Search results for: open tendering
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3082

Search results for: open tendering

862 Facies Analysis and Depositional Environment of Late Cretaceous (Cenomanian) Lidam Formation, South East Sirt Basin, Libya

Authors: Miloud M. Abugares

Abstract:

This study concentrates on the facies analysis, cyclicity and depositional environment of the Upper Cretaceous (Cenomanian) carbonate ramp deposits of the Lidam Formation. Core description, petrographic analysis data from five wells in Hamid and 3V areas in the SE Sirt Basin, Libya were studied in detail. The Lidam Formation is one of the main oil producing carbonate reservoirs in Southeast Sirt Basin and this study represents one of the key detailed studies of this Formation. In this study, ten main facies have been identified. These facies are; Chicken-Wire Anhydrite Facies, Fine Replacive Dolomite Facies, Bioclastic Sandstone Facies, Laminated Shale Facies, Stromatolitic Laminated Mudstone Facies, Ostracod Bioturbated Wackestone Facies, Bioturbated Mollusc Packstone Facies, Foraminifera Bioclastic Packstone/Grainstone Facies Peloidal Ooidal Packstone/Grainstone Facies and Squamariacean/Coralline Algae Bindstone Facies. These deposits are inferred to have formed in supratidal sabkha, intertidal, semi-open restricted shallow lagoon and higher energy shallow shoal environments. The overall depositional setting is interpreted as have been deposited in inner carbonate ramp deposits. The best reservoir quality is encountered in Peloidal- Ooidal Packstone/Grainstone facies, these facies represents storm - dominated shoal to back shoal deposits and constitute the inner part of carbonate ramp deposits. The succession shows a conspicuous hierarchical cyclicity. Porous shoal and backshoal deposits form during maximum transgression system and early regression hemi-cycle of the Lidam Fm. However; oil producing from shoal and backshoal deposits which only occur in the upper intervals 15 - 20 feet, which forms the large scale transgressive cycle of the Upper Lidam Formation.

Keywords: Lidam Fm. Sirt Basin, Wackestone Facies, petrographic, intertidal

Procedia PDF Downloads 516
861 Nuclear Energy: The Reorientations of the French Public Perception

Authors: Aurélia Jandot

Abstract:

With the oil and economic crises which began in the 1970’s, it has progressively appeared necessary to convince the French “general public“ that a use of new energy sources was essential. In this field, nuclear energy represented the future and concentrated lots of hopes. However, the discourse about nuclear energy has progressively seen negative arguments growing in the French media. The gradual changes in the perception of nuclear energy will be studied here through the arguments given in the main French weekly newsmagazines, which had a great impact on the readers, thus on the “general public“, from the 1970’s to the end of the 1980’s. Indeed, to understand better these changes will be taken into account the major international events, the reorientations of the French domestic policy, and the evolutions of the nuclear technology. As this represents a considerable amount of copies and thus of information, will be selected here the main articles which emphasize the “mental images“ aiming to direct the thought of the readers, and which have led the public awareness and acceptance to evolve. From the 1970’s to the end of the 1980’s, two dichotomous trends are in confrontation : one is promoting the perception of the nuclear energy, the other is discrediting it. Moreover, these two trends are organized in two axes. The first axis is about the engineerings evolutions, such as the main French media represent them, with its approximations, its exaggerations, its fictions sometimes. Is added the will to make accessible to the “general public“ some concepts which are quite difficult to understand for the largest number. The second axis rests on the way the major accidents of the period are approached, including those of Three Mile Island and Chernobyl. Thanks to these accidents and because of the international relations evolutions, the ecologist movements and their impacts have progressively grown, with evident consequences on the public perception of nuclear energy and on the way the successive governments can implement new power plants in France. Then, in both cases, over the period considered, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the newsmagazines editing. This is all these changes that will be emphasized, over a period where the nuclear energy technology, to there a field for specialists, bearing mystery and secret, has become a social issue seemingly open to all.

Keywords: social issues, public acceptance, mediatization, discourse changes

Procedia PDF Downloads 291
860 Analytical Characterization of TiO2-Based Nanocoatings for the Protection and Preservation of Architectural Calcareous Stone Monuments

Authors: Sayed M. Ahmed, Sawsan S. Darwish, Mahmoud A. Adam, Nagib A. Elmarzugi, Mohammad A. Al-Dosari, Nadia A. Al-Mouallimi

Abstract:

Historical stone surfaces and architectural heritage especially which located in open areas may undergo unwanted changes due to the exposure to many physical and chemical deterioration factors, air pollution, soluble salts, Rh/temperature, and biodeterioration are the main causes of decay of stone building materials. The development and application of self-cleaning treatments on historical and architectural stone surfaces could be a significant improvement in conservation, protection, and maintenance of cultural heritage. In this paper, nanometric titanium dioxide has become a promising photocatalytic material owing to its ability to catalyze the complete degradation of many organic contaminants and represent an appealing way to create self-cleaning surfaces, thus limiting maintenance costs, and to promote the degradation of polluting agents. The obtained nano-TiO2 coatings were applied on travertine (Marble and limestone often used in historical and monumental buildings). The efficacy of the treatments has been evaluated after coating and artificial thermal aging, through capillary water absorption, Ultraviolet-light exposure to evaluate photo-induced and the hydrophobic effects of the coated surface, while the surface morphology before and after treatment was examined by scanning electron microscopy (SEM). The changes of molecular structure occurring in treated samples were spectroscopy studied by FTIR-ATR, and Colorimetric measurements have been performed to evaluate the optical appearance. All the results get together with the apparent effect that coated TiO2 nanoparticles is an innovative method, which enhanced the durability of stone surfaces toward UV aging, improved their resistance to relative humidity and temperature, self-cleaning photo-induced effects are well evident, and no alteration of the original features.

Keywords: architectural calcareous stone monuments, coating, photocatalysis TiO2, self-cleaning, thermal aging

Procedia PDF Downloads 254
859 Effect of Geometric Imperfections on the Vibration Response of Hexagonal Lattices

Authors: P. Caimmi, E. Bele, A. Abolfathi

Abstract:

Lattice materials are cellular structures composed of a periodic network of beams. They offer high weight-specific mechanical properties and lend themselves to numerous weight-sensitive applications. The periodic internal structure responds to external vibrations through characteristic frequency bandgaps, making these materials suitable for the reduction of noise and vibration. However, the deviation from architectural homogeneity, due to, e.g., manufacturing imperfections, has a strong influence on the mechanical properties and vibration response of these materials. In this work, we present results on the influence of geometric imperfections on the vibration response of hexagonal lattices. Three classes of geometrical variables are used: the characteristics of the architecture (relative density, ligament length/cell size ratio), imperfection type (degree of non-periodicity, cracks, hard inclusions) and defect morphology (size, distribution). Test specimens with controlled size and distribution of imperfections are manufactured through selective laser sintering. The Frequency Response Functions (FRFs) in the form of accelerance are measured, and the modal shapes are captured through a high-speed camera. The finite element method is used to provide insights on the extension of these results to semi-infinite lattices. An updating procedure is conducted to increase the reliability of numerical simulation results compared to experimental measurements. This is achieved by updating the boundary conditions and material stiffness. Variations in FRFs of periodic structures due to changes in the relative density of the constituent unit cell are analysed. The effects of geometric imperfections on the dynamic response of periodic structures are investigated. The findings can be used to open up the opportunity for tailoring these lattice materials to achieve optimal amplitude attenuations at specific frequency ranges.

Keywords: lattice architectures, geometric imperfections, vibration attenuation, experimental modal analysis

Procedia PDF Downloads 122
858 Carbon Pool Assessment in Two Community Forest in Nepal

Authors: Khemnath Kharel

Abstract:

Forest itself is a factory as well as product. It supplies tangible and intangible goods and services. It supplies timber, fuel wood, fodder, grass leaf litter as well as non timber edible goods and medicinal and aromatic products additionally provides environmental services. These environmental services are of local, national, or even global importance. In Nepal more than 19 thousands community forests are providing environmental service in less economic benefit than actual efficiency. There is a risk of cost of management of those forest exceeds benefits and forests get converted to open access resources in future. Most of the environmental goods and services don’t have markets which mean no prices at which they are available to the consumers therefore the valuation of these services goods and services establishment of paying mechanism for such services and insure the benefit to community is more relevant in local as well as global scale. There are few examples of carbon trading in domestic level to meet the country wide emission goal. In this contest the study aims to explore the public attitude towards carbon offsetting and their responsibility over service providers. This study helps in promotion of environment service awareness among general people and service provider; community forest. The research helps to unveil the carbon pool scenario in community forest and willingness to pay for carbon offsetting of people who are consuming more energy than general people and emitting relatively more carbon in atmosphere. The study has assessed the carbon pool status in two community forest. In the study in two community forests carbon pools were assessed following the guideline “Forest Carbon Inventory Guideline 2010” prescribed by Ministry of Forest and soil Conservation, Nepal. Final out comes of analysis in intensively managed area of Hokse CF recorded as 103.58 tons C /ha with 6173.30 tons carbon stock. Similarly in Hariyali CF carbon density was recorded 251.72 mg C /ha. The total carbon stock of intensively managed blocks in Hariyali CF is 35839.62 tons carbon.

Keywords: carbon, offsetting, sequestration, valuation

Procedia PDF Downloads 321
857 The Opinions of Nursing Students Regarding Humanized Care through Volunteer Activities at Boromrajonani College of Nursing, Chonburi

Authors: P. Phenpun, S. Wareewan

Abstract:

This qualitative study aimed to describe the opinions in relation to humanized care emerging from the volunteer activities of nursing students at Boromarajonani College of Nursing, Chonburi, Thailand. One hundred and twenty-seven second-year nursing students participated in this study. The volunteer activity model was composed of preparation, implementation, and evaluation through a learning log, in which students were encouraged to write their daily activities after completing practical training at the healthcare center. The preparation content included three main categories: service minded, analytical thinking, and client participation. The preparation process took over three days that accumulates up to 20 hours only. The implementation process was held over 10 days, but with a total of 70 hours only, with participants taking part in volunteer work activities at a healthcare center. A learning log was used for evaluation and data were analyzed using content analysis. The findings were as follows. With service minded, there were two subcategories that emerged from volunteer activities, which were service minded towards patients and within themselves. There were three categories under service minded towards patients, which were rapport, compassion, and empathy service behaviors, and there were four categories under service minded within themselves, which were self-esteem, self-value, management potential, and preparedness in providing good healthcare services. In line with analytical thinking, there were two components of analytical thinking, which were analytical skill for their works and analytical thinking for themselves. There were four subcategories under analytical thinking for their works, which were evidence based thinking, real situational thinking, cause analysis thinking, and systematic thinking, respectively. There were four subcategories under analytical thinking for themselves, which were comparative between themselves, towards their clients that leads to the changing of their service behaviors, open-minded thinking, modernized thinking, and verifying both verbal and non-verbal cues. Lastly, there were three categories under participation, which were mutual rapport relationship; reconsidering client’s needs services and providing useful health care information.

Keywords: humanized care service, volunteer activity, nursing student, learning log

Procedia PDF Downloads 307
856 Comparison of Storage Facilities on Different Varieties of Orange Fleshed Sweet Potato Grown in Rwanda

Authors: Jean Paul Hategekimana, Dukuzumuremyi Yvonne, Mukeshimana Marthe, Alexandre Niyonshima

Abstract:

Sweet potato (Ipomoea batatas) is a very important staple food crop in Rwanda due to its high growth and consumption in all parts of the country. The effect of seven different storage conditions on the quality and nutritional composition of the three most grown and consumed varieties of orange-fleshed sweet potato (OFSP), namely Kabode, Terimbere, and Vita, were studied over a period of six weeks at Postharvest Service and Training Center of University Rwanda, Busogo Campus. The potato stored under the following conditions (zero energy cooling chamber, ground washed sweet potato, ground unwashed sweet potato, perforated washed sweet potato, perforated unwashed sweet potato, non-perforated washed sweet potato, and non-perforated unwashed sweet potato) were assessed in this study. These storage conditions are the modifications of existing methods currently used in Rwanda for suitable local climatic conditions. Hence, 30kgs of freshly harvested OFSP for each variety were bought from farmers of Gakenke and Rulindo districts and then transported to the postharvest training and service center UR-CAVM, Busogo Campus. 2.5kg of each potato sample was selected and stored under the above-mentioned storage conditions after pretreatment. Data were collected for six weeks on percent weight loss, shrinkability and the general appearance at interval of three days. The stored samples were also analyzed for moisture, crude ash, crude fiber, and reduced sugar levels during the entire storage period. Results showed the difference among the various storage conditions. It was shown that ZECC and non-perforated sacs (in the open air) storage techniques had good potential for storage of orange flesh sweet potato for up to six weeks without considerable change in physical and nutritional parameters compared to other considered conditions and, therefore, can be recommended as more useful for OSFP at farm level and during transport and market storage.

Keywords: ZECC, orange fleshed sweet potato, perforated sacs, storage conditions

Procedia PDF Downloads 68
855 A Comprehensive Methodology for Voice Segmentation of Large Sets of Speech Files Recorded in Naturalistic Environments

Authors: Ana Londral, Burcu Demiray, Marcus Cheetham

Abstract:

Speech recording is a methodology used in many different studies related to cognitive and behaviour research. Modern advances in digital equipment brought the possibility of continuously recording hours of speech in naturalistic environments and building rich sets of sound files. Speech analysis can then extract from these files multiple features for different scopes of research in Language and Communication. However, tools for analysing a large set of sound files and automatically extract relevant features from these files are often inaccessible to researchers that are not familiar with programming languages. Manual analysis is a common alternative, with a high time and efficiency cost. In the analysis of long sound files, the first step is the voice segmentation, i.e. to detect and label segments containing speech. We present a comprehensive methodology aiming to support researchers on voice segmentation, as the first step for data analysis of a big set of sound files. Praat, an open source software, is suggested as a tool to run a voice detection algorithm, label segments and files and extract other quantitative features on a structure of folders containing a large number of sound files. We present the validation of our methodology with a set of 5000 sound files that were collected in the daily life of a group of voluntary participants with age over 65. A smartphone device was used to collect sound using the Electronically Activated Recorder (EAR): an app programmed to record 30-second sound samples that were randomly distributed throughout the day. Results demonstrated that automatic segmentation and labelling of files containing speech segments was 74% faster when compared to a manual analysis performed with two independent coders. Furthermore, the methodology presented allows manual adjustments of voiced segments with visualisation of the sound signal and the automatic extraction of quantitative information on speech. In conclusion, we propose a comprehensive methodology for voice segmentation, to be used by researchers that have to work with large sets of sound files and are not familiar with programming tools.

Keywords: automatic speech analysis, behavior analysis, naturalistic environments, voice segmentation

Procedia PDF Downloads 281
854 Intentions and Willingness of Marketing Professionals to Adopt Neuromarketing

Authors: Anka Gorgiev, Chris Martin, Nikolaos Dimitriadis, Dimitrios V. Nikolaidis

Abstract:

This paper is part of a doctoral research study aimed to identify behavioral indicators for the existence of the new marketing paradigm. Neuromarketing is becoming a growing trend in the marketing industry worldwide and it is capturing a lot of interest among the members of academia and the practitioner community. However, it is still not very clear how big of an impact neuromarketing might have in the following years. In an effort to get closer to an answer, this study investigates behavioral intentions and willingness to adopt neuromarketing and its practices by the marketing professionals, including academics, practitioners, students, researchers, experts and journal editors. The participants in the study include marketing professionals at different levels of neuromarketing fluency with residency in the United States of America and the South East Europe. The total of 19 participants participated in the interviews, all of whom belong to more than one group of marketing professionals. The authors use qualitative research approach and open-ended interview questions specifically developed to assess ideas, beliefs and opinions that marketing professionals hold towards neuromarketing. In constructing the interview questions, the authors have used the theory of planned behavior, the prototype willingness model and the technology acceptance model as a theoretical framework. Previous studies have not explicitly investigated the behavioral intentions of marketing professionals to engage in neuromarketing behavior, which is described here as a tendency to apply neuromarketing assumptions and tools in usual marketing practices. This study suggests that the marketing professionals believe that neuromarketing can contribute to the business in a positive way and outlines the main advantages and disadvantages of adopting neuromarketing as identified by the participants. In addition, the study reveals an emerging image of an exemplar company that is perceived to be using neuromarketing, including the most common characteristics and attributes. These findings are believed to be crucial in facilitating a way for neuromarketing field to have a broader impact than it currently does by recognizing and understanding the limitations that such exemplars imply and how that has an effect on the decision-making of marketing professionals.

Keywords: behavioral intentions, marketing paradigm, neuromarketing adoption, theory of planned behavior

Procedia PDF Downloads 172
853 Criteria for Good Governance in Georgian Defense Sector:Standards and Principles

Authors: Vephkhvia Grigalashvili

Abstract:

This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community.

Keywords: anti-corruption policy within Georgian defense governance, conflict of interests within Georgian defense governance, good governance in Georgian defense sector, principles of integrity in Georgian defense management

Procedia PDF Downloads 162
852 Impact of Social Media in Shaping Perceptions on Filipino Muslim Identity

Authors: Anna Rhodora A. Solar, Jan Emil N. Langomez

Abstract:

Social Media plays a crucial role in influencing Philippine public opinion with regard to a variety of socio-political issues. This became evident in the massacre of 44 members of the Special Action Force (SAF 44) tasked by the Philippine government to capture one of the US Federal Bureau of Investigation’s most wanted terrorists. The incident was said to be perpetrated by members of the Moro Islamic Liberation Front and the Bangsamoro Islamic Freedom Fighters. Part of the online discourse within Philippine cyberspace sparked intense debates on Filipino Muslim identity, with several Facebook viral posts linking Islam as a factor to the tragic event. Facebook is considered to be the most popular social media platform in the Philippines. As such, this begs the question of the extent to which social media, specifically Facebook, shape the perceptions of Filipinos on Filipino Muslims. This study utilizes Habermas’ theory of communicative action as it offers an explanation on how public sphere such as social media could be a network for communicating information and points of view through free and open dialogue among equal citizens to come to an understanding or common perception. However, the paper argues that communicative action which is aimed at reaching understanding free from force, and strategic action which is aimed at convincing someone through argumentation may not necessarily be mutually exclusive since reaching an understanding can also be considered as a result of convincing someone through argumentation. Moreover, actors may clash one another in their ideas before reaching common understanding, hence the presence of force. Utilizing content analysis on the Facebook posts with Islamic component that went viral after the massacre of the SAF 44, this paper argues that framing the image of Filipino Muslims through Facebook reflects both communicative and strategic actions. Moreover, comment threads on viral posts manifest force albeit implicit.

Keywords: communication, Muslim, Philippines, social media

Procedia PDF Downloads 402
851 Confidence Building Strategies Adopted in an EAP Speaking Course at METU and Their Effectiveness: A Case Study

Authors: Canan Duzan

Abstract:

For most language learners, mastery of the speaking skill is the proof of the mastery of the foreign language. On the other hand, the speaking skill is considered as the most difficult aspect of language learning to develop for both learners and teachers. Especially in countries like Turkey where exposure to the target language is minimum and resources and opportunities provided for language practice are scarce, teaching and learning to speak the language become a real struggle for teachers and learners alike. Data collected from students, instructors, faculty members and the business sector in needs analysis studies conducted previously at Middle East Technical University (METU) consistently revealed the need for addressing the problem of lack of confidence in speaking English. Action was taken during the design of the only EAP speaking course offered in Modern Languages Department since lack of confidence is considered to be a serious barrier for effective communication and causes learners to suffer from insecurity, uncertainty and fear. “Confidence building” served as the guiding principle in the syllabus design, nature of the tasks created for the course and the assessment procedures to help learners become more confident speakers of English. In order to see the effectiveness of the decisions made during the design phase of the course and whether students become more confident speakers upon completion of the course, a case study was carried out with 100 students at METU. A questionnaire including both Likert-Scale and open-ended items were administered to students to collect data and this data were analyzed using the SPSS program. Group interviews were also carried out to gain more insight into the effectiveness of the course in terms of building speaking confidence. This presentation will explore the specific actions taken to develop students’ confidence based on the findings of program evaluation studies and to what extent the students believe these actions to be effective in improving their confidence. The unique design of this course and strategies adopted for confidence building are highly applicable in other EAP contexts and may yield similar positive results.

Keywords: confidence, EAP, speaking, strategy

Procedia PDF Downloads 401
850 Effects of Indole on Aerobic Biodegradation of Butanoic Acid by Pseudomonas aeruginosa and Serratia marcescens

Authors: J. B. J. Njalam’mano, E. M. N. Chirwa

Abstract:

In low resource settings in Africa and other developing regions, pit latrines remain the dominant basic minimum acceptable form of sanitation. However, unpleasant smells-malodours emitted from faecal sludge in the pit latrines, which elicit disgusting or repulsive response, are one of the factors that thwart people to use latrines and instead opt for open defecation as an alternative. This provides an important but often overlooked major impediment, dissuading people from adopting and using the pit latrines hence affecting successful, effective sanitation promotion. The malodours are primarily attributed to four odorants: butanoic acid (C₄H₈O₂), dimethyl trisulphide (C₂H₆S₃), indole (C₈H₇N) and para-cresol (C₇H₈O). Several pit latrine deodorisation methods such as addition of carbonous materials, use of ventilation systems and urine separation are available, and they continue to occupy their niche, but social, economic, environmental and technological shortfalls remain. Bioremediation has been gaining popularity because it is inexpensive, simple to operate and environmentally friendly. Recently, the biodegradation of butanoic acid as individual odorant has been studied. However, to the best of our knowledge, there have been no kinetic studies of the butanoic acid in the presence of other key odorous compounds. In this study, a series of experiments were conducted to investigate the effects of indole on the removal of butanoic acid under aerobic conditions using indigenous bacteria strains, Pseudomonas aeruginosa, and Serratia marcescens isolated from faecal sludge as pure cultures as well as mixed cultures. In this purpose, butanoic acid removal was performed in a batch reactor containing the bacterial strains in mineral salt medium (MSM) amended with 3000 ppm of butanoic acid at the temperature of 30°C, under continuous stirring rate of 150 rpm and the concentration of indole was varied from 50-200 ppm. The initial pH of the solution was in the range of 6.0-7.2. Overall, there were significant differences in the bacterial growth rate and total butanoic acid removal dependent on the concentration of indole in the solution.

Keywords: biodegradation, butanoic acid, indole, pit latrine

Procedia PDF Downloads 195
849 The Rupture of Tendon Achilles During the Recreative and Sports Activities

Authors: Jasmin S. Nurkovic, Ljubisa Dj. Jovasevic, Zana C. Dolicanin, Zoran S. Bajin

Abstract:

Ruptured muscles and tendons very often must be repatriated by open operation in young persons. In young, muscles are ruptured more often than tendons, at the sane time in older persons are more exposed to rupture than muscles. Ruptured of the calcaneus are the most present of all ruptures. Sometime the rupture is complete, but very often the incomplete rupture can be noticed. During six years, from 2006 to 2012, we treated nineteen male patients and three female patients with the rupture of tendon Achilles. The youngest patient was aged thirty two, and the oldest was also managed sixty four. The youngest female patient was forty one and the oldest was forty six. One of our patients who was under corticosteroid treatment did not take any part in sport activities but she was, as she told us, going for a long walk, the same was with other two patients one man and one woman. We had nineteen male patients age 32 to 64 and three female patients age 41, 44 and 46. Conservative treatment by cast was applied in five patients and very good results were in three of them. In two patients surgical treatment failed in patient’s age 53 and 64. Only one of all patients treated by surgery had healing problems because of necrotic changes of the skin where incision was made. One of our female patients age 45 was under steroid treatment for almost 20 years because of asthmatic problems. We suggested her wearing boots with 8cm long heels by day and by night eight weeks. The final results were satisfactory and all the time she was able to work and to walk. It was the only case we had with bilateral tendon rupture. After eight weeks the cast is removed and psychiatric treatment started, patient is using crutches with partial weight bearing over a period of two weeks. Quite the same treatment conservative treatment, only the cast is not removed after two but after four weeks. Everyday activities after the surgical treatment started ten weeks and sport activities can start after fourteen to sixteen weeks. An increased activity of our patient without previous preparing for forces activity can result, as we already see, with tendon rupture. Treatment is very long and very often surgical. We find that surgical treatment resulted as safer and better solution for patients. We also had a patient with spontaneous rupture of tendon during longer walking but this patient was under prolonged corticosteroid treatment.

Keywords: tendon, Achilles, rupture, sport

Procedia PDF Downloads 247
848 Formulation of Hybrid Nanopowder-Molecular Ink for Fabricating Critical Material-Free Cu₂ZnSnS₄ Thin Film Solar Absorber

Authors: Anies Mutiari, Neha Bansal, Martin Artner, Veronika Mayer, Juergen Roth, Mathias Weil, Rachmat Adhi Wibowo

Abstract:

Cu₂ZnSnS₄ (CZTS) compound (mineral name kesterite) has attracted considerable interests for photovoltaic application owing to its optoelectrical properties. Moreover, its elemental abundance in Earth’s crust offers a comparative advantage for envisaged large-scale photovoltaic deployment without any material shortage issues. In this contribution, we present an innovative route to prepare CZTS solar absorber layer for photovoltaic application from low-cost and up-scalable process. CZTS layers were spin coated on the Molybdenum-coated glass from two inks composed of different solvents; dimethylsulfoxide (DMSO) and ultrapure water. Into each solvent; 0.57M CuCl₂, 0.39M ZnCl₂, 0.53M SnCl₂, and 1.85M Thiourea or Na₂S₂O₃, as well as pre-synthesized CZTS nanopowder, were added as sources of Cu, Zn, Sn and S in the ink. The crystallisation of ink into CZTS dense layers was carried out by firstly annealing the as-deposited CZTS layer in open air at 300°C for 1 minute, followed by sulfurisation at 560–620°C under atmospheric pressure for 120 minutes. Complementary electron microscopy, grazing incidence X-ray diffraction and Raman spectroscopy investigations suggest that both solvents can be used for preparing high quality and device relevant CZTS solar absorber layers. The sulphurisation crystallizes the as-deposited CZTS into highly polycrystalline CZTS layer with tetragonal structure demonstrated by the presence of tetrahedrally-shaped grains with the size of 1 µm. An advancement of the CZTS layer preparation was made by gradual substitution of volatile organic compound solvent of DMSO with ultrapure water. It is revealed that by using similar air annealing and sulphurisation process, dense and compact CZTS layers can also be fabricated from an ink with reduced volatile organic compound content.

Keywords: kesterite, solar ink, spin coating, photovoltaics

Procedia PDF Downloads 171
847 Exploring Emerging Viruses From a Protected Reserve

Authors: Nemat Sokhandan Bashir

Abstract:

Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.

Keywords: wild, plant, novel, metagenomics

Procedia PDF Downloads 80
846 Topography Effects on Wind Turbines Wake Flow

Authors: H. Daaou Nedjari, O. Guerri, M. Saighi

Abstract:

A numerical study was conducted to optimize the positioning of wind turbines over complex terrains. Thus, a two-dimensional disk model was used to calculate the flow velocity deficit in wind farms for both flat and complex configurations. The wind turbine wake was assessed using the hybrid methods that combine CFD (Computational Fluid Dynamics) with the actuator disc model. The wind turbine rotor has been defined with a thrust force, coupled with the Navier-Stokes equations that were resolved by an open source computational code (Code_Saturne V3.0 developed by EDF) The simulations were conducted in atmospheric boundary layer condition considering a two-dimensional region located at the north of Algeria at 36.74°N longitude, 02.97°E latitude. The topography elevation values were collected according to a longitudinal direction of 1km downwind. The wind turbine sited over topography was simulated for different elevation variations. The main of this study is to determine the topography effect on the behavior of wind farm wake flow. For this, the wake model applied in complex terrain needs to selects the singularity effects of topography on the vertical wind flow without rotor disc first. This step allows to determine the existence of mixing scales and friction forces zone near the ground. So, according to the ground relief the wind flow waS disturbed by turbulence and a significant speed variation. Thus, the singularities of the velocity field were thoroughly collected and thrust coefficient Ct was calculated using the specific speed. In addition, to evaluate the land effect on the wake shape, the flow field was also simulated considering different rotor hub heights. Indeed, the distance between the ground and the hub height of turbine (Hhub) was tested in a flat terrain for different locations as Hhub=1.125D, Hhub = 1.5D and Hhub=2D (D is rotor diameter) considering a roughness value of z0=0.01m. This study has demonstrated that topographical farm induce a significant effect on wind turbines wakes, compared to that on flat terrain.

Keywords: CFD, wind turbine wake, k-epsilon model, turbulence, complex topography

Procedia PDF Downloads 563
845 Refugee Job Seeking Opportunities: It's Not What You Know, It's Who You Know

Authors: Kimberley Kershaw, Denis Hyams-Ssekasi

Abstract:

Although there is a wealth of information about refugees and Asylum seekers, Refugee job opportunities continue to be one of the most hotly contested areas and less researched within the social sciences. Refugees are a vital asset in the society due to their experiences, skills, and competences. However, society perceives them differently, and as such, their prior lived experiences are often underutilised. This research study gleans from the work conducted during the Refugee Employment Support Clinic delivered for 12 weeks within a University setting in the North West of England. The study is conducted using three perspectives, refugees, students, and researchers, allowing for identification of the challenges encountered by the refugees concerning job opportunities. Through the utilisation of the qualitative research method, the study has found that refugees experience a wide range of issues unrelated to their skills, prior experience, and education but rather due to the red tapes connected to their legal identity labelling. Refugees struggle to build reliable employment networks that appreciate and acknowledge their capabilities and talents, impacting their ability to navigate the labour market and classism. Notably, refugees are misunderstood within their new societies, and little care is taken to understand the unique struggles they face with respect to securing paid work in their industry or field of work due to their lack of experience in the UK. Unlike other European countries, it is evident that the UK has no strategic approach to enhancing the chances of paid or voluntary work for refugees. A clinic like this provided lenses for comprehending how refugees can be better supported with employment related opportunities. By creating a safe and conducive platform for honest and open discussion about employment and through collaborative approaches with local community agencies, doors were opened for social and professional networks to be built. The study concluded that there is a need for local communities and education establishments to be more aware of the prevailing challenges and in a position to support at all stages of their asylum claim in order for the perceptions of distrust and uncertainty around refugees to be minimised.

Keywords: refugees, employment, community, classism, education

Procedia PDF Downloads 95
844 Exploring the Profiles of Militants in the SWAT Valley of Pakistan

Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali

Abstract:

In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.

Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants

Procedia PDF Downloads 155
843 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 393
842 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs

Authors: Aldona Guzik

Abstract:

Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.

Keywords: experts, media, public discours, symbolic elites

Procedia PDF Downloads 129
841 Simulation of a Control System for an Adaptive Suspension System for Passenger Vehicles

Authors: S. Gokul Prassad, S. Aakash, K. Malar Mohan

Abstract:

In the process to cope with the challenges faced by the automobile industry in providing ride comfort, the electronics and control systems play a vital role. The control systems in an automobile monitor various parameters, controls the performances of the systems, thereby providing better handling characteristics. The automobile suspension system is one of the main systems that ensure the safety, stability and comfort of the passengers. The system is solely responsible for the isolation of the entire automobile from harmful road vibrations. Thus, integration of the control systems in the automobile suspension system would enhance its performance. The diverse road conditions of India demand the need of an efficient suspension system which can provide optimum ride comfort in all road conditions. For any passenger vehicle, the design of the suspension system plays a very important role in assuring the ride comfort and handling characteristics. In recent years, the air suspension system is preferred over the conventional suspension systems to ensure ride comfort. In this article, the ride comfort of the adaptive suspension system is compared with that of the passive suspension system. The schema is created in MATLAB/Simulink environment. The system is controlled by a proportional integral differential controller. Tuning of the controller was done with the Particle Swarm Optimization (PSO) algorithm, since it suited the problem best. Ziegler-Nichols and Modified Ziegler-Nichols tuning methods were also tried and compared. Both the static responses and dynamic responses of the systems were calculated. Various random road profiles as per ISO 8608 standard are modelled in the MATLAB environment and their responses plotted. Open-loop and closed loop responses of the random roads, various bumps and pot holes are also plotted. The simulation results of the proposed design are compared with the available passive suspension system. The obtained results show that the proposed adaptive suspension system is efficient in controlling the maximum over shoot and the settling time of the system is reduced enormously.

Keywords: automobile suspension, MATLAB, control system, PID, PSO

Procedia PDF Downloads 294
840 The Emergence of Construction Mafia in South Africa: The Implication on the Construction Industry

Authors: Thandokazi Nyangiwe, Christopher Amoah, Charles P. Mukumba

Abstract:

The South African construction sector is threatened by emerging black business forums called construction mafias. The emergence of the construction mafia has culminated in the disruptions and abandonment of construction sites resulting in the loss of jobs for construction workers. The paper examines the origin of construction mafias and their impact on the construction sector, including the potential ways to cope with their operations. A qualitative research approach was adopted for this study using open-ended interview questions to gather information from 30 key construction industry stakeholders, including contractors, subcontractors, consultants, and the construction project communities. Content and thematic analysis were used to analyse the data collected. The findings suggest that most participants do not fully understand the existence and operations of construction mafias in the construction industry. Construction mafias claim to be part of the local business forums. They disrupt construction projects and demand a certain amount, usually 30% of the construction value. Construction mafias frequently resort to intimidation and violence if their demands are unmet. Their operations have resulted in delayed completion of construction projects, abandonment of projects, and loss of income for the contractor and jobs for the construction workers. The interviews were limited to construction stakeholders. Because of the nature of the mafias’ operations, they could not be accessed for interviews for fear of being identified because of the connotation attached to their role as construction mafias. Construction project owners face disruptions of projects resulting in loss of equipment, materials, and income. Therefore, there is a need to sensitise the construction stakeholders in the construction industry regarding the existence and operations of the construction mafia and the implications on construction project performance and delivery. The findings will give insight into the operations of the construction mafias in the South African construction industry, which has caused disruptions in construction project sites. Stakeholders must find solutions to address the construction mafias’ disruptive actions on construction projects. The study presents an initial inquiry that will come up with how to manage and cope with the growing operations of construction mafias in the South African construction industry.

Keywords: black business forums, construction mafia, emergence, implication

Procedia PDF Downloads 134
839 A Radioprotective Effect of Nanoceria (CNPs), Magnetic Flower-Like Iron Oxide Microparticles (FIOMPs), and Vitamins C and E on Irradiated BSA Protein

Authors: Hajar Zarei, AliAkbar Zarenejadatashgah, Vuk Uskoković, Hiroshi Watabe

Abstract:

The reactive oxygen species (ROS) generated by radiation in nuclear diagnostic imaging and radiotherapy could damage the structure of the proteins in noncancerous cells surrounding the tumor. The critical factor in many age-related diseases, such as Alzheimer, Parkinson, or Huntington diseases, is the oxidation of proteins by the ROS as molecular triggers of the given pathologies. Our studies by spectroscopic experiments showed doses close to therapeutic ones (1 to 5 Gy) could lead to changes of secondary and tertiary structures in BSA protein macromolecule as a protein model as well as the aggregation of polypeptide chain but without the fragmentation. For this reason, we investigated the radioprotective effects of natural (vitamin C and E) and synthetic materials (CNPs and FIOMPs) on the structural changes in BSA protein induced by gamma irradiation at a therapeutic dose (3Gy). In the presence of both vitamins and synthetic materials, the spectroscopic studies revealed that irradiated BSA was protected from the structural changes caused by ROS, according to in vitro research. The radioprotective property of CNPs and FIOMPs arises from enzyme mimetic activities (catalase, superoxide dismutase, and peroxidase) and their antioxidant capability against hydroxyl radicals. In the case of FIOMPs, a porous structure also leads to increased ROS recombination with each other in the same radiolytic track and subsequently decreased encounters with BSA. The hydrophilicity of vitamin C resulted in the major scavenging of ROS in the solvent, whereas hydrophobic vitamin E localized on the nonpolar patches of the BSA surface, where it did not only neutralize them thanks to the moderate BSA binding constant but also formed a barrier for diffusing ROS. To the best of our knowledge, there has been a persistent lack of studies investigating the radioactive effect of mentioned materials on proteins. Therefore, the results of our studies can open a new widow for application of these common dietary ingredients and new synthetic NPs in improving the safety of radiotherapy.

Keywords: reactive oxygen species, spectroscopy, bovine serum albumin, gamma radiation, radioprotection

Procedia PDF Downloads 86
838 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 89
837 Investigating Legal Consciousness Among Migrants in Greece: A Study of Migrant’s Views of Hate Crime and their Legal Rights

Authors: Violeta Kapageorgiadou

Abstract:

Over the past decade, millions of individuals from middle-eastern and African countries have migrated to Europe to seek refuge. The majority of these refugees emigrate from Muslim majority countries and seek to integrate into European societies. Notably, Greece has hosted thousands of individuals seeking asylum since 2015. Many of these individuals have applied for asylum. They have sought to integrate into the Greek society and to navigate their way through the national and European legal systems with regard to their status. This paper, drawn from a PhD thesis project, focuses on the legal consciousness of migrants and the processes open to asylum seekers to assert their rights, notably with regard to incidents of hate crime and including their interactions with the legal authorities in Greece. The research seeks to capture the factors that influence the views and behaviors of migrants towards the law and their legal rights, using legal consciousness as a theoretical framework. The research findings indicate that asylum seekers have developed a multidimensional legal consciousness influenced by their religious and political background, legal knowledge, previous (negative) experiences with the legal system and their socio-economic status in Greece. Asylum seekers, while aware of the rights essential for their survival in the host country (such as applying for asylum to obtain a secure status, claiming for benefits and housing), were unaware of, and less willing to engage with, legal authorities and rights which they did not find essential for their survival. They viewed hate incidents against them as less important, not worth reporting and sometimes did not even consider these incidents as crimes. The research suggests that asylum seekers in Greece are a vulnerable population who need mechanisms to support them and raise their legal consciousness around their rights in order to better integrate, develop and thrive in the host society. Moving forwards, a better understanding of refugees' and asylum seekers’ reactions towards hate crime will help to create future policies and support mechanisms that could improve the lives of these individuals.

Keywords: hate crime, legal consciousness, legal rights, migrations

Procedia PDF Downloads 222
836 The Role of Middle Managers SBU's in Context of Change: Sense-Making Approach

Authors: Hala Alioua, Alberic Tellier

Abstract:

This paper is designed to spotlight the research on corporate strategic planning, by emphasizing the role of middle manager of SBU’s and related issues such as the context of vision change. Previous research on strategic vision has been focused principally at the SME, with relatively limited consideration given to the role of middle managers SBU’s in the context of change. This project of research has been done by using a single case study. We formulated through our immersion for 2.5 years on the ground and by a qualitative method and abduction approach. This entity that we analyze is a subsidiary of multinational companies headquartered in Germany, specialized in manufacturing automotive equipment. The "Delta Company" is a French manufacturing plant that has undergone numerous changes over the past three years. The two major strategic changes that have a significant impact on the Delta plant are the strengths of its core business through « lead plant strategy» in 2011 and the implementation of a new strategic vision in 2014. These consecutive changes impact the purpose of the mission of the middle managers. The plant managers ask the following questions: How the middle managers make sense of the corporate strategic planning imposed by the parent company? How they appropriate the new vision and decline it into actions on the ground? We chose the individual interview technique through open-ended questions as the source of data collection. We first of all carried out an exploratory approach by interviewing 8 members of the Management committee’s decision and 19 heads of services. The first findings and results show that exist a divergence of opinion and interpretations of the corporate strategic planning among organization members and there are difficulties to make sense and interpretations of the signals of the environment. The lead plant strategy enables new projects which insure the workload of Delta Company. Nevertheless, it creates a tension and stress among the middle managers because its provoke lack of resources to the detriment of their main jobs as manufacturer plant. The middle managers does not have a clear vision and they are wondering if the new strategic vision means more autonomy and less support from the group.

Keywords: change, middle managers, vision, sensemaking

Procedia PDF Downloads 401
835 Poly(L-Lactic Acid) Scaffolds for Bone Tissue Engineering

Authors: Aleksandra BužArovska, Gordana Bogoeva Gaceva

Abstract:

Biodegradable polymers have received significant scientific attention in tissue engineering (TE) application, in particular their composites consisting of inorganic nanoparticles. In the last 15 years, they are subject of intensive research by many groups, aiming to develop polymer scaffolds with defined biodegradability, porosity and adequate mechanical stability. The most important characteristic making these materials attractive for TE is their biodegradability, a process that could be time controlled and long enough to enable generation of a new tissue as a replacement for the degraded polymer scaffold. In this work poly(L-lactic acid) scaffolds, filled with TiO2 nanoparticles functionalized with oleic acid, have been prepared by thermally induced phase separation method (TIPS). The functionalization of TiO2 nanoparticles with oleic acid was performed in order to improve the nanoparticles dispersibility within the polymer matrix and at the same time to inhibit the cytotoxicity of the nanofiller. The oleic acid was chosen as amphiphilic molecule belonging to the fatty acid family because of its non-toxicity and possibility for mediation between the hydrophilic TiO2 nanoparticles and hydrophobic PLA matrix. The produced scaffolds were characterized with thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), scanning electron microscopy (SEM) and mechanical compression measurements. The bioactivity for bone tissue engineering application was tested in supersaturated simulated body fluid. The degradation process was followed by Fourier transform infrared spectroscopy (FTIR). The results showed anisotropic morphology with elongated open pores (100 µm), high porosity (around 92%) and perfectly dispersed nanofiller. The compression moduli up to 10 MPa were identified independent on the nanofiller content. Functionalized TiO2 nanoparticles induced formation of hydroxyapatite clusters as much as unfunctionalized TiO2. The prepared scaffolds showed properties ideal for scaffold vascularization, cell attachment, growth and proliferation.

Keywords: biodegradation, bone tissue engineering, mineralization, PLA scaffolds

Procedia PDF Downloads 269
834 Structural Correlates of Reduced Malicious Pleasure in Huntington's Disease

Authors: Sandra Baez, Mariana Pino, Mildred Berrio, Hernando Santamaria-Garcia, Lucas Sedeno, Adolfo Garcia, Sol Fittipaldi, Agustin Ibanez

Abstract:

Schadenfreude refers to the perceiver’s experience of pleasure at another’s misfortune. This is a multidetermined emotion which can be evoked by hostile feelings and envy. The experience of Schadenfreude engages mechanisms implicated in diverse social cognitive processes. For instance, Schadenfreude involves heightened reward processing, accompanied by increased striatal engagement and it interacts with mentalizing and perspective-taking abilities. Patients with Huntington's disease (HD) exhibit reductions of Schadenfreude experience, suggesting a role of striatal degeneration in such an impairment. However, no study has directly assessed the relationship between regional brain atrophy in HD and reduced Schadenfreude. This study investigated whether gray matter (GM) atrophy in HD patients correlates with ratings of Schadenfreude. First, we compared the performance of 20 HD patients and 23 controls on an experimental task designed to trigger Schadenfreude and envy (another social emotion acting as a control condition). Second, we compared GM volume between groups. Third, we examined brain regions where atrophy might be associated with specific impairments in the patients. Results showed that while both groups showed similar ratings of envy, HD patients reported lower Schadenfreude. The latter pattern was related to atrophy in regions of the reward system (ventral striatum) and the mentalizing network (precuneus and superior parietal lobule). Our results shed light on the intertwining of reward and socioemotional processes in Schadenfreude, while offering novel evidence about their neural correlates. In addition, our results open the door to future studies investigating social emotion processing in other clinical populations characterized by striatal or mentalizing network impairments (e.g., Parkinson’s disease, schizophrenia, autism spectrum disorders).

Keywords: envy, Gray matter atrophy, Huntigton's disease, Schadenfreude, social emotions

Procedia PDF Downloads 336
833 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 354