Search results for: human memory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9360

Search results for: human memory

7260 The Effects of Music and Gender on Recall Ability on College Students: A Study in Students from Universitas Indonesia

Authors: Hestika D. Waraningrum, Indriani N. Khairunnisa, Nabila Isnandini, Nadine Yasminah, Sekar A. Winesa

Abstract:

Each individual’s ability to recall, whether they are male or female, is allegedly influenced by the environmental circumstances during the recalling process. The presence of a distraction is one of the environmental variables that affect recall ability in its capacity in the Short Term Memory. This study was made to see the difference in number of words that was successfully recalled by male participants and female participants with the presence of music as a distraction and also without music as a distraction. Data was taken using an experimental procedure from 75 female and male undergraduate students of Universitas Indonesia. The study design used was a 2x2 Factorial ANOVA, which aimed to see the difference between two variables, which were gender (male vs female) and the presence of a distraction (music serving as a distraction vs absence of music). The results indicated that there were no significant mean differences in the ability to recall between male and female participants. There are no significant mean differences between the presence and the absence of music as a distraction, but a significant interaction was found between gender and distraction with the ability to recall.

Keywords: college, gender, music, recall

Procedia PDF Downloads 231
7259 Operating System Based Virtualization Models in Cloud Computing

Authors: Dev Ras Pandey, Bharat Mishra, S. K. Tripathi

Abstract:

Cloud computing is ready to transform the structure of businesses and learning through supplying the real-time applications and provide an immediate help for small to medium sized businesses. The ability to run a hypervisor inside a virtual machine is important feature of virtualization and it is called nested virtualization. In today’s growing field of information technology, many of the virtualization models are available, that provide a convenient approach to implement, but decision for a single model selection is difficult. This paper explains the applications of operating system based virtualization in cloud computing with an appropriate/suitable model with their different specifications and user’s requirements. In the present paper, most popular models are selected, and the selection was based on container and hypervisor based virtualization. Selected models were compared with a wide range of user’s requirements as number of CPUs, memory size, nested virtualization supports, live migration and commercial supports, etc. and we identified a most suitable model of virtualization.

Keywords: virtualization, OS based virtualization, container based virtualization, hypervisor based virtualization

Procedia PDF Downloads 329
7258 Impact of Stack Caches: Locality Awareness and Cost Effectiveness

Authors: Abdulrahman K. Alshegaifi, Chun-Hsi Huang

Abstract:

Treating data based on its location in memory has received much attention in recent years due to its different properties, which offer important aspects for cache utilization. Stack data and non-stack data may interfere with each other’s locality in the data cache. One of the important aspects of stack data is that it has high spatial and temporal locality. In this work, we simulate non-unified cache design that split data cache into stack and non-stack caches in order to maintain stack data and non-stack data separate in different caches. We observe that the overall hit rate of non-unified cache design is sensitive to the size of non-stack cache. Then, we investigate the appropriate size and associativity for stack cache to achieve high hit ratio especially when over 99% of accesses are directed to stack cache. The result shows that on average more than 99% of stack cache accuracy is achieved by using 2KB of capacity and 1-way associativity. Further, we analyze the improvement in hit rate when adding small, fixed, size of stack cache at level1 to unified cache architecture. The result shows that the overall hit rate of unified cache design with adding 1KB of stack cache is improved by approximately, on average, 3.9% for Rijndael benchmark. The stack cache is simulated by using SimpleScalar toolset.

Keywords: hit rate, locality of program, stack cache, stack data

Procedia PDF Downloads 303
7257 Interactive Shadow Play Animation System

Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding

Abstract:

The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.

Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI

Procedia PDF Downloads 401
7256 Education and Development: An Overview of Islam

Authors: Rasheed Sanusi Adeleke

Abstract:

Several attempts have been made by scholars, both medieval and contemporary on the impact of Islam on scientific discovery. Lesser attention, however, is always accorded to the historical antecedents of the earlier Muslim scholars, who made frantic efforts towards the discoveries. Islam as a divine religion places high premium on the acquisition of knowledge especially that of sciences. It considers knowledge as a comprehensive whole, which covers both spiritual and material aspects of human life. Islam torches every aspect of human life for the growth, development and advancement of society. Acquisition of knowledge of humanity, social sciences as well as the pure and applied sciences is comprehensively expressed in Islamic education. Not only this, the history portrays the leading indelible roles played by the early Muslims on these various fields of knowledge. That is why Islam has declared acquisition of knowledge compulsory for all Muslims. This paper therefore analyses the contributions of Islam to civilization with particular reference to sciences. It also affirms that Islam is beyond the religion of prayers and rituals. The work is historic, analytic and explorative in nature. Recommendations are also also put forward as suggestions for the present generation cum posterity in general and Muslims in particular.

Keywords: education, development, Islam, development and Islam

Procedia PDF Downloads 435
7255 Myeloid Zinc Finger 1/Ets-Like Protein-1/Protein Kinase C Alpha Associated with Poor Prognosis in Patients with Hepatocellular Carcinoma

Authors: Jer-Yuh Liu, Je-Chiuan Ye, Jin-Ming Hwang

Abstract:

Protein kinase C alpha (PKCα) is a key signaling molecule in human cancer development. As a therapeutic strategy, targeting PKCα is difficult because the molecule is ubiquitously expressed in non-malignant cells. PKCα is regulated by the cooperative interaction of the transcription factors myeloid zinc finger 1 (MZF-1) and Ets-like protein-1 (Elk-1) in human cancer cells. By conducting tissue array analysis, herein, we determined the protein expression of MZF-1/Elk-1/PKCα in various cancers. The data show that the expression of MZF-1/Elk-1 is correlated with that of PKCα in hepatocellular carcinoma (HCC), but not in bladder and lung cancers. In addition, the PKCα down-regulation by shRNA Elk-1 was only observed in the HCC SK-Hep-1 cells. Blocking the interaction between MZF-1 and Elk-1 through the transfection of their binding domain MZF-160–72 decreased PKCα expression. This step ultimately depressed the epithelial-mesenchymal transition potential of the HCC cells. These findings could be used to develop an alternative therapeutic strategy for patients with the PKCα-derived HCC.

Keywords: protein kinase C alpha, myeloid zinc finger 1, ets-like protein-1, hepatocellular carcinoma

Procedia PDF Downloads 227
7254 Molecular Basis for Amyloid Inhibition by L-Dopa: Implication towards Systemic Amyloidosis

Authors: Rizwan H. Khan, Saima Nusrat

Abstract:

Despite the fact that amyloid associated neurodegenerative diseases and non-neuropathic systemic amyloidosis have allured the research endeavors, as no curative drugs have been proclaimed up till now except for symptomatic cure. Therapeutic compounds which can diminish or disaggregate such toxic oligomers and fibrillar species have been examined and more are on its way. In the present study, we had reported an extensive biophysical, microscopic and computational study, revealing that L-3, 4-dihydroxyphenylalanine (L-Dopa) possess undeniable potency to inhibit heat induced human lysozyme (HL) amyloid fibrillation and also retain the fibril disaggregating potential. L-Dopa interferes in the amyloid fibrillogenesis process by interacting hydrophobically and also by forming hydrogen bonds with the amino acid residues found in amyloid fibril forming prone region of HL as elucidated by molecular docking results. L-Dopa also disaggregates the mature amyloid fibrils into some unorganised species. Thus, L-Dopa and related compounds can work as a promising inhibitor for the therapeutic advancement prospective against systemic amyloidosis.

Keywords: amyloids, disaggregation, human lysozyme, molecular docking

Procedia PDF Downloads 327
7253 Design of Advanced Materials for Alternative Cooling Devices

Authors: Emilia Olivos, R. Arroyave, A. Vargas-Calderon, J. E. Dominguez-Herrera

Abstract:

More efficient cooling systems are needed to reduce building energy consumption and environmental impact. At present researchers focus mainly on environmentally-friendly magnetic materials and the potential application in cooling devices. The magnetic materials presented in this project belong to a group known as Heusler alloys. These compounds are characterized by a strong coupling between their structure and magnetic properties. Usually, a change in one of them can alter the other, which implies changes in other electronic or structural properties, such as, shape magnetic memory response or the magnetocaloric effect. Those properties and its dependence with external fields make these materials interesting, both from a fundamental point of view, as well as on their different possible applications. In this work, first principles and Monte Carlo simulations have been used to calculate exchange couplings and magnetic properties as a function of an applied magnetic field on Heusler alloys. As a result, we found a large dependence of the magnetic susceptibility, entropy and heat capacity, indicating that the magnetic field can be used in experiments to trigger particular magnetic properties in materials, which are necessary to develop solid-state refrigeration devices.

Keywords: ferromagnetic materials, magnetocaloric effect, materials design, solid state refrigeration

Procedia PDF Downloads 215
7252 General Purpose Graphic Processing Units Based Real Time Video Tracking System

Authors: Mallikarjuna Rao Gundavarapu, Ch. Mallikarjuna Rao, K. Anuradha Bai

Abstract:

Real Time Video Tracking is a challenging task for computing professionals. The performance of video tracking techniques is greatly affected by background detection and elimination process. Local regions of the image frame contain vital information of background and foreground. However, pixel-level processing of local regions consumes a good amount of computational time and memory space by traditional approaches. In our approach we have explored the concurrent computational ability of General Purpose Graphic Processing Units (GPGPU) to address this problem. The Gaussian Mixture Model (GMM) with adaptive weighted kernels is used for detecting the background. The weights of the kernel are influenced by local regions and are updated by inter-frame variations of these corresponding regions. The proposed system has been tested with GPU devices such as GeForce GTX 280, GeForce GTX 280 and Quadro K2000. The results are encouraging with maximum speed up 10X compared to sequential approach.

Keywords: connected components, embrace threads, local weighted kernel, structuring elements

Procedia PDF Downloads 440
7251 The Roles of Muslims Scholars in Minifying Religious Extremism for Religious Tolerance and Peace Building in Nigeria

Authors: Mukhtar Sarkin-Kebbi

Abstract:

Insurgency, religious extremism and other related religious crises become hydra-headed in Nigeria, which caused destruction of human lives and properties worth of billions naira. As result, millions people were displaced and million children were out of school most of whom from Muslims community. The wrong teaching and misinterpretation of Islam by some Muslim community fuel the spread of extremist ideology hatred among Muslim sects, non-Muslims and emergency of extremist groups, like Boko Haram. A multi-religious country like Nigeria to realise its development in all human aspects, there must be unity and religious tolerance. Many agreed that changing the ideologies of insurgents and religious extremism will require intellectual role with vigorous campaign. Muslim scholars can play a vital role in promoting social reform and peaceful coexistence. This paper discusses the importance of unity among Muslim community and religious tolerance in light of the Qur’an and the Hadith. The paper also reviews the relationship between Muslims and non Muslims during the life time the Prophet (S.A.W.) in order to serve as exemplary model. Contemporary issues such as religious extremism, sectarians, intolerance and their consequences were examined. To minify religious intolerance and extremism,the paper identifies the roles to be played by Muslim scholars with references from Qur’an and Sunnah. The paper concludes that to realise overall human development and eternal salvation, Muslim should shun away from any religious crises and embrace unity and religious tolerance. Finally the paper recommends among others that only pious and learned scholars should be allowed to preach in any religious gathering, Muslim should exercise patience, tolerance in dealing with Muslims and non Muslims. Muslims should leave by example from the teaching of Qur’an and Sunnah of the Prophet (S.A.W.).

Keywords: Muslim scholars, peace building, religious extremism, religious tolerance

Procedia PDF Downloads 213
7250 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
7249 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 83
7248 Non-Canonical Beclin-1-Independent Autophagy and Apoptosis in Cell Death Induced by Rhus coriaria in Human Colon HT-29 Cancer Cells

Authors: Rabah Iratni, Husain El Hasasna, Khawlah Athamneh, Halima Al Sameri, Nehla Benhalilou, Asma Al Rashedi

Abstract:

Background: Cancer therapies have witnessed great advances in the recent past, however, cancer continues to be a leading cause of death, with colorectal cancer being the fourth cause of cancer-related deaths. Colorectal cancer affects both sexes equally with poor survival rate once it metastasizes. Phytochemicals, which are plant derived compounds, have been on a steady rise as anti-cancer drugs due to the accumulation of evidences that support their potential. Here, we investigated the anticancer effect of Rhus coriaria on colon cancer cells. Material and Method: Human colon cancer HT-29 cell line was used. Protein expression and protein phosphorylation were examined using Western blotting. Transcription activity was measure using Quantitative RT-PCR. Human tumoral clonogenic assay was used to assess cell survival. Senescence was assessed by the senescence-associated beta-galactosidase assay. Results: Rhus coriaria extract (RCE) was found to significantly inhibit the viability and colony growth of human HT-29 colon cancer cells. RCE induced senescence and cell cycle arrest at G1 phase. These changes were concomitant with upregulation of p21, p16, downregulation of cyclin D1, p27, c-myc and expression of Senescence-associated-β-Galactosidase activity. Moreover, RCE induced non-canonical beclin-1independent autophagy and subsequent apoptotic cell death through activation of activation caspase 8 and caspase 7. The blocking of autophagy by 3-methyladenine (3-MA) or chloroquine (CQ) reduced RCE-induced cell death. Further, RCE induced DNA damage, reduced mutant p53 protein level and downregulated phospho-AKT and phospho-mTOR, events that preceded autophagy. Mechanistically, we found that RCE inhibited the AKT and mTOR pathway, a regulator of autophagy, by promoting the proteasome-dependent degradation of both AKT and mTOR proteins. Conclusion: Our findings provide strong evidence that Rhus coriaria possesses strong anti-colon cancer activity through induction of senescence and autophagic cell death, making it a promising alternative or adjunct therapeutic candidate against colon cancer.

Keywords: autophagy, proteasome degradation, senescence, mTOR, apoptosis, Beclin-1

Procedia PDF Downloads 262
7247 Improving Fingerprinting-Based Localization (FPL) System Using Generative Artificial Intelligence (GAI)

Authors: Getaneh Berie Tarekegn, Li-Chia Tai

Abstract:

With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 47
7246 The Role Of Diallyl Trisulfide As A Suppressor In Activated-Platelets Induced Human Breast Cancer MDA-MB-435s Cells Hematogenous Metastasis

Authors: Yuping Liu, Li Tao, Yin Lu

Abstract:

Accumulating evidence has been shown that diallyl trisulfide (DATS) from garlic may reduce the risk of developing several types of cancer. In view of the dynamic crosstalk interplayed by tumor cells and platelets in hematogenous metastasis, we demonstrate the effectiveness of DATS on the metastatic behaviors of MDA-MB-435s human breast cancer cell line co-incubated with activated platelets. Indeed, our data identified that DATS significantly blocked platelets fouction induced by PAF, followed by the decreased production of TXB2. DATS was found to dose-dependently suppressed MDA-MB-435s cell migration and invasion in presence of activated platelets by PAF in vitro. Furthermore, the expression, secretion and enzymatic activity of matrix metalloproteinase (MMP)-2/9, as well as the luciferase activity of upstream regulator NF-κB in MDA-MB-435s, were obviously diminished by DATS. In parallel, DATS blocked upstream NF-κB activation signaling complexes composed of extracellular signal-related kinase (ERK) as assessed by measuring the levels of the phosphorylated forms.

Keywords: DATS, ERK, metastasis, MMPs, NF-κB, platelet

Procedia PDF Downloads 386
7245 Examination of How Do Smart Watches Influence the Market of Luxury Watches with Particular Regard of the Buying-Reasons

Authors: Christopher Benedikt Jakob

Abstract:

In our current society, there is no need to take a look at the wristwatch to know the exact time. Smartphones, the watch in the car or the computer watch, inform us about the time too. Over hundreds of years, luxury watches have held a fascination for human beings. Consumers buy watches that cost thousands of euros, although they could buy much cheaper watches which also fulfill the function to indicate the correct time. This shows that the functional value has got a minor meaning with reference to the buying-reasons as regards luxury watches. For a few years, people have an increased demand to track data like their walking distance per day or to track their sleep for example. Smart watches enable consumers to get information about these data. There exists a trend that people intend to optimise parts of their social life, and thus they get the impression that they are able to optimise themselves as human beings. With the help of smart watches, they are able to optimise parts of their productivity and to realise their targets at the same time. These smart watches are also offered as luxury models, and the question is: how will customers of traditional luxury watches react? Therefore this study has the intention to give answers to the question why people are willing to spend an enormous amount of money on the consumption of luxury watches. The self-expression model, the relationship basis model, the functional benefit representation model and the means-end-theory are chosen as an appropriate methodology to find reasons why human beings purchase specific luxury watches and luxury smart watches. This evaluative approach further discusses these strategies concerning for example if consumers buy luxury watches/smart watches to express the current self or the ideal self and if human beings make decisions on expected results. The research critically evaluates that relationships are compared on the basis of their advantages. Luxury brands offer socio-emotional advantages like social functions of identification and that the strong brand personality of luxury watches and luxury smart watches helps customers to structure and retrieve brand awareness which simplifies the process of decision-making. One of the goals is to identify if customers know why they like specific luxury watches and dislike others although they are produced in the same country and cost comparable prices. It is very obvious that the market for luxury watches especially for luxury smart watches is changing way faster than it has been in the past. Therefore the research examines the market changing parameters in detail.

Keywords: buying-behaviour, brand management, consumer, luxury watch, smart watch

Procedia PDF Downloads 210
7244 Organizational Climate being Knowledge Sharing Oriented: A Fuzzy-Set Analysis

Authors: Paulo Lopes Henriques, Carla Curado

Abstract:

According to literature, knowledge sharing behaviors are influenced by organizational values and structures, namely organizational climate. The manuscript examines the antecedents of the knowledge sharing oriented organizational climate. According to theoretical expectations the study adopts the following explanatory conditions: knowledge sharing costs, knowledge sharing incentives, perceptions of knowledge sharing contributing to performance and tenure. The study confronts results considering two groups of firms: nondigital (firms without intranet) vs digital (firms with intranet). The paper applies fsQCA technique to analyze data by using fsQCA 2.5 software (www.fsqca.com) testing several conditional arguments to explain the outcome variable. Main results strengthen claims on the relevancy of the contribution of knowledge sharing to performance. Secondly, evidence brings tenure - an explanatory condition that is associated to organizational memory – to the spotlight. The study provides an original contribution not previously addressed in literature, since it identifies the sufficient conditions sets to knowledge sharing oriented organizational climate using fsQCA, which is, to our knowledge, a novel application of the technique.

Keywords: fsQCA, knowledge sharing oriented organizational climate, knowledge sharing costs, knowledge sharing incentives

Procedia PDF Downloads 328
7243 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 44
7242 The System of Uniform Criteria for the Characterization and Evaluation of Elements of Economic Structure: The Territory, Infrastructure, Processes, Technological Chains, the End Products

Authors: Aleksandr A. Gajour, Vladimir G. Merzlikin, Vladimir I. Veselov

Abstract:

This paper refers to the analysis of the characteristics of industrial and lifestyle facilities heat- energy objects as a part of the thermal envelope of Earth's surface for inclusion in any database of economic forecasting. The idealized model of the Earth's surface is discussed. This model gives the opportunity to obtain the energy equivalent for each element of terrain and world ocean. Energy efficiency criterion of comfortable human existence is introduced. Dynamics of changes of this criterion offers the possibility to simulate the possible technogenic catastrophes with the spontaneous industrial development of the certain Earth areas. Calculated model with the confirmed forecast of the Gulf Stream freezing in the polar regions in 2011 due to the heat-energy balance disturbance for the oceanic subsurface oil polluted layer is given. Two opposing trends of human development under limited and unlimited amount of heat-energy resources are analyzed.

Keywords: Earth's surface, heat-energy consumption, energy criteria, technogenic catastrophes

Procedia PDF Downloads 402
7241 Design and Implementation of Automated Car Anti-Collision System Device Using Distance Sensor

Authors: Mehrab Masayeed Habib, Tasneem Sanjana, Ahmed Amin Rumel

Abstract:

Automated car anti-collision system is a trending technology of science. A car anti-collision system is an automobile safety system. The aim of this paper was to describe designing a car anti-collision system device to reduce the severity of an accident. The purpose of this device is to prevent collision among cars and objects to reduce the accidental death of human. This project gives an overview of secure & smooth journey of car as well as the certainty of human life. This system is controlled by microcontroller PIC. Sharp distance sensor is used to detect any object within the danger range. A crystal oscillator is used to produce the oscillation and generates the clock pulse of the microcontroller. An LCD is used to give information about the safe distance and a buzzer is used as alarm. An actuator is used as automatic break and inside the actuator; there is a motor driver that runs the actuator. For coding ‘microC PRO for PIC’ was used and ’Proteus Design Suite version 8 Software’ was used for simulation.

Keywords: sharp distance sensor, microcontroller, MicroC PRO for PIC, proteus, actuator, automobile anti-collision system

Procedia PDF Downloads 474
7240 Characterisation of Human Attitudes in Software Requirements Elicitation

Authors: Mauro Callejas-Cuervo, Andrea C. Alarcon-Aldana

Abstract:

It is evident that there has been progress in the development and innovation of tools, techniques and methods in the development of software. Even so, there are few methodologies that include the human factor from the point of view of motivation, emotions and impact on the work environment; aspects that, when mishandled or not taken into consideration, increase the iterations in the requirements elicitation phase. This generates a broad number of changes in the characteristics of the system during its developmental process and an overinvestment of resources to obtain a final product that, often, does not live up to the expectations and needs of the client. The human factors such as emotions or personality traits are naturally associated with the process of developing software. However, most of these jobs are oriented towards the analysis of the final users of the software and do not take into consideration the emotions and motivations of the members of the development team. Given that in the industry, the strategies to select the requirements engineers and/or the analysts do not take said factors into account, it is important to identify and describe the characteristics or personality traits in order to elicit requirements effectively. This research describes the main personality traits associated with the requirements elicitation tasks through the analysis of the existing literature on the topic and a compilation of our experiences as software development project managers in the academic and productive sectors; allowing for the characterisation of a suitable profile for this job. Moreover, a psychometric test is used as an information gathering technique, and it is applied to the personnel of some local companies in the software development sector. Such information has become an important asset in order to make a comparative analysis between the degree of effectiveness in the way their software development teams are formed and the proposed profile. The results show that of the software development companies studied: 53.58% have selected the personnel for the task of requirements elicitation adequately, 37.71% possess some of the characteristics to perform the task, and 10.71% are inadequate. From the previous information, it is possible to conclude that 46.42% of the requirements engineers selected by the companies could perform other roles more adequately; a change which could improve the performance and competitiveness of the work team and, indirectly, the quality of the product developed. Likewise, the research allowed for the validation of the pertinence and usefulness of the psychometric instrument as well as the accuracy of the characteristics for the profile of requirements engineer proposed as a reference.

Keywords: emotions, human attitudes, personality traits, psychometric tests, requirements engineering

Procedia PDF Downloads 263
7239 Absenteeism of Nursing Staff in Emergency Care Units of a City in the Interior of SãO Paulo

Authors: B. P. G. Figueira, I. C. Pinto, D. Ferro, F. C. M. Zacharias

Abstract:

The absenteeism at work constitutes in a temporary absence of labor functions resulting from various reasons, bringing damage to production, increasing costs of care and overburdening other workers, has its principal cause due to illness, often due exposure to several risks in the workplace. This study aims to know, identify and analyze the types and causes of absenteeism, such as the frequency at which it occurs by professional category, for employment contract and days not worked in Emergency Care Public in a city in the interior of São Paulo. We conducted exploratory and descriptive study with a quantitative approach, with nursing professionals, after selection of inclusion criteria was reached a universe of 208 subjects, the data collected are for the years from 2010-2013. Research has shown that the professional category of nursing assistant had 88,11% of total absenteeism, absenteeism lasting 1 day was the with the highest frequency, the women were responsible for 74,80% of absenteeism disease. It was concluded that absenteeism shall be monitored to plan control actions, establishing better political for the management of human resources, because it can be an aggravating factor in the quality of care.

Keywords: absenteeism; nursing; emergency medical services, human resource

Procedia PDF Downloads 326
7238 Determination of Micronutrients in the Fruit of Cydonia oblonga Miller

Authors: Madrakhimova Sakhiba, Matmurotov Bakhtishod, Boltaboyava Zilola, Matchanov Alimjan

Abstract:

Analyzing the chemical composition of locally consumed food products is one of the urgent problems in the health sector today. Taking this into account, it analyzed the microelement content of Cydonia oblonga Miller (COM) fruit growing in the Republic of Uzbekistan using the ISP MS inductively coupled mass spectrometry method. fruits brought to a constant mass in the analysis were mineralized in a mixture of nitric acid-HNO₃ and hydrogen peroxide-H₂O₂ in a ratio of 3:2. The mineralized extract was diluted to 50 milliliters with double-distilled water and analyzed. The results of the analysis showed that the fruit is rich in micronutrients necessary for the human body, especially potassium-K and phosphorus-P among macroelements, Strontium-Sr and barium-Ba from microelements are more than other microelements. It was observed that the amount of trace elements contained in COM fruit does not exceed the permissible standards. Therefore, it can be recommended to eat this fruit every day to prevent various diseases that occur in the human body.

Keywords: cydonia oblonga miller, macroelement, microelement, inductively coupled mass spectrometry, hydrolysis, mineralization

Procedia PDF Downloads 72
7237 Responsibility to Protect and State Sovereignty: The Case of Syria

Authors: Renu Kumari

Abstract:

State sovereignty refers to the ability and power of a state to be independent and not to have any interference of external actors in its internal affairs. This phenomenon has been accepted by International Law, which gives rights to the state to maintain its autonomy and territorial integrity without the interference of other actors. In of 1980’s and 1990’s the world has witnessed the worst case of human rights violence for instance, Rwanda genocide, the conflict in former Yugoslavia, Kosovo, Burundi, and Chad so and so forth. Though human rights violence is not a new phenomenon, it has been present all over the world in different time and space. But in 1990’s after the devastation of these conflicts and violence the world community came up with the notion of humanitarian intervention in which some states took the responsibility of protecting human rights violations and on the in order to protect they can intervene in the internal matters of a state specifically during civil war where state is unable to protect its people. Later on these so-called world community realized that intervention itself is a negative term that was criticized also therefore they came up with a different notion that sounded positive which known as responsibility to protect. In 2005 onwards, the notion of responsibility to protect accepted and recognized by the United Nations and states at a larger level. In the case of Syria on the name of responsibility to protect foreign interventions took place and due to the internal war Syrian people were already facing many problems, the government was not able to protect them. External invasion caused many devastating outcomes to the country. This paper is an attempt to analyze various dimensions of invasion of external affairs of a particular state and the status of sovereignty. Firstly, it lays out the notion of humanitarian intervention and then the responsibility to protect. Secondly, it looks in the case of Syria since 2011, the conflict of Syria. Thirdly it focuses on various efforts made by international organizations and other actors. Lastly, it looks why and how other actors intervene in the internal matter of Syria.

Keywords: state sovereignty, external actors, intervention, responsibility to protect

Procedia PDF Downloads 169
7236 Assessing Firm Readiness to Implement Cloud Computing: Toward a Comprehensive Model

Authors: Seyed Mohammadbagher Jafari, Elahe Mahdizadeh, Masomeh Ghahremani

Abstract:

Nowadays almost all organizations depend on information systems to run their businesses. Investment on information systems and their maintenance to keep them always in best situation to support firm business is one of the main issues for every organization. The new concept of cloud computing was developed as a technical and economic model to address this issue. In cloud computing the computing resources, including networks, applications, hardwares and services are configured as needed and are available at the moment of request. However, migration to cloud is not an easy task and there are many issues that should be taken into account. This study tries to provide a comprehensive model to assess a firm readiness to implement cloud computing. By conducting a systematic literature review, four dimensions of readiness were extracted which include technological, human, organizational and environmental dimensions. Every dimension has various criteria that have been discussed in details. This model provides a framework for cloud computing readiness assessment. Organizations that intend to migrate to cloud can use this model as a tool to assess their firm readiness before making any decision on cloud implementation.

Keywords: cloud computing, human readiness, organizational readiness, readiness assessment model

Procedia PDF Downloads 395
7235 Antiproliferative Effect of Polyphenols from Crocus sativus L. Leaves on Human Colon Adenocarcinoma Cells (Caco-2)

Authors: Gonzalo Ortiz de Elguea-Culebras, Raúl Sánchez-Vioquea, Adela Mena-Morales, Manuel Alaiz, Enrique Melero-Bravo, Esteban García-Romero, Javier Vioque, Lourdes Marchante-Cuevas, Julio Girón-Calle

Abstract:

Saffron (Crocus sativus L.) is a highly valued crop for the manufacture of spice that consists of the dried stigma of the flowers. This is in contrast to other underutilized parts of the saffron plant as leaves, which represent abundant biomass whose use might help to enhance the sustainability of the saffron crop. Saffron leaves contain significant amounts of phenolic compounds, 7.8 equivalent grams of gallic acid per 100g of extract, and are very promising compounds in terms of exploring novel uses of saffron leaves. Given that phenolic compounds have numerous effects on cancer-related biological pathways, we have investigated the in vitro antiproliferative effect of saffron leaf polyphenols against human colon adenocarcinoma cells (Caco-2). Polyphenols were extracted from leaves with 70% ethanol, defatted with hexane, and purified by solid phase extraction using C18 silica gel and then silica gel 60. Analysis of polyphenols was performed by HPLC-ESI-MS. Di-, tri-, and tetrahexosides of quercetin, kaempferol, and isorhamnetin, as well as C-hexosides like isoorientin and vitexin, were tentatively identified. Polyphenols strongly inhibited the proliferation of Caco-2 cells, which is consistent with model studies in which several of the polyphenols identified in saffron leaves have demonstrated their potential as chemopreventive agents in cancer. Due to the low profitability that saffron leaf currently represents, we consider these results very encouraging and that this by-product deserves further investigation as a potential source of active molecules against colorectal cancer.

Keywords: saffron leaves, agricultural by-products, polyphenols, antiproliferative effect, human colon adenocarcinoma cells

Procedia PDF Downloads 95
7234 ADCOR © Muscle Damage Rapid Detection Test Based on Skeletal Troponin I Immunochromatography Reaction

Authors: Muhammad Solikhudin Nafi, Wahyu Afif Mufida, Mita Erna Wati, Fitri Setyani Rokim, M. Al-Rizqi Dharma Fauzi

Abstract:

High dose activity without any pre-exercise will impact Delayed Onset Muscle Soreness (DOMS). DOMS known as delayed pain post-exercise and induce skeletal injury which will decrease athletes’ performances. From now on, post-exercise muscle damage can be detected by measuring skeletal troponin I (sTnI) concentration in serum using ELISA but this method needs more time and cost. To prevent decreased athletes performances, screening need to be done rapidly. We want to introduce our new prototype to detect DOMS acutely. Rapid detection tests are based on immunological reaction between skeletal troponin I antibodies and sTnI in human serum or whole blood. Chemical methods that are used in the manufacture of diagnostic test is lateral flow immunoassay. The material used is rat monoclonal antibody sTnI, colloidal gold, anti-mouse IgG, nitrocellulose membrane, conjugate pad, sample pad, wick and backing card. The procedure are made conjugate (colloidal gold and mAb sTnI) and insert into the conjugate pad, gives spray sTnI mAb and anti-mouse IgG into nitrocellulose membrane, and assemble RDT. RDT had been evaluated by measuring the sensitivity of positive human serum (n = 30) and negative human serum (n = 30). Overall sensitivity value was 93% and specificity value was 90%. ADCOR as the first rapid detection test qualitatively showed antigen-antibody reaction and showed good overall performances for screening of muscle damage. Furthermore, these finding still need more improvements to get best results.

Keywords: DOMS, sTnI, rapid detection test, ELISA

Procedia PDF Downloads 513
7233 Hong Kong Chinese-Speaking Adolescents Diagnosed with Dyslexia: What Is and Is Not Improved?

Authors: Kevin Kien Hoa Chung

Abstract:

The present study was to investigate cognitive-linguistic skills that might distinguish the improved dyslexics from the non-improved dyslexics. Twenty-eight improved dyslexics and 28 non-improved dyslexics were selected from a pool of 254 students diagnosed as dyslexics in Grade 1 to 2. These students were administered measures: morphological skills, visual-orthographic skills, rapid naming skills, working memory, reading comprehension, writing, word reading, word dictation, and one-minute word reading. Findings showed that the improved dyslexics performed better than the non-improved dyslexics in visual-orthographic skills, word reading, one-minute reading, writing, and reading comprehension. Furthermore, the improved dyslexics showed fewer cognitive-linguistic deficits compared with the non-improved dyslexics. Among the 4 cognitive-linguistic measures, morphological skills and visual-orthographic skills showed the greatest power in discriminating the improved and non-improved dyslexics. Results underscore the importance of cognitive-linguistic skills underlying the manifestations of the improved and non-improved dyslexia in Chinese adolescents.

Keywords: adolescents, chinese language, improved dyslexics, non-improved dyslexics

Procedia PDF Downloads 391
7232 Road Safety and Accident Prevention in Third World Countries: A Case Study of NH-7 in India

Authors: Siddegowda, Y. A. Sathish, G. Krishnegowda, T. M. Mohan Kumar

Abstract:

Road accidents are a human tragedy. They involve high human suffering and monetary costs in terms of untimely death, injuries and social problems. India had earned the dubious distinction of having more number of fatalities due to road accidents in the world. Road safety is emerging as a major social concern around the world especially in India because of infrastructure project works. A case study was taken on NH – 07 which connects to various major cities and industries. The study shows that major cases of fatalities are due to bus, trucks and high speed vehicles. The main causes of accidents are due to high density, non-restriction of speed, use of mobile phones, lack of board signs on road parking, visibility restriction, improper geometric design, road use characteristics, environmental aspects, social aspects etc. Data analysis and preventive measures are enlightened in this paper.

Keywords: accidents, environmental aspects, fatalities, geometric design, road user characteristics

Procedia PDF Downloads 255
7231 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 427