shielding. In order to automate the shielding design procedure, the IDOM Shielding Optimization Tool (ISOT) has been developed. This software combines optimization algorithms with the capabilities to read/write input files, run calculations, as well as parse output files for different radiation transport codes. In the first stage, the software was established to adjust the input files for two well-known Monte Carlo codes (MCNP and Serpent) and optimize the result (weight, volume, price, dose rate) using multi-objective genetic algorithms. Nevertheless, its modular implementation easily allows the inclusion of more radiation transport codes and optimization algorithms. The work related to the development of ISOT and its verification on a simple 3D multi-layer shielding problem using both MCNP and Serpent will be presented. ISOT looks very promising for achieving an optimal solution to complex shielding problems.

Keywords: optimization, shielding, nuclear, genetic algorithm

Procedia PDF Downloads 105
29273 Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Organizations, including governments, generate (big) data that are high in volume, velocity, veracity, and come from a variety of sources. Public Administrations are using (big) data, implementing base registries, and enforcing data sharing within the entire government to deliver (big) data related integrated services, provision of insights to users, and for good governance. Government (Big) data ecosystem actors represent distinct entities that provide data, consume data, manipulate data to offer paid services, and extend data services like data storage, hosting services to other actors. In this research work, we perform a systematic literature review. The key objectives of this paper are to propose a robust definition of government (big) data ecosystem and a classification of government (big) data ecosystem actors and their roles. We showcase a graphical view of actors, roles, and their relationship in the government (big) data ecosystem. We also discuss our research findings. We did not find too much published research articles about the government (big) data ecosystem, including its definition and classification of actors and their roles. Therefore, we lent ideas for the government (big) data ecosystem from numerous areas that include scientific research data, humanitarian data, open government data, industry data, in the literature.

Keywords: big data, big data ecosystem, classification of big data actors, big data actors roles, definition of government (big) data ecosystem, data-driven government, eGovernment, gaps in data ecosystems, government (big) data, public administration, systematic literature review

Procedia PDF Downloads 157
29272 A Study of Sexual Violence on Women and Children in Hong Kong

Authors: Wing Hang Shelley Leung

Abstract:

With the rise of the recent social movement, namely #MeToo, it shows that a lot of women and children in fact suffered from sexual abuse and some even suffered from child abuse, including in Hong Kong. In view of the ongoing social movements, this paper argues that we have to look beyond their impacts and understand the roots of the problem: what if the underlying cause of the recent social movements was the inherited values that were rooted in us since we were young, or the public’s lack of confidence in the legal system when it comes to this type of personal matters? What if the movements reveal the problematic issue of the lack of protection plans, either in the private or public sphere? If the legal system is presumed to not be able to preemptively protect everyone or effectively punish all perpetrators, can other pillars provide supports to fill in the loopholes of the legal system? This paper takes a theoretical approach to look into current sexuality education, the legal system in Hong Kong and the adoption of Asian values in society to argue that difficulties that are being placed onto victims in disclosing sexual violence they had experienced. Reviews of the current system and recent sexual assaults court cases for case studies allow the research to address the issues of victims’ experience including (a) their reactions to incidents; (b) issues they have in trials; (c) psychological impacts of the incidents; and (d) their understandings of gender equality before and after incidents. The study is significant because it criticises the current legal system in Hong Kong and provides insights to the public by explaining the dynamics between the problem, the legal system and the society. Also, it contributes to the ongoing research about the psychological impacts to victims in Hong Kong, especially how they are placed in a disadvantaged position in the legal system and society and even for their recovery. It contributes to the findings of how family structures, parental responsibilities and gender studies influence a child’s perception of gender equality in Hong Kong and hence their immediate reactions to incidents. To fully address the needs of victims, especially our younger generation, as well as to prevent future harm and to raise awareness, an inclusive framework which recognizes the needs of protecting and safeguarding women and children in the private sphere and a proper education for gender equality are needed.

Keywords: child abuse, children's rights, domestic violence, gender equality, Hong Kong, Me too, sexual violence, women's rights

Procedia PDF Downloads 163
29271 Improving Energy Efficiency through Industrial Symbiosis: A Conceptual Framework of Energy Management in Energy-Intensive Industries

Authors: Yuanjun Chen, Yongjiang Shi

Abstract:

Rising energy prices have drawn a focus to global energy issues, and the severe pollution that has resulted from energy-intensive industrial sectors has yet to be addressed. By combining Energy Efficiency with Industrial Symbiosis, the practices of efficient energy utilization and improvement can be not only enriched at the factory level but also upgraded into “within and/or between firm level”. The academic contribution of this paper provides a conceptual framework of energy management through IS. The management of waste energy within/between firms can contribute to the reduction of energy consumption and provides a solution to the environmental issues.

Keywords: energy efficiency, energy management, industrial symbiosis, energy-intensive industry

Procedia PDF Downloads 431
29270 Anti-Ulcer Activity of Hydro Alcoholic Extract of Ficus bengalensis Linn Bark in Experimental Rats

Authors: Jagdish Baheti, Sampat Navale

Abstract:

The present study was performed to evaluate the anti-ulcerogenic activity of hydro-alcoholic extract of Ficus bengalensis Linn. against ethanol-induced gastric mucosal injury in rats and pylorus ligation gastric secretion in rats. Five groups of adult wistar rats were orally pre-treated respectively with carboxy methyl cellulose (CMC) solution (ulcer control group), Omeprazole 20 mg/kg (reference group), and 100, 200 and 300 mg/kg F. bengalensis Linn. bark extract in CMC solution (experimental groups), one hour before oral administration of absolute ethanol to generate gastric mucosal injury. Rats were sacrificed and the ulcer index, gastric volume, gastric pH, free acidity, total acidity of the gastric content was determined. Grossly, the ulcer control group exhibited severe mucosal injury, whereas pre-treatment with F. bengalensis Linn. bark extract exhibited significant protection of gastric mucosal injury in both model. Histological studies revealed that ulcer control group exhibited severe damage of gastric mucosa, along with edema and leucocytes infiltration of submucosal layer compared to rats pre-treated with F. bengalensis Linn. bark extract which showed gastric mucosal protection, reduction or absence of edema and leucocytes infiltration of submucosal layer. Acute toxicity study did not manifest any toxicological signs in rats. The present finding suggests that F. bengalensis Linn. bark extract promotes ulcer protection as ascertained grossly and histologically compared to the ulcer control group.

Keywords: Ficus bengalensis Linn., gastric ulcer, hydroalcoholic, pylorus ligation

Procedia PDF Downloads 289
29269 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 261
29268 Corporate Codes of Ethics and Earnings Discretion: International Evidence

Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe

Abstract:

This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.

Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals

Procedia PDF Downloads 282
29267 Relationship Salt Sensitivity and с825т Polymorphism of gnb3 Gene in Patients with Essential Hypertension

Authors: Aleksandr Nagay, Gulnoz Khamidullayeva

Abstract:

It is known that an unbalanced intake of salt (NaCI), lifestyle and genetic predisposition to pathology is a key component of the risk and the development of essential hypertension (EH). Purpose: To study the relationship between salt-sensitivity and blood pressure (BP) on systolic (SBP) and diastolic (DBP) blood pressure, depending on the C825T polymorphism of GNB3 in individuals of Uzbek nationality with EH. Method: studied 148 healthy and 148 patients with EH with I-II degree (WHO/ISH, 2003) with disease duration 6,5±1,3 years. Investigation of the gene GNB3 was produced by PCR-RFLP method. Determination of salt-sensitivity was performed by the method of R. Henkin. Results: For a comparative analysis of BP, the groups with carriage of CТ and TT genotypes were combined. The analysis showed that carriers of CC genotype and low salt-sensitivity were determined by higher levels of SBP compared with carriers of CT and TT genotypes, and low salt-sensitivity of SBP: 166,2±4,3 against 158,2±9,1 mm Hg (p=0,000). A similar analysis on the values of DBP also showed significantly higher values of blood pressure in carriers of CC genotype DBP: 105,8±10,6 vs. 100,5±7,2 mm Hg, respectively (p=0,001). The average values of SBP and DBP in groups with carriers of CC genotype at medium or high salt-sensitivity in comparison with carriers of CT or TT genotype did not differ statistically SBP: 165,0±0,1 vs. 160,0±8,6 mm Hg (p=0,275) and DBP: 100,1±0,1 vs. 101,6±7,6 mm Hg (p=0,687), respectively. Conclusion: It is revealed that in patients with EH CC genotype of the gene GNB3 given salt-sensitivity has a negative effect on blood pressure profile. Since patients with EH with the CC genotype of GNB3 gene with low-salt taste sensitivity is determined by a higher level of blood pressure, both on SBP and DBP.

Keywords: salt sensitivity, essential hypertension EH, blood pressure BP, genetic predisposition

Procedia PDF Downloads 274
29266 Geoecological Problems of Karst Waters in Chiatura Municipality, Georgia

Authors: Liana Khandolishvili, Giorgi Dvalashvili

Abstract:

Karst waters in the world play an important role in the water supply. Among them, the Vaucluse in Chiatura municipality (Georgia) is used as drinking water and is irreplaceable for the local population. Accordingly, it is important to assess their geo-ecological conditions and take care to maintain sustainability. The aim of the paper is to identify the hazards of pollution of underground waters in the karst environment and to develop a scheme for their protection, which will take into consideration both the hydrogeological characteristics and the role of humans. To achieve this goal, the EPIK method was selected using which an epikarst zone of the study area was studied in detail, as well as the protective cover, infiltration conditions and frequency of karst network development, after which the conditions of karst waters in Chiatura municipality was assessed, their main pollutants were identified and the recommendations were prepared for their protection. The results of the study showed that the karst water pollution rate in Chiatura municipality is highest, where karst-fissured layers are represented and intensive extraction works are underway. The EPIK method is innovative in Georgia and was first introduced on the example of karst waters of Chiatura municipality.

Keywords: cave, EPIK method, pollution, Karst waters, geology, geography, ecology

Procedia PDF Downloads 90
29265 A Multi-Objective Programming Model to Supplier Selection and Order Allocation Problem in Stochastic Environment

Authors: Rouhallah Bagheri, Morteza Mahmoudi, Hadi Moheb-Alizadeh

Abstract:

This paper aims at developing a multi-objective model for supplier selection and order allocation problem in stochastic environment, where purchasing cost, percentage of delivered items with delay and percentage of rejected items provided by each supplier are supposed to be stochastic parameters following any arbitrary probability distribution. In this regard, dependent chance programming is used which maximizes probability of the event that total purchasing cost, total delivered items with delay and total rejected items are less than or equal to pre-determined values given by decision maker. The abovementioned stochastic multi-objective programming problem is then transformed into a stochastic single objective programming problem using minimum deviation method. In the next step, the further problem is solved applying a genetic algorithm, which performs a simulation process in order to calculate the stochastic objective function as its fitness function. Finally, the impact of stochastic parameters on the given solution is examined via a sensitivity analysis exploiting coefficient of variation. The results show that whatever stochastic parameters have greater coefficients of variation, the value of the objective function in the stochastic single objective programming problem is deteriorated.

Keywords: supplier selection, order allocation, dependent chance programming, genetic algorithm

Procedia PDF Downloads 309
29264 Beggar-Thy-Neighbor's Beach: Pricing Adaptation to Sea-Level Rise

Authors: Arlan Zandro Brucal, John Lynham

Abstract:

With the accelerated sea-level rise (SLR) increasingly becoming a concern, demand for coastal management and protection is expected to grow. Among the coastal management and protection methods, building seawalls are among the most controversial due to the negative externalities they impose on beachgoers and neighboring properties. This paper provides estimates of the external cost associated with building seawalls on the island of Oahu in Hawaii. Using hedonic pricing approach on real properties sold between 1980-2010 and aerial photographs of seawalls in 1995, the paper finds that (1) while seawalls do increase the value of protected properties, the share of armored properties appear to be negatively correlated with property sale prices, suggesting that the positive effect of seawalls tend to decline as more and more rely on this coastal management method; and (2) the value of beachfront properties tend to decline as they get approach seawalls. Results suggest that policymakers should devise a policy that would internalize the externalities associated with private-sector adaptation to climate change.

Keywords: private sector climate change adaptation, externalities, sea-level rise, hedonic pricing

Procedia PDF Downloads 286
29263 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 67
29262 Performance Evaluation of Discrete Fourier Transform Algorithm Based PMU for Wide Area Measurement System

Authors: Alpesh Adeshara, Rajendrasinh Jadeja, Praghnesh Bhatt

Abstract:

Implementation of advanced technologies requires sophisticated instruments that deal with the operation, control, restoration and protection of rapidly growing power system network under normal and abnormal conditions. Presently, the applications of Phasor Measurement Unit (PMU) are widely found in real time operation, monitoring, controlling and analysis of power system network as it eliminates the various limitations of Supervisory Control and Data Acquisition System (SCADA) conventionally used in power system. The use of PMU data is very rapidly increasing its importance for online and offline analysis. Wide Area Measurement System (WAMS) is developed as new technology by use of multiple PMUs in power system. The present paper proposes a model of MATLAB based PMU using Discrete Fourier Transform (DFT) algorithm and evaluation of its operation under different contingencies. In this paper, PMU based two bus system having WAMS network is presented as a case study.

Keywords: GPS global positioning system, PMU phasor measurement system, WAMS wide area monitoring system, DFT, PDC

Procedia PDF Downloads 491
29261 Legal Issues of Food Security in Republic of Kazakhstan

Authors: G. T. Aigarinova

Abstract:

This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it.

Keywords: food security, national security, agriculture, public resources, economic security

Procedia PDF Downloads 421
29260 Investigating Conflict Between Traditional Cultural Practices for Women and South African Government Laws

Authors: Hebert Sihle Ntuli

Abstract:

Traditional cultural practices mirror or replicate the values and beliefs held by members of the community. Throughout the world, every social grouping has specific traditional practices, some of which are beneficial to all, while others have become harmful to specific group such as women. Like in some African states, these traditional cultural practices are performed in South Africa and are violating women’s rights. Women’s rights are human rights. The South African Constitution is one of the most progressive in the world, and notable includes the Bill of Rights which provides protection of socio-economic and cultural rights. Cultural rights are protected in Section 30 and 31 of the constitution, although such protection is not without limitation. This highly complex interplay and competition between human rights and cultural rights, which are manifested through cultural practices, is the golden thread that traces through this paper. The paper argues that there is conflict and the lack of balance between diverse cultural and legal or constitutional framework which promotes the value of human dignity and equality, especially for women. These practices are reviewed in connection with the South African government laws. This work adopted qualitative research method.

Keywords: cultural practices, conflict, South African constitution, laws

Procedia PDF Downloads 106
29259 Determination of Genotypic Relationship among 12 Sugarcane (Saccharum officinarum) Varieties

Authors: Faith Eweluegim Enahoro-Ofagbe, Alika Eke Joseph

Abstract:

Information on genetic variation within a population is crucial for utilizing heterozygosity for breeding programs that aim to improve crop species. The study was conducted to ascertain the genotypic similarities among twelve sugarcane (Saccharum officinarum) varieties to group them for purposes of hybridizations for cane yield improvement. The experiment was conducted at the University of Benin, Faculty of Agriculture Teaching and Research Farm, Benin City. Twelve sugarcane varieties obtained from National Cereals Research Institute, Badeggi, Niger State, Nigeria, were planted in three replications in a randomized complete block design. Each variety was planted on a five-row plot of 5.0 m in length. Data were collected on 12 agronomic traits, including; the number of millable cane, cane girth, internode length, number of male and female flowers (fuss), days to flag leaf, days to flowering, brix%, cane yield, and others. There were significant differences, according to the findings among the twelve genotypes for the number of days to flag leaf, number of male and female flowers (fuss), and cane yield. The relationship between the twelve sugarcane varieties was expressed using hierarchical cluster analysis. The twelve genotypes were grouped into three major clusters based on hierarchical classification. Cluster I had five genotypes, cluster II had four, and cluster III had three. Cluster III was dominated by varieties characterized by higher cane yield, number of leaves, internode length, brix%, number of millable stalks, stalk/stool, cane girth, and cane length. Cluster II contained genotypes with early maturity characteristics, such as early flowering, early flag leaf development, growth rate, and the number of female and male flowers (fuss). The maximum inter-cluster distance between clusters III and I indicated higher genetic diversity between the two groups. Hybridization between the two groups could result in transgressive recombinants for agronomically important traits.

Keywords: sugarcane, Saccharum officinarum, genotype, cluster analysis, principal components analysis

Procedia PDF Downloads 78