Search results for: World Heritage
6111 Water Purification By Novel Nanocomposite Membrane
Authors: E. S. Johal, M. S. Saini, M. K. Jha
Abstract:
Currently, 1.1 billion people are at risk due to lack of clean water and about 35 % of people in the developed world die from water related problem. To alleviate these problems water purification technology requires new approaches for effective management and conservation of water resources. Electrospun nanofibres membrane has a potential for water purification due to its high large surface area and good mechanical strength. In the present study PAMAM dendrimers composite nynlon-6 nanofibres membrane was prepared by crosslinking method using Glutaraldehyde. Further, the efficacy of the modified membrane can be renewed by mere exposure of the saturated membrane with the solution having acidic pH. The modified membrane can be used as an effective tool for water purification.Keywords: dendrimer, nanofibers, nanocomposite membrane, water purification
Procedia PDF Downloads 3546110 A Critical Examination of the Iranian National Legal Regulation of the Ecosystem of Lake Urmia
Authors: Siavash Ostovar
Abstract:
The Iranian national Law on the Ramsar Convention (officially known as the Convention of International Wetlands and Aquatic Birds' Habitat Wetlands) was approved by the Senate and became a law in 1974 after the ratification of the National Council. There are other national laws with the aim of preservation of environment in the country. However, Lake Urmia which is declared a wetland of international importance by the Ramsar Convention in 1971 and designated a UNESCO Biosphere Reserve in 1976 is now at the brink of total disappearance due mainly to the climate change, water mismanagement, dam construction, and agricultural deficiencies. Lake Urmia is located in the north western corner of Iran. It is the third largest salt water lake in the world and the largest lake in the Middle East. Locally, it is designated as a National Park. It is, indeed, a unique lake both nationally and internationally. This study investigated how effective the national legal regulation of the ecosystem of Lake Urmia is in Iran. To do so, the Iranian national laws as Enforcement of Ramsar Convention in the country including three nationally established laws of (i) Five sets of laws for the programme of economic, social and cultural development of Islamic Republic of Iran, (ii) The Iranian Penal Code, (iii) law of conservation, restoration and management of the country were investigated. Using black letter law methods, it was revealed that (i) regarding the national five sets of laws; the benchmark to force the implementation of the legislations and policies is not set clearly. In other words, there is no clear guarantee to enforce these legislations and policies at the time of deviation and violation; (ii) regarding the Penal Code, there is lack of determining the environmental crimes, determining appropriate penalties for the environmental crimes, implementing those penalties appropriately, monitoring and training programmes precisely; (iii) regarding the law of conservation, restoration and management, implementation of this regulation is adjourned to preparation, announcement and approval of several categories of enactments and guidelines. In fact, this study used a national environmental catastrophe caused by drying up of Lake Urmia as an excuse to direct the attention to the weaknesses of the existing national rules and regulations. Finally, as we all depend on the natural world for our survival, this study recommended further research on every environmental issue including the Lake Urmia.Keywords: conservation, environmental law, Lake Urmia, national laws, Ramsar Convention, water management, wetlands
Procedia PDF Downloads 1996109 Topological Analyses of Unstructured Peer to Peer Systems: A Survey
Authors: Hend Alrasheed
Abstract:
Due to their different properties that have led to avoid several limitations of classic client/server systems, there has been a great interest in the development and the improvement of different peer to peer systems. Understanding the properties of complex peer to peer networks is essential for their future improvements. It was shown that the performances of peer to peer protocols are directly related to their underlying topologies. Therefore, multiple efforts have analyzed the topologies of different peer to peer systems. This study presents an overview of major findings of close experimental analyses to different topologies of three unstructured peer to peer systems: BitTorrent, Gnutella, and FreeNet.Keywords: peer to peer networks, network topology, graph diameter, clustering coefficient, small-world property, random graph, degree distribution
Procedia PDF Downloads 3806108 Media Engagement and Ethnic Identity: The Case of the Aeta Ambala of Pastolan Village
Authors: Kriztine R. Viray, Chona Rita R. Cruz
Abstract:
The paper explores the engagement of indigenous group, Aeta Ambala with different media and how this engagement affects their perception of their own ethnic identity. The researchers employed qualitative research as their approach and descriptive research method as their design. The paper integrates two theories. These are communication theory of identity by Michael Hecht and the Uses and Gratification Theory of Katz, Blumler, and Gurevitch. Among others, the paper exposes that the engagement of the Aeta-Ambala with the various forms of media certainly affected the way they perceived the outside world and their own ethnic group.Keywords: Aeta Ambala, culture, ethnic, media engagement, Philippines
Procedia PDF Downloads 4936107 Effective Teaching of Thermofluid Pratical Courses during COVID-19
Authors: Opeyemi Fadipe, Masud Salimian
Abstract:
The COVID-19 pandemic has introduced a new normal into the world; online teaching is now the most used method of teaching over the face to face meeting. With the emergency of these teaching, online-teaching has been improved over time and with more technological advancement tools introduced. Practical courses are more demanding to teach because it requires the physical presence of the student as well as a demonstration of the equipment. In this study, a case of Lagos State University thermofluid practical was the understudy. A survey was done and give to a sample of students to fill. The result showed that the blend-approach is better for practical course teaching. Software simulation of the equipment used to conduct practical should be encouraged in the future.Keywords: COVID-19, online teaching, t-distribution, thermofluid
Procedia PDF Downloads 1766106 Cyrus Cylinder; A Law for His Future Time
Authors: Hasanzadeh Mehran
Abstract:
The Cyrus Cylinder, which is a baked clay tablet, was written in 539 BC by order of the Achaemenid king Cyrus. This clay tablet contains orders and is considered a historical document of the humanitarian behaviour of the victorious army during the conquest of Babylon. Some believe that these laws are the first declaration of human rights in the ancient world. After the conquest of Babylon, Cyrus created laws that had never been seen anywhere in history. For this reason, in this article it has been tried to mention the human aspects and the reasons and grounds for the formation of such laws at that time. The origin of the creation of these progressive and humanitarian laws in the Cyrus cylinder should be sought in the cultural roots of civilization and his social and individual teachings.Keywords: Iran, cyrus, cyrus cylinder, human rights
Procedia PDF Downloads 936105 Impact of Instrument Transformer Secondary Connections on Performance of Protection System: Experiences from Indian POWERGRID
Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh, Sandeep Yadav
Abstract:
Protective relays are commonly connected to the secondary windings of instrument transformers, i.e., current transformers (CTs) and/or capacitive voltage transformers (CVTs). The purpose of CT and CVT is to provide galvanic isolation from high voltages and reduce primary currents and voltages to a nominal quantity recognized by the protective relays. Selecting the correct instrument transformers for an application is imperative: failing to do so may compromise the relay’s performance, as the output of the instrument transformer may no longer be an accurately scaled representation of the primary quantity. Having an accurately rated instrument transformer is of no use if these devices are not properly connected. The performance of the protective relay is reliant on its programmed settings and on the current and voltage inputs from the instrument transformers secondary. This paper will help in understanding the fundamental concepts of the connections of Instrument Transformers to the protection relays and the effect of incorrect connection on the performance of protective relays. Multiple case studies of protection system mal-operations due to incorrect connections of instrument transformers will be discussed in detail in this paper. Apart from the connection issue of instrument transformers to protective relays, this paper will also discuss the effect of multiple earthing of CTs and CVTs secondary on the performance of the protection system. Case studies presented in this paper will help the readers to analyse the problem through real-world challenges in complex power system networks. This paper will also help the protection engineer in better analysis of disturbance records. CT and CVT connection errors can lead to undesired operations of protection systems. However, many of these operations can be avoided by adhering to industry standards and implementing tried-and-true field testing and commissioning practices. Understanding the effect of missing neutral of CVT, multiple earthing of CVT secondary, and multiple grounding of CT star points on the performance of the protection system through real-world case studies will help the protection engineer in better commissioning the protection system and maintenance of the protection system.Keywords: bus reactor, current transformer, capacitive voltage transformer, distance protection, differential protection, directional earth fault, disturbance report, instrument transformer, ICT, REF protection, shunt reactor, voltage selection relay, VT fuse failure
Procedia PDF Downloads 816104 Women, Culture and Ambiguity: Postcolonial Feminist Critique of Lobola in African Culture and Society
Authors: Goodness Thandi Ntuli
Abstract:
Some cultural aspects in the African context have a tendency of uplifting women while some thrust them into the worst denigration scenarios; hence African Women Theologians refer to culture as a ‘double edged sword. Through socialization and internalization of social norms, some women become custodians of life, denying aspects of the culture that are against them and hand them down to the next generation. This indirectly contributes to the perpetuation of patriarchal tendencies wherein women themselves uphold and endorse such tendencies to their own detriment. One of the findings of the empirical research study conducted among the Zulu young women in the South African context was that, on the one hand, lobola (the bride-price) is one of the cultural practices that contribute a great deal in the vilification of women. On the other hand, a woman whose lobola has been paid is highly esteemed in the cultural context not only by society at large but also by the implicated woman who takes pride in it. Consequently, lobola becomes an ambiguous cultural practice. Thus from the postcolonial feminist perspective, this paper examines and critiques lobola practice while also disclosing and exposing its deep seated cultural reinforcement that is life denying to women. The paper elucidates the original lobola as a cultural practice before colonization and how it became commercialized during colonial times. With commercialization in the modern world, lobola has completely lost its preliminary meaning and ceased to be a life-giving cultural practice, particularly for women. It turned out to be the worst cultural practice that demeans women to the extent that it becomes suicidal to women dignity because, in marriage, they become objects or property to the men who purchased them. Women objectification in marriage does not only leave them culturally trapped in what was perceived to be a good practice, but it also leads to women abuse and gender based or domestic violence. The research has indicated that this kind of violence is escalating and has become so pervasive in the South African context that the country is rated as one of the capital cities of violence against women in the world. Therefore, this paper demonstrates how cultural practices at times indirectly contribute to this national scourge that needs to be condemned, disparaged and rejected. Women in the African context where such cultural activities are still viewed as a norm are in desperate need for true liberation from such ambiguous cultural practices that leave them in the margins in spite of the earned social status they might have achieved.Keywords: african, ambiguity, critique, culture, feminist, lobola, postcolonial, society
Procedia PDF Downloads 1996103 The Intersection of Artificial Intelligence and Mathematics
Authors: Mitat Uysal, Aynur Uysal
Abstract:
Artificial Intelligence (AI) is fundamentally driven by mathematics, with many of its core algorithms rooted in mathematical principles such as linear algebra, probability theory, calculus, and optimization techniques. This paper explores the deep connection between AI and mathematics, highlighting the role of mathematical concepts in key AI techniques like machine learning, neural networks, and optimization. To demonstrate this connection, a case study involving the implementation of a neural network using Python is presented. This practical example illustrates the essential role that mathematics plays in training a model and solving real-world problems.Keywords: AI, mathematics, machine learning, optimization techniques, image processing
Procedia PDF Downloads 136102 Mathematics as the Foundation for the STEM Disciplines: Different Pedagogical Strategies Addressed
Authors: Marion G. Ben-Jacob, David Wang
Abstract:
There is a mathematics requirement for entry level college and university students, especially those who plan to study STEM (Science, Technology, Engineering and Mathematics). Most of them take College Algebra, and to continue their studies, they need to succeed in this course. Different pedagogical strategies are employed to promote the success of our students. There is, of course, the Traditional Method of teaching- lecture, examples, problems for students to solve. The Emporium Model, another pedagogical approach, replaces traditional lectures with a learning resource center model featuring interactive software and on-demand personalized assistance. This presentation will compare these two methods of pedagogy and the study done with its results on this comparison. Math is the foundation for science, technology, and engineering. Its work is generally used in STEM to find patterns in data. These patterns can be used to test relationships, draw general conclusions about data, and model the real world. In STEM, solutions to problems are analyzed, reasoned, and interpreted using math abilities in a assortment of real-world scenarios. This presentation will examine specific examples of how math is used in the different STEM disciplines. Math becomes practical in science when it is used to model natural and artificial experiments to identify a problem and develop a solution for it. As we analyze data, we are using math to find the statistical correlation between the cause of an effect. Scientists who use math include the following: data scientists, scientists, biologists and geologists. Without math, most technology would not be possible. Math is the basis of binary, and without programming, you just have the hardware. Addition, subtraction, multiplication, and division is also used in almost every program written. Mathematical algorithms are inherent in software as well. Mechanical engineers analyze scientific data to design robots by applying math and using the software. Electrical engineers use math to help design and test electrical equipment. They also use math when creating computer simulations and designing new products. Chemical engineers often use mathematics in the lab. Advanced computer software is used to aid in their research and production processes to model theoretical synthesis techniques and properties of chemical compounds. Mathematics mastery is crucial for success in the STEM disciplines. Pedagogical research on formative strategies and necessary topics to be covered are essential.Keywords: emporium model, mathematics, pedagogy, STEM
Procedia PDF Downloads 756101 Evil Eye's Effects on Individual's Mental Health
Authors: Nikolaos Souvlakis
Abstract:
One of the prominent phenomena that have survived even in the 21st century, when science is gaining more and more space in the scientific world, is the evil eye within non-Westernized societies and more specifically in Greek culture. The presentation is based on the Christian Orthodox beliefs and folklore about the evil eye. Evil eye occupies an important role in individuals' everyday life and it is fuelled by Satanic powers. Satanic powers and the belief on them have an immense effect on individual's well-being and mental health causing spiritual suffering. The present paper examines the psychological manifestations of the belief of evil eye in individuals' mental health and the ways to protect from it according to the Greek Orthodox tradition.Keywords: spirituality, belief, evil eye, mental health, well-being, healing
Procedia PDF Downloads 5046100 Key Concepts of 5th Generation Mobile Technology
Authors: Magri Hicham, Noreddine Abghour, Mohamed Ouzzif
Abstract:
The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology.Keywords: WWWW, BDMA, DAWN, 5G, 4G, IPv6, Cloud Computing
Procedia PDF Downloads 5136099 Ensemble Methods in Machine Learning: An Algorithmic Approach to Derive Distinctive Behaviors of Criminal Activity Applied to the Poaching Domain
Authors: Zachary Blanks, Solomon Sonya
Abstract:
Poaching presents a serious threat to endangered animal species, environment conservations, and human life. Additionally, some poaching activity has even been linked to supplying funds to support terrorist networks elsewhere around the world. Consequently, agencies dedicated to protecting wildlife habitats have a near intractable task of adequately patrolling an entire area (spanning several thousand kilometers) given limited resources, funds, and personnel at their disposal. Thus, agencies need predictive tools that are both high-performing and easily implementable by the user to help in learning how the significant features (e.g. animal population densities, topography, behavior patterns of the criminals within the area, etc) interact with each other in hopes of abating poaching. This research develops a classification model using machine learning algorithms to aid in forecasting future attacks that is both easy to train and performs well when compared to other models. In this research, we demonstrate how data imputation methods (specifically predictive mean matching, gradient boosting, and random forest multiple imputation) can be applied to analyze data and create significant predictions across a varied data set. Specifically, we apply these methods to improve the accuracy of adopted prediction models (Logistic Regression, Support Vector Machine, etc). Finally, we assess the performance of the model and the accuracy of our data imputation methods by learning on a real-world data set constituting four years of imputed data and testing on one year of non-imputed data. This paper provides three main contributions. First, we extend work done by the Teamcore and CREATE (Center for Risk and Economic Analysis of Terrorism Events) research group at the University of Southern California (USC) working in conjunction with the Department of Homeland Security to apply game theory and machine learning algorithms to develop more efficient ways of reducing poaching. This research introduces ensemble methods (Random Forests and Stochastic Gradient Boosting) and applies it to real-world poaching data gathered from the Ugandan rain forest park rangers. Next, we consider the effect of data imputation on both the performance of various algorithms and the general accuracy of the method itself when applied to a dependent variable where a large number of observations are missing. Third, we provide an alternate approach to predict the probability of observing poaching both by season and by month. The results from this research are very promising. We conclude that by using Stochastic Gradient Boosting to predict observations for non-commercial poaching by season, we are able to produce statistically equivalent results while being orders of magnitude faster in computation time and complexity. Additionally, when predicting potential poaching incidents by individual month vice entire seasons, boosting techniques produce a mean area under the curve increase of approximately 3% relative to previous prediction schedules by entire seasons.Keywords: ensemble methods, imputation, machine learning, random forests, statistical analysis, stochastic gradient boosting, wildlife protection
Procedia PDF Downloads 2906098 Realization of Sustainable Urban Society by Personal Electric Transporter and Natural Energy
Authors: Yuichi Miyamoto
Abstract:
In regards to the energy sector in the modern period, two points were raised. First is a vast and growing energy demand, and second is an environmental impact associated with it. The enormous consumption of fossil fuel to the mobile unit is leading to its rapid depletion. Nuclear power is not the only problem. A modal shift that utilizes personal transporters and independent power, in order to realize a sustainable society, is very effective. The paper proposes that the world will continue to work on this. Energy of the future society, innovation in battery technology and the use of natural energy is a big key. And it is also necessary in order to save on energy consumption.Keywords: natural energy, modal shift, personal transportation, battery
Procedia PDF Downloads 4056097 European Countries Challenge’s in Value Added Tax
Authors: Fatbardha Kadiu, Nulifer Caliskan
Abstract:
The value added tax came as a necessity of substituting the old tax on sales. Based on the advantages of this new tax in our days it is used successfully in more than 140 countries around the world. The aim of the paper is to describe the nature of this tax with its advantages and disadvantages. Also it will describe the way how it functions in most of the European countries and the actual challenges of these countries on value added tax. It will be present the types of goods which are exempt from this tax, the reasons and the consequences of those exemptions. The paper will be based on secondary data taken from respective literature. An econometric model will be present in order to identify the dependence of value tax from other parameters. The analyzing most refers to the two main principles of harmonization and billing on the fiscal system and the ways how to restructures the system in order to minimize the fiscal evasion.Keywords: value added tax, revenues, complexity, legal uncertainty
Procedia PDF Downloads 3976096 Artificial Intelligence Aided Improvement in Canada's Supply Chain Management
Authors: Mohammad Talebi
Abstract:
Supply chain administration could be a concern for all the countries within the world, whereas there's no special approach towards supportability. Generally, for one decade, manufactured insights applications in keen supply chains have found a key part. In this paper, applications of artificial intelligence in supply chain management have been clarified, and towards Canadian plans for smart supply chain management (SCM), a few notes have been suggested. A hierarchical framework for smart SCM might provide a great roadmap for decision-makers to find the most appropriate approach toward smart SCM. Within the system of decision-making, all the levels included in the accomplishment of smart SCM are included. In any case, more considerations are got to be paid to available and needed infrastructures.Keywords: smart SCM, AI, SSCM, procurement
Procedia PDF Downloads 886095 The Reality of Food Scarcity in Madhya Pradesh: Is It a Glimpse or Not?
Authors: Kalyan Sundar Som, Ghanshyam Prasad Jhariya
Abstract:
Population growth is an important pervasive phenomenon in the world. Its survival depends upon many daily needs and food is one of them. Population factors play a decisive role in the human endeavor to attain food. Nutrition and health status compose integral part of human development and progress of a society. Therefore, the neglect any one of these components may leads to the deterioration of the quality of life. Food is also intimately related with economic growth and social progress as well as with political stability and peace. It refers to the availability of food and its access to it. It can be observed from global to local level. Food scarcity has emerged as a matter of great concern all over the world due to uncontrolled and unregulated growth of population .For this purpose this study try to find out the deficit or surplus production of food availability in terms of their total population in the study area. It also ascertains the population pressure, demand and supply of food stuff and demarcation of insecure areas.The data base of the study under discussion includes government published data regarding agriculture production, yield and cropped area in 2005-06 to 2011-12 available at commissioner land record Madhya Pradesh, Gwalior. It also includes the census of India for population data. For measuring food security or insecurity regions is based on the consumption of net food available in terms caloric value minus the consumption by the weighted total population. This approach has been adopted because the direct estimate of production and consumption is the only reliable way to ascertain food security in a unit area and to compare one area with another (Noor Mohammad, dec. 2002). The scenario in 2005-06 is 57.78 percent district has food insufficient in terms of their population. On the other hand after 5 years, there are only 22 % districts are deficit in term of food availability where Burhanpur is the most deficit (56 percent) district. While 20% district are highly surplus district in the state where Harda and Hoshangabad districts are very high surplus district (5 times and 3.95 times) in term of food availability(2011). The drastic change (agriculture transformation) is happen due government good intervention in the agricultural sector.Keywords: agriculture transformation, caloric value method, deficit or surplus region, population pressure
Procedia PDF Downloads 4376094 Knowledge of Artificial Insemination and Agribusiness Management for Social Innovation in Rural Populations
Authors: Yasser Y. Lenis, Daniela Garcia Gonzalez, Cristian Solarte Bacca, Diego F. Carrillo González, Amy Jo Montgomery, Dursun Barrios
Abstract:
Introduction: Artificial insemination in bovines helps to promote genetic improvement and can positively impact the rural economy. The Colombian armed conflict has forced a large portion of the rural population to abandon their territory, affecting their education, family integration, and economics. Justification: The achievement of education in rural populations was one of the Millennium Development Goals (MDGs) made by the United Nations. During the last World Summit on Sustainable Development (WSSD), it was concluded that most of the world’s poor, illiterate and undernourished population lives in rural areas; therefore, access to education is considered one of the most significant challenges for governments in countries with developing economies. Objectives: To study the effects of training in artificial insemination and rural management on the perception of knowledge and the level of knowledge in rural residents affected by the armed conflict in Nariño, Colombia. Methods: The perception of knowledge and the theoretical-practical knowledge of 63 rural residents were evaluated on the topics of bovine agribusiness management, artificial insemination, and genetic improvement through the application of three surveys. 1) evaluated the perceived level of knowledge each rural resident had about each topic using the Likert scale, 2) evaluated the theoretical knowledge before training, and 3) evaluated the theoretical knowledge upon completion of training. Results/discussion: Of the surveyed rural residents, 54% stated that they knew how business management improved the performance of their bovine agribusiness, 54% answered the pre-training knowledge test correctly, while 83% correctly answered the post-training knowledge test. Only 6% of surveyed residents perceived that they had prior knowledge of artificial insemination and reproductive anatomy topics. Before training, 35% of surveyed residents answered correctly on these topics, while upon completion of training, 65% answered correctly. Regarding genetic improvement, 11% of participating rural residents stated that they knew this subject. The correct answers on this topic went from 57% to 89% before and post-training. Conclusion: Rural extension programs contribute to closing knowledge gaps in relation to the use of reproductive biotechnologies and bovine management in rural areas affected by armed conflict.Keywords: agribusiness, insemination, knowledge, reproduction
Procedia PDF Downloads 1766093 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship
Authors: Ken Munro
Abstract:
Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.Keywords: maritime security, cybersecurity, OT, IT, networks
Procedia PDF Downloads 316092 The Impact of Artificial Intelligence on Medicine Production
Authors: Yasser Ahmed Mahmoud Ali Helal
Abstract:
The use of CAD (Computer Aided Design) technology is ubiquitous in the architecture, engineering and construction (AEC) industry. This has led to its inclusion in the curriculum of architecture schools in Nigeria as an important part of the training module. This article examines the ethical issues involved in implementing CAD (Computer Aided Design) content into the architectural education curriculum. Using existing literature, this study begins with the benefits of integrating CAD into architectural education and the responsibilities of different stakeholders in the implementation process. It also examines issues related to the negative use of information technology and the perceived negative impact of CAD use on design creativity. Using a survey method, data from the architecture department of University was collected to serve as a case study on how the issues raised were being addressed. The article draws conclusions on what ensures successful ethical implementation. Millions of people around the world suffer from hepatitis C, one of the world's deadliest diseases. Interferon (IFN) is treatment options for patients with hepatitis C, but these treatments have their side effects. Our research focused on developing an oral small molecule drug that targets hepatitis C virus (HCV) proteins and has fewer side effects. Our current study aims to develop a drug based on a small molecule antiviral drug specific for the hepatitis C virus (HCV). Drug development using laboratory experiments is not only expensive, but also time-consuming to conduct these experiments. Instead, in this in silicon study, we used computational techniques to propose a specific antiviral drug for the protein domains of found in the hepatitis C virus. This study used homology modeling and abs initio modeling to generate the 3D structure of the proteins, then identifying pockets in the proteins. Acceptable lagans for pocket drugs have been developed using the de novo drug design method. Pocket geometry is taken into account when designing ligands. Among the various lagans generated, a new specific for each of the HCV protein domains has been proposed.Keywords: drug design, anti-viral drug, in-silicon drug design, hepatitis C virus (HCV) CAD (Computer Aided Design), CAD education, education improvement, small-size contractor automatic pharmacy, PLC, control system, management system, communication
Procedia PDF Downloads 816091 Prediction of Mental Health: Heuristic Subjective Well-Being Model on Perceived Stress Scale
Authors: Ahmet Karakuş, Akif Can Kilic, Emre Alptekin
Abstract:
A growing number of studies have been conducted to determine how well-being may be predicted using well-designed models. It is necessary to investigate the backgrounds of features in order to construct a viable Subjective Well-Being (SWB) model. We have picked the suitable variables from the literature on SWB that are acceptable for real-world data instructions. The goal of this work is to evaluate the model by feeding it with SWB characteristics and then categorizing the stress levels using machine learning methods to see how well it performs on a real dataset. Despite the fact that it is a multiclass classification issue, we have achieved significant metric scores, which may be taken into account for a specific task.Keywords: machine learning, multiclassification problem, subjective well-being, perceived stress scale
Procedia PDF Downloads 1296090 A Modest Proposal for Deep-Sixing Propositions in the Philosophy of Language
Authors: Patrick Duffley
Abstract:
Hanks (2021) identifies three Frege-inspired commitments concerning propositions that are widely shared across the philosophy of language: (1) propositions are the primary, inherent bearers of representational properties and truth-conditions; (2) propositions are neutral representations possessing a ‘content’ that is devoid of ‘force; (3) propositions can be entertained or expressed without being asserted. Hanks then argues that the postulate of neutral content must be abandoned, and the primary bearers of truth-evaluable representation must be identified as the token acts of assertoric predication that people perform when they are thinking or speaking about the world. Propositions are ‘types of acts of predication, which derive their representational features from their tokens.’ Their role is that of ‘classificatory devices that we use for the purposes of identifying and individuating mental states and speech acts,’ so that ‘to say that Russell believes that Mont Blanc is over 4000 meters high is to classify Russell’s mental state under a certain type, and thereby distinguish that mental state from others that Russell might possess.’ It is argued in this paper that there is no need to classify an utterance of 'Russell believes that Mont Blanc is over 4000 meters high' as a token of some higher-order utterance-type in order to identify what Russell believes; the meanings of the words themselves and the syntactico-semantic relations between them are sufficient. In our view what Hanks has accomplished in effect is to build a convincing argument for dispensing with propositions completely in the philosophy of language. By divesting propositions of the role of being the primary bearers of representational properties and truth-conditions and fittingly transferring this role to the token acts of predication that people perform when they are thinking or speaking about the world, he has situated truth in its proper place and obviated any need for abstractions like propositions to explain how language can express things that are true. This leaves propositions with the extremely modest role of classifying mental states and speech acts for the purposes of identifying and individuating them. It is demonstrated here however that there is no need whatsoever to posit such abstract entities to explain how people identify and individuate such states/acts. We therefore make the modest proposal that the term ‘proposition’ be stricken from the vocabulary of philosophers of language.Keywords: propositions, truth-conditions, predication, Frege, truth-bearers
Procedia PDF Downloads 656089 The Need for Career Education Based on Self-Esteem in Japanese Youths
Authors: Kumiko Inagaki
Abstract:
Because of the rapidly changing social and industrial world, career education in Japan has recently gained in popularity with the government’s support. However, it has not fostered proactive mindsets and attitudes in the youths. This paper first provides a background of career education in Japan. Next, based on the International Survey of Youth Attitude, Japanese youths’ views of themselves and their future were identified and then compared to the views of youths in six other countries. Assessments of the feelings of self-satisfaction and future hopes of Japanese youths returned very low scores. Suggestions were offered on career education in order to promote a positive self-image.Keywords: career education, self-esteem, self-image, youth attitude
Procedia PDF Downloads 4776088 Adding Security Blocks to the DevOps Lifecycle
Authors: Andrew John Zeller, Francis Pouatcha
Abstract:
Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.Keywords: information security, data security, cybersecurity, devOps, IT management
Procedia PDF Downloads 1146087 Sustainable Development as a Part of Development and Foreign Trade in Turkey
Authors: Sadife Güngör, Sevilay Konya
Abstract:
Sustainable development is an economic development scope which covers the economic growth included environmental factors. With the help of economic development, the needs of the future generations are going to be met the needs. As it is aimed the environmental conscious, sustainable development focuses on decreasing the damage of natural sources. From this point of view, while sustainable development is environmentally conscious, it also improving the life standards of individuals. The relationship between development and foreign trade on sustainable development is theoretically searched in this study. In the second part, sustainable development at world and EU is searched and in the last part, the sustainability of trade and development in Turkey is stated.Keywords: development, sustainable development, foreign trade, Turkey
Procedia PDF Downloads 4586086 Working Improvement of Modern Finance in Millennium World
Authors: Saeed Mohammadirad
Abstract:
Financing activities involve long-term liabilities, stockholders' equity (or owner's equity), and changes to short-term borrowings. Finance is very important for every business activities. To perform the finance we have to follow the accounting languages bases on the nature of the business. If all are one package in the software, it is easy to handle, monitor, control, plan, organize, direct and budget the finance. Let us make a challenge in the computer software for the whole finance packages of every business related activities. In this article, it mentioned about the finance functions in the various levels of the business activities and how it should be maintained properly to avoid the unethical events.Keywords: financing activities, business activities, computer software, unethical events
Procedia PDF Downloads 3546085 Building Exoskeletons for Seismic Retrofitting
Authors: Giuliana Scuderi, Patrick Teuffel
Abstract:
The proven vulnerability of the existing social housing building heritage to natural or induced earthquakes requires the development of new design concepts and conceptual method to preserve materials and object, at the same time providing new performances. An integrate intervention between civil engineering, building physics and architecture can convert the social housing districts from a critical part of the city to a strategic resource of revitalization. Referring to bio-mimicry principles the present research proposes a taxonomy with the exoskeleton of the insect, an external, light and resistant armour whose role is to protect the internal organs from external potentially dangerous inputs. In the same way, a “building exoskeleton”, acting from the outside of the building as an enclosing cage, can restore, protect and support the existing building, assuming a complex set of roles, from the structural to the thermal, from the aesthetical to the functional. This study evaluates the structural efficiency of shape memory alloys devices (SMADs) connecting the “building exoskeleton” with the existing structure to rehabilitate, in order to prevent the out-of-plane collapse of walls and for the passive dissipation of the seismic energy, with a calibrated operability in relation to the intensity of the horizontal loads. The two case studies of a masonry structure and of a masonry structure with concrete frame are considered, and for each case, a theoretical social housing building is exposed to earthquake forces, to evaluate its structural response with or without SMADs. The two typologies are modelled with the finite element program SAP2000, and they are respectively defined through a “frame model” and a “diagonal strut model”. In the same software two types of SMADs, called the 00-10 SMAD and the 05-10 SMAD are defined, and non-linear static and dynamic analyses, namely push over analysis and time history analysis, are performed to evaluate the seismic response of the building. The effectiveness of the devices in limiting the control joint displacements resulted higher in one direction, leading to the consideration of a possible calibrated use of the devices in the different walls of the building. The results show also a higher efficiency of the 00-10 SMADs in controlling the interstory drift, but at the same time the necessity to improve the hysteretic behaviour, to maximise the passive dissipation of the seismic energy.Keywords: adaptive structure, biomimetic design, building exoskeleton, social housing, structural envelope, structural retrofitting
Procedia PDF Downloads 4196084 A Survey on a Critical Infrastructure Monitoring Using Wireless Sensor Networks
Authors: Khelifa Benahmed, Tarek Benahmed
Abstract:
There are diverse applications of wireless sensor networks (WSNs) in the real world, typically invoking some kind of monitoring, tracking, or controlling activities. In an application, a WSN is deployed over the area of interest to sense and detect the events and collect data through their sensors in a geographical area and transmit the collected data to a Base Station (BS). This paper presents an overview of the research solutions available in the field of environmental monitoring applications, more precisely the problems of critical area monitoring using wireless sensor networks.Keywords: critical infrastructure monitoring, environment monitoring, event region detection, wireless sensor networks
Procedia PDF Downloads 3496083 Cerebral Toxoplasmosis: A Histopathological Diagnosis
Authors: Prateek Rastogi, Jenash Acharya
Abstract:
Histopathology examination has been a boon to forensic experts all around the world since its implication in autopsy cases. Whenever a case of sudden death is encountered, forensic experts clandestinely focus on cardiovascular, respiratory, gastrointestinal or cranio-cerebral causes. After ruling out poisoning or trauma, they are left with the only option available, histopathology examination. Besides preserving thoracic and abdominal organs, brain tissues are very less frequently subjected for the analysis. Based on provisional diagnosis documented on hospital treatment record files, one hemisphere of grossly unremarkable cerebrum was confirmatively diagnosed by histopathology examination to be a case of cerebral toxoplasmosis.Keywords: cerebral toxoplasmosis, sudden death, health information, histopathology
Procedia PDF Downloads 2596082 Release of Legacy Persistent Organic Pollutants and Mitigating Their Effects in Downstream Communities
Authors: Kimberley Rain Miner, Karl Kreutz, Larry LeBlanc
Abstract:
During the period of 1950-1970 persistent organic pollutants such as DDT, dioxin and PCB were released in the atmosphere and distributed through precipitation into glaciers throughout the world. Recent abrupt climate change is increasing the melt rate of these glaciers, introducing the toxins to the watershed. Studies have shown the existence of legacy pollutants in glacial ice, but neither the impact nor quantity of these toxins on downstream populations has been assessed. If these pollutants are released at toxic levels it will be necessary to create a mitigation plan to lower their impact on the affected communities.Keywords: climate change, adaptation, mitigation, risk management
Procedia PDF Downloads 359