Search results for: security mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5641

Search results for: security mechanism

3991 ICAM1 Expression is Enhanced by TNFa through Histone Methylation in Human Brain Microvessel Cells

Authors: Ji-Young Choi, Jungjin Kim, Sang-Sun Yun, Sangmee Ahn Jo

Abstract:

Intracellular adhesion molecule1 (ICAM1) is a mediator of inflammation and involved in adhesion and transmigration of leukocytes to endothelial cells, resulting in enhancement of brain inflammation. We hypothesized that increase of ICAM1 expression in endothelial cells is an early step in the pathogenesis of brain diseases such as Alzheimer’s disease. Here, we report that ICAM1 expression is regulated by pro-inflammatory cytokine TNFa in human microvascular endothelial cell (HBMVEC). TNFa significantly increased ICAM1 mRNA and protein levels at the concentrations showing no cell toxicity. This increase was also shown in micro vessels of mouse brain 24 hours after treatment with TNFa (8 mg/kg, i.v). We then investigated the epigenetic mechanism involved in the induction of ICAM1 expression. Chromatin immunoprecipitation assay revealed that TNFa reduced methylation of histone3K9 (H3K9-2me) and histone3K27 (H3K27-3me), well-known modification as gene suppression, with in the ICAM1 promoter region. However, acetylation of H3K9 and H3K14, well-known modification as gene activation, was not changed by TNFa. Treatment of BIX01294, a specific inhibitor of histone methyltransferase G9a responsible for H3K9-2me, dramatically increased in ICAM1 mRNA and protein levels and overexpression of G9a gene suppressed TNFa-induced ICAM1 expression. In contrast, GSK126, an inhibitor of histone methyltransferase EZH2 responsible for H3K27-3me and valproic acid, an inhibitor of histone deacetylase (HDAC) did not affect ICAM1 expression. These results suggested that histone3 methylation is involved in ICAM1 repression. Moreover, TNFa or BIX01294-induced ICAM induction resulted in both enhancements in adhesion and transmigration of leukocyte on endothelial cell. This study demonstrates that TNFa upregulates ICAM1 expression through H3K9-2me and H3K27-3me within the ICAM1 promoter region, in which G9a is likely to play a pivotal role in ICAM1 transcription. Our study provides a novel mechanism for ICAM1 transcription regulation in HBMVEC.

Keywords: ICAM1, TNFa, HBMVEC, H3K9-2me

Procedia PDF Downloads 320
3990 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 49
3989 Synthesis of TiO2 Nanoparticles by Sol-Gel and Sonochemical Combination

Authors: Sabriye Piskin, Sibel Kasap, Muge Sari Yilmaz

Abstract:

Nanocrystalline TiO2 particles were successfully synthesized via sol-gel and sonochemical combination using titanium tetraisopropoxide as a precursor at lower temperature for a short time. The effect of the reaction parameters (hydrolysis media, acid media, and reaction temperatures) on the synthesis of TiO2 particles were investigated in the present study. Characterizations of synthesized samples were prepared by X-ray diffraction (XRD) analysis. It was shown that the reaction parameters played a significant role in the synthesis of TiO2 particles.

Keywords: crystalline TiO2, sonochemical mechanism, sol-gel reaction, XRD

Procedia PDF Downloads 443
3988 Implementation of Smart Card Automatic Fare Collection Technology in Small Transit Agencies for Standards Development

Authors: Walter E. Allen, Robert D. Murray

Abstract:

Many large transit agencies have adopted RFID technology and electronic automatic fare collection (AFC) or smart card systems, but small and rural agencies remain tied to obsolete manual, cash-based fare collection. Small countries or transit agencies can benefit from the implementation of smart card AFC technology with the promise of increased passenger convenience, added passenger satisfaction and improved agency efficiency. For transit agencies, it reduces revenue loss, improves passenger flow and bus stop data. For countries, further implementation into security, distribution of social services or currency transactions can provide greater benefits. However, small countries or transit agencies cannot afford expensive proprietary smart card solutions typically offered by the major system suppliers. Deployment of Contactless Fare Media System (CFMS) Standard eliminates the proprietary solution, ultimately lowering the cost of implementation. Acumen Building Enterprise, Inc. chose the Yuma County Intergovernmental Public Transportation Authority (YCIPTA) existing proprietary YCAT smart card system to implement CFMS. The revised system enables the purchase of fare product online with prepaid debit or credit cards using the Payment Gateway Processor. Open and interoperable smart card standards for transit have been developed. During the 90-day Pilot Operation conducted, the transit agency gathered the data from the bus AcuFare 200 Card Reader, loads (copies) the data to a USB Thumb Drive and uploads the data to the Acumen Host Processing Center for consolidation of the data into the transit agency master data file. The transition from the existing proprietary smart card data format to the new CFMS smart card data format was transparent to the transit agency cardholders. It was proven that open standards and interoperability design can work and reduce both implementation and operational costs for small transit agencies or countries looking to expand smart card technology. Acumen was able to avoid the implementation of the Payment Card Industry (PCI) Data Security Standards (DSS) which is expensive to develop and costly to operate on a continuing basis. Due to the substantial additional complexities of implementation and the variety of options presented to the transit agency cardholder, Acumen chose to implement only the Directed Autoload. To improve the implementation efficiency and the results for a similar undertaking, it should be considered that some passengers lack credit cards and are averse to technology. There are more than 1,300 small and rural agencies in the United States. This grows by 10 fold when considering small countries or rural locations throughout Latin American and the world. Acumen is evaluating additional countries, sites or transit agency that can benefit from the smart card systems. Frequently, payment card systems require extensive security procedures for implementation. The Project demonstrated the ability to purchase fare value, rides and passes with credit cards on the internet at a reasonable cost without highly complex security requirements.

Keywords: automatic fare collection, near field communication, small transit agencies, smart cards

Procedia PDF Downloads 268
3987 Application of Response Surface Methodology in Optimizing Chitosan-Argan Nutshell Beads for Radioactive Wastewater Treatment

Authors: F. F. Zahra, E. G. Touria, Y. Samia, M. Ahmed, H. Hasna, B. M. Latifa

Abstract:

The presence of radioactive contaminants in wastewater poses a significant environmental and health risk, necessitating effective treatment solutions. This study investigates the optimization of chitosan-Argan nutshell beads for the removal of radioactive elements from wastewater, utilizing Response Surface Methodology (RSM) to enhance the treatment efficiency. Chitosan, known for its biocompatibility and adsorption properties, was combined with Argan nutshell powder to form composite beads. These beads were then evaluated for their capacity to remove radioactive contaminants from synthetic wastewater. The Box-Behnken design (BBD) under RSM was employed to analyze the influence of key operational parameters, including initial contaminant concentration, pH, bead dosage, and contact time, on the removal efficiency. Experimental results indicated that all tested parameters significantly affected the removal efficiency, with initial contaminant concentration and pH showing the most substantial impact. The optimized conditions, as determined by RSM, were found to be an initial contaminant concentration of 50 mg/L, a pH of 6, a bead dosage of 0.5 g/L, and a contact time of 120 minutes. Under these conditions, the removal efficiency reached up to 95%, demonstrating the potential of chitosan-Argan nutshell beads as a viable solution for radioactive wastewater treatment. Furthermore, the adsorption process was characterized by fitting the experimental data to various isotherm and kinetic models. The adsorption isotherms conformed well to the Langmuir model, indicating monolayer adsorption, while the kinetic data were best described by the pseudo-second-order model, suggesting chemisorption as the primary mechanism. This study highlights the efficacy of chitosan-Argan nutshell beads in removing radioactive contaminants from wastewater and underscores the importance of optimizing treatment parameters using RSM. The findings provide a foundation for developing cost-effective and environmentally friendly treatment technologies for radioactive wastewater.

Keywords: adsorption, argan nutshell, beads, chitosan, mechanism, optimization, radioactive wastewater, response surface methodology

Procedia PDF Downloads 10
3986 Socio-Economic Influences on Soilless Agriculture

Authors: George Vernon Byrd, Bhim Bahadur Ghaley, Eri Hayashi

Abstract:

In urban farming, research and innovation are taking place at an unprecedented pace, and soilless growing technologies are emerging at different rates motivated by different objectives in various parts of the world. Local food production is ultimately a main objective everywhere, but adoption rates and expressions vary with socio-economic drivers. Herein, the status of hydroponics and aquaponics is summarized for four countries with diverse socio-economic settings: Europe (Denmark), Asia (Japan and Nepal) and North America (US). In Denmark, with a strong environmental ethic, soilless growing is increasing in urban agriculture because it is considered environmentally friendly. In Japan, soil-based farming is being replaced with commercial plant factories using advanced technology such as complete environmental control and computer monitoring. In Nepal, where rapid loss of agriculture land is occurring near cities, dozens of hydroponics and aquaponics systems have been built in the past decade, particularly in “non-traditional” sites such as roof tops to supplement family food. In the US, where there is also strong interest in locally grown fresh food, backyard and commercial systems have proliferated. Nevertheless, soilless growing is still in the research and development and early adopter stages, and the broad contribution of hydroponics and aquaponics to food security is yet to be fully determined. Nevertheless, current adoption of these technologies in diverse environments in different socio-economic settings highlights the potential contribution to food security with social and environmental benefits which contribute to several Sustainable Development Goals.

Keywords: aquaponics, hydroponics, soilless agriculture, urban agriculture

Procedia PDF Downloads 78
3985 Analytical Technique for Definition of Internal Forces in Links of Robotic Systems and Mechanisms with Statically Indeterminate and Determinate Structures Taking into Account the Distributed Dynamical Loads and Concentrated Forces

Authors: Saltanat Zhilkibayeva, Muratulla Utenov, Nurzhan Utenov

Abstract:

The distributed inertia forces of complex nature appear in links of rod mechanisms within the motion process. Such loads raise a number of problems, as the problems of destruction caused by a large force of inertia; elastic deformation of the mechanism can be considerable, that can bring the mechanism out of action. In this work, a new analytical approach for the definition of internal forces in links of robotic systems and mechanisms with statically indeterminate and determinate structures taking into account the distributed inertial and concentrated forces is proposed. The relations between the intensity of distributed inertia forces and link weight with geometrical, physical and kinematic characteristics are determined in this work. The distribution laws of inertia forces and dead weight make it possible at each position of links to deduce the laws of distribution of internal forces along the axis of the link, in which loads are found at any point of the link. The approximation matrixes of forces of an element under the action of distributed inertia loads with the trapezoidal intensity are defined. The obtained approximation matrixes establish the dependence between the force vector in any cross-section of the element and the force vector in calculated cross-sections, as well as allow defining the physical characteristics of the element, i.e., compliance matrix of discrete elements. Hence, the compliance matrixes of an element under the action of distributed inertial loads of trapezoidal shape along the axis of the element are determined. The internal loads of each continual link are unambiguously determined by a set of internal loads in its separate cross-sections and by the approximation matrixes. Therefore, the task is reduced to the calculation of internal forces in a final number of cross-sections of elements. Consequently, it leads to a discrete model of elastic calculation of links of rod mechanisms. The discrete model of the elements of mechanisms and robotic systems and their discrete model as a whole are constructed. The dynamic equilibrium equations for the discrete model of the elements are also received in this work as well as the equilibrium equations of the pin and rigid joints expressed through required parameters of internal forces. Obtained systems of dynamic equilibrium equations are sufficient for the definition of internal forces in links of mechanisms, which structure is statically definable. For determination of internal forces of statically indeterminate mechanisms (in the way of determination of internal forces), it is necessary to build a compliance matrix for the entire discrete model of the rod mechanism, that is reached in this work. As a result by means of developed technique the programs in the MAPLE18 system are made and animations of the motion of the fourth class mechanisms of statically determinate and statically indeterminate structures with construction on links the intensity of cross and axial distributed inertial loads, the bending moments, cross and axial forces, depending on kinematic characteristics of links are obtained.

Keywords: distributed inertial forces, internal forces, statically determinate mechanisms, statically indeterminate mechanisms

Procedia PDF Downloads 206
3984 Exploring Well-Being: Lived Experiences and Assertions From a Marginalized Perspective

Authors: Ritwik Saha, Anindita Chaudhuri

Abstract:

The psychological dimension of work-based mobility of the contemporary time in the context of the ever-changing socio-economic process mounting the interest to address the consequential issues of quality of life and well-being of the migrant section of society. The negotiation with the fluidity of the job market and the changing psychosocial dimensions within and between psychosocial relations may disentangle the resilience as well as the mechanism of diligence toward migrant (marginal) life. The work-based mobility and its associated phenomena have highly impacted the migrant’s quality of life especially the marginalized (socioeconomically weak) ones along with their family members staying away from them. The subjective experiences of the journey of their migrant life and reconstruction of the psychosocial being in terms of existence and well-being at the host place are the minimal addressed issues in migrant literature. Hence this gap instigates to bring forth the issue with the present study exploring the phenomenal aspects of lived experiences, resilience, and sense-making of the well-being of migrant living by the marginalized migrant people engaging in unorganized space. In doing so qualitative research method was followed, and semi-structured interviews were used for data collection from the four selected migrant groups (Fuchkawala, Bhunjawala, Bhari - drinking water supplier, Construction worker) as they migrated to Kolkata and its metropolis area from different states of India, Five participants from each group (20 participants in total) age range between 20 to 45 were interviewed physically and participants’ observatory notes were taken to capture their lived experiences, audio recordings were transcribed and analyzed systematically following Charmaz’s three-layer coding of grounded theory. Being truthful to daily industry, the strong desire to build children’s future, the mastering mechanism to dual existence, use of traditional social network these four themes emerges after analysis of the data. However, incorporating fate as their usual way of life and making sense of well-being through their assertion is another evolving aspect of migrant life.

Keywords: lived experiences, marginal living, resilience, sense-making process, well-being

Procedia PDF Downloads 46
3983 Peptide-Gold Nanocluster as an Optical Biosensor for Glycoconjugate Secreted from Leishmania

Authors: Y. A. Prada, Fanny Guzman, Rafael Cabanzo, John J. Castillo, Enrique Mejia-Ospino

Abstract:

In this work, we show the important results about of synthesis of photoluminiscents gold nanoclusters using a small peptide as template for biosensing applications. Interestingly, we design one peptide (NBC2854) homologue to conservative domain from 215 250 residue of a galactolectin protein which can recognize the proteophosphoglycans (PPG) from Leishmania. Peptide was synthetized by multiple solid phase synthesis using FMoc group methodology in acid medium. Finally, the peptide was purified by High-Performance Liquid Chromatography using a Vydac C-18 preparative column and the detection was at 215 nm using a Photo Diode Array detector. Molecular mass of this peptide was confirmed by MALDI-TOF and to verify the α-helix structure we use Circular Dichroism. By means of the methodology used we obtained a novel fluorescents gold nanoclusters (AuNC) using NBC2854 as a template. In this work, we described an easy and fast microsonic method for the synthesis of AuNC with ≈ 3.0 nm of hydrodynamic size and photoemission at 630 nm. The presence of cysteine residue in the C-terminal of the peptide allows the formation of Au-S bond which confers stability to Peptide-based gold nanoclusters. Interactions between the peptide and gold nanoclusters were confirmed by X-ray Photoemission and Raman Spectroscopy. Notably, from the ultrafine spectra shown in the MALDI-TOF analysis which containing only 3-7 KDa species was assigned to Au₈-₁₈[NBC2854]₂ clusters. Finally, we evaluated the Peptide-gold nanocluster as an optical biosensor based on fluorescence spectroscopy and the fluorescence signal of PPG (0.1 µg-mL⁻¹ to 1000 µg-mL⁻¹) was amplified at the same wavelength emission (≈ 630 nm). This can suggest that there is a strong interaction between PPG and Pep@AuNC, therefore, the increase of the fluorescence intensity can be related to the association mechanism that take place when the target molecule is sensing by the Pep@AuNC conjugate. Further spectroscopic studies are necessary to evaluate the fluorescence mechanism involve in the sensing of the PPG by the Pep@AuNC. To our best knowledge the fabrication of an optical biosensor based on Pep@AuNC for sensing biomolecules such as Proteophosphoglycans which are secreted in abundance by parasites Leishmania.

Keywords: biosensing, fluorescence, Leishmania, peptide-gold nanoclusters, proteophosphoglycans

Procedia PDF Downloads 153
3982 The Curse of Vigilante Justice: Killings of Rape Suspects in India and Its Impact on the Discourse on Sexual Violence

Authors: Hrudaya Kamasani

Abstract:

The cultural prevalence of vigilante justice is sustained through the social sanction for foregoing a judicial trial to determine guilt. Precisely due to its roots in social sanction, it has repercussions as more than just being symptomatic of cultural values that condone violence. In the long term, the practice of vigilante justice as a response to incidents of sexual violence, while veiled in civic discontent over the standards of women’s security in society, can adversely affect the discourse on sexual violence. To illustrate the impact that acts of vigilante justice can have in prematurely ending a budding discourse on sexual violence, the paper reviews three cases of heinous crimes committed against women in India that gained popular attention in the discursive spaces. The 2012 Nirbhaya rape and murder case in Delhi demonstrates how the criminal justice system can spur a social movement and can result in legislative changes and a discourse that challenged a wide range of socio-cultural issues of women’s security and treatment. The paper compares it with two incidents of sexual violence in India that ended with the suspects being killed in the name of vigilante justice that had wide social sanction. The two cases are the 2019 extrajudicial killing of Priyanka Reddy rape and murder case suspects in Hyderabad and the 2015 mob lynching of an accused in a rape case in Dimapur. The paper explains why the absence of judicial trials in sexual violence cases results in ending any likelihood of the instances inspiring civic engagement with the discourse on sexual violence.

Keywords: sexual violence, vigilante justice, extrajudicial killing, cultural values of violence, Nirbhaya rape case, mob violence

Procedia PDF Downloads 196
3981 Physical Activity Self-Efficacy among Pregnant Women with High Risk for Gestational Diabetes Mellitus: A Cross-Sectional Study

Authors: Xiao Yang, Ji Zhang, Yingli Song, Hui Huang, Jing Zhang, Yan Wang, Rongrong Han, Zhixuan Xiang, Lu Chen, Lingling Gao

Abstract:

Aim and Objectives: To examine physical activity self-efficacy, identify its predictors, and further explore the mechanism of action among the predictors in mainland Chinese pregnant women with high risk for gestational diabetes mellitus (GDM). Background: Physical activity could protect pregnant women from developing GDM. Physical activity self-efficacy was the key predictor of physical activity. Design: A cross-sectional study was conducted from October 2021 to May 2022 in Zhengzhou, China. Methods: 252 eligible pregnant women completed the Pregnancy Physical Activity Self-efficacy Scale, the Social Support for Physical Activity Scale, the Knowledge on Physical Activity Questionnaire, the 7-item Generalized Anxiety Disorder scale, the Edinburgh Postnatal Depression Scale, and a socio-demographic data sheet. Multiple linear regression was applied to explore the predictors of physical activity self-efficacy. Structural equation modeling was used to explore the mechanism of action among the predictors. Results: Chinese pregnant women with a high risk for GDM reported a moderate level of physical activity self-efficacy. The best-fit regression analysis revealed four variables explained 17.5% of the variance in physical activity self-efficacy. Social support for physical activity was the strongest predictor, followed by knowledge of the physical activity, intention to do physical activity, and anxiety symptoms. The model analysis indicated that knowledge of physical activity could release anxiety and depressive symptoms and then increase physical activity self-efficacy. Conclusion: The present study revealed a moderate level of physical activity self-efficacy. Interventions targeting pregnant women with high risk for GDM need to include the predictors of physical activity self-efficacy. Relevance to clinical practice: To facilitate pregnant women with high risk for GDM to engage in physical activity, healthcare professionals may find assess physical activity self-efficacy and intervene as soon as possible on their first antenatal visit. Physical activity intervention programs focused on self-efficacy may be conducted in further research.

Keywords: physical activity, gestational diabetes, self-efficacy, predictors

Procedia PDF Downloads 74
3980 Series Connected GaN Resonant Tunneling Diodes for Multiple-Valued Logic

Authors: Fang Liu, JunShuai Xue, JiaJia Yao, XueYan Yang, ZuMao Li, GuanLin Wu, HePeng Zhang, ZhiPeng Sun

Abstract:

III-Nitride resonant tunneling diode (RTD) is one of the most promising candidates for multiple-valued logic (MVL) elements. Here, we report a monolithic integration of GaN resonant tunneling diodes to realize multiple negative differential resistance (NDR) regions for MVL application. GaN RTDs, composed of a 2 nm quantum well embedded in two 1 nm quantum barriers, are grown by plasma-assisted molecular beam epitaxy on free-standing c-plane GaN substrates. Negative differential resistance characteristic with a peak current density of 178 kA/cm² in conjunction with a peak-to-valley current ratio (PVCR) of 2.07 is observed. Statistical properties exhibit high consistency showing a peak current density standard deviation of almost 1%, laying the foundation for the monolithic integration. After complete electrical isolation, two diodes of the designed same area are connected in series. By solving the Poisson equation and Schrodinger equation in one dimension, the energy band structure is calculated to explain the transport mechanism of the differential negative resistance phenomenon. Resonant tunneling events in a sequence of the series-connected RTD pair (SCRTD) form multiple NDR regions with nearly equal peak current, obtaining three stable operating states corresponding to ternary logic. A frequency multiplier circuit achieved using this integration is demonstrated, attesting to the robustness of this multiple peaks feature. This article presents a monolithic integration of SCRTD with multiple NDR regions driven by the resonant tunneling mechanism, which can be applied to a multiple-valued logic field, promising a fast operation speed and a great reduction of circuit complexity and demonstrating a new solution for nitride devices to break through the limitations of binary logic.

Keywords: GaN resonant tunneling diode, multiple-valued logic system, frequency multiplier, negative differential resistance, peak-to-valley current ratio

Procedia PDF Downloads 66
3979 A Method for Solid-Liquid Separation of Cs+ from Radioactive Waste by Using Ionic Liquids and Extractants

Authors: J. W. Choi, S. Y. Cho, H. J. Lee, W. Z. Oh, S. J. Choi

Abstract:

Ionic liquids (ILs), which is alternative to conventional organic solvent, were used for extraction of Cs ions. ILs, as useful environment friendly green solvents, have been recently applied as replacement for traditional volatile organic compounds (VOCs) in liquid/liquid extraction of heavy metal ions as well as organic and inorganic species and pollutants. Thus, Ionic liquids were used for extraction of Cs ions from the liquid radioactive waste. In most cases, Cs ions present in radioactive wastes in very low concentration, approximately less than 1ppm. Therefore, unlike established extraction system the required amount of ILs as extractant is comparatively very small. This extraction method involves cation exchange mechanism in which Cs ion transfers to the organic phase and binds to one crown ether by chelation in exchange of single ILs cation, IL_cation+, transfer to the aqueous phase. In this extraction system showed solid-liquid separation in which the Ionic liquid 1-ethyl-3-methylimidazolium bis(trifluoromethylsulfonly)imide (C2mimTf2N) and the crown ether Dicyclohexano-18-crown-6 (DCH18C6) both were used here in very little amount as solvent and as extractant, respectively. 30 mM of CsNO3 was used as simulated waste solution cesium ions. Generally, in liquid-liquid extraction, the molar ratio of CE:Cs+:ILs was 1:5~10:>100, while our applied molar ratio of CE:Cs+:ILs was 1:2:1~10. The quantity of CE and Cs ions were fixed to 0.6 and 1.2 mmol, respectively. The phenomenon of precipitation showed two kinds of separation: solid-liquid separation in the ratio of 1:2:1 and 1:2:2; solid-liquid-liquid separation (3 phase) in the ratio of 1:2:5 and 1:2:10. In the last system, 3 phases were precipitate-ionic liquids-aqueous. The precipitate was verified to consist of Cs+, DCH18C6, Tf2N- based on the cation exchange mechanism. We analyzed precipitate using scanning electron microscopy with X-ray microanalysis (SEM-EDS), an elemental analyser, Fourier transform infrared spectroscopy (FT-IR) and differential scanning calorimetry (DSC). The experimental results showed an easy extraction method and confirmed the composition of solid precipitate. We also obtained information that complex formation ratio of Cs+ to DCH18C6 is 0.88:1 regardless of C2mimTf2N quantities.

Keywords: extraction, precipitation, solid-liquid seperation, ionic liquid, precipitate

Procedia PDF Downloads 404
3978 Study on Safety Management of Deep Foundation Pit Construction Site Based on Building Information Modeling

Authors: Xuewei Li, Jingfeng Yuan, Jianliang Zhou

Abstract:

The 21st century has been called the century of human exploitation of underground space. Due to the characteristics of large quantity, tight schedule, low safety reserve and high uncertainty of deep foundation pit engineering, accidents frequently occur in deep foundation pit engineering, causing huge economic losses and casualties. With the successful application of information technology in the construction industry, building information modeling has become a research hotspot in the field of architectural engineering. Therefore, the application of building information modeling (BIM) and other information communication technologies (ICTs) in construction safety management is of great significance to improve the level of safety management. This research summed up the mechanism of the deep foundation pit engineering accident through the fault tree analysis to find the control factors of deep foundation pit engineering safety management, the deficiency existing in the traditional deep foundation pit construction site safety management. According to the accident cause mechanism and the specific process of deep foundation pit construction, the hazard information of deep foundation pit engineering construction site was identified, and the hazard list was obtained, including early warning information. After that, the system framework was constructed by analyzing the early warning information demand and early warning function demand of the safety management system of deep foundation pit. Finally, the safety management system of deep foundation pit construction site based on BIM through combing the database and Web-BIM technology was developed, so as to realize the three functions of real-time positioning of construction site personnel, automatic warning of entering a dangerous area, real-time monitoring of deep foundation pit structure deformation and automatic warning. This study can initially improve the current situation of safety management in the construction site of deep foundation pit. Additionally, the active control before the occurrence of deep foundation pit accidents and the whole process dynamic control in the construction process can be realized so as to prevent and control the occurrence of safety accidents in the construction of deep foundation pit engineering.

Keywords: Web-BIM, safety management, deep foundation pit, construction

Procedia PDF Downloads 137
3977 The Study of Implications on Modern Businesses Performances by Digital Communities: Case of Data Leak

Authors: Asim Majeed, Anwar Ul Haq, Ayesha Asim, Mike Lloyd-Williams, Arshad Jamal, Usman Butt

Abstract:

This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.

Keywords: Digital, communities, performance, dissemination, implications, data, exploitation

Procedia PDF Downloads 381
3976 EcoMush: Mapping Sustainable Mushroom Production in Bangladesh

Authors: A. A. Sadia, A. Emdad, E. Hossain

Abstract:

The increasing importance of mushrooms as a source of nutrition, health benefits, and even potential cancer treatment has raised awareness of the impact of climate-sensitive variables on their cultivation. Factors like temperature, relative humidity, air quality, and substrate composition play pivotal roles in shaping mushroom growth, especially in Bangladesh. Oyster mushrooms, a commonly cultivated variety in this region, are particularly vulnerable to climate fluctuations. This research explores the climatic dynamics affecting oyster mushroom cultivation and, presents an approach to address these challenges and provides tangible solutions to fortify the agro-economy, ensure food security, and promote the sustainability of this crucial food source. Using climate and production data, this study evaluates the performance of three clustering algorithms -KMeans, OPTICS, and BIRCH- based on various quality metrics. While each algorithm demonstrates specific strengths, the findings provide insights into their effectiveness for this specific dataset. The results yield essential information, pinpointing the optimal temperature range of 13°C-22°C, the unfavorable temperature threshold of 28°C and above, and the ideal relative humidity range of 75-85% with the suitable production regions in three different seasons: Kharif-1, 2, and Robi. Additionally, a user-friendly web application is developed to support mushroom farmers in making well-informed decisions about their cultivation practices. This platform offers valuable insights into the most advantageous periods for oyster mushroom farming, with the overarching goal of enhancing the efficiency and profitability of mushroom farming.

Keywords: climate variability, mushroom cultivation, clustering techniques, food security, sustainability, web-application

Procedia PDF Downloads 49
3975 The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law

Authors: Gergely Horváth

Abstract:

The study presents the complexity of food safety dividing it into two layers. Beyond the basic layer of requirements, there is a more demanding higher level linked with quality and purity aspects. It would be important to give special prominence to both layers, given that massive illnesses are caused by foods even though officially licensed. Then the study discusses an exciting safety challenge stemming from the risks of genetically modified organisms (GMOs). Furthermore, it features legal case examples that illustrate how certain liability questions are solved or not yet decided in connection with the production of genetically modified crops. In addition, a special kind of land grabbing, more precisely land grabbing from non-GMO farming systems can also be noticed as well as a new phenomenon eroding food sovereignty. Coexistence, the state where organic, conventional, and GM farming systems are standing alongside each other is an unsuitable experiment that cannot be successful, because of biophysical reasons (such as cross-pollination). Agricultural and environmental lawyers both try to find the optimal solution. Agri-environmental measures are introduced as a special subfield of law maintaining also food safety. The important steps of agri-environmental legislation are aiming at the protection of natural values, the environmental media and strengthening food safety as well, practically the quality of agricultural products intended for human consumption. The major findings of the study focus on searching for the appropriate approach capable of solving the security and safety problems of food production. The most interesting concepts of the Hungarian national and EU food law legislation are analyzed in more detail with descriptive, analytic and comparative methods.

Keywords: food law, food safety, food security, GMO, Genetically Modified Organisms, agri-environmental measures

Procedia PDF Downloads 423
3974 Vulnerability and Risk Assessment, and Preparedness to Natural Disasters of Schools in Southern Leyte, Philippines

Authors: Lorifel Hinay

Abstract:

Natural disasters have increased in frequency and severity in the Philippines over the years resulting to detrimental impacts in school properties and lives of learners. The topography of the Province of Southern Leyte is a hotspot for inevitable natural disaster-causing hazards that could affect schools, cripple the educational system and cause environmental, cultural and social detrimental impacts making Disaster Risk Reduction and Management (DRRM) an indispensable platform to keep learners safe, secure and resilient. This study determined the schools’ vulnerability and risk assessment to earthquake, landslide, flood, storm surge and tsunami hazards, and its relationship to status in disaster preparedness. Descriptive-correlational research design was used where the respondents were School DRRM Coordinators/School Administrators and Municipal DRRM Officers. It was found that schools’ vulnerability and risk were high in landslide, medium in earthquake, and low in flood, storm surge and tsunami. Though schools were moderately prepared in disasters across all hazards, they were less accomplished in group organization and property security. Less planning preparation and less implementation of DRRM measures were observed in schools highly at risk of earthquake and landslide. Also, schools vulnerable to landslide and flood have very high property security. Topography and location greatly contributed to schools’ vulnerability to hazards, thus, a school-based disaster preparedness plan is hoped to help ensure that hazard-exposed schools can build a culture of safety, disaster resiliency and education continuity.

Keywords: disaster risk reduction and management, earthquake, flood, landslide, storm surge, tsunami

Procedia PDF Downloads 106
3973 Juridically Secure Trade Mechanisms for Alternative Dispute Resolution in Transnational Business Negotiations

Authors: Linda Frazer

Abstract:

A pluralistic methodology focuses on promoting an understanding that an alternative juridical framework for the regulation of transnational business negotiations (TBN) between private business parties is fundamentally required. This paper deals with the evolving assessment of the doctoral research of the author which demonstrated that due to insufficient juridical tools, negotiations are commonly misunderstood within the complexity of pluralistic and conflicting legal regimes. This inadequacy causes uncertainty in the enforcement of legal remedies, leaving business parties surprised. Consequently, parties cannot sufficiently anticipate when and how legal rights and obligations are created, often counting on oral or incomplete agreements which may lead to the misinterpretation of the extent of their legal rights and obligations. This uncertainty causes threats to business parties for fear of creating unintended legal obligations or, conversely, that law will not enforce intended agreements for failure to pass the tests of contractual validity. A need to find a manner to set default standards of communications and standards of conduct to monitor our evolving global trade would aid law to provide the security, predictability and foreseeability during alternative dispute resolution required by TBN parties. The conclusion of this study includes a proposal of new trade mechanisms, termed 'Bills of Negotiations' (BON) to enhance party autonomy and promote the ability for TBN parties to self-regulate within the boundaries of law. BON will be guided by a secure juridical institutionalized setting that caters to guiding communications during TBN and resolving disputes that arise along the negotiation processes on a fast track basis.

Keywords: alternative resolution disputes, ADR, good faith, good faith, juridical security, legal regulation, trade mechanisms, transnational business negotiations

Procedia PDF Downloads 132
3972 Ultracapacitor State-of-Energy Monitoring System with On-Line Parameter Identification

Authors: N. Reichbach, A. Kuperman

Abstract:

The paper describes a design of a monitoring system for super capacitor packs in propulsion systems, allowing determining the instantaneous energy capacity under power loading. The system contains real-time recursive-least-squares identification mechanism, estimating the values of pack capacitance and equivalent series resistance. These values are required for accurate calculation of the state-of-energy.

Keywords: real-time monitoring, RLS identification algorithm, state-of-energy, super capacitor

Procedia PDF Downloads 516
3971 Tax Criminal Case Settlement Through Obligative Justice Approach to Increase the State Revenue

Authors: Pujiyono, Reda Manthovani, Deny Tri Ardianto, Rabani Halawa, Isharyanto

Abstract:

This research has background that the taxpayer (defendant) who has paid off the tax payable and the tax penalty payable after the tax case file has been transferred to the court, while the legality of stopping the prosecution of tax cases on the grounds that in the interest of state revenue is not regulated in the provisions of Law Number 8 of 1981 concerning The Criminal Procedure Code and Law Number 28 of 2007 concerning the Third Amendment to Law Number 6 of 1983 concerning General Provisions and Tax Procedures as amended several times, most recently by Law Number 16 of 2009 concerning Stipulation of Government Regulation in Lieu of Law Number 5 of 2008 concerning Fourth Amendment to Law Number 6 0f 1983 concerning General Provisions and Tax Procedures to become Law, even though at the investigation stage it regulates the mechanism for stopping the investigation for the sake of the interest of acceptance ne this is because before the case file is transferred to the court where at the request of the Minister of Finance of The Republic of Indonesia can stop the investigation in the interest of state revenue so that based on this phenomenon a legal vacuum is found. Therefore, a non-penal policy is needed from the public prosecutor to resolve tax crime cases without going through litigation in court through the penal mediation method using the Plea Bargaining System which adheres to the principles of restorative justice and obligative justice based on the ultimum remedium principle and the principle of opportunity in order to realize the principle of fast, simple and low cost justice (content principle). This research is a normative legal research, using a statutory approach, conceptual approach, and comparative law approach. Regulations that is used in many countries, include America, The Netherlands and Singapore. The results of this study indicate that there is a reformulation of the tax criminal justice system which regulates the mechanism, qualifications and authority to terminate the prosecution of tax cases in the interest of state revenues in order to achieve legal goals which are not only for legal certainty but more that, namely providing benefits and legal justice for people seeking justice.

Keywords: obligative justice, regulation, state reveneus, tax criminal

Procedia PDF Downloads 67
3970 Performance Evaluation of Packet Scheduling with Channel Conditioning Aware Based on Wimax Networks

Authors: Elmabruk Laias, Abdalla M. Hanashi, Mohammed Alnas

Abstract:

Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non-real time traffic in congested networks by considering channel status.

Keywords: WiMAX, Quality of Services (QoS), OPNE, Diff-Serv (DS).

Procedia PDF Downloads 268
3969 Violence and Challenges in the Pamir Hindu Kush: A Study of the Impact of Change on a Central but Unknown Region

Authors: Skander Ben Mami

Abstract:

Despite its particular patterns and historical importance, the remote region of the Pamir Hindu Kush still lacks public recognition, as well as scientific substance, because of the abundance of classical state-centred geopolitical studies, the resilience of (inter)national narratives, and the political utility of the concepts of 'Central Asia' and 'South Asia'. However, this specific region of about 100 million inhabitants and located at the criss-cross of four geopolitical areas (Indian, Iranian, Chinese and Russian) over a territory of half a million square kilometres features a string of patterns that set it apart from the neighbouring areas of the Fergana, the Gansu and Punjab. Moreover, the Pamir Hindu Kush undergoes a series of parallel social and economic transformations that deserve scrutiny for their strong effect on the people’s lifestyle, particularly in three major urban centres (Aksu in China, Bukhara in Uzbekistan and Islamabad in Pakistan) and their immediate rural surroundings. While the involvement of various public and private stakeholders (States, NGOs, civil movements, private firms…) has undeniably resulted in positive elements (economic growth, connectivity, higher school attendance), it has in the same time generated a collection of negative effects (radicalizing, inequalities, pollution, territorial divide) that need to be addressed to strengthen regional and international security. This paper underscores the region’s strategical importance as the major hotbed and engine of insecurity and violence in Asia, notably in the context of Afghanistan’s enduring violence. It introduces the inner structures of the region, the different sources of violence as well as the governments’ responses to address it.

Keywords: geography, security, terrorism, urbanisation

Procedia PDF Downloads 120
3968 China Pakistan Economic Corridor: A Changing Mechanism in Pakistan

Authors: Komal Niazi, He Guoqiang

Abstract:

This paper is focused on ‘CPEC (China Pakistan Economic Corridor) a changing mechanism in Pakistan’. China Pakistan Economic Corridor (CPEC) activity under OBOR (One Belt One Road (OBOR) CPEC is a piece of the bigger umbrella and goes for giving another hallway of exchange for China and Pakistan and is relied upon to profit the entire of South Asian area. But this study reveals that significance of acculturation can never be overemphasized in the investigation of diverse impacts and the routes people groups of various ethnic personalities figure out how to adjust and acknowledge the social attributes of a larger part group in a multiethnic culture. This study also deals with the effects of acculturation which can be seen at multiple levels through CPEC for both Pakistani and Chinese people, who were working on this project. China and Pakistan exchanged the cultural and social patterns with each other. Probably the most perceptible gathering level impacts of cultural assimilation regularly incorporate changes in sustenance (food), clothing, and language. At the individual level, the procedure of cultural assimilation alludes to the socialization procedure by which the Pakistani local people and Chinese who were working in Pakistan adopted values, traditions, attitudes, states of mind, and practices. But China has imposed discourse through economic power and language. CPEC dominates Pakistan’s poor area’s and changes their living, social and cultural values. People also claimed this acculturation was a great threat to their cultural values and religious beliefs. Main findings of the study clearly ascertained that research was to find out the conceptual understanding of people about the acculturation process through CPEC. At the cultural level, aggregate activities and social organizations end up plainly adjusted, and at the behavioral level, there are changes in a person's day by day behavioral collection and some of the time in experienced anxiety. Anthropological data methods were used to collect data, like snowball and judgmental sampling, case studied methods.

Keywords: CPEC, acculturation process, language discourse, social norms, cultural values, religious beliefs

Procedia PDF Downloads 278
3967 Unveiling the Potential of Hydroponics as a Climate-Smart Technology for Small-Scale Farming and Food Security in Africa

Authors: Margaret S. Gumisiriza, Ernest. R. Mbega, Patrick Ndakidemi, Businge K. Edward

Abstract:

The purpose of the paper was to assess existing literature regarding hydroponics in both the developing and developed countries. Furthermore, relate it to the context of African countries, how they can implement it and benefit from it in the face of climate change, high population growth rates, and reduced food production. Agriculture remains the major economic activity for a number of African countries. It is the source of income for most peasants, and still contributes to the Gross Domestic Product in most of these African countries. Unfortunately, climate change coupled with the increasing rates of population growth; rural-urban migration; and urbanization have led to food insecurity due to a reduction of available land for agriculture. This has further intensified the food security dilemma in Africa, especially in urban areas, where land is already limited. Considering the aforementioned state of affairs, there is an increasing demand for interventions that can help farmers in Africa to cope with climate change and increase food production. This review explores hydroponic farming and how it can be used as a climate-smart farming system in Africa’s rural and urban areas. Specifically, the review focuses on hydroponics, requirements for hydroponic farming and the state of hydroponic farming in LDCs and Developed countries (DCs). From the review, it was observed that African countries especially those that receive a lot of sunlight would highly benefit from the solar-powered hydroponic farming systems. Further, still, this farming system will help African countries cope with the challenges of high population pressure in urban areas and climate change as it qualifies to be an urban farming system.

Keywords: Africa, climate-smart agriculture, solar-powered-hydroponics, urban-farming

Procedia PDF Downloads 254
3966 Transformer Life Enhancement Using Dynamic Switching of Second Harmonic Feature in IEDs

Authors: K. N. Dinesh Babu, P. K. Gargava

Abstract:

Energization of a transformer results in sudden flow of current which is an effect of core magnetization. This current will be dominated by the presence of second harmonic, which in turn is used to segregate fault and inrush current, thus guaranteeing proper operation of the relay. This additional security in the relay sometimes obstructs or delays differential protection in a specific scenario, when the 2nd harmonic content was present during a genuine fault. This kind of scenario can result in isolation of the transformer by Buchholz and pressure release valve (PRV) protection, which is acted when fault creates more damage in transformer. Such delays involve a huge impact on the insulation failure, and chances of repairing or rectifying fault of problem at site become very dismal. Sometimes this delay can cause fire in the transformer, and this situation becomes havoc for a sub-station. Such occurrences have been observed in field also when differential relay operation was delayed by 10-15 ms by second harmonic blocking in some specific conditions. These incidences have led to the need for an alternative solution to eradicate such unwarranted delay in operation in future. Modern numerical relay, called as intelligent electronic device (IED), is embedded with advanced protection features which permit higher flexibility and better provisions for tuning of protection logic and settings. Such flexibility in transformer protection IEDs, enables incorporation of alternative methods such as dynamic switching of second harmonic feature for blocking the differential protection with additional security. The analysis and precautionary measures carried out in this case, have been simulated and discussed in this paper to ensure that similar solutions can be adopted to inhibit analogous issues in future.

Keywords: differential protection, intelligent electronic device (IED), 2nd harmonic inhibit, inrush inhibit

Procedia PDF Downloads 279
3965 Neighbor Caring Environment System (NCE) Using Parallel Replication Mechanism

Authors: Ahmad Shukri Mohd Noor, Emma Ahmad Sirajudin, Rabiei Mamat

Abstract:

Pertaining to a particular Marine interest, the process of data sampling could take years before a study can be concluded. Therefore, the need for a robust backup system for the data is invariably implicit. In recent advancement of Marine applications, more functionalities and tools are integrated to assist the work of the researchers. It is anticipated that this modality will continue as research scope widens and intensifies and at the same to follow suit with current technologies and lifestyles. The convenience to collect and share information these days also applies to the work in Marine research. Therefore, Marine system designers should be aware that high availability is a necessary attribute in Marine repository applications as well as a robust backup system for the data. In this paper, the approach to high availability is related both to hardware and software but the focus is more on software. We consider a NABTIC repository system that is primitively built on a single server and does not have replicated components. First, the system is decomposed into separate modules. The modules are placed on multiple servers to create a distributed system. Redundancy is added by placing the copies of the modules on different servers using Neighbor Caring Environment System(NCES) technique. NCER is utilizing parallel replication components mechanism. A background monitoring is established to check servers’ heartbeats to confirm their aliveness. At the same time, a critical adaptive threshold is maintained to make sure a failure is timely detected using Adaptive Fault Detection (AFD). A confirmed failure will set the recovery mode where a selection process will be done before a fail-over server is instructed. In effect, the Marine repository service is continued as the fail-over masks a recent failure. The performance of the new prototype is tested and is confirmed to be more highly available. Furthermore, the downtime is not noticeable as service is immediately restored automatically. The Marine repository system is said to have achieved fault tolerance.

Keywords: availability, fault detection, replication, fault tolerance, marine application

Procedia PDF Downloads 305
3964 Adsorptive Removal of Methylene Blue Dye from Aqueous Solutions by Leaf and Stem Biochar Derived from Lantana camara: Adsorption Kinetics, Equilibrium, Thermodynamics and Possible Mechanism

Authors: Deepa Kundu, Prabhakar Sharma, Sayan Bhattacharya, Jianying Shang

Abstract:

The discharge of dye-containing effluents in the water bodies has raised concern due to the potential hazards related to their toxicity in the environment. There are various treatment technologies available for the removal of dyes from wastewaters. The use of biosorbent to remove dyes from wastewater is one of the effective and inexpensive techniques. In the study, the adsorption of phenothiazine dye methylene blue onto biosorbent prepared from Lantana camara L. has been studied in aqueous solutions. The batch adsorption experiments were conducted and the effects of various parameters such as pH (3-12), contact time, adsorbent dose (100-400 mg/L), initial dye concentration (5-20 mg/L), and temperature (303, 313 and 323 K) were investigated. The prepared leaf (BCL600) and shoot (BCS600) biochar of Lantana were characterized using FTIR, SEM, elemental analysis, and zeta potential (pH~7). A comparison between the adsorption potential of both the biosorbent was also evaluated. The results indicated that the amount of methylene blue dye (mg/g) adsorbed onto the surface of biochar was highly dependent on the pH of the dye solutions as it increased with an increase in pH from 3 to 12. It was observed that the dye treated with BCS600 and BCL600 attained an equilibrium within 60 and 100 minutes, respectively. The rate of the adsorption process was determined by performing the Lagergren pseudo-first-order and pseudo-second-order kinetics. It was found that dye treated with both BCS600 and BCL600 followed pseudo-second-order kinetics implying the multi-step nature of the adsorption process involving external adsorption and diffusion of dye molecules into the interior of the adsorbents. The data obtained from batch experiments were fitted well with Langmuir and Freundlich isotherms (R² > 0.98) to indicate the multilayer adsorption of dye over the biochar surfaces. The thermodynamic studies revealed that the adsorption process is favourable, spontaneous, and endothermic in nature. Based on the results, the inexpensive and easily available Lantana camara biomass can be used to remove methylene blue dye from wastewater. It can also help in managing the growth of the notorious weed in the environment.

Keywords: adsorption kinetics, biochar, Lantana camara, methylene blue dye, possible mechanism, thermodynamics

Procedia PDF Downloads 120
3963 Photoelectrical Stimulation for Cancer Therapy

Authors: Mohammad M. Aria, Fatma Öz, Yashar Esmaeilian, Marco Carofiglio, Valentina Cauda, Özlem Yalçın

Abstract:

Photoelectrical stimulation of cells with semiconductor organic polymers have been shown promising applications in neuroprosthetics such as retinal prosthesis. Photoelectrical stimulation of the cell membranes can be induced through a photo-electric charge separation mechanism in the semiconductor materials, and it can alter intracellular calcium level through both stimulation of voltage-gated ion channels and increase of intracellular reactive oxygen species (ROS) level. On the other hand, targeting voltage-gated ion channels in cancer cells to induce cell apoptosis through calcium signaling alternation is an effective mechanism which has been explained before. In this regard, remote control of the voltage-gated ion channels aimed to alter intracellular calcium by using photo-active organic polymers can be novel technology in cancer therapy. In this study, we used P (ITO/Indium thin oxide)/P3HT(poly(3-hexylthiophene-2,5-diyl)) and PN (ITO/ZnO/P3HT) photovoltaic junctions to stimulate MDA-MB-231 breast cancer cells. We showed that the photo-stimulation of breast cancer cells through photo capacitive current generated by the photovoltaic junctions are able to excite the cells and alternate intracellular calcium based on the calcium imaging (at 8mW/cm² green light intensity and 10-50 ms light durations), which has been reported already to safety stimulate neurons. The control group did not undergo light treatment and was cultured in T-75 flasks. We detected 20-30% cell death for ITO/P3HT and 51-60% cell death for ITO/ZnO/P3HT samples in the light treated MDA-MB-231 cell group. Western blot analysis demonstrated poly(ADP-ribose) polymerase (PARP) activated cell death in the light treated group. Furthermore, Annexin V and PI fluorescent staining indicated both apoptosis and necrosis in treated cells. In conclusion, our findings revealed that the photoelectrical stimulation of cells (through long time overstimulation) can induce cell death in cancer cells.

Keywords: Ca²⁺ signaling, cancer therapy, electrically excitable cells, photoelectrical stimulation, voltage-gated ion channels

Procedia PDF Downloads 160
3962 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.

Keywords: Belgium, counterterrorism strategies, human rights, immigration law

Procedia PDF Downloads 97