Search results for: spread reshaping code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2643

Search results for: spread reshaping code

873 Timber Urbanism: Assessing the Carbon Footprint of Mass-Timber, Steel, and Concrete Structural Prototypes for Peri-Urban Densification in the Hudson Valley’s Urban Fringe

Authors: Eleni Stefania Kalapoda

Abstract:

The current fossil-fuel based urbanization pattern and the estimated human population growth are increasing the environmental footprint on our planet’s precious resources. To mitigate the estimated skyrocketing in greenhouse gas emissions associated with the construction of new cities and infrastructure over the next 50 years, we need a radical rethink in our approach to construction to deliver a net zero built environment. This paper assesses the carbon footprint of a mass-timber, a steel, and a concrete structural alternative for peri-urban densification in the Hudson Valley's urban fringe, along with examining the updated policy and the building code adjustments that support synergies between timber construction in city making and sustainable management of timber forests. By quantifying the carbon footprint of a structural prototype for four different material assemblies—a concrete (post-tensioned), a mass timber, a steel (composite), and a hybrid (timber/steel/concrete) assembly applicable to the three updated building typologies of the IBC 2021 (Type IV-A, Type IV-B, Type IV-C) that range between a nine to eighteen-story structure alternative—and scaling-up that structural prototype to the size of a neighborhood district, the paper presents a quantitative and a qualitative approach for a forest-based construction economy as well as a resilient and a more just supply chain framework that ensures the wellbeing of both the forest and its inhabitants.

Keywords: mass-timber innovation, concrete structure, carbon footprint, densification

Procedia PDF Downloads 109
872 Design of SAE J2716 Single Edge Nibble Transmission Digital Sensor Interface for Automotive Applications

Authors: Jongbae Lee, Seongsoo Lee

Abstract:

Modern sensors often embed small-size digital controller for sensor control, value calibration, and signal processing. These sensors require digital data communication with host microprocessors, but conventional digital communication protocols are too heavy for price reduction. SAE J2716 SENT (single edge nibble transmission) protocol transmits direct digital waveforms instead of complicated analog modulated signals. In this paper, a SENT interface is designed in Verilog HDL (hardware description language) and implemented in FPGA (field-programmable gate array) evaluation board. The designed SENT interface consists of frame encoder/decoder, configuration register, tick period generator, CRC (cyclic redundancy code) generator/checker, and TX/RX (transmission/reception) buffer. Frame encoder/decoder is implemented as a finite state machine, and it controls whole SENT interface. Configuration register contains various parameters such as operation mode, tick length, CRC option, pause pulse option, and number of nibble data. Tick period generator generates tick signals from input clock. CRC generator/checker generates or checks CRC in the SENT data frame. TX/RX buffer stores transmission/received data. The designed SENT interface can send or receives digital data in 25~65 kbps at 3 us tick. Synthesized in 0.18 um fabrication technologies, it is implemented about 2,500 gates.

Keywords: digital sensor interface, SAE J2716, SENT, verilog HDL

Procedia PDF Downloads 305
871 Heritage Landmark of Penang: Segara Ninda, a Mix of Culture

Authors: Normah Sulaiman, Yong Zhi Kang, Nor Hayati Hussain, Abdul Rehman Khalid

Abstract:

Segara Ninda owned by Din Ku Meh, the governor of the province Satul, a Malay man with a big role liaising with Thailand. This mansion is part of the legacy he left behind among other properties in George Town, Penang, besides his family. The island’s geographical location is strategic which has benefitted it through important trade routes for Europe, Middle, East, India, and China in the past. Due to this reasoning, various architectural styles were introduced in Penang; Late Straits Eclectic style is one of the forms of the Colonial Architectural style widely spread as vernacular shophouses in George Town. Segara Ninda is located among the mixture of nouveau-riche, historical and heritage sites at the most important street; Penang Road, which dated back to the late 18th century. This paper examines the strait eclectic style that Segara Ninda encompasses. Acknowledging the mixture of colonial architecture in Georgetown, we argue that the mansion faces challenging issues in conservation processes to be vindicated. This is reflected by analysing the spatial layout, visual elements quality, and its activity through interviews with the occupants of the mansion. The focus will be on the understanding of building form, features, and functions; respecting the architectural spaces and their activity. The methodology applied is to promote our understanding of the mix of culture that the mansion holds through documentation, observation and measuring exercises. This offers a positional interpretation of the mix of culture that the mansion holds. This conservation effort will further contribute exposure to the public and recognize it in the society as its essence is a deficiency character to the existing built environment.

Keywords: eclectic, heritage, spatial organization, culture

Procedia PDF Downloads 182
870 Simulation of the Collimator Plug Design for Prompt-Gamma Activation Analysis in the IEA-R1 Nuclear Reactor

Authors: Carlos G. Santos, Frederico A. Genezini, A. P. Dos Santos, H. Yorivaz, P. T. D. Siqueira

Abstract:

The Prompt-Gamma Activation Analysis (PGAA) is a valuable technique for investigating the elemental composition of various samples. However, the installation of a PGAA system entails specific conditions such as filtering the neutron beam according to the target and providing adequate shielding for both users and detectors. These requirements incur substantial costs, exceeding $100,000, including manpower. Nevertheless, a cost-effective approach involves leveraging an existing neutron beam facility to create a hybrid system integrating PGAA and Neutron Tomography (NT). The IEA-R1 nuclear reactor at IPEN/USP possesses an NT facility with suitable conditions for adapting and implementing a PGAA device. The NT facility offers a thermal flux slightly colder and provides shielding for user protection. The key additional requirement involves designing detector shielding to mitigate high gamma ray background and safeguard the HPGe detector from neutron-induced damage. This study employs Monte Carlo simulations with the MCNP6 code to optimize the collimator plug for PGAA within the IEA-R1 NT facility. Three collimator models are proposed and simulated to assess their effectiveness in shielding gamma and neutron radiation from nucleon fission. The aim is to achieve a focused prompt-gamma signal while shielding ambient gamma radiation. The simulation results indicate that one of the proposed designs is particularly suitable for the PGAA-NT hybrid system.

Keywords: MCNP6.1, neutron, prompt-gamma ray, prompt-gamma activation analysis

Procedia PDF Downloads 78
869 International Classification of Primary Care as a Reference for Coding the Demand for Care in Primary Health Care

Authors: Souhir Chelly, Chahida Harizi, Aicha Hechaichi, Sihem Aissaoui, Leila Ben Ayed, Maha Bergaoui, Mohamed Kouni Chahed

Abstract:

Introduction: The International Classification of Primary Care (ICPC) is part of the morbidity classification system. It had 17 chapters, and each is coded by an alphanumeric code: the letter corresponds to the chapter, the number to a paragraph in the chapter. The objective of this study is to show the utility of this classification in the coding of the reasons for demand for care in Primary health care (PHC), its advantages and limits. Methods: This is a cross-sectional descriptive study conducted in 4 PHC in Ariana district. Data on the demand for care during 2 days in the same week were collected. The coding of the information was done according to the CISP. The data was entered and analyzed by the EPI Info 7 software. Results: A total of 523 demands for care were investigated. The patients who came for the consultation are predominantly female (62.72%). Most of the consultants are young with an average age of 35 ± 26 years. In the ICPC, there are 7 rubrics: 'infections' is the most common reason with 49.9%, 'other diagnoses' with 40.2%, 'symptoms and complaints' with 5.5%, 'trauma' with 2.1%, 'procedures' with 2.1% and 'neoplasm' with 0.3%. The main advantage of the ICPC is the fact of being a standardized tool. It is very suitable for classification of the reasons for demand for care in PHC according to their specificity, capacity to be used in a computerized medical file of the PHC. Its current limitations are related to the difficulty of classification of some reasons for demand for care. Conclusion: The ICPC has been developed to provide healthcare with a coding reference that takes into account their specificity. The CIM is in its 10th revision; it would gain from revision to revision to be more efficient to be generalized and used by the teams of PHC.

Keywords: international classification of primary care, medical file, primary health care, Tunisia

Procedia PDF Downloads 269
868 Numerical Investigation of Pressure Drop and Erosion Wear by Computational Fluid Dynamics Simulation

Authors: Praveen Kumar, Nitin Kumar, Hemant Kumar

Abstract:

The modernization of computer technology and commercial computational fluid dynamic (CFD) simulation has given better detailed results as compared to experimental investigation techniques. CFD techniques are widely used in different field due to its flexibility and performance. Evaluation of pipeline erosion is complex phenomenon to solve by numerical arithmetic technique, whereas CFD simulation is an easy tool to resolve that type of problem. Erosion wear behaviour due to solid–liquid mixture in the slurry pipeline has been investigated using commercial CFD code in FLUENT. Multi-phase Euler-Lagrange model was adopted to predict the solid particle erosion wear in 22.5° pipe bend for the flow of bottom ash-water suspension. The present study addresses erosion prediction in three dimensional 22.5° pipe bend for two-phase (solid and liquid) flow using finite volume method with standard k-ε turbulence, discrete phase model and evaluation of erosion wear rate with varying velocity 2-4 m/s. The result shows that velocity of solid-liquid mixture found to be highly dominating parameter as compared to solid concentration, density, and particle size. At low velocity, settling takes place in the pipe bend due to low inertia and gravitational effect on solid particulate which leads to high erosion at bottom side of pipeline.

Keywords: computational fluid dynamics (CFD), erosion, slurry transportation, k-ε Model

Procedia PDF Downloads 409
867 Perforation Analysis of the Aluminum Alloy Sheets Subjected to High Rate of Loading and Heated Using Thermal Chamber: Experimental and Numerical Approach

Authors: A. Bendarma, T. Jankowiak, A. Rusinek, T. Lodygowski, M. Klósak, S. Bouslikhane

Abstract:

The analysis of the mechanical characteristics and dynamic behavior of aluminum alloy sheet due to perforation tests based on the experimental tests coupled with the numerical simulation is presented. The impact problems (penetration and perforation) of the metallic plates have been of interest for a long time. Experimental, analytical as well as numerical studies have been carried out to analyze in details the perforation process. Based on these approaches, the ballistic properties of the material have been studied. The initial and residual velocities laser sensor is used during experiments to obtain the ballistic curve and the ballistic limit. The energy balance is also reported together with the energy absorbed by the aluminum including the ballistic curve and ballistic limit. The high speed camera helps to estimate the failure time and to calculate the impact force. A wide range of initial impact velocities from 40 up to 180 m/s has been covered during the tests. The mass of the conical nose shaped projectile is 28 g, its diameter is 12 mm, and the thickness of the aluminum sheet is equal to 1.0 mm. The ABAQUS/Explicit finite element code has been used to simulate the perforation processes. The comparison of the ballistic curve was obtained numerically and was verified experimentally, and the failure patterns are presented using the optimal mesh densities which provide the stability of the results. A good agreement of the numerical and experimental results is observed.

Keywords: aluminum alloy, ballistic behavior, failure criterion, numerical simulation

Procedia PDF Downloads 316
866 Utilizing Minecraft Java Edition for the Application of Fire Disaster Procedures to Establish Fire Disaster Readiness for Grade 12 STEM students of DLSU-IS

Authors: Aravella Flores, Jose Rafael E. Sotelo, Luis Romulus Phillippe R. Javier, Josh Christian V. Nunez

Abstract:

This study focuses on analyzing the performance of Grade 12 STEM students of De La Salle University - Integrated School that has completed the Disaster Readiness and Risk Reduction course in handling fire hazards through Minecraft Java Edition. This platform is suitable because fire DRRR is challenging to learn in a practical setting as well as questionable with regard to supplementing the successful implementation of textbook knowledge into actual practice. The purpose of this study is to acknowledge whether Minecraft can be a suitable environment to familiarize oneself to fire DRRR. The objectives are achieved through utilizing Minecraft in simulating fire scenarios which allows the participants to freely act upon and practice fire DRRR. The experiment was divided into the grounding and validation phase, where researchers observed the performance of the participants in the simulation. A pre-simulation and post-simulation survey was given to acknowledge the change in participants’ perception of being able to utilize fire DRRR procedures and their vulnerabilities. The paired t-test was utilized, showing significant differences in the pre-simulation and post-simulation survey scores, thus, insinuating improved judgment of DRRR, lessening their vulnerabilities in the possibility of encountering a fire hazard. This research poses a model for future research which can gather more participants and dwell on more complex codes outside just command blocks and into the code lines of Minecraft itself.

Keywords: minecraft, DRRR, fire, disaster, simulation

Procedia PDF Downloads 140
865 Dietary Risk Assessment of Green Leafy Vegetables (GLV) Due to Heavy Metals from Selected Mining Areas

Authors: Simon Mensah Ofosu

Abstract:

Illicit surface mining activities pollutes agricultural lands and water bodies and results in accumulation of heavy metals in vegetables cultivated in such areas. Heavy metal (HM) accumulation in vegetables is a serious food safety issues due to the adverse effects of metal toxicities, hence the need to investigate the levels of these metals in cultivated vegetables in the eastern region. Cocoyam leaves, cabbage and cucumber were sampled from selected farms in mining areas (Atiwa District) and non -mining areas (Yilo Krobo and East Akim District) of the region for the study. Levels of Cadmium, Lead, Mercury and Arsenic were investigated in the vegetables with Atomic Absorption Spectrometer, and the results statistically analyzed with Microsoft Office Excel (2013) Spread Sheet and ANOVA. Cadmium (Cd) and arsenic (As) were the highest and least concentrated HM in the vegetables sampled, respectively. The mean concentrations of Cd and Pb in cabbage (0.564 mg/kg, 0.470 mg/kg), cucumber (0.389 mg/kg, 0.190 mg/kg), cocoyam leaves (0.410 mg/kg, 0.256 mg/kg) respectively from the mining areas exceeded the permissible limits set by Joint FAO/WHO. The mean concentrations of the metals in vegetables from the mining and non-mining areas varied significantly (P<0.05). The Target Hazard Quotient (THQ) was used to assess the health risk posed to the human population via vegetable consumption. The THQ values of cadmium, mercury, and lead in adults and children through vegetable consumption in the mining areas were greater than 1 (THQ >1). This indicates the potential health risk that the children and adults may be facing. The THQ values of adults and children in the non-mining areas were less than the safe limit of 1 (THQ<1), hence no significant health risk posed to the population from such areas.

Keywords: food safety, risk assessment, illicit mining, public health, contaminated vegetables

Procedia PDF Downloads 95
864 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 350
863 Cache Analysis and Software Optimizations for Faster on-Chip Network Simulations

Authors: Khyamling Parane, B. M. Prabhu Prasad, Basavaraj Talawar

Abstract:

Fast simulations are critical in reducing time to market in CMPs and SoCs. Several simulators have been used to evaluate the performance and power consumed by Network-on-Chips. Researchers and designers rely upon these simulators for design space exploration of NoC architectures. Our experiments show that simulating large NoC topologies take hours to several days for completion. To speed up the simulations, it is necessary to investigate and optimize the hotspots in simulator source code. Among several simulators available, we choose Booksim2.0, as it is being extensively used in the NoC community. In this paper, we analyze the cache and memory system behaviour of Booksim2.0 to accurately monitor input dependent performance bottlenecks. Our measurements show that cache and memory usage patterns vary widely based on the input parameters given to Booksim2.0. Based on these measurements, the cache configuration having least misses has been identified. To further reduce the cache misses, we use software optimization techniques such as removal of unused functions, loop interchanging and replacing post-increment operator with pre-increment operator for non-primitive data types. The cache misses were reduced by 18.52%, 5.34% and 3.91% by employing above technology respectively. We also employ thread parallelization and vectorization to improve the overall performance of Booksim2.0. The OpenMP programming model and SIMD are used for parallelizing and vectorizing the more time-consuming portions of Booksim2.0. Speedups of 2.93x and 3.97x were observed for the Mesh topology with 30 × 30 network size by employing thread parallelization and vectorization respectively.

Keywords: cache behaviour, network-on-chip, performance profiling, vectorization

Procedia PDF Downloads 200
862 In silico Subtractive Genomics Approach for Identification of Strain-Specific Putative Drug Targets among Hypothetical Proteins of Drug-Resistant Klebsiella pneumoniae Strain 825795-1

Authors: Umairah Natasya Binti Mohd Omeershffudin, Suresh Kumar

Abstract:

Klebsiella pneumoniae, a Gram-negative enteric bacterium that causes nosocomial and urinary tract infections. Particular concern is the global emergence of multidrug-resistant (MDR) strains of Klebsiella pneumoniae. Characterization of antibiotic resistance determinants at the genomic level plays a critical role in understanding, and potentially controlling, the spread of multidrug-resistant (MDR) pathogens. In this study, drug-resistant Klebsiella pneumoniae strain 825795-1 was investigated with extensive computational approaches aimed at identifying novel drug targets among hypothetical proteins. We have analyzed 1099 hypothetical proteins available in genome. We have used in-silico genome subtraction methodology to design potential and pathogen-specific drug targets against Klebsiella pneumoniae. We employed bioinformatics tools to subtract the strain-specific paralogous and host-specific homologous sequences from the bacterial proteome. The sorted 645 proteins were further refined to identify the essential genes in the pathogenic bacterium using the database of essential genes (DEG). We found 135 unique essential proteins in the target proteome that could be utilized as novel targets to design newer drugs. Further, we identified 49 cytoplasmic protein as potential drug targets through sub-cellular localization prediction. Further, we investigated these proteins in the DrugBank databases, and 11 of the unique essential proteins showed druggability according to the FDA approved drug bank databases with diverse broad-spectrum property. The results of this study will facilitate discovery of new drugs against Klebsiella pneumoniae.

Keywords: pneumonia, drug target, hypothetical protein, subtractive genomics

Procedia PDF Downloads 177
861 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 106
860 Development of a Methodology for Surgery Planning and Control: A Management Approach to Handle the Conflict of High Utilization and Low Overtime

Authors: Timo Miebach, Kirsten Hoeper, Carolin Felix

Abstract:

In times of competitive pressures and demographic change, hospitals have to reconsider their strategies as a company. Due to the fact, that operations are one of the main income and one of the primary cost drivers otherwise, a process-oriented approach and an efficient use of resources seems to be the right way for getting a consistent market position. Thus, the efficient operation room occupancy planning is an important cause variable for the success and continued the existence of these institutions. A high utilization of resources is essential. This means a very high, but nevertheless sensible capacity-oriented utilization of working systems that can be realized by avoiding downtimes and a thoughtful occupancy planning. This engineering approach should help hospitals to reach her break-even point. Firstly, the aim is to establish a strategy point, which can be used for the generation of a planned throughput time. Secondly, the operation planning and control should be facilitated and implemented accurately by the generation of time modules. More than 100,000 data records of the Hannover Medical School were analyzed. The data records contain information about the type of conducted operation, the duration of the individual process steps, and all other organizational-specific data such as an operating room. Based on the aforementioned data base, a generally valid model was developed by an analysis to define a strategy point which takes the conflict of capacity utilization and low overtime into account. Furthermore, time modules were generated in this work, which allows a simplified and flexible operation planning and control for the operation manager. By the time modules, it is possible to reduce a high average value of the idle times of the operation rooms. Furthermore, the potential is used to minimize the idle time spread.

Keywords: capacity, operating room, surgery planning and control, utilization

Procedia PDF Downloads 253
859 Investigating the Efficacy of HIV/AIDS Psycho-Education and Behavioural Skills Training in Reducing Sexual Risk Behaviours in a Trucking Population in Nigeria

Authors: Abiodun Musbau Lawal, Benjamin Oladapo Olley

Abstract:

Long Distance Truck Drivers (LDTDs) have been found to be a high-risk group in the spread of HIV/AIDS globally; perhaps, due to their high Sexual Risk Behaviours (SRBs). Interventions for reducing SRBs in trucking population have not been fully exploited. A quasi-experimental control group pretest-posttest design was used to assess the efficacy of psycho-education and behavioural skills training in reducing SRBs among LDTDs. Sixteen drivers rivers were randomly assigned into either experimental or control groups using balloting technique. A questionnaire was used as an instrument for data collection. Repeated measures t-test and independent t-test were used to test hypotheses. The intervention had a significant effect on the SRBs among LDTDs at post-test(t{7}=6.01, p<.01) and at followup (t{7}=6.42, p<.01). No significant difference in sexual risk behaviour of LDTDs at post-test and at follow-up stage. Similarly, intervention had significant effects on sexual risk behaviour at post-test (t {14}=- 4.69, p<.05) and at follow-up (t {14}= -9.56, p < .05) respectively. At post-test and follow-up stages, drivers in experimental group reported reduced SRBs than those in the control group. Drivers in an experimental group reported lower sexual risk behaviour a week after intervention as well as at three months follow-up than those in the control group. It is concluded that HIV/AIDS preventive intervention that provides the necessary informational and behavioural skills content can significantly impact long distance truck drivers sexual risk behaviours.

Keywords: HIV/AIDS interventions, long distance truck drivers, Nigeria, sexual risk behaviours

Procedia PDF Downloads 476
858 Entry Inhibitors Are Less Effective at Preventing Cell-Associated HIV-2 Infection than HIV-1

Authors: A. R. Diniz, P. Borrego, I. Bártolo, N. Taveira

Abstract:

Cell-to-cell transmission plays a critical role in the spread of HIV-1 infection in vitro and in vivo. Inhibition of HIV-1 cell-associated infection by antiretroviral drugs and neutralizing antibodies (NAbs) is more difficult compared to cell-free infection. Limited data exists on cell-associated infection by HIV-2 and its inhibition. In this work, we determined the ability of entry inhibitors to inhibit HIV-1 and HIV-2 cell-to cell fusion as a proxy to cell-associated infection. We developed a method in which Hela-CD4-cells are first transfected with a Tat expressing plasmid (pcDNA3.1+/Tat101) and infected with recombinant vaccinia viruses expressing either the HIV-1 (vPE16: from isolate HTLV-IIIB, clone BH8, X4 tropism) or HIV-2 (vSC50: from HIV-2SBL/ISY, R5 and X4 tropism) envelope glycoproteins (M.O.I.=1 PFU/cell).These cells are added to TZM-bl cells. When cell-to-cell fusion (syncytia) occurs the Tat protein diffuses to the TZM-bl cells activating the expression of a reporter gene (luciferase). We tested several entry inhibitors including the fusion inhibitors T1249, T20 and P3, the CCR5 antagonists MVC and TAK-779, the CXCR4 antagonist AMD3100 and several HIV-2 neutralizing antibodies (Nabs). All compounds inhibited HIV-1 and HIV-2 cell fusion albeit to different levels. Maximum percentage of HIV-2 inhibition (MPI) was higher for fusion inhibitors (T1249- 99.8%; P3- 95%, T20-90%) followed by co-receptor antagonists (MVC- 63%; TAK-779- 55%; AMD3100- 45%). NAbs from HIV-2 infected patients did not prevent cell fusion up to the tested concentration of 4μg/ml. As for HIV-1, MPI reached 100% with TAK-779 and T1249. For the other antivirals, MPIs were: P3-79%; T20-75%; AMD3100-61%; MVC-65%.These results are consistent with published data. Maraviroc had the lowest IC50 both for HIV-2 and HIV-1 (IC50 HIV-2= 0.06 μM; HIV-1=0.0076μM). Highest IC50 were observed with T20 for HIV-2 (3.86μM) and with TAK-779 for HIV-1 (12.64μM). Overall, our results show that entry inhibitors in clinical use are less effective at preventing Env mediated cell-to-cell-fusion in HIV-2 than in HIV-1 which suggests that cell-associated HIV-2 infection will be more difficult to inhibit compared to HIV-1. The method described here will be useful to screen for new HIV entry inhibitors.

Keywords: cell-to-cell fusion, entry inhibitors, HIV, NAbs, vaccinia virus

Procedia PDF Downloads 310
857 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 53
856 The Status Quo, Consensus and Debates on Urbanization in Chinese Education: A General Overview of Research from the 1990s

Authors: Jingqian Xiao

Abstract:

The rapid wave of urbanization triggered by China’s economic growth over the past few decades has inevitably impacted the country’s educational landscape. Educational spaces in China shifted during the 1990s when, due to the government’s tax reforms, large numbers of rural schools were abolished or merged with urban schools, resulting in an “urbanization” of school content and values. While urbanized education is now the status quo, there is as yet no literature review, to our best knowledge, that comprehensively summarizes academic work on this phenomenon. Besides, most research on Chinese educational urbanization relies on basic policy deductions, and there is room for improvement in both the quality and quantity of empirical research on this topic. This paper, therefore, reviews relevant literature on educational urbanization in China from three interrelated factors that shape educational inequality between urban and rural China, namely the urbanization in educational space, school content, and educational values. Results find that the main discussion on Chinese educational urbanization often addresses how Chinese rural education can be improved by reforming the urbanization model to revitalize rural society. While the complete urbanization of Chinese education does not seem feasible, the rapidly changing nature of China’s development patterns and political landscape means the course of Chinese education may shift at any time. When the government does decide to fulfill its intentions to improve the countryside, many formerly dilapidated rural schools may be revived, but for the moment, both rural and urban education in China suffers from governmental neglect. In addition, the breakout of COVID-19, which led to a sudden spread of online education that reopened the gap between the educational conditions and the cultural capital of families in rural and urban areas, has also posed new challenges for China’s attempts to resolve conflicting interests between urban and rural schools and promote educational equality.

Keywords: Chinese education, educational inequality, rural and urban education, urbanization in education

Procedia PDF Downloads 130
855 Water Quality Calculation and Management System

Authors: H. M. B. N Jayasinghe

Abstract:

The water is found almost everywhere on Earth. Water resources contain a lot of pollution. Some diseases can be spread through the water to the living beings. So to be clean water it should undergo a number of treatments necessary to make it drinkable. So it is must to have purification technology for the wastewater. So the waste water treatment plants act a major role in these issues. When considering the procedures taken after the water treatment process was always based on manual calculations and recordings. Water purification plants may interact with lots of manual processes. It means the process taking much time consuming. So the final evaluation and chemical, biological treatment process get delayed. So to prevent those types of drawbacks there are some computerized programmable calculation and analytical techniques going to be introduced to the laboratory staff. To solve this problem automated system will be a solution in which guarantees the rational selection. A decision support system is a way to model data and make quality decisions based upon it. It is widely used in the world for the various kind of process automation. Decision support systems that just collect data and organize it effectively are usually called passive models where they do not suggest a specific decision but only reveal information. This web base system is based on global positioning data adding facility with map location. Most worth feature is SMS and E-mail alert service to inform the appropriate person on a critical issue. The technological influence to the system is HTML, MySQL, PHP, and some other web developing technologies. Current issues in the computerized water chemistry analysis are not much deep in progress. For an example the swimming pool water quality calculator. The validity of the system has been verified by test running and comparison with an existing plant data. Automated system will make the life easier in productively and qualitatively.

Keywords: automated system, wastewater, purification technology, map location

Procedia PDF Downloads 248
854 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 111
853 Depression among University Students an Epidemiological Study on a Sample of University Students

Authors: Laid Fekih

Abstract:

Background: Depression affects people in all communities across the world and in all aspects of their lives. Its spread varies from one country to another, can happen at any age and get rid of it is not easy. There is no clear policy in Algeria's higher education institutions to detect and treat these disorders or pay particular attention to those at risk. Identifying the prevalence of depression among Algerian students, its correlation with different variables, and studying gender differences in the light of a range of variables is necessary to develop an appropriate plan to raise the level of hope and love of life among students. Method: Random samples of 1500 University of Tlemcen students (967 girls and 533 boys), aged 19 to 24 years completed a self-administered questionnaire that included Beck's Depression Inventory ®-II (BDI®-II), (School Health Promotion: The Mood part), Other questions included in this survey focused on demographic characteristics including gender, age and year of study, academic performance (Annual Average Score (0-20) AAS), were examined. Results: The rate of depression (moderate, severe and extreme) varied from 03% to 13% among university students in Tlemcen University. There was no difference in the rates of depression in male and female students, which means that male and female students do have similar rates of depression. The rate of depression in the first-year of the study shows a higher score relative to students of other years. Depression has a negative relationship with academic performance, which means that depressed students have many difficulties in academic tasks at university. Conclusion: Depression among university students is an important center of interest in the world, not only because of the ease with which they can be followed, or the difficulties encountered during their studies and their technical courses but for the link between the level of depression and the quality of care of mental health services, especially if many students with mood and emotional problems don't meet the criteria for psychotherapy.

Keywords: depression, epidemiology, university students, academic performance

Procedia PDF Downloads 146
852 A Rare Case of Metastatic Basal Cell Carcinoma

Authors: Nitesh Kumar, Eoin Twohig, jasparl cheema, Sadiq mawji, Yousif al najjar

Abstract:

Basal cell carcinoma (BCC) is the commonest cutaneous malignancy affecting humans. Despite this, distant spread is exceptionally rare. Metastatic BCC (mBCC) is estimated to occur in 0.0028 - 0.5%. it aim to illustrate with the aid of histological slides, a case of mBCC occurring in a fit and well 67-year-old. Initial diagnosis of desmoplastic BCC was made in 2006 from a scalp biopsy with the lesion then being excised. Re-excision of local recurrence was undertaken the following year. In 2014 the patient presented with an ipsilateral level 2a mass. Fine Needle Aspiration raised the suspicion of metastatic carcinoma. The patient had excision of two nodes from the left neck alongside pharyngeal tonsillectomy and tongue base biopsies. Histologically, the nodes closely resembled the immunophenotype of the initial scalp lesion. The patient subsequently had a modified radical neck dissection, and residual mBCC was excised from the left Sternocleidomastoid muscle. In 2023 the patient developed haematuria. On further investigation bilateral lung lesions on CT were noted with subsequent biopsy confirming mBCC. Spinal and renal lesions have also been found. Histopathology showed clear resemblance of the lung metastases to both those in the neck and the primary (scalp BCC) – with no squamous differentiation seen. The time span from primary to occurrence of lung metastasis (18 years) affirms the indolent and slow growing nature of BCC.  This case fulfils Lattes and Kessler diagnostic criteria. High risk cases are described as those with advanced local presentation, primary tumour on the Head and Neck and locally recurrent lesions.

Keywords: BCC, metastasis, rare, skin cancer

Procedia PDF Downloads 58
851 Retrospective Statistical Study on the Evolution of Brucellosis during the Last Decade (2011-2021) in Medea, Algeria

Authors: Mammar Khames, Mustapha Oumouna

Abstract:

Brucellosis is one of the most common zoonoses in the world. It represents a serious threat to human health; the existence of brucellosis in Algeria dates back to the beginning of the 19th century. Its transmission to humans is through coccobacilli of the genus Brucella following direct contact with contaminated animals or indirectly through the consumption of their unpasteurized dairy products. The present investigation covers a retrospective study on human brucellosis in the district of Medea over a period from 2011 to 2021 at the level of two public health establishments. In the first place, it is at the level of the Directorate of Public Health and in the infectious department level at Medea Hospital, and at the level of the directorate of agricultural services in the third place. The results showed that during these eleven years of study, 795 cases were collected from the department of health and population, and 141 cases were collected from the infectious department of the district of Medea. A total of 56 cases of bovine brucellosis were obtained from the directorate of agricultural services of the district of Medea. Human brucellosis affects all age groups with different percentages, but the rate has been higher in the 20-44 age group, with a predominance of men. However, the geographic distribution map of the cases shows that the western part of the district was the most affected. A cohort of 141 cases was hospitalized at the infectious service level of Medea Hospital. They were 89 men and 52 women. The most common age reached is [20-44] years. The majority were of rural origin. Two serological reactions were performed for diagnosis: the buffered antigen test and Wright's serodiagnosis. Bovine brucellosis affects all age groups with different percentages, but the rate was higher in the 2-to-4-year age group, with a predominance of females. From these data, we conclude that brucellosis has a strong spread in the region studied.

Keywords: human brucellosis, serology, Medea, Algeria

Procedia PDF Downloads 64
850 Development of Cost-effective Sensitive Methods for Pathogen Detection in Community Wastewater for Disease Surveillance

Authors: Jesmin Akter, Chang Hyuk Ahn, Ilho Kim, Jaiyeop Lee

Abstract:

Global pandemic coronavirus disease (COVID-19) caused by Severe acute respiratory syndrome SARS-CoV-2, to control the spread of the COVID-19 pandemic, wastewater surveillance has been used to monitor SARS-CoV2 prevalence in the community. The challenging part is establishing wastewater surveillance; there is a need for a well-equipped laboratory for wastewater sample analysis. According to many previous studies, reverse transcription-polymerase chain reaction (RT-PCR) based molecular tests are the most widely used and popular detection method worldwide. However, the RT-qPCR based approaches for the detection or quantification of SARS-CoV-2 genetic fragments ribonucleic acid (RNA) from wastewater require a specialized laboratory, skilled personnel, expensive instruments, and a workflow that typically requires 6 to 8 hours to provide results for just minimum samples. Rapid and reliable alternative detection methods are needed to enable less-well-qualified practitioners to set up and provide sensitive detection of SARS-CoV-2 within wastewater at less-specialized regional laboratories. Therefore, scientists and researchers are conducting experiments for rapid detection methods of COVID-19; in some cases, the structural and molecular characteristics of SARS-CoV-2 are unknown, and various strategies for the correct diagnosis of COVID-19 have been proposed by research laboratories, which are presented in the present study. The ongoing research and development of these highly sensitive and rapid technologies, namely RT-LAMP, ELISA, Biosensors, GeneXpert, allows a wide range of potential options not only for SARS-CoV-2 detection but also for other viruses as well. The effort of this study is to discuss the above effective and regional rapid detection and quantification methods in community wastewater as an essential step in advancing scientific goals.

Keywords: rapid detection, SARS-CoV-2, sensitive detection, wastewater surveillance

Procedia PDF Downloads 86
849 Analysis of Pangasinan State University: Bayambang Students’ Concerns Through Social Media Analytics and Latent Dirichlet Allocation Topic Modelling Approach

Authors: Matthew John F. Sino Cruz, Sarah Jane M. Ferrer, Janice C. Francisco

Abstract:

COVID-19 pandemic has affected more than 114 countries all over the world since it was considered a global health concern in 2020. Different sectors, including education, have shifted to remote/distant setups to follow the guidelines set to prevent the spread of the disease. One of the higher education institutes which shifted to remote setup is the Pangasinan State University (PSU). In order to continue providing quality instructions to the students, PSU designed Flexible Learning Model to still provide services to its stakeholders amidst the pandemic. The model covers the redesigning of delivering instructions in remote setup and the technology needed to support these adjustments. The primary goal of this study is to determine the insights of the PSU – Bayambang students towards the remote setup implemented during the pandemic and how they perceived the initiatives employed in relation to their experiences in flexible learning. In this study, the topic modelling approach was implemented using Latent Dirichlet Allocation. The dataset used in the study. The results show that the most common concern of the students includes time and resource management, poor internet connection issues, and difficulty coping with the flexible learning modality. Furthermore, the findings of the study can be used as one of the bases for the administration to review and improve the policies and initiatives implemented during the pandemic in relation to remote service delivery. In addition, further studies can be conducted to determine the overall sentiment of the other stakeholders in the policies implemented at the University.

Keywords: COVID-19, topic modelling, students’ sentiment, flexible learning, Latent Dirichlet allocation

Procedia PDF Downloads 122
848 Components and Public Health Impact of Population Growth in the Arab World

Authors: Asharaf Abdul Salam, Ibrahim Elsegaey, Rshood Khraif, Abdullah AlMutairi, Ali Aldosari

Abstract:

Arab World that comprises of 22 member states of Arab League undergoes rapid transition in demographic front - fertility, mortality and migration. A distinctive geographic region spread across West Asia and North East Africa unified by Arabic language shares common values and characteristics even though diverse in economic and political conditions. Demographic lag that characterizes Arab World is unique but the present trend of declining fertility combined with the existing relatively low mortality undergoes significant changes in its population size. The current research aimed at (i) assessing the growth of population, over a period of 3 decades, (ii) exploring the components and (iii) understanding the public health impact. Based on International Data Base (IDB) of US Census Bureau, for 3 time periods – 1992, 2002 and 2012; 21 countries of Arab World have been analyzed by dividing them into four geographic sectors namely Gulf Cooperation Council (GCC), West Asia, Maghreb and Nile Valley African Horn. Population of Arab World grew widely during the past both through natural growth and migration. Immigrations pronounced especially in the resource intensive GCC nations not only from East Asian and central African countries but also from resource thrifty Arab nations. Migrations within the Arab World as well as outside of the Arab World remark an interesting demographic phenomenon that requires further research. But the transformations on public health statistics – impact of demographic change – depict a new era in the Arab World.

Keywords: demographic change, public health statistics, net migration, natural growth, geographic sectors, fertility and mortality, life expectancy

Procedia PDF Downloads 542
847 Herbal Medicinal Materials for Health/Functional Foods in Korea

Authors: Chang-Hwan Oh, Young-Jong Lee

Abstract:

In April, 2015, the Ministry of Food and Drug Safety’s announcement that only 10 of the 207 products that list Cynanchum Wilfordii Radix among their ingredients were confirmed to actually contain “iyeobupiso” the counterfeit version of the “baeksuo” raised a fog to consumers who purchased health/functional foods supposedly containing the herbal medicinal material, “baeksuo” in Korean. Baeksuo is the main ingredient of the product “EstroG-100” that contain Phlomis umbrosa and Angelica gigas too (NaturalEndoTech, S.Korea). The hot water extract of the herbal medicinal materials (HMM) was approved as a product specific Health/Functional Food (HFF) having a helpful function to women reaching menopause by Korea Food & Drug Administration (Ministry of Food & Drug Safety at present). The origin of “baeksuo” is the root of Cynanchum wilfordii Hemsley in Korea (But “iyeobupiso, the root of Cynanchum auriculatum Royle ex Wight is considered as the origin of “baeksuo” in China). In Korea, about 116 HMMs are listed as the food materials in Korea Food Code among the total 187 HMMs could be used for food and medicine purpose simultaneously. But there are some chances of the HMMs (shared use for food and medicine purpose) could be misused by the part and HMMs not permitted for HFF such as the “baeksuo” case. In this study, some of HMMs (shared use for food and medicine purpose) are examined to alleviate the misuse chance of HMMs for HFFs in Korea. For the purpose of this study, the origin, shape, edible parts, efficacy and the side effects of the similar HMMs to be misused for HFF are investigated.

Keywords: herbal medicinal materials, healthy/functional foods, misuse, shared use

Procedia PDF Downloads 292
846 Pre and Post IFRS Loss Avoidance in France and the United Kingdom

Authors: T. Miková

Abstract:

This paper analyzes the effect of a single uniform accounting rule on reporting quality by investigating the influence of IFRS on earnings management. This paper examines whether earnings management is reduced after IFRS adoption through the use of “loss avoidance thresholds”, a method that has been verified in earlier studies. This paper concentrates on two European countries: one that represents the continental code law tradition with weak protection of investors (France) and one that represents the Anglo-American common law tradition, which typically implies a strong enforcement system (the United Kingdom). The research investigates a sample of 526 companies (6822 firm-year observations) during the years 2000 – 2013. The results are different for the two jurisdictions. This study demonstrates that a single set of accounting standards contributes to better reporting quality and reduces the pervasiveness of earnings management in France. In contrast, there is no evidence that a reduction in earnings management followed the implementation of IFRS in the United Kingdom. Due to the fact that IFRS benefit France but not the United Kingdom, other political and economic factors, such legal system or capital market strength, must play a significant role in influencing the comparability and transparency cross-border companies’ financial statements. Overall, the result suggests that IFRS moderately contribute to the accounting quality of reported financial statements and bring benefit for stakeholders, though the role played by other economic factors cannot be discounted.

Keywords: accounting standards, earnings management, international financial reporting standards, loss avoidance, reporting quality

Procedia PDF Downloads 199
845 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 137
844 The DAQ Debugger for iFDAQ of the COMPASS Experiment

Authors: Y. Bai, M. Bodlak, V. Frolov, S. Huber, V. Jary, I. Konorov, D. Levit, J. Novy, D. Steffen, O. Subrt, M. Virius

Abstract:

In general, state-of-the-art Data Acquisition Systems (DAQ) in high energy physics experiments must satisfy high requirements in terms of reliability, efficiency and data rate capability. This paper presents the development and deployment of a debugging tool named DAQ Debugger for the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN. Utilizing a hardware event builder, the iFDAQ is designed to be able to readout data at the average maximum rate of 1.5 GB/s of the experiment. In complex softwares, such as the iFDAQ, having thousands of lines of code, the debugging process is absolutely essential to reveal all software issues. Unfortunately, conventional debugging of the iFDAQ is not possible during the real data taking. The DAQ Debugger is a tool for identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. It provides the layer for an easy integration to any process and has no impact on the process performance. Based on handling of system signals, the DAQ Debugger represents an alternative to conventional debuggers provided by most integrated development environments. Whenever problem occurs, it generates reports containing all necessary information important for a deeper investigation and analysis. The DAQ Debugger was fully incorporated to all processes in the iFDAQ during the run 2016. It helped to reveal remaining software issues and improved significantly the stability of the system in comparison with the previous run. In the paper, we present the DAQ Debugger from several insights and discuss it in a detailed way.

Keywords: DAQ Debugger, data acquisition system, FPGA, system signals, Qt framework

Procedia PDF Downloads 284