Search results for: threats identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3527

Search results for: threats identification

1877 How Does the Interaction between Environmental and Intellectual Property Rights Affect Environmental Innovation? A Study of Seven OECD Countries

Authors: Aneeq Sarwar

Abstract:

This study assesses the interaction between environmental and intellectual property policy on the rate of invention of environmental inventions and specifically tests for whether there is a synergy between stricter IP regimes and stronger environmental policies. The empirical analysis uses firm and industry-level data from seven OECD countries from 2009 to 2015. We also introduce a new measure of environmental inventions using a Natural Language Processing Topic Modelling technique. We find that intellectual property policy strictness demonstrates greater effectiveness in encouraging inventiveness in environmental inventions when used in combination with stronger environmental policies. This study contributes to existing literature in two ways. First, it devises a method for better identification of environmental technologies, we demonstrate how our method is more comprehensive than existing methods as we are better able to identify not only environmental inventions, but also major components of said inventions. Second, we test how various policy regimes affect the development of environmental technologies, we are the first study to examine the interaction of the environmental and intellectual property policy on firm level innovation.

Keywords: environmental economics, economics of innovation, environmental policy, firm level

Procedia PDF Downloads 137
1876 The Benefits of Mountain Climbing in the Physical Well-Being of Young People

Authors: Zylfi Shehu, Rozeta Shatku

Abstract:

The aim of this study is the identification of the goods and the consequences it brings up the mountain climbing to the youth, how mountain climbing influences in physical activity and the health of young people. Taken to study 37 young people aged 18-30 years, 25 males and 12 females. The selection was made at random and voluntary. Subjects were not professionals but amateurs climbing in the mountain. They were informed and instructed for the test to be carried out. The ascent was made in January 2016 in the Mount of Gjallica in Kukës, Albania, the height of the mountain is 2489 m above sea level. Backpack for each subject weighing 32 kg. Time of ascent, attitude and descent was 6 days. In 22 males, 2 of them did not afford the ascent on the first day and went back. Of the 12 women, 5 of them withdrew on the first day. During the descent on day six, 20 males 7 of them had minor injuries, three with serious injuries. While a total of 7 women, 4 of them had minor injuries and one with serious injuries. Most of the men and women who deal with physical activity throughout life faced the light and were not injured, and the rest that were not dealt with physical activity were more injured. Lack of experience and knowledge was one of the causes of injuries. The subjects had anxiety all the time, uncertainty and fear of avalanches of snow and difficult terrain.

Keywords: climbing, physical activity, young people

Procedia PDF Downloads 328
1875 Analysis of Trends in Equity of Maternal Health Care in South India

Authors: Anushree S. Panikkassery

Abstract:

The paper analyses the pattern and trend of maternal health care in south Indian states. It studies the interstate disparities in terms of maternal health care. It also compares the trends in terms of achieving the target of sustainable development Goal is related to maternal health. The maternal health care (MHC) development is one of the key indicators for the development of health sector in the country and assumes significance from the socioeconomic and developmental perspectives. Maternal health care mainly consists of composite care during pregnancy, child birth as well as postpartum period. Antenatal care, identification, referral and management of high risk pregnancies, safe and healthy child birth and early postnatal care are some of the important issues pertaining to maternal health. Data is collected from national family health survey 1992-93, 1998-99, 2005-06, and 2015-16. A concentration index is used to study the disparities in equity of maternal health among south Indian states. The study shows that there has been an improvement in maternal health care in south Indian states with Kerala topping among the states. But there exist disparities among the south Indian states.

Keywords: antenatal care, disparities, equity, maternal health

Procedia PDF Downloads 364
1874 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 417
1873 Phage Therapy of Staphylococcal Pyoderma in Dogs

Authors: Jiri Nepereny, Vladimir Vrzal

Abstract:

Staphylococcus intermedius/pseudintermedius bacteria are commonly found on the skin of healthy dogs and can cause pruritic skin diseases under certain circumstances (trauma, allergy, immunodeficiency, ectoparasitosis, endocrinological diseases, glucocorticoid therapy, etc.). These can develop into complicated superficial or deep pyoderma, which represent a large group of problematic skin diseases in dogs. These are predominantly inflammations of a secondary nature, associated with the occurrence of coagulase-positive Staphylococcus spp. A major problem is increased itching, which greatly complicates the healing process. The aim of this work is to verify the efficacy of the developed preparation Bacteriophage SI (Staphylococcus intermedius). The tested preparation contains a lysate of bacterial cells of S. intermedius host culture including culture medium and live virions of specific phage. Sodium Merthiolate is added as a preservative in a safe concentration. Validation of the efficacy of the product was demonstrated by monitoring the therapeutic effect after application to indicated cases from clinical practice. The indication for inclusion of the patient into the trial was an adequate history and clinical examination accompanied by sample collection for bacteriological examination and isolation of the specific causative agent. Isolate identification was performed by API BioMérieux identification system (API ID 32 STAPH) and rep-PCR typing. The suitability of therapy for a specific case was confirmed by in vitro testing of the lytic ability of the bacteriophage to lyse the specific isolate = formation of specific plaques on the culture isolate on the surface of the solid culture medium. So far, a total of 32 dogs of different sexes, ages and breed affiliations with different symptoms of staphylococcal dermatitis have been included in the testing. Their previous therapy consisted of more or less successful systemic or local application of broad-spectrum antibiotics. The presence of S. intermedius/pseudintermedius has been demonstrated in 26 cases. The isolates were identified as a S. pseudintermedius, in all cases. Contaminant bacterial microflora was always present in the examined samples. The test product was applied subcutaneously in gradually increasing doses over a period of 1 month. After improvement in health status, maintenance therapy was followed by application of the product once a week for 3 months. Adverse effects associated with the administration of the product (swelling at the site of application) occurred in only 2 cases. In all cases, there was a significant reduction in clinical signs (healing of skin lesions and reduction of inflammation) after therapy and an improvement in the well-being of the treated animals. A major problem in the treatment of pyoderma is the frequent resistance of the causative agents to antibiotics, especially the increasing frequency of multidrug-resistant and methicillin-resistant S. pseudintermedius (MRSP) strains. Specific phagolysate using for the therapy of these diseases could solve this problem and to some extent replace or reduce the use of antibiotics, whose frequent and widespread application often leads to the emergence of resistance. The advantage of the therapeutic use of bacteriophages is their bactericidal effect, high specificity and safety. This work was supported by Project FV40213 from Ministry of Industry and Trade, Czech Republic.

Keywords: bacteriophage, pyoderma, staphylococcus spp, therapy

Procedia PDF Downloads 160
1872 The Medieval Byzantine Churches at Trebizond (Trabzon): Promotion of Local Awareness and Conservation through Interpretation and Presentation

Authors: Esra Ceren Kara, Ufuk Seri̇n

Abstract:

The Byzantine Empire, which persisted from the 4th to 15th centuries, covered a significant period in history and bequeathed a significant cultural heritage throughout its territories, including Turkey. However, despite its historical and cultural importance, the approach of the political authorities, which emphasizes the Seljuk and Ottoman heritage, to Byzantium in Turkey is reluctant and problematic. Byzantine history and culture have long been neglected and attained negative connotations. This has led to a lack of awareness and understanding of Byzantine heritage among the public and inadequate conservation efforts. This research aims to address this problem by proposing a reinterpretation and presentation of Byzantine heritage in Turkey that emphasizes its cultural value and presents it to the public as a part of a common cultural heritage in order to accomplish effective conservation, raise awareness and provide a better understanding of the Byzantium. In this article, the ways to interpret, present and integrate the Medieval Byzantine heritage into today’s world are analyzed through the selected case study of Trebizond (Trabzon) with a holistic approach by putting emphasis on the Byzantine religious edifices, churches, chapels and monasteries. Although the vestiges of this period are still intact and in use today, their past is unknown to many of their users. This situation is even more evident in the case of the converted churches, which are now used as mosques or mosque-museums. In the city center of Trebizond, 9 out of 12 religious edifices that are still in use were built during the Medieval Byzantine period and converted into mosques under Ottoman and Turkish rule. Currently, these monuments serve as mosques and mosque-museums. However, with the exception of Hagia Sophia and Girls Monastery, their Byzantine past is obscure to many locals. Thus, the promotion of local awareness and conservation of the Medieval Byzantine heritage in the city is required. With this premise, this research will investigate the values and opportunities offered by the Byzantine cultural heritage in Trebizond and the threats to its conservation, and it will offer proposals for a more effective interpretation and presentation so as to foster local awareness and integration of the Medieval Byzantine heritage.

Keywords: Byzantium/Byzantine, Trebizond, cultural heritage, interpretation and presentation, conservation, religious architecture, converted churches interpretation and presentation

Procedia PDF Downloads 59
1871 Innovation and Technologies Synthesis of Various Components: A Contribution to the New Precision Irrigation Development for Open-Field Fruit Orchards

Authors: Pipop Chatrabhuti, S. Visessri, T. Charinpanitkul

Abstract:

Precision irrigation (PI) technology has emerged as a solution to optimize water usage in agriculture, aiming to maximize crop yields while minimizing water waste. Developing a new PI for commercialization requires developers to research, synthesize, evaluate, and select appropriate technologies and make use of such information to produce innovative products. The objective of this review is to facilitate innovators by providing them with a summary of existing knowledge and the identification of gaps in research linking to the innovative development of PI. This paper reviews and synthesizes technologies and components relevant to precision irrigation, highlighting its potential benefits and challenges. The Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) framework is used for the review. The study is intended to contribute to innovators who apply for collaborative approach to problem-solving and idea generation that involves seeking external input and resources from a diverse range of individuals and organizations.

Keywords: innovation synthesis, technology assessment, precision irrigation technologies, precision irrigation components, new product development

Procedia PDF Downloads 52
1870 A Genetic Algorithm Based Ensemble Method with Pairwise Consensus Score on Malware Cacophonous Labels

Authors: Shih-Yu Wang, Shun-Wen Hsiao

Abstract:

In the field of cybersecurity, there exists many vendors giving malware samples classified results, namely naming after the label that contains some important information which is also called AV label. Lots of researchers relay on AV labels for research. Unfortunately, AV labels are too cluttered. They do not have a fixed format and fixed naming rules because the naming results were based on each classifiers' viewpoints. A way to fix the problem is taking a majority vote. However, voting can sometimes create problems of bias. Thus, we create a novel ensemble approach which does not rely on the cacophonous naming result but depend on group identification to aggregate everyone's opinion. To achieve this purpose, we develop an scoring system called Pairwise Consensus Score (PCS) to calculate result similarity. The entire method architecture combine Genetic Algorithm and PCS to find maximum consensus in the group. Experimental results revealed that our method outperformed the majority voting by 10% in term of the score.

Keywords: genetic algorithm, ensemble learning, malware family, malware labeling, AV labels

Procedia PDF Downloads 71
1869 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data

Authors: Murat Yazici

Abstract:

Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.

Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data

Procedia PDF Downloads 36
1868 Identification and Characterization of Heavy Metal Resistant Bacteria from the Klip River

Authors: P. Chihomvu, P. Stegmann, M. Pillay

Abstract:

Pollution of the Klip River has caused microorganisms inhabiting it to develop protective survival mechanisms. This study isolated and characterized the heavy metal resistant bacteria in the Klip River. Water and sediment samples were collected from six sites along the course of the river. The pH, turbidity, salinity, temperature and dissolved oxygen were measured in-situ. The concentrations of six heavy metals (Cd, Cu, Fe, Ni, Pb, and Zn) of the water samples were determined by atomic absorption spectroscopy. Biochemical and antibiotic profiles of the isolates were assessed using the API 20E® and Kirby Bauer Method. Growth studies were carried out using spectrophotometric methods. The isolates were identified using 16SrDNA sequencing. The uppermost part of the Klip River with the lowest pH had the highest levels of heavy metals. Turbidity, salinity and specific conductivity increased measurably at Site 4 (Henley on Klip Weir). MIC tests showed that 16 isolates exhibited high iron and lead resistance. Antibiotic susceptibility tests revealed that the isolates exhibited multi-tolerances to drugs such as tetracycline, ampicillin, and amoxicillin.

Keywords: Klip River, heavy metals, resistance, 16SrDNA

Procedia PDF Downloads 312
1867 Evaluation of Humoral Immune Response Against Somatic and Excretory- Secretory Antigens of Dicrocoelium Dendriticum in Infected Sheep by Western Blot

Authors: Arash Jafari, Somaye Bahrami, Mohammad Hossein Razi Jalali

Abstract:

The aim of this study was the isolation and identification of excretory-secretory and somatic antigens from D. dendriticum by SDS-PAGE and evaluation of humeral immune response against these antigens. The sera of infected sheep with different infection degrees were collected. Somatic and ES proteins were isolated with SDS PAGE. Immunogenicity properties of the resulting proteins were determined using western blot analysis. The total extract of somatic antigens analysed by SDS-PAGE revealed 21 proteins. In mild infection, bands of 130 KDa were immune dominant. In moderate infections 48, 80 and 130 KDa and in heavy infections 48, 60, 80, 130 KDa were detected as immune dominant bands. In ES antigens, mild infection 130 KDa, in moderate infection 100, 120 and 130 KDa and in heavy infection 45, 80, 85, 100, 120 and 130 KDa were immune dominant bands. The most immunogenic protein band during different degrees of infection was 130KDa.

Keywords: Dicrocoelium dendriticum excretory-secretory antigens, somatic antigens, western blot

Procedia PDF Downloads 586
1866 System Identification and Controller Design for a DC Electrical Motor

Authors: Armel Asongu Nkembi, Ahmad Fawad

Abstract:

The aim of this paper is to determine in a concise way the transfer function that characterizes a DC electrical motor with a helix. In practice it can be obtained by applying a particular input to the system and then, based on the observation of its output, determine an approximation to the transfer function of the system. In our case, we use a step input and find the transfer function parameters that give the simulated first-order time response. The simulation of the system is done using MATLAB/Simulink. In order to determine the parameters, we assume a first order system and use the Broida approximation to determine the parameters and then its Mean Square Error (MSE). Furthermore, we design a PID controller for the control process first in the continuous time domain and tune it using the Ziegler-Nichols open loop process. We then digitize the controller to obtain a digital controller since most systems are implemented using computers, which are digital in nature.

Keywords: transfer function, step input, MATLAB, Simulink, DC electrical motor, PID controller, open-loop process, mean square process, digital controller, Ziegler-Nichols

Procedia PDF Downloads 33
1865 Identification of Lean Implementation Hurdles in Indian Industries

Authors: Bhim Singh

Abstract:

Due to increased pressure from global competitors, manufacturing organizations are switching over to lean philosophies from traditional mass production. Lean manufacturing is a manufacturing philosophy which focuses on elimination of various types of wastes and creates maximum value for the end customers. Lean thinking aims to produce high quality products and services at the lowest possible cost with maximum customer responsiveness. Indian Industry is facing lot of problems in this transformation from traditional mass production to lean production. Through this paper an attempt has been made to identify various lean implementation hurdles in Indian industries with the help of a structured survey. Identified hurdles are grouped with the help of factor analysis and rated by calculating descriptive statistics. To show the effect of lean implementation hurdles a hypothesis “Organizations having higher level of lean implementation hurdles will have poor (negative) performance” has been postulated and tested using correlation matrix between performance parameters of the organizations and identified hurdles. The findings of the paper will be helpful to prepare road map to identify and eradicate the lean implementation hurdles.

Keywords: factor analysis, global competition, lean implementation, lean hurdles

Procedia PDF Downloads 237
1864 Fault Diagnosis of Nonlinear Systems Using Dynamic Neural Networks

Authors: E. Sobhani-Tehrani, K. Khorasani, N. Meskin

Abstract:

This paper presents a novel integrated hybrid approach for fault diagnosis (FD) of nonlinear systems. Unlike most FD techniques, the proposed solution simultaneously accomplishes fault detection, isolation, and identification (FDII) within a unified diagnostic module. At the core of this solution is a bank of adaptive neural parameter estimators (NPE) associated with a set of single-parameter fault models. The NPEs continuously estimate unknown fault parameters (FP) that are indicators of faults in the system. Two NPE structures including series-parallel and parallel are developed with their exclusive set of desirable attributes. The parallel scheme is extremely robust to measurement noise and possesses a simpler, yet more solid, fault isolation logic. On the contrary, the series-parallel scheme displays short FD delays and is robust to closed-loop system transients due to changes in control commands. Finally, a fault tolerant observer (FTO) is designed to extend the capability of the NPEs to systems with partial-state measurement.

Keywords: hybrid fault diagnosis, dynamic neural networks, nonlinear systems, fault tolerant observer

Procedia PDF Downloads 378
1863 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 145
1862 Historical Studies on Gilt Decorations on Glazed Surfaces

Authors: Sabra Saeidi

Abstract:

This research focuses on the historical techniques associated with the lajevardina and Haft-Rangi production methods in creating tiles, with emphasis on the identification of the techniques of inserting gold sheets on the surface of such historical glazed tiles. In this regard, firstly, the history of the production of enamel, gold plated, and Lajevardina glazed pottery work made during the Khwarizmanshahid and Mongol era (eleventh to the thirteenth century) have been assessed to reach a better understanding of the background and the history associated with historical glazing methods. After the historical overview of the production technique of glazed pottery work and introductions of the civilizations using those techniques, we focused on the niches production methods of enamel and Lajevardina glazing, which are two categories of decorations usually found in tiles. Next, a general classification method for various types of gilt tiles has been introduced, which is applicable to the tile works up to Safavid period (Sixteenth to the seventeenth century). Gilded lajevardina glazed tiles, gilt Haft-Rangi tiles, monolithic glazed gilt tiles, and gilt mosaic tiles are included in the categories.

Keywords: gilt tiles, Islamic art, Iranian art, historical studies, gilding

Procedia PDF Downloads 110
1861 PD Test in Gas Insulated Substation Using UHF Method

Authors: T. Prabakaran

Abstract:

Gas Insulated Substations (GIS) are widely used as important switchgear equipment because of its high reliability, low space requirement, low risk factor and easy maintenance, yet some failures have been reported. Some of the failures are due to presence of metallic particles inside the GIS compartment. The defect can be generated in GIS during production, maintenance, installation and can be due to ageing of the component. The Ultra-High Frequency (UHF) method is used to diagnose the insulation condition of GIS by detecting the PD signals in GIS. This paper identifies PD patterns for free moving particle defect and particle fixed on cone using UHF method. As insulation failure usually starts with PD activity, this paper investigates the differences in PD characteristics in SF6 gas with different types of defects. Experimental results show that correct identification of defects can be achieved based on considered PD characteristics. The method can be applied to prove the quality of assembly work at commissioning, also on a regular basis after many years in service to detect aged and conducting particles as a part of the condition based maintenance.

Keywords: gas insulated substation, partial discharge, free moving particle defect, particle fixed on cone defect, ultra high frequency method

Procedia PDF Downloads 233
1860 Managing Maritime Security in the Mediterranean Sea: The Roles of the EU in Tackling Irregular Migration

Authors: Shazwanis Shukri

Abstract:

The Mediterranean Sea, at the crossroads of three continents has always been the focus of pan-European and worldwide attention. Over the past decade, the Mediterranean Sea has become a hotbed for irregular migration particularly from the African continent toward the Europe. Among the major transit routes in the Mediterranean Sea include the Strait of Gibraltar, Canary Island and island of Lampedusa. In recent years, Mediterranean Sea has witnessed significant numbers of accidents and shipwrecks involving the irregular migrants and refugees trying to reach Europe via the sea. The shipwrecks and traffickers exploitation of migrants draw most of the attention particularly for the European Union (EU). This incident has been a wakeup call for the EU and become the top political agenda in the EU policy to tackle irregular migration and human smuggling at sea. EU has repeatedly addressed irregular migration as one of the threats the EU and its citizens may be confronted with and therefore immediate measures are crucial to tackle the crisis. In light of this, various initiatives have been adopted by the EU to strengthen external border control and restrict access to irregular migrants, notably through the enforcement of Frontex and Eunavfor Med. This paper analyses current development of counter-migration operations by the EU in response to migration crisis in the Mediterranean Sea. The analysis is threefold. First, this study examines the patterns and trends of irregular migration’s movements from recent perspective. Second, this study concentrates on the evolution of the EU operations that are in place in the Mediterranean Sea, notably by Frontex and Eunavfor Med to curb the influx of irregular migrants to the European countries, including, among others, Greece and Italy. Third, this study investigates the EU approaches to fight against the proliferation of human trafficking networks at sea. This study is essential to determine the roles of the EU in tackling migration crisis and human trafficking in the Mediterranean Sea and the effectiveness of their counter-migration operations to reduce the number of irregular migrants travelling via the sea. Elite interviews and document analysis were used as a methodology in this study. The study discovers that the EU operations have successfully contributed to reduce the numbers of irregular migrant’s arrival to Europe. The study also shows that the operations were effective to disrupt smugglers business models particularly from Libya. This study provides essential understanding about the roles of the EU not limited to tackle the migration crisis and disrupt trafficking networks, but also pledged to prevent further loss of lives at sea.

Keywords: European union, frontex, irregular migration, Mediterranean sea

Procedia PDF Downloads 312
1859 Adaptive Control of Magnetorheological Damper Using Duffing-Like Model

Authors: Hung-Jiun Chi, Cheng-En Tsai, Jia-Ying Tu

Abstract:

Semi-active control of Magnetorheological (MR) dampers for vibration reduction of structural systems has received considerable attention in civil and earthquake engineering, because the effective stiffness and damping properties of MR fluid can change in a very short time in reaction to external loading, requiring only a low level of power. However, the inherent nonlinear dynamics of hysteresis raise challenges in the modeling and control processes. In order to control the MR damper, an innovative Duffing-like equation is proposed to approximate the hysteresis dynamics in a deterministic and systematic manner than previously has been possible. Then, the model-reference adaptive control technique based on the Duffing-like model and the Lyapunov method is discussed. Parameter identification work with experimental data is presented to show the effectiveness of the Duffing-like model. In addition, simulation results show that the resulting adaptive gains enable the MR damper force to track the desired response of the reference model satisfactorily, verifying the effectiveness of the proposed modeling and control techniques.

Keywords: magnetorheological damper, duffing equation, model-reference adaptive control, Lyapunov function, hysteresis

Procedia PDF Downloads 352
1858 Turkey Disaster Risk Management System Project (TAFRISK)

Authors: Ahmet Parlak, Celalettin Bilgen

Abstract:

In order to create an effective early warning system, Identification of the risks, preparation and carrying out risk modeling of risk scenarios, taking into account the shortcomings of the old disaster scenarios should be used to improve the system. In the light of this, the importance of risk modeling in creating an effective early warning system is understood. In the scope of TAFRISK project risk modeling trend analysis report on risk modeling developed and a demonstration was conducted for Risk Modeling for flood and mass movements. For risk modeling R&D, studies have been conducted to determine the information, and source of the information, to be gathered, to develop algorithms and to adapt the current algorithms to Turkey’s conditions for determining the risk score in the high disaster risk areas. For each type of the disaster; Disaster Deficit Index (DDI), Local Disaster Index (LDI), Prevalent Vulnerability Index (PVI), Risk Management Index (RMI) have been developed as disaster indices taking danger, sensitivity, fragility, and vulnerability, the physical and economic damage into account in the appropriate scale of the respective type.

Keywords: disaster, hazard, risk modeling, sensor

Procedia PDF Downloads 409
1857 Production and Characterisation of Lipase from a Novel Streptomyces.sp - Its Molecular Identification

Authors: C. Asha Poorna, N. S. Pradeep

Abstract:

The biological function of lipase is to catalyze the hydrolysis of triacylglycerols to give free fatty acid, diacylglycerols, mono-acylglycerols and glycerol. They constitute the most important group of biocatalysts for biotechnological applications. The aim of the present study was to identify the lipolytic activity of Streptomyces sp. From soil sample collected from the sacred groves of southern Kerala. The culture conditions of the isolate were optimised and the enzyme was purified and characterised. The purification was attempted with acetone precipitation. The isolate observed to have high lipolytic activity and identified to be of Streptomyces strain. The purification was attempted with acetone precipitation. The purified enzyme observed to have an apparent molecular mass of ~60kDa by sodium dodecyl sulphate polyacrylamide gel electrophoresis (SDS-PAGE). The enzyme showed maximum activity at 60oC and pH-8. The lipase showed tolerance towards different organic solvents like ethanol and methanol that are commonly used in transesterification reactions to displace alcohol from triglycerides contained in renewable resources to yield fatty acid alkyl esters known as biodiesel.

Keywords: lipase, Streptomyces, biodiesel, fatty acid, transesterification

Procedia PDF Downloads 309
1856 Face Recognition Using Eigen Faces Algorithm

Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale

Abstract:

Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.

Keywords: face detection, face recognition, eigen faces, algorithm

Procedia PDF Downloads 341
1855 China Global Policy through the Shanghai Cooperation Organization

Authors: Enayatollah Yazdani

Abstract:

In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.

Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy

Procedia PDF Downloads 53
1854 Development of Fake News Model Using Machine Learning through Natural Language Processing

Authors: Sajjad Ahmed, Knut Hinkelmann, Flavio Corradini

Abstract:

Fake news detection research is still in the early stage as this is a relatively new phenomenon in the interest raised by society. Machine learning helps to solve complex problems and to build AI systems nowadays and especially in those cases where we have tacit knowledge or the knowledge that is not known. We used machine learning algorithms and for identification of fake news; we applied three classifiers; Passive Aggressive, Naïve Bayes, and Support Vector Machine. Simple classification is not completely correct in fake news detection because classification methods are not specialized for fake news. With the integration of machine learning and text-based processing, we can detect fake news and build classifiers that can classify the news data. Text classification mainly focuses on extracting various features of text and after that incorporating those features into classification. The big challenge in this area is the lack of an efficient way to differentiate between fake and non-fake due to the unavailability of corpora. We applied three different machine learning classifiers on two publicly available datasets. Experimental analysis based on the existing dataset indicates a very encouraging and improved performance.

Keywords: fake news detection, natural language processing, machine learning, classification techniques.

Procedia PDF Downloads 146
1853 The Making of a Community: Perception versus Reality of Neighborhood Resources

Authors: Kirstie Smith

Abstract:

This paper elucidates the value of neighborhood perception as it contributes to the advancement of well-being for individuals and families within a neighborhood. Through in-depth interviews with city residents, this paper examines the degree to which key stakeholders’ (residents) evaluate their neighborhood and perception of resources and identify, access, and utilize local assets existing in the community. Additionally, the research objective included conducting a community inventory that qualified the community assets and resources of lower-income neighborhoods of a medium-sized industrial city. Analysis of the community’s assets was compared with the interview results to allow for a better understanding of the community’s condition. Community mapping revealed the key informants’ reflections of assets were somewhat validated. In each neighborhood, there were more assets mapped than reported in the interviews. Another chief supposition drawn from this study was the identification of key development partners and social networks that offer the potential to facilitate locally-driven community development. Overall, the participants provided invaluable local knowledge of the perception of neighborhood assets, the well-being of residents, the condition of the community, and suggestions for responding to the challenges of the entire community in order to mobilize the present assets and networks.

Keywords: community mapping, family, resource allocation, social networks

Procedia PDF Downloads 326
1852 HPLC-UV Screening of Legal (Caffeine and Yohimbine) and Illegal (Ephedrine and Sibutramine) Substances from Weight Loss Dietary Supplements for Athletes

Authors: Amelia Tero-Vescan, Camil-Eugen Vari, Laura Ciulea, Cristina Filip, Silvia Imre

Abstract:

A HPLC –UV method for the identification of ephedrine (EPH), sibutramine (SB), yohimbine (Y) and caffeine (CF) was developed. Separation was performed on a Kromasil 100-RP8, 150 mm x 4.6 mm, 5 mm column equipped with a precolumn Kromasil RP 8. Mobile phase was a gradient of 80-35 % sodium dihydrogen phosphate pH=5 with NH4OH and acetonitrile over 15 minutes time of analysis. Based on the responses of 113 athletes about dietary supplements (DS) consumed for "fat burning" and weight loss which have a legal status in Romania, 28 supplements have been selected and investigated for their content in CF, Y, legal substances, and SB, EPH (prohibited substances in DS). The method allows quantitative determination of the four substances in a short analysis time and with minimum cost. The presence of SB and EPH in the analyzed DS was not detected while the content in CF and Y considering the dosage recommended by the manufacturer does not affect the health of the consumers. DS labeling (plant extracts with CF and Y content) allows manufacturers to avoid declaring correct and exact amounts per pharmaceutical form (pure CF or equivalent and Y, respectively).

Keywords: dietary supplements, sibutramine, ephedrine, yohimbine, caffeine, HPLC

Procedia PDF Downloads 428
1851 Identification of Location Parameters for Different User Types of the Inner-City Building Stock: An Austrian Example

Authors: Bernhard Bauer, Thomas Meixner, Amir Dini, Detlef Heck

Abstract:

The inner city building stock is characterized by different types of buildings of different decades and centuries and different types of historical constructions. Depending on the natural growth of a city, those types are often located in downtown areas and the surrounding suburbs. Since the population is becoming older and the variation of the different social requirements spread with the so-called 'Silver Society', city quarters have to be seen alternatively. If an area is very attractive for young students to live there because of the busy nightlife, it might not be suitable for the older society. To identify 'Location Types A, B, C' for different user groups, qualitative interviews with 24 citizens of the city of Graz (Austria) have been carried out, in order to identify the most important values for making a location or city quarter 'A', 'B', or 'C'. Furthermore these acknowledgements have been put into a softwaretool for predicting locations that are the most suitable for certain user groups. On the other hands side, investors or owners of buildings can use the tool for determining the most suitable user group for the location of their building or construction project in order to adapt the project or building stock to the requirements of the users.

Keywords: building stock, location parameters, inner city population, built environment

Procedia PDF Downloads 300
1850 Identification and Quantification of Phenolic Compounds In Cassia tora Collected from Three Different Locations Using Ultra High Performance Liquid Chromatography – Electro Spray Ionization – Mass Spectrometry (UHPLC-ESI-MS-MS)

Authors: Shipra Shukla, Gaurav Chaudhary, S. K. Tewari, Mahesh Pal, D. K. Upreti

Abstract:

Cassia tora L. is widely distributed in tropical Asian countries, commonly known as sickle pod. Various parts of the plant are reported for their medicinal value due to presence of anthraquinones, phenolic compounds, emodin, β-sitosterol, and chrysophanol. Therefore a sensitive analytical procedure using UHPLC-ESI-MS/MS was developed and validated for simultaneous quantification of five phenolic compounds in leaf, stem and root extracts of Cassia tora. Rapid chromatographic separation of compounds was achieved on Acquity UHPLC BEH C18 column (50 mm×2.1 mm id, 1.7µm) column in 2.5 min. Quantification was carried out using negative electrospray ionization in multiple-reaction monitoring mode. The method was validated as per ICH guidelines and showed good linearity (r2 ≥ 0.9985) over the concentration range of 0.5-200 ng/mL. The intra- and inter-day precisions and accuracy were within RSDs ≤ 1.93% and ≤ 1.90%, respectively. The developed method was applied to investigate variation of five phenolic compounds in the three geographical collections. Results indicated significant variation among analyzed samples collected from different locations in India.

Keywords: Cassia tora, phenolic compounds, quantification, UHPLC-ESI-MS/MS

Procedia PDF Downloads 252
1849 Study on Measuring Method and Experiment of Arc Fault Detection Device

Authors: Yang Jian-Hong, Zhang Ren-Cheng, Huang Li

Abstract:

Arc fault is one of the main inducements of electric fires. Arc Fault Detection Device (AFDD) can detect arc fault effectively. Arc fault detections and unhooking standards are the keys to AFDD practical application. First, an arc fault continuous production system was developed, which could count the arc half wave number. Then, Combining with the UL1699 standard, ignition probability curve of cotton and unhooking time of various currents intensity were obtained by experiments. The combustion degree of arc fault could be expressed effectively by arc area. Experiments proved that electric fires would be misjudged or missed only using arc half wave number as AFDD unhooking basis. At last, Practical tests were carried out on the self-developed AFDD system. The result showed that actual AFDD unhooking time was the sum of arc half wave cycling number, Arc wave identification time and unhooking mechanical operation time And the first two shared shorter time. Unhooking time standard depended on the shortest mechanical operation time.

Keywords: arc fault detection device, arc area, arc half wave, unhooking time, arc fault

Procedia PDF Downloads 489
1848 Study on Impact of Existence of an Open Boundary Foreign Enclave and a 24-Hours Open Corridor for Foreigners inside Indian Territory

Authors: Debarshi Bhattacharya

Abstract:

In 2015, historic Land Boundary Agreement (LBA) executed between India and Bangladesh finally settled almost seven decades long overdue critical enclave problems of the two neighbouring countries. Enclaves within India and Bangladesh were the awful outcome of the partition of India in 1947. As a dire consequence, the populace within these enclaves enormously suffered from getting basic rights and opportunities and governmental support services till long 67 years after India’s independence and partition. As per LBA, 2015, 51 Bangladeshi (BD) enclaves inside Indian territory and 111 Indian enclaves inside Bangladesh territory were actually transferred to each other. But, by virtue of LBA, 1974 executed earlier between the two countries, one BD enclave situated inside India, namely Dohogram-Angarpota (D-A) twin enclave, had not yet been exchanged by means of LBA, 2015 and it still remains as an integral part, may not be contiguous, of Bangladesh completely surrounded by Indian territory. A study was undertaken through an extensive field survey to assess the impact of the existence of D-A BD enclave inside Indian territory from India’s perspective. Field survey was conducted for the purpose in the form of an interview, group discussion, questionnaire survey, personal interaction etc. to gather information from the Indian people residing adjacent to D-A enclave and Tin Bigha Corridor (TBC), people of D-A enclave, officials of Border Security Forces of India and Bangladesh, public representatives, representatives of political organizations etc. The issue of the existence of D-A BD enclave inside Indian territory seriously brought apprehension of future problems to the people of Kuchlibari Region of Mekhligunj Block, India, on its contiguity with Indian mainland due to 24-hour open access for the BD people through TBC. The anxiety of the local Indian people regarding threats to the national security of India as well as to the law and order issues of the locality due to the open border of D-A BD enclave in the region. On the other hand, it was observed that 24 hours opening of TBC brought significant positive changes to the people of D-A BD enclave in terms of their socio-economic condition and security status.

Keywords: enclave, exchange of enclaves, land boundary agreement, Dohogram-Angarpota (D-A) Bangladeshi (BD) enclave, Tin Bigha Corridor

Procedia PDF Downloads 67