Search results for: threats identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3527

Search results for: threats identification

1577 The Mobilizing Role of Moral Obligation and Collective Action Frames in Two Types of Protest

Authors: Monica Alzate, Marcos Dono, Jose Manuel Sabucedo

Abstract:

As long as collective action and its predictors constitute a big body of work in the field of political psychology, context-dependent studies and moral variables are a relatively new issue. The main goal of this presentation is to examine the differences in the predictors of collective action when taking into account two different types of protest, and also focus on the role of moral obligation as a predictor of collective action. To do so, we sampled both protesters and non-protesters from two mobilizations (N=376; N=563) of different nature (catalan Independence, and an 'indignados' march) and performed a logistic regression and a 2x2 MANOVA analysis. Results showed that the predictive variables that were more discriminative between protesters and non-protesters were identity, injustice, efficacy and moral obligation for the catalan Diada and injustice and moral obligation for the 'indignados'. Also while the catalans scored higher in the identification and efficacy variables, the indignados did so in injustice and moral obligation. Differences are evidenced between two types of collective action that coexist within the same protest cycle. The frames of injustice and moral obligation gain strength in the post-2010 mobilizations, a fact probably associated with the combination of materialist and post-materialist values that distinguish the movement. All of this emphasizes the need of studying protest from a contextual point of view. Besides, moral obligation emerges as key predictor of collective action engagement.

Keywords: collective action, identity, moral obligation, protest

Procedia PDF Downloads 312
1576 Rapid Detection of Cocaine Using Aggregation-Induced Emission and Aptamer Combined Fluorescent Probe

Authors: Jianuo Sun, Jinghan Wang, Sirui Zhang, Chenhan Xu, Hongxia Hao, Hong Zhou

Abstract:

In recent years, the diversification and industrialization of drug-related crimes have posed significant threats to public health and safety globally. The widespread and increasingly younger demographics of drug users and the persistence of drug-impaired driving incidents underscore the urgency of this issue. Drug detection, a specialized forensic activity, is pivotal in identifying and analyzing substances involved in drug crimes. It relies on pharmacological and chemical knowledge and employs analytical chemistry and modern detection techniques. However, current drug detection methods are limited by their inability to perform semi-quantitative, real-time field analyses. They require extensive, complex laboratory-based preprocessing, expensive equipment, and specialized personnel and are hindered by long processing times. This study introduces an alternative approach using nucleic acid aptamers and Aggregation-Induced Emission (AIE) technology. Nucleic acid aptamers, selected artificially for their specific binding to target molecules and stable spatial structures, represent a new generation of biosensors following antibodies. Rapid advancements in AIE technology, particularly in tetraphenyl ethene-based luminous, offer simplicity in synthesis and versatility in modifications, making them ideal for fluorescence analysis. This work successfully synthesized, isolated, and purified an AIE molecule and constructed a probe comprising the AIE molecule, nucleic acid aptamers, and exonuclease for cocaine detection. The probe demonstrated significant relative fluorescence intensity changes and selectivity towards cocaine over other drugs. Using 4-Butoxytriethylammonium Bromide Tetraphenylethene (TPE-TTA) as the fluorescent probe, the aptamer as the recognition unit, and Exo I as an auxiliary, the system achieved rapid detection of cocaine within 5 mins in aqueous and urine, with detection limits of 1.0 and 5.0 µmol/L respectively. The probe-maintained stability and interference resistance in urine, enabling quantitative cocaine detection within a certain concentration range. This fluorescent sensor significantly reduces sample preprocessing time, offers a basis for rapid onsite cocaine detection, and promises potential for miniaturized testing setups.

Keywords: drug detection, aggregation-induced emission (AIE), nucleic acid aptamer, exonuclease, cocaine

Procedia PDF Downloads 49
1575 Intelligent Building as a Pragmatic Approach towards Achieving a Sustainable Environment

Authors: Zahra Hamedani

Abstract:

Many wonderful technological developments in recent years has opened up the possibility of using intelligent buildings for a number of important applications, ranging from minimizing resource usage as well as increasing building efficiency to maximizing comfort, adaption to inhabitants and responsiveness to environmental changes. The concept of an intelligent building refers to the highly embedded, interactive environment within which by exploiting the use of artificial intelligence provides the ability to know its configuration, anticipate the optimum dynamic response to prevailing environmental stimuli, and actuate the appropriate physical reaction to provide comfort and efficiency. This paper contains a general identification of the intelligence paradigm and its impacts on the architecture arena, that with examining the performance of artificial intelligence, a mechanism to analyze and finally for decision-making to control the environment will be described. This mechanism would be a hierarchy of the rational agents which includes decision-making, information, communication and physical layers. This multi-agent system relies upon machine learning techniques for automated discovery, prediction and decision-making. Then, the application of this mechanism regarding adaptation and responsiveness of intelligent building will be provided in two scales of environmental and user. Finally, we review the identifications of sustainability and evaluate the potentials of intelligent building systems in the creation of sustainable architecture and environment.

Keywords: artificial intelligence, intelligent building, responsiveness, adaption, sustainability

Procedia PDF Downloads 396
1574 Characterization of Penicillin V Acid and Its Related Compounds by HPLC

Authors: Bahdja Guerfi, N. Hadhoum, I. Azouz, M. Bendoumia, S. Bouafia, F. Z. Hadjadj Aoul

Abstract:

Background: 'Penicillin V' is a narrow, bactericidal antibiotic of the beta-lactam family of the naturally occurring penicillin group. It is limited to infections due to the germs defined as sensitive. The objective of this work was to identify and to characterize Penicillin V acid and its related compounds by High-performance liquid chromatography (HPLC). Methods: Firstly phenoxymethylpenicillin was identified by an infrared absorption. The organoleptic characteristics, pH, and determination of water content were also studied. The dosage of Penicillin V acid active substance and the determination of its related compounds were carried on waters HPLC, equipped with a UV detector at 254 nm and Discovery HS C18 column (250 mm X 4.6 mm X 5 µm) which is maintained at room temperature. The flow rate was about 1 ml per min. A mixture of water, acetonitrile and acetic acid (65:35:01) was used as mobile phase for phenoxyacetic acid ‘impurity B' and a mixture of water, acetonitrile and acetic acid (650:150:5.75) for the assay and 4-hydroxypenicillin V 'impurity D'. Results: The identification of Penicillin V acid active substance and the evaluation of its chemical quality showed conformity with USP 35th edition. The Penicillin V acid content in the raw material is equal to 1692.22 UI/mg. The percentage content of phenoxyacetic acid and 4-hydroxypenicillin V was respectively: 0.035% and 0.323%. Conclusion: Through these results, we can conclude that the Penicillin V acid active substance tested is of good physicochemical quality.

Keywords: characterization, HPLC, Penicillin V acid, related substances

Procedia PDF Downloads 267
1573 How Group Education Impacts Female Factory Workers’ Behavior and Readiness to Receive Mammography and Pap Smears

Authors: Memnun Seven, Mine Bahar, Aygül Akyüz, Hatice Erdoğan

Abstract:

Background: The workplace has been deemed a suitable location for educating many women at once about cancer screening. Objective: To determine how group education about early diagnostic methods for breast and cervical cancer affects women’s behavior and readiness to receive mammography and Pap smears. Methods: This semi-interventional study was conducted at a textile factory in Istanbul, Turkey. Female workers (n = 125) were included in the study. A participant identification form and knowledge evaluation form developed for this study, along with the trans-theoretical model, were used to collect data. A 45-min interactive group education was given to the participants. Results: Upon contacting participants 3 months after group education, 15.4% (n = 11) stated that they had since received a mammogram and 9.8% (n = 7) a Pap smear. As suggested by the trans-theoretical model, group education increased participants’ readiness to receive cancer screening, along with their knowledge of breast and cervical cancer. Conclusions: Group education positively impacted women’s knowledge of cancer and their readiness to receive mammography and Pap smears. Group education can therefore potentially create awareness of cancer screening tests among women and improve their readiness to receive such tests.

Keywords: cancer screening, educational intervention, participation, women

Procedia PDF Downloads 315
1572 Taking Sides: The Frames of Online Media on the Bilateral Relationship between Moslem Countries (Malaysia and Indonesia)

Authors: Gatut Priyowidodo, I. I. Indrayani

Abstract:

The relations between Indonesia and Malaysia are always full of colors. Indonesia is always known as old brother of Malaysia since it has similar history, religion also socio culturally. Some decades show that the declination of relationship the both countries. Another time, as ASEAN members the two countries devotes their nationalities to purify their collective identities as Eastern. The objective of the research is to extricate the construction of Kompas online and Utusan online toward news coverage of the borders dispute between Indonesia-Malaysia in 2010. This research is proposed to examine central issues which reported by Kompas online and Utusan online consistently. As a media industry, Kompas coverage dominates circulation nationally. Kompas.com was the pioneer of online news in Indonesia and born in reformation era. Utusan is prominent media industry in Malaysia that conducted by UMNO as the ruling party in Malaysia for some periods. The method used in this research is framing method by Robert N. Entman’s which consists of four steps identification: defining problem, diagnosing causes, moral judgment and a treatment recommendation. This research found that Kompas news covered the border dispute must be negotiated as recognition of Indonesia dignity. In contrary, Utusan’s spectacle focused on the Indonesia demonstrans anarchism during the dispute.

Keywords: online media, media construction, the border dispute, Indonesia-Malaysia’s bilateral relations

Procedia PDF Downloads 331
1571 Identification of Tissue-Specific Transcription Factors in C. roseus with Emphasis to the TIA Biosynthetic Pathway

Authors: F. M. El-Domyati, A. Atef, S. Edris, N. O. Gadalla, M. A. Al-Kordy, A. M. Ramadan, Y. M. Saad, H. S. Al-Zahrani, A. Bahieldin

Abstract:

Transcriptome retrieved from SRA database of different tissues and treatments of C. roseus was assembled in order to detect tissue-specific transcription factors (TFs) and TFs possibly related to terpenoid indole alkaloids (TIA) pathway. A number of 290 TF-like transcripts along with 12 transcripts related to TIA biosynthetic pathway were divided in terms of co-expression in the different tissues, treatments and genotypes. Three transcripts encoding peroxidases 1 and 12 were downregulated in hairy root, while upregulated in mature leaf. Eight different transcripts of the TIA pathway co-expressed with TFs either functioning downstream tryptophan biosynthesis, e.g., tdc, str1 and sgd, or upstream vindoline biosynthesis, e.g., t16h, omt, nmt, d4h and dat. The results showed no differential expression of TF transcripts in hairy roots knocked down for tdc gene (TDCi) as compared to their wild type controls. There were several evidences of tissue-specific expression of TF transcripts in flower, mature leaf, root/hairy root, stem, seedling, hairy root and immature/mature leaves. Regulation included transcription factor families, e.g., bHLH, MYB and WRKY mostly induced by ABA and/or JA (or MeJA) and regulated during abiotic or biotic stress. The information of tissue-specific regulation and co-expression of TFs and genes in the TIA pathway can be utilized in manipulating alkaloid biosynthesis in C. roseus.

Keywords: SRA database, bHLH, MYB, WRKY, co-expression

Procedia PDF Downloads 396
1570 Executive Order as an Effective Tool in Combating Insecurities and Human Rights Violations: The Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Following countless violations of Human Rights in Nigeria by the various arms and agencies of government; from the Military to the Federal Police and other law enforcement agencies, Nigeria has been riddled with several reports of acts by these agencies against the citizens, ranging from illegal arrest and imprisonment, torture, disappearing, and extrajudicial killings, just to mention a few. This paper, focuses on SARS (Special Anti-Robbery Squad), a division of the Nigeria Police Force, and its reported threats to the people’s security, particularly the Nigerian youths, with continuous violence, extortion, illegal arrest and imprisonment, terror, and extrajudicial activities resulting in maiming and in most cases death, thus infringing on the human rights of the people it’s sworn to protect. This research further analyses how the activities of SARS has over the years instigated fear on the average Nigerian youth, preventing the free participation in daily life, education, job, and individual development, in turn impeding the realization of their full potentials for growth and participation in collective national development. This research analyzes the executive order by the then Acting President (Vice-President) of Nigeria, directing the overhauling of SARS, and its implementation by the Federal Police Force in determining if it’s enough to prevent or put a stop to the continuous Human Rights abuse and threat to the security of the individual citizen. Concluding that although the order by the Acting President was given with an intent to halt the various violations by SARS, and the Inspector General of Police’s (IGP) subsequent action by releasing a statement following the order, the bureaucracy in Nigeria, with a history of incompetency and a return to 'business as usual' after a reduced public outcry, it’s most likely that there will not be adequate follow up put in place and these violations would be slowly 'swept under the rug' with SARS officials not held accountable. It is recommended therefore that the Federal Government through the NPF, following the reforms made, in collaboration with the mentioned Independent Human Rights and civil societies organizations should periodically produce unbiased and publicly accessible reports on the implementation of these reforms and progress made. This will go a long way in assuring the public of actual fulfillment of the restructuring, reduce fear by the youths and restore some public faith in the government.

Keywords: special anti-robbery squad, youths in Nigeria, overhaul, insecurities, human rights violations

Procedia PDF Downloads 285
1569 A Neural Network Classifier for Estimation of the Degree of Infestation by Late Blight on Tomato Leaves

Authors: Gizelle K. Vianna, Gabriel V. Cunha, Gustavo S. Oliveira

Abstract:

Foliage diseases in plants can cause a reduction in both quality and quantity of agricultural production. Intelligent detection of plant diseases is an essential research topic as it may help monitoring large fields of crops by automatically detecting the symptoms of foliage diseases. This work investigates ways to recognize the late blight disease from the analysis of tomato digital images, collected directly from the field. A pair of multilayer perceptron neural network analyzes the digital images, using data from both RGB and HSL color models, and classifies each image pixel. One neural network is responsible for the identification of healthy regions of the tomato leaf, while the other identifies the injured regions. The outputs of both networks are combined to generate the final classification of each pixel from the image and the pixel classes are used to repaint the original tomato images by using a color representation that highlights the injuries on the plant. The new images will have only green, red or black pixels, if they came from healthy or injured portions of the leaf, or from the background of the image, respectively. The system presented an accuracy of 97% in detection and estimation of the level of damage on the tomato leaves caused by late blight.

Keywords: artificial neural networks, digital image processing, pattern recognition, phytosanitary

Procedia PDF Downloads 315
1568 Performance Comparison of Outlier Detection Techniques Based Classification in Wireless Sensor Networks

Authors: Ayadi Aya, Ghorbel Oussama, M. Obeid Abdulfattah, Abid Mohamed

Abstract:

Nowadays, many wireless sensor networks have been distributed in the real world to collect valuable raw sensed data. The challenge is to extract high-level knowledge from this huge amount of data. However, the identification of outliers can lead to the discovery of useful and meaningful knowledge. In the field of wireless sensor networks, an outlier is defined as a measurement that deviates from the normal behavior of sensed data. Many detection techniques of outliers in WSNs have been extensively studied in the past decade and have focused on classic based algorithms. These techniques identify outlier in the real transaction dataset. This survey aims at providing a structured and comprehensive overview of the existing researches on classification based outlier detection techniques as applicable to WSNs. Thus, we have identified key hypotheses, which are used by these approaches to differentiate between normal and outlier behavior. In addition, this paper tries to provide an easier and a succinct understanding of the classification based techniques. Furthermore, we identified the advantages and disadvantages of different classification based techniques and we presented a comparative guide with useful paradigms for promoting outliers detection research in various WSN applications and suggested further opportunities for future research.

Keywords: bayesian networks, classification-based approaches, KPCA, neural networks, one-class SVM, outlier detection, wireless sensor networks

Procedia PDF Downloads 479
1567 Isolation, Identification and Crude Oil Biodegradation Potential of Providencia sp. BAZ 01

Authors: Aisami A., Z. A. Adamu, Lawan Bulama

Abstract:

Due to growing issues of crude oil pollution in both marine and terrestrial environments, Billions to Trillions of US Dollars were spent over the years for the treatment of this spill. There is an urgent need for effective bioremediation strategies. This current study focuses on the isolation and characterization of a crude oil-degrading bacterium from hydrocarbon-contaminated soil samples. Soil samples were collected from an oil spill site and subjected to enrichment culture techniques in a mineral salt medium supplemented with crude oil as the singular carbon source. The isolates were screened for their crude oil-degrading capabilities using gravimetric analysis. The most efficient isolation was identified through 16S rRNA gene sequencing. Cultural and physical conditions such pH, temperature salinity and crude oil concentrations were optimized. The isolates showed significant crude oil degradation efficiency, reducing oil concentration (2.5%) by 75% within 15 days of incubation. The strain was identified as Providencia sp. through molecular characterization, the sequence was deposited at the NCBI Genbank with accession number MN880494. The bacterium exhibited optimal growth at 32.5°C, pH 7.0 to 7.5, and in the presence of 1.5% (w/v) NaCl. The isolated Providencia sp. shows encouraging potential for bioremediation of crude oil-contaminated environments. This study successfully isolated and characterized a crude oil-degrading Providencia sp., highlighting its potential in bioremediation.

Keywords: crude oil degradation, providencia sp., bioremediation, hydrocarbon utilization, environmental pollution.

Procedia PDF Downloads 9
1566 Identification and Analysis of Supports Required for Teachers Moving to Remote Teaching and Learning during Disasters and Pandemics

Authors: Susan Catapano, Meredith Jones, Carol McNulty

Abstract:

Analysis of one state’s collaborative effort to support teachers, in both public and private schools, as they moved from face-to-face teaching to remote teaching during the Covid pandemic to identify lessons learned and materials put into place to support teachers and families. Surveys were created, distributed, and analyzed throughout the three months of remote teaching, documents and lesson plans were developed, and training materials were created. All data collected and materials developed were analyzed to identify supports teachers used and needed for successful remote teaching. Researchers found most teachers easily moved to online teaching; however, many families did not have access to technology, so teachers needed to develop non-technology-based access and support for remote teaching. Teachers also reported the need to prepare to teach remotely as part of their teaching training, so they were prepared in the future. Finally, data indicated teachers were able to establish stronger relationships with families than usual as a result of remote teaching. The lessons learned and support developed are part of the state’s ongoing policy for online teaching in the event of disasters and pandemics in the future.

Keywords: remote learning, teacher education, pandemic, families

Procedia PDF Downloads 145
1565 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance

Authors: Kyle Phillips, Ndiko Ludidi

Abstract:

Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.

Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22

Procedia PDF Downloads 444
1564 Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia

Authors: Wasmi Woishi

Abstract:

Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data.

Keywords: smart card technology, healthcare using smart cards, smart healthcare cards, KSA healthcare information system, cloud-based healthcare cards

Procedia PDF Downloads 152
1563 Appraisal of Conservation Strategies of Veligonda Forest Range of Eastern Ghats, Andhra Pradesh, India

Authors: Khasim Munir Bhasha Shaik

Abstract:

Veligonda and adjoining hill range spread along about 170 Km North to South in Kadapa and Nellore Districts stretching a little further into Prakasam District. The latitude in general ranges up to 1000m. The forests are generally dry deciduous type. Veligonda and adjoining hill ranges comprise of Palakonda, Seshachalam, Lankamala and the terminal part of Nallamalais from mid-region of Southern Eastern Ghats. The Veligonda range which separates the Nellore district from Kadapa and Kurnool is the backbone of the Eastern Ghats, starting from Nagari promontory in Chittoor district. It runs in a northerly direction along the western border of the Nellore district, with a raising elevation of 3,626 ft at Penchalakona in Raipur thaluk. Veligonda hill ranges are high in altitude and have deep valleys. Among the Veligondas range of hills the Durgam in Venkatagiri range and Penchalakona are the most prominent and are situated 914 meters above mean sea level. It has more than 3000 species of plants along with 500 animal species. The unique specialty of this region is the presence of Pterocarpus santalinus(endangered) and Santalum album (vulnerable). In the present study, an attempt is made to assess the efforts that are going on to conserve the biodiversity of flora and fauna of this region. Various conservation strategies were suggested to protect the biodiversity and richness of Veligonda forest, hill region of Eastern Ghats of Andhra Pradesh. The major threats and the reasons for the dwindling species richness are poor rainfall, adverse climatic conditions, robbery of Red sanders and poaching of animals by the local tribals. Efforts are to be made to conserve some of the animals by both in situ and ex-situ methods. More awareness is to be developed among the local communities who are dwelling in the vicinity and importance of conservation is to be emphasized to them. Anthropogenic attachments are to be made by introducing more numbers of sacred groves. Gross enforcement of law is to be made to protect the various forest resources in this area. The important species with the medicinal values are to be identified. It was found that two important wildlife sanctuaries named Sri Lankamalleswarawildlife sanctuary and Sripenusila Narasimha wildlife sanctuary are working for the comprehensive conservation of the environment in this area. Apart from this more than 38 important sacred grooves are there where the plants and animals are protected by local Yanadi and other communities.

Keywords: biodiversity, wild life sanctuary, habitat destruction, eastern Ghats

Procedia PDF Downloads 145
1562 Inducible Trans-Encapsidation System for Temporal Separation of Hepatitis C Virus Life Cycle

Authors: Ovidiu Vlaicu, Leontina Banica, Dan Otelea, Andrei-Jose Petrescu, Costin-Ioan Popescu

Abstract:

Hepatitis C Virus (HCV) infects 170 million peoples worldwide. Major advances have been made recently in HCV standard of care with interferon-free therapy being already approved. Despite major progress in HCV therapy, the genotype associated treatment efficacy and toxicity still represent issues to address. To identify endogenous factors involved in different stages of HCV life cycle, we have developed a trans-packaging system for HCV subgenomic replicons lacking core protein gene. Huh7 cells were used to generate a packaging cell line expressing the core protein in an inducible manner. The core packaging cell line was able to trans-complemented various subgenomic replicons to secret infectious trans-complemented HCV particles (HCV-TCP). Further, we constructed subgenomic replicons with foreign epitopes suitable for immunoaffinity purification or fluorescence microscopy studies. We have shown that the insertion has not effects on the efficacy of trans-complementation yielding similar titers to the control subgenomic replicon. This system will be a valuable tool in studying pre- and post-assembly events in HCV life cycle and for the fast identification of HCV assembly inhibitors.

Keywords: assembly inhibitors, core protein, HCV, trans-complementation

Procedia PDF Downloads 280
1561 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 42
1560 Fluorescence in situ Hybridization (FISH) Detection of Bacteria and Archaea in Fecal Samples

Authors: Maria Nejjari, Michel Cloutier, Guylaine Talbot, Martin Lanthier

Abstract:

The fluorescence in situ hybridization (FISH) is a staining technique that allows the identification, detection and quantification of microorganisms without prior cultivation by means of epifluorescence and confocal laser scanning microscopy (CLSM). Oligonucleotide probes have been used to detect bacteria and archaea that colonize the cattle and swine digestive systems. These bacterial strains have been obtained from fecal samples issued from cattle manure and swine slurry. The collection of these samples has been done at 3 different pit’s levels A, B and C with same height. Two collection depth levels have been taken in consideration, one collection level just under the pit’s surface and the second one at the bottom of the pit. Cells were fixed and FISH was performed using oligonucleotides of 15 to 25 nucleotides of length associated with a fluorescent molecule Cy3 or Cy5. The double hybridization using Cy3 probe targeting bacteria (Cy3-EUB338-I) along with a Cy5 probe targeting Archaea (Gy5-ARCH915) gave a better signal. The CLSM images show that there are more bacteria than archaea in swine slurry. However, the choice of fluorescent probes is critical for getting the double hybridization and a unique signature for each microorganism. FISH technique is an easy way to detect pathogens like E. coli O157, Listeria, Salmonella that easily contaminate water streams, agricultural soils and, consequently, food products and endanger human health.

Keywords: archaea, bacteria, detection, FISH, fluorescence

Procedia PDF Downloads 375
1559 Characterization of Aquifer Systems and Identification of Potential Groundwater Recharge Zones Using Geospatial Data and Arc GIS in Kagandi Water Supply System Well Field

Authors: Aijuka Nicholas

Abstract:

A research study was undertaken to characterize the aquifers and identify the potential groundwater recharge zones in the Kagandi district. Quantitative characterization of hydraulic conductivities of aquifers is of fundamental importance to the study of groundwater flow and contaminant transport in aquifers. A conditional approach is used to represent the spatial variability of hydraulic conductivity. Briefly, it involves using qualitative and quantitative geologic borehole-log data to generate a three-dimensional (3D) hydraulic conductivity distribution, which is then adjusted through calibration of a 3D groundwater flow model using pumping-test data and historic hydraulic data. The approach consists of several steps. The study area was divided into five sub-watersheds on the basis of artificial drainage divides. A digital terrain model (DTM) was developed using Arc GIS to determine the general drainage pattern of Kagandi watershed. Hydrologic characterization involved the determination of the various hydraulic properties of the aquifers. Potential groundwater recharge zones were identified by integrating various thematic maps pertaining to the digital elevation model, land use, and drainage pattern in Arc GIS and Sufer golden software. The study demonstrates the potential of GIS in delineating groundwater recharge zones and that the developed methodology will be applicable to other watersheds in Uganda.

Keywords: aquifers, Arc GIS, groundwater recharge, recharge zones

Procedia PDF Downloads 132
1558 Autonomous Vehicle Detection and Classification in High Resolution Satellite Imagery

Authors: Ali J. Ghandour, Houssam A. Krayem, Abedelkarim A. Jezzini

Abstract:

High-resolution satellite images and remote sensing can provide global information in a fast way compared to traditional methods of data collection. Under such high resolution, a road is not a thin line anymore. Objects such as cars and trees are easily identifiable. Automatic vehicles enumeration can be considered one of the most important applications in traffic management. In this paper, autonomous vehicle detection and classification approach in highway environment is proposed. This approach consists mainly of three stages: (i) first, a set of preprocessing operations are applied including soil, vegetation, water suppression. (ii) Then, road networks detection and delineation is implemented using built-up area index, followed by several morphological operations. This step plays an important role in increasing the overall detection accuracy since vehicles candidates are objects contained within the road networks only. (iii) Multi-level Otsu segmentation is implemented in the last stage, resulting in vehicle detection and classification, where detected vehicles are classified into cars and trucks. Accuracy assessment analysis is conducted over different study areas to show the great efficiency of the proposed method, especially in highway environment.

Keywords: remote sensing, object identification, vehicle and road extraction, vehicle and road features-based classification

Procedia PDF Downloads 216
1557 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network

Authors: Amit Verma, Pardeep Kaur

Abstract:

In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.

Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval

Procedia PDF Downloads 364
1556 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 246
1555 Cognitive Development Theories as Determinant of Children's Brand Recall and Ad Recognition: An Indian Perspective

Authors: Ruchika Sharma

Abstract:

In the past decade, there has been an explosion of research that has examined children’s understanding of TV advertisements and its persuasive intent, socialization of child consumer and child psychology. However, it is evident from the literature review that no studies in this area have covered advertising messages and its impact on children’s brand recall and ad recognition. Copywriters use various creative devices to lure the consumers and very impressionable consumers such as children face far more drastic effects of these creative ways of persuasion. On the basis of Piaget’s theory of cognitive development as a theoretical basis for predicting/understanding children’s response and understanding, a quasi-experiment was carried out for the study, that manipulated measurement timing and advertising messages (familiar vs. unfamiliar) keeping gender and age group as two prominent factors. This study also examines children’s understanding of Advertisements and its elements, predominantly - Language, keeping in view Fishbein’s model. Study revealed significant associations between above mentioned factors and children’s brand recall and ad identification. Further, to test the reliability of the findings on larger sample, bootstrap simulation technique was used. The simulation results are in accordance with the findings of experiment, suggesting that the conclusions obtained from the study can be generalized for entire children’s (as consumers) market in India.

Keywords: advertising, brand recall, cognitive development, preferences

Procedia PDF Downloads 274
1554 Isolation and Antifungal Susceptibility Pattern of Candida albicans from Endocervical and High Vaginal Swabs of Pregnant Women Attending State Specialist Hospital Gombe, Nigeria

Authors: Isa Shu’aibu, A. A. Mu’inat, F. U. Maigari, M. A. Mani

Abstract:

Candida albicans is the common cause of both oral and vaginal candidiasis in humans. This candidiasis leads to a wide range of physical, psychological and even physiological problems in humans particularly pregnant women. Samples of endocervical and high vaginal swab were collected from 200 women attending Gombe Specialist Hospital and inoculated on Saboraud Dextrose Agar (SDA) incorporated with chloramphenicol to get rid of the unwanted bacterial contaminants. Gram staining technique and germ tube test were employed for the identification, as Candida albicans is positive for both. Gram positive samples were 70% (n=140) and were further subjected to germ tube test. The remaining 30% (n=60) were found to be Gram negative. 90% (n=126) of the Gram positive ones isolated were also found to be positive for germ tube test; confirming the presence of Candida albicans. Antifungal susceptibility testing revealed that members of Imidazole (Ketoconazole, Miconazole) and those of Triazoles (Fluconazole and Itraconazole) were found to be more effective at concentrations of 20, 50 and 100 µg/disc compared to Griseofulvin (Fulcin) with only 26.00 mm zone of inhibition at 100 µg/disc concentration.

Keywords: Candida albicans, candidiasis, endocervical, vaginal swab, antifungal susceptibility, imidazole, triazoles

Procedia PDF Downloads 322
1553 Fatigue Life Estimation of Tubular Joints - A Comparative Study

Authors: Jeron Maheswaran, Sudath C. Siriwardane

Abstract:

In fatigue analysis, the structural detail of tubular joint has taken great attention among engineers. The DNV-RP-C203 is covering this topic quite well for simple and clear joint cases. For complex joint and geometry, where joint classification isn’t available and limitation on validity range of non-dimensional geometric parameters, the challenges become a fact among engineers. The classification of joint is important to carry out through the fatigue analysis. These joint configurations are identified by the connectivity and the load distribution of tubular joints. To overcome these problems to some extent, this paper compare the fatigue life of tubular joints in offshore jacket according to the stress concentration factors (SCF) in DNV-RP-C203 and finite element method employed Abaqus/CAE. The paper presents the geometric details, material properties and considered load history of the jacket structure. Describe the global structural analysis and identification of critical tubular joints for fatigue life estimation. Hence fatigue life is determined based on the guidelines provided by design codes. Fatigue analysis of tubular joints is conducted using finite element employed Abaqus/CAE [4] as next major step. Finally, obtained SCFs and fatigue lives are compared and their significances are discussed.

Keywords: fatigue life, stress-concentration factor, finite element analysis, offshore jacket structure

Procedia PDF Downloads 433
1552 The Instrumentalization of Digital Media in the Context of Sexualized Violence

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.

Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media

Procedia PDF Downloads 170
1551 Use of Alternative Water Sources Based on a Rainwater in the Multi-Dwelling Urban Building 2030

Authors: Monika Lipska

Abstract:

Drinking water is water with a very high quality, and as such represents only 2.5% of the total quantity of all water in the world. For many years we have observed continuous increase in its consumption as a result of many factors such as: Growing world population (7 billion in 2011r.), increase of human lives comfort and – above all – the economic growth. Due to the rocketing consumption and growing costs of production of water with such high-quality parameters, we experience accelerating interest in alternative sources of obtaining potable water. One of the ways of saving this valuable material is using rainwater in the Urban Building. With an exponentially growing demand, the acquisition of additional sources of water is necessary to maintain the proper balance of all ecosystems. The first part of the paper describes what rainwater is and what are its potential sources and means of use, while the main part of the article focuses on the description of the methods of obtaining water from rain on the example of new urban building in Poland. It describes the method and installations of rainwater in the new urban building (“MBJ2030”). The paper addresses also the issue of monitoring of the whole recycling systems as well as the particular quality indicators important because of identification of the potential risks to human health. The third part describes the legal arrangements concerning the recycling of rainwater existing in different European Union countries with particular reference to Poland on example the new urban building in Warsaw.

Keywords: rainwater, potable water, non-potable water, Poland

Procedia PDF Downloads 401
1550 Method for Tuning Level Control Loops Based on Internal Model Control and Closed Loop Step Test Data

Authors: Arnaud Nougues

Abstract:

This paper describes a two-stage methodology derived from internal model control (IMC) for tuning a proportional-integral-derivative (PID) controller for levels or other integrating processes in an industrial environment. Focus is the ease of use and implementation speed which are critical for an industrial application. Tuning can be done with minimum effort and without the need for time-consuming open-loop step tests on the plant. The first stage of the method applies to levels only: the vessel residence time is calculated from equipment dimensions and used to derive a set of preliminary proportional-integral (PI) settings with IMC. The second stage, re-tuning in closed-loop, applies to levels as well as other integrating processes: a tuning correction mechanism has been developed based on a series of closed-loop simulations with model errors. The tuning correction is done from a simple closed-loop step test and the application of a generic correlation between observed overshoot and integral time correction. A spin-off of the method is that an estimate of the vessel residence time (levels) or open-loop process gain (other integrating process) is obtained from the closed-loop data.

Keywords: closed-loop model identification, IMC-PID tuning method, integrating process control, on-line PID tuning adaptation

Procedia PDF Downloads 203
1549 Tailoring Polythiophene Nanocomposites with MnS/CoS Nanoparticles for Enhanced Surface-Enhanced Raman Spectroscopy (SERS) Detection of Mercury Ions in Water

Authors: Temesgen Geremew

Abstract:

The excessive emission of heavy metal ions from industrial processes poses a serious threat to both the environment and human health. This study presents a distinct approach utilizing (PTh-MnS/CoS NPs) for the highly selective and sensitive detection of Hg²⁺ ions in water. Such detection is crucial for safeguarding human health, protecting the environment, and accurately assessing toxicity. The fabrication method employs a simple and efficient chemical precipitation technique, harmoniously combining polythiophene, MnS, and CoS NPs to create highly active substrates for SERS. The MnS@Hg²⁺ exhibits a distinct Raman shift at 1666 cm⁻¹, enabling specific identification and demonstrating the highest responsiveness among the studied semiconductor substrates with a detection limit of only 1 nM. This investigation demonstrates reliable and practical SERS detection for Hg²⁺ ions. Relative standard deviation (RSD) ranged from 0.49% to 9.8%, and recovery rates varied from 96% to 102%, indicating selective adsorption of Hg²⁺ ions on the synthesized substrate. Furthermore, this research led to the development of a remarkable set of substrates, including (MnS, CoS, MnS/CoS, and PTh-MnS/CoS) nanoparticles were created right there on SiO₂/Si substrate, all exhibiting sensitive, robust, and selective SERS for Hg²⁺ ion detection. These platforms effectively monitor Hg²⁺ concentrations in real environmental samples.

Keywords: surface-enhanced raman spectroscopy (SERS), sensor, mercury ions, nanoparticles, and polythiophene.

Procedia PDF Downloads 44
1548 Ice Breakers: A Tool for Esl Learners

Authors: Nazia Shehzad

Abstract:

An icebreaker is a facilitation exercise intended to help a group to begin the process of forming themselves into a team. Icebreakers are commonly presented as a game to ‘warm up’ the group by helping the members to get to know each other. They often focus on sharing personal information such as names, hobbies, etc. Challenging icebreakers also have the ability to allow a group to be better prepared to complete its assigned tasks. For example, if the team's objective is to redesign a business process such as Accounts Payable, the icebreaker activity might take the team through a process analysis. The analysis could include the identification of failure points, challenging assumptions, and development of new solutions — all in a simpler and ‘safer’ setting where the team can practice the group dynamics which they will use to solve the assigned problem. Icebreakers help establish a positive environment and provide an opportunity for students to get to know one another and the instructor. Both are critical to the retention and success of students. There are a number of benefits of using ice-breakers activities in the classroom. It reduces both student and instructor anxiety prior to introducing the course, fosters in a powerful way both student-student and faculty-student interactions. It creates an environment where the learner is expected to participate and the instructor is willing to listen, actively engage students from the onset. It conveys the message that the instructor cares about getting to know the students and makes it easier for students to form relationships early in the semester so they can work together both in and out of class.

Keywords: actively engages students, facilitation exercise, faculty- student interactions, group dynamics, warm up

Procedia PDF Downloads 330