Search results for: socioscientific issue based instruction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30803

Search results for: socioscientific issue based instruction

28433 Lexicon-Based Sentiment Analysis for Stock Movement Prediction

Authors: Zane Turner, Kevin Labille, Susan Gauch

Abstract:

Sentiment analysis is a broad and expanding field that aims to extract and classify opinions from textual data. Lexicon-based approaches are based on the use of a sentiment lexicon, i.e., a list of words each mapped to a sentiment score, to rate the sentiment of a text chunk. Our work focuses on predicting stock price change using a sentiment lexicon built from financial conference call logs. We introduce a method to generate a sentiment lexicon based upon an existing probabilistic approach. By using a domain-specific lexicon, we outperform traditional techniques and demonstrate that domain-specific sentiment lexicons provide higher accuracy than generic sentiment lexicons when predicting stock price change.

Keywords: computational finance, sentiment analysis, sentiment lexicon, stock movement prediction

Procedia PDF Downloads 170
28432 Oral Hygiene Behaviors among Pregnant Women with Diabetes Who Attend Primary Health Care Centers at Baghdad City

Authors: Zena F. Mushtaq, Iqbal M. Abbas

Abstract:

Background: Diabetes mellitus during pregnancy is one of the major medical and social problems with increasing prevalence in last decades and may lead to more vulnerable to dental problems and increased risk for periodontal diseases. Objectives: To assess oral hygiene behaviors among pregnant women with diabetes who attended primary health care centers and find out the relationship between oral hygiene behaviors and studied variables. Methodology: A cross sectional design was conducted from 7 July to 30 September 2014 on non probability (convenient sample) of 150 pregnant women with diabetes was selected from twelve Primary Health Care Centers at Baghdad city. Questionnaire format is tool for data collection which had designed and consisted of three main parts including: socio demographic, reproductive characteristics and items of oral hygiene behaviors among pregnant women with diabetes. Reliability of the questionnaire was determined through internal consistency of correlation coefficient (R= 0.940) and validity of content was determined through reviewing it by (12) experts in different specialties and was determined through pilot study. Descriptive and inferential statistics were used to analyze collected data. Result: Result of study revealed that (35.3%) of study sample was (35-39) years old with mean and SD is (X & SD = 33.57 ± 5.54) years, and (34.7%) of the study sample was graduated from primary school and less, half of the study sample was government employment and self employed, (42.7%) of the study sample had moderate socioeconomic status, the highest percentage (70.0%) of the study sample was nonsmokers, The result indicates that oral hygiene behaviors have moderate mean score in all items. There are no statistical significant association between oral hygiene domain and studied variables. Conclusions: All items related to health behavior concerning oral hygiene is in moderate mean of score, which may expose pregnant women with diabetes to high risk of periodontal diseases. Recommendations: Dental care provider should perform a dental examination at least every three months for each pregnant woman with diabetes, explanation of the effect of DM on periodontal health, oral hygiene instruction, oral prophylaxis, professional cleaning and treatment of periodontal diseases(scaling and root planing) when needed.

Keywords: diabetes, health behavior, pregnant women, oral hygiene

Procedia PDF Downloads 287
28431 A New Verification Based Congestion Control Scheme in Mobile Networks

Authors: P. K. Guha Thakurta, Shouvik Roy, Bhawana Raj

Abstract:

A congestion control scheme in mobile networks is proposed in this paper through a verification based model. The model proposed in this work is represented through performance metric like buffer Occupancy, latency and packet loss rate. Based on pre-defined values, each of the metric is introduced in terms of three different states. A Markov chain based model for the proposed work is introduced to monitor the occurrence of the corresponding state transitions. Thus, the estimation of the network status is obtained in terms of performance metric. In addition, the improved performance of our proposed model over existing works is shown with experimental results.

Keywords: congestion, mobile networks, buffer, delay, call drop, markov chain

Procedia PDF Downloads 441
28430 Implementing Activity-Based Costing in Architectural Aluminum Projects: Case Study and Lessons Learned

Authors: Amer Momani, Tarek Al-Hawari, Abdallah Alakayleh

Abstract:

This study explains how to construct an actionable activity-based costing and management system to accurately track and account the total costs of architectural aluminum projects. Two ABC models were proposed to accomplish this purpose. First, the learning and development model was introduced to examine how to apply an ABC model in an architectural aluminum firm for the first time and to be familiar with ABC concepts. Second, an actual ABC model was built on the basis of the results of the previous model to accurately trace the actual costs incurred on each project in a year, and to be able to provide a quote with the best trade-off between competitiveness and profitability. The validity of the proposed model was verified on a local architectural aluminum company.

Keywords: activity-based costing, activity-based management, construction, architectural aluminum

Procedia PDF Downloads 102
28429 Interpreting Form Based Code in Historic Residential Corridor

Authors: Diljan C. K.

Abstract:

Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.

Keywords: form based code, urban conservation, heritage, historic corridor

Procedia PDF Downloads 109
28428 A Review on Light Shafts Rendering for Indoor Scenes

Authors: Hatam H. Ali, Mohd Shahrizal Sunar, Hoshang Kolivand, Mohd Azhar Bin M. Arsad

Abstract:

Rendering light shafts is one of the important topics in computer gaming and interactive applications. The methods and models that are used to generate light shafts play crucial role to make a scene more realistic in computer graphics. This article discusses the image-based shadows and geometric-based shadows that contribute in generating volumetric shadows and light shafts, depending on ray tracing, radiosity, and ray marching technique. The main aim of this study is to provide researchers with background on a progress of light scattering methods so as to make it available for them to determine the technique best suited to their goals. It is also hoped that our classification helps researchers find solutions to the shortcomings of each method.

Keywords: shaft of lights, realistic images, image-based, and geometric-based

Procedia PDF Downloads 279
28427 Barriers and Strategies for Effective Communication between Parents and Children in the Family

Authors: Sadhana Ghnayiem

Abstract:

This article deals with the issue of effective communication between parents and children and its impact on the family in general and on the child in particular. The aim of this article is to provide information to parents, students, anyone interested in family communication between parents and children, and to provide them with tools to deal with barriers to communication in the family unit. The article presented a literature review of the importance of effective communication in the family, the definition of the concept of communication, and was a reference to factors and barriers in communication between parents and children leading to conflict destructive to the extent that barriers to effective communication in the family unit. At the end of the article, strategies were introduced to motivate children to behave appropriately, and to equip parents best to foster the healthy development of their children when they can create an atmosphere of effective communication. From the literature review, it's found that effective communication between parents and children prevents problematic behavior and helps children understand how to communicate effectively with others. Communication between parents and children is the cornerstone of a happy family life and is the basis for positive interactions between parents and children and increases self-esteem in children.

Keywords: children, communication, conflict, family

Procedia PDF Downloads 196
28426 Will My Home Remain My Castle? Tenants’ Interview Topics regarding an Eco-Friendly Refurbishment Strategy in a Neighborhood in Germany

Authors: Karin Schakib-Ekbatan, Annette Roser

Abstract:

According to the Federal Government’s plans, the German building stock should be virtually climate neutral by 2050. Thus, the “EnEff.Gebäude.2050” funding initiative was launched, complementing the projects of the Energy Transition Construction research initiative. Beyond the construction and renovation of individual buildings, solutions must be found at the neighborhood level. The subject of the presented pilot project is a building ensemble from the Wilhelminian period in Munich, which is planned to be refurbished based on a socially compatible, energy-saving, innovative-technical modernization concept. The building ensemble, with about 200 apartments, is part of the building cooperative. To create an optimized network and possible synergies between researchers and projects of the funding initiative, a Scientific Accompanying Research was established for cross-project analyses of findings and results in order to identify further research needs and trends. Thus, the project is characterized by an interdisciplinary approach that combines constructional, technical, and socio-scientific expertise based on a participatory understanding of research by involving the tenants at an early stage. The research focus is on getting insights into the tenants’ comfort requirements, attitudes, and energy-related behaviour. Both qualitative and quantitative methods are applied based on the Technology-Acceptance-Model (TAM). The core of the refurbishment strategy is a wall heating system intended to replace conventional radiators. A wall heating provides comfortable and consistent radiant heat instead of convection heat, which often causes drafts and dust turbulence. Besides comfort and health, the advantage of wall heating systems is an energy-saving operation. All apartments would be supplied by a uniform basic temperature control system (around perceived room temperature of 18 °C resp. 64,4 °F), which could be adapted to individual preferences via individual heating options (e. g. infrared heating). The new heating system would affect the furnishing of the walls, in terms of not allowing the wall surface to be covered too much with cupboards or pictures. Measurements and simulations of the energy consumption of an installed wall heating system are currently being carried out in a show apartment in this neighborhood to investigate energy-related, economical aspects as well as thermal comfort. In March, interviews were conducted with a total of 12 people in 10 households. The interviews were analyzed by MAXQDA. The main issue of the interview was the fear of reduced self-efficacy within their own walls (not having sufficient individual control over the room temperature or being very limited in furnishing). Other issues concerned the impact that the construction works might have on their daily life, such as noise or dirt. Despite their basically positive attitude towards a climate-friendly refurbishment concept, tenants were very concerned about the further development of the project and they expressed a great need for information events. The results of the interviews will be used for project-internal discussions on technical and psychological aspects of the refurbishment strategy in order to design accompanying workshops with the tenants as well as to prepare a written survey involving all households of the neighbourhood.

Keywords: energy efficiency, interviews, participation, refurbishment, residential buildings

Procedia PDF Downloads 126
28425 Quality of the Ruin Probabilities Approximation Using the Regenerative Processes Approach regarding to Large Claims

Authors: Safia Hocine, Djamil Aïssani

Abstract:

Risk models, recently studied in the literature, are becoming increasingly complex. It is rare to find explicit analytical relations to calculate the ruin probability. Indeed, the stability issue occurs naturally in ruin theory, when parameters in risk cannot be estimated than with uncertainty. However, in most cases, there are no explicit formulas for the ruin probability. Hence, the interest to obtain explicit stability bounds for these probabilities in different risk models. In this paper, we interest to the stability bounds of the univariate classical risk model established using the regenerative processes approach. By adopting an algorithmic approach, we implement this approximation and determine numerically the bounds of ruin probability in the case of large claims (heavy-tailed distribution).

Keywords: heavy-tailed distribution, large claims, regenerative process, risk model, ruin probability, stability

Procedia PDF Downloads 364
28424 Near-Miss Deep Learning Approach for Neuro-Fuzzy Risk Assessment in Pipelines

Authors: Alexander Guzman Urbina, Atsushi Aoyama

Abstract:

The sustainability of traditional technologies employed in energy and chemical infrastructure brings a big challenge for our society. Making decisions related with safety of industrial infrastructure, the values of accidental risk are becoming relevant points for discussion. However, the challenge is the reliability of the models employed to get the risk data. Such models usually involve large number of variables and with large amounts of uncertainty. The most efficient techniques to overcome those problems are built using Artificial Intelligence (AI), and more specifically using hybrid systems such as Neuro-Fuzzy algorithms. Therefore, this paper aims to introduce a hybrid algorithm for risk assessment trained using near-miss accident data. As mentioned above the sustainability of traditional technologies related with energy and chemical infrastructure constitutes one of the major challenges that today’s societies and firms are facing. Besides that, the adaptation of those technologies to the effects of the climate change in sensible environments represents a critical concern for safety and risk management. Regarding this issue argue that social consequences of catastrophic risks are increasing rapidly, due mainly to the concentration of people and energy infrastructure in hazard-prone areas, aggravated by the lack of knowledge about the risks. Additional to the social consequences described above, and considering the industrial sector as critical infrastructure due to its large impact to the economy in case of a failure the relevance of industrial safety has become a critical issue for the current society. Then, regarding the safety concern, pipeline operators and regulators have been performing risk assessments in attempts to evaluate accurately probabilities of failure of the infrastructure, and consequences associated with those failures. However, estimating accidental risks in critical infrastructure involves a substantial effort and costs due to number of variables involved, complexity and lack of information. Therefore, this paper aims to introduce a well trained algorithm for risk assessment using deep learning, which could be capable to deal efficiently with the complexity and uncertainty. The advantage point of the deep learning using near-miss accidents data is that it could be employed in risk assessment as an efficient engineering tool to treat the uncertainty of the risk values in complex environments. The basic idea of using a Near-Miss Deep Learning Approach for Neuro-Fuzzy Risk Assessment in Pipelines is focused in the objective of improve the validity of the risk values learning from near-miss accidents and imitating the human expertise scoring risks and setting tolerance levels. In summary, the method of Deep Learning for Neuro-Fuzzy Risk Assessment involves a regression analysis called group method of data handling (GMDH), which consists in the determination of the optimal configuration of the risk assessment model and its parameters employing polynomial theory.

Keywords: deep learning, risk assessment, neuro fuzzy, pipelines

Procedia PDF Downloads 292
28423 A Resource Based View: Perspective on Acquired Human Resource towards Competitive Advantage

Authors: Monia Hassan Abdulrahman

Abstract:

Resource-based view is built on many theories in addition to diverse perspectives, we extend this view placing emphasis on human resources addressing the tools required to sustain competitive advantage. Highlighting on several theories and judgments, assumptions were established to clearly reach if resource possession alone suffices for the sustainability of competitive advantage, or necessary accommodation are required for better performance. New practices were indicated in terms of resources used in firms, these practices were implemented on the human resources in particular, and results were developed in compliance to the mentioned assumptions. Such results drew attention to the significance of practices that provide enhancement of human resources that have a core responsibility of maintaining resource-based view for an organization to lead the way to gaining competitive advantage.

Keywords: competitive advantage, resource based value, human resources, strategic management

Procedia PDF Downloads 391
28422 The Roles of Pay Satisfaction and Intent to Leave on Counterproductive Work Behavior among Non-Academic University Employees

Authors: Abiodun Musbau Lawal, Sunday Samson Babalola, Uzor Friday Ordu

Abstract:

Issue of employees counterproductive work behavior in government owned organization in emerging economies has continued to be a major concern. This study investigated the factors of pay satisfaction, intent to leave and age as predictors of counterproductive work behavior among non-academic employee in a Nigerian federal government owned university. A sample of 200 non-academic employees completed questionnaires. Hierarchical multiple regression was conducted to determine the contribution of each of the predictor variables on the criterion variable on counterproductive work behavior. Results indicate that age of participants (β = -.18; p < .05) significantly independently predicted CWB by accounting for 3% of the explained variance. Addition of pay satisfaction (β = -.14; p < .05) significantly accounted for 5% of the explained variance, while intent to leave (β = -.17; p < .05) further resulted in 8% of the explained variance in counterproductive work behavior. The importance of these findings with regards to reduction in counterproductive work behavior is highlighted.

Keywords: counterproductive, work behaviour, pay satisfaction, intent to leave

Procedia PDF Downloads 385
28421 A Comprehensive Study on Quality Assurance in Game Development

Authors: Maria Komal, Zaineb Khalil, Mehreen Sirshar

Abstract:

Due to the recent technological advancements, Games have become one of the most demanding applications. Gaming industry is rapidly growing and the key to success in this industry is the development of good quality games, which is a highly competitive issue. The ultimate goal of game developers is to provide player’s satisfaction by developing high-quality games. This research is the comprehensive survey of techniques followed by game industries to ensure games quality. After analysis of various techniques, it has been found that quality simulation according to ISO standards and play test methods are used to ensure games quality. Because game development requires cross-disciplined team, an increasing trend towards distributed game development has been observed. This paper evaluates the strengths and weaknesses of current methodologies used in game industry and draws a conclusion. We have also proposed quality parameters which can be used as a heuristic framework to identify those attributes which have high testing priorities.

Keywords: game development, computer games, video games, gaming industry, quality assurance, playability, user experience

Procedia PDF Downloads 534
28420 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 332
28419 Exploring the Carer Gender Support Gap: Results from Freedom of Information Requests to Adult Social Services in England

Authors: Stephen Bahooshy

Abstract:

Our understanding of gender inequality has advanced in recent years. Differences in pay and societal gendered behaviour expectations have been emphasized. It is acknowledged globally that gender shapes everyone’s experiences of health and social care, including access to care, use of services and products, and the interaction with care providers. NHS Digital in England collects data from local authorities on the number of carers and people with support needs and the services they access. This data does not provide a gender breakdown. Caring can have many positive and negative impacts on carers’ health and wellbeing. For example, caring can improve physical health, provide a sense of pride and purpose, and reduced stress levels for those who undertake a caring role by choice. Negatives of caring include financial concerns, social isolation, a reduction in earnings, and not being recognized as a carer or involved and consulted by health and social care professionals. Treating male and female carers differently is by definition unequitable and precludes one gender from receiving the benefits of caring whilst potentially overburdening the other with the negatives of caring. In order to explore the issue on a preliminary basis, five local authorities who provide statutory adult social care services in England were sent Freedom of Information requests in 2019. The authorities were selected to include county councils and London boroughs. The authorities were asked to provide data on the amount of money spent on care at home packages to people over 65 years, broken down by gender and carer gender for each financial year between 2013 and 2019. Results indicated that in each financial year, female carers supporting someone over 65 years received less financial support for care at home support packages than male carers. Over the six-year period, this difference equated to a £9.5k deficit in financial support received on average per female carer when compared to male carers. An example of a London borough with the highest disparity presented an average weekly spend on care at home for people over 65 with a carer of £261.35 for male carers and £165.46 for female carers. Consequently, female carers in this borough received on average £95.89 less per week in care at home support than male carers. This highlights a real and potentially detrimental disparity in the care support received to female carers in order to support them to continue to care in parts of England. More research should be undertaken in this area to better explore this issue and to understand if these findings are unique to these social care providers or part of a wider phenomenon. NHS Digital should request local authorities collect data on gender in the same way that large employers in the United Kingdom are required by law to provide data on staff salaries by gender. People who allocate social care packages of support should consider the impact of gender when allocating support packages to people with support needs and who have carers to reduce any potential impact of gender bias on their decision-making.

Keywords: caregivers, carers, gender equality, social care

Procedia PDF Downloads 165
28418 Prediction of Unsteady Heat Transfer over Square Cylinder in the Presence of Nanofluid by Using ANN

Authors: Ajoy Kumar Das, Prasenjit Dey

Abstract:

Heat transfer due to forced convection of copper water based nanofluid has been predicted by Artificial Neural network (ANN). The present nanofluid is formed by mixing copper nano particles in water and the volume fractions are considered here are 0% to 15% and the Reynolds number are kept constant at 100. The back propagation algorithm is used to train the network. The present ANN is trained by the input and output data which has been obtained from the numerical simulation, performed in finite volume based Computational Fluid Dynamics (CFD) commercial software Ansys Fluent. The numerical simulation based results are compared with the back propagation based ANN results. It is found that the forced convection heat transfer of water based nanofluid can be predicted correctly by ANN. It is also observed that the back propagation ANN can predict the heat transfer characteristics of nanofluid very quickly compared to standard CFD method.

Keywords: forced convection, square cylinder, nanofluid, neural network

Procedia PDF Downloads 321
28417 Knowledge Representation Based on Interval Type-2 CFCM Clustering

Authors: Lee Myung-Won, Kwak Keun-Chang

Abstract:

This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.

Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation

Procedia PDF Downloads 322
28416 Enhancement of Radiosensitization by Aptamer 5TR1-Functionalized AgNCs for Triple-Negative Breast Cancer

Authors: Xuechun Kan, Dongdong Li, Fan Li, Peidang Liu

Abstract:

Triple-negative breast cancer (TNBC) is the most malignant subtype of breast cancer with a poor prognosis, and radiotherapy is one of the main treatment methods. However, due to the obvious resistance of tumor cells to radiotherapy, high dose of ionizing radiation is required during radiotherapy, which causes serious damage to normal tissues near the tumor. Therefore, how to improve radiotherapy resistance and enhance the specific killing of tumor cells by radiation is a hot issue that needs to be solved in clinic. Recent studies have shown that silver-based nanoparticles have strong radiosensitization, and silver nanoclusters (AgNCs) also provide a broad prospect for tumor targeted radiosensitization therapy due to their ultra-small size, low toxicity or non-toxicity, self-fluorescence and strong photostability. Aptamer 5TR1 is a 25-base oligonucleotide aptamer that can specifically bind to mucin-1 highly expressed on the membrane surface of TNBC 4T1 cells, and can be used as a highly efficient tumor targeting molecule. In this study, AgNCs were synthesized by DNA template based on 5TR1 aptamer (NC-T5-5TR1), and its role as a targeted radiosensitizer in TNBC radiotherapy was investigated. The optimal DNA template was first screened by fluorescence emission spectroscopy, and NC-T5-5TR1 was prepared. NC-T5-5TR1 was characterized by transmission electron microscopy, ultraviolet-visible spectroscopy and dynamic light scattering. The inhibitory effect of NC-T5-5TR1 on cell activity was evaluated using the MTT method. Laser confocal microscopy was employed to observe NC-T5-5TR1 targeting 4T1 cells and verify its self-fluorescence characteristics. The uptake of NC-T5-5TR1 by 4T1 cells was observed by dark-field imaging, and the uptake peak was evaluated by inductively coupled plasma mass spectrometry. The radiation sensitization effect of NC-T5-5TR1 was evaluated through cell cloning and in vivo anti-tumor experiments. Annexin V-FITC/PI double staining flow cytometry was utilized to detect the impact of nanomaterials combined with radiotherapy on apoptosis. The results demonstrated that the particle size of NC-T5-5TR1 is about 2 nm, and the UV-visible absorption spectrum detection verifies the successful construction of NC-T5-5TR1, and it shows good dispersion. NC-T5-5TR1 significantly inhibited the activity of 4T1 cells and effectively targeted and fluoresced within 4T1 cells. The uptake of NC-T5-5TR1 reached its peak at 3 h in the tumor area. Compared with AgNCs without aptamer modification, NC-T5-5TR1 exhibited superior radiation sensitization, and combined radiotherapy significantly inhibited the activity of 4T1 cells and tumor growth in 4T1-bearing mice. The apoptosis level of NC-T5-5TR1 combined with radiation was significantly increased. These findings provide important theoretical and experimental support for NC-T5-5TR1 as a radiation sensitizer for TNBC.

Keywords: 5TR1 aptamer, silver nanoclusters, radio sensitization, triple-negative breast cancer

Procedia PDF Downloads 61
28415 Investigate and Solving Analytically at Vibrational structures (In Arched Beam to Bridges) by New Method “AGM”

Authors: M. R. Akbari, P. Soleimani, R. Khalili, Sara Akbari

Abstract:

Analyzing and modeling the vibrational behavior of arched bridges during the earthquake in order to decrease the exerted damages to the structure is a very hard task to do. This item has been done analytically in the present paper for the first time. Due to the importance of building arched bridges as a great structure in the human being civilization and its specifications such as transferring vertical loads to its arcs and the lack of bending moments and shearing forces, this case study is devoted to this special issue. Here, the nonlinear vibration of arched bridges has been modeled and simulated by an arched beam with harmonic vertical loads and its behavior has been investigated by analyzing a nonlinear partial differential equation governing the system. It is notable that the procedure has been done analytically by AGM (Akbari, Ganji Method). Furthermore, comparisons have been made between the obtained results by numerical Method (rkf-45) and AGM in order to assess the scientific validity.

Keywords: new method (AGM), arched beam bridges, angular frequency, harmonic loads

Procedia PDF Downloads 297
28414 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 123
28413 Research on the Performance Management of Social Organizations Participating in Home-Based Care

Authors: Qiuhu Shao

Abstract:

Community home-based care service system, which is based on the family pension, supported by community pension and supplied by institutions pension, is an effective pension system to solve the current situation of China's accelerated aging. However, due to the fundamental realities of our country, the government is not able to bear the unilateral supply of the old-age service of the community. Therefore, based on the theory of welfare pluralism, the participation of social organizations in the home-based care service center has become an important part of the diversified supply of the old-age service for the elderly. Meanwhile, the home-based care service industry is still in the early stage, the management is relatively rough, which resulted in a large number of social resources waste. Thus, scientific, objective and long-term implementation is needed for social organizations to participate in home-based care services to guide its performance management. In order to realize the design of the performance management system, the author has done a research work that clarifies the research status of social organization's participation in home-based care service. Relevant theories such as welfare pluralism, community care theory, and performance management theory have been used to demonstrate the feasibility of data envelopment analysis method in social organization performance research. This paper analyzes the characteristics of the operation mode of the home-based care service center, and hackles the national as well as local documents, standards and norms related to the development of the home-based care industry, particularly studies those documents in Nanjing. Based on this, the paper designed a set of performance management PDCA system for home-based care service center in Nanjing and clarified each step of the system in detail. Subsequently, the research methods of performance evaluation and performance management and feedback, which are two core steps of performance management have been compared and screened in order to establish the overall framework of the performance management system of the home-based care service center. Through a large number of research, the paper summarized and analyzed the characteristics of the home-based care service center. Based on the research results, combined with the practice of the industry development in Nanjing, the paper puts forward a targeted performance evaluation index system of home-based care service center in Nanjing. Finally, the paper evaluated and sub-filed the performance of 186 home-based care service centers in Nanjing and then designed the performance optimization direction and performance improvement path based on the results. This study constructs the index system of performance evaluation of home-based care service and makes the index detailed to the implementation level, and constructs the evaluation index system which can be applied directly. Meanwhile, the quantitative evaluation of social organizations participating in the home-based care service changed the subjective impression in the previous practice of evaluation.

Keywords: data envelopment analysis, home-based care, performance management, social organization

Procedia PDF Downloads 270
28412 Using the Notion of Terrorism Irrespective of the Principle of Legality While Countering Terrorism

Authors: Tugce Duygu Koksal

Abstract:

In recent years, given the fact that the acts of terrorism and the threat of the latter are taking place without any border and distinction, it has led the states to deal with the terrorism as a priority issue. More recently, as seen in different countries during state of emergency, the adoption of anti-terrorism measures motivated by the sole need of the prevention of terrorism targets directly the fundamental rights of individuals. Therefore, a contribution to the understanding of the value of the principle of legality is becoming more and more important nowadays. This paper aims to reflect the probable effects of the adoption of anti-terrorism measures regardless of the principle of legality, on the fundamental rights. In this respect, this paper will first discuss the margin of appreciation of the national authorities by countering terrorism, and then, the importance of the respect of the legality of the anti-terrorism measures will be examined in the light of actual examples. Indeed, one of the major findings of this study is the fact that the anti-terrorism laws and measures were taken in this framework must be subject to close scrutiny in democracies, which adopted the principle of the rule of law and respect human rights. Although the state's margin of appreciation in the field of counter-terrorism is broad, these measures which are based on the legitimate aim of a democracies’ legitimate right to protect itself against the activities of terrorist organizations should have the legal basis and be strictly required by the exigencies of the fight against terrorism. While combating terrorism, the legal basis shall only be achieved if the legal consequences of an individuals’ actions related to terrorism shall be clear and foreseeable by the individuals of a society. On the other hand, particularly during the state of emergency, the ambiguity of the law might be used to include a wide range of actions under acts of terrorism. This is becoming more dangerous where freedom of expression, freedom of the press, freedom of association and the right to information is in the substance of these actions. Disregarding the principle of legality is susceptible to create a chilling effect on the exercise of human rights, and therefore, the fight against terrorism can be transformed into a repressive regime on opponents. As a result, the efforts to counter terrorism of the national authorities irrespective of the principle of legality are susceptible to cause a transformation of the rule of law to a state of law which cannot be appreciated in a democratic society.

Keywords: anti-terrorism measures, chilling effect, predictability, the principle of legality, state of emergency

Procedia PDF Downloads 203
28411 Choosing the Green Energy Option: A Willingness to Pay Study of Metro Manila Residents for Solar Renewable Energy

Authors: Paolo Magnata

Abstract:

The energy market in the Philippines remains to have one of the highest electricity rates in the region averaging at US$0.16/kWh (PHP6.89/kWh), excluding VAT, as opposed to the overall energy market average of US$0.13/kWh. The movement towards renewable energy, specifically solar energy, will pose as an expensive one with the country’s energy sector providing Feed-in-Tariff rates as high as US$0.17/kWh (PHP8.69/kWh) for solar energy power plants. Increasing the share of renewables at the current state of the energy regulatory background would yield a three-fold increase in residential electricity bills. The issue lies in the uniform charge that consumers bear regardless of where the electricity is sourced resulting in rates that only consider costs and not the consumers. But if they are given the option to choose where their electricity comes from, a number of consumers may potentially choose economically costlier sources of electricity due to higher levels of utility coupled with the willingness to pay of consuming environmentally-friendly sourced electricity. A contingent valuation survey was conducted to determine their willingness-to-pay for solar energy on a sample that was representative of Metro Manila to elicit their willingness-to-pay and a Single Bounded Dichotomous Choice and Double Bounded Dichotomous Choice analysis was used to estimate the amount they were willing to pay. The results showed that Metro Manila residents are willing to pay a premium on top of their current electricity bill amounting to US$5.71 (PHP268.42) – US$9.26 (PHP435.37) per month which is approximately 0.97% - 1.29% of their monthly household income. It was also discovered that besides higher income of households, a higher level of self-perceived knowledge on environmental awareness significantly affected the likelihood of a consumer to pay the premium. Shifting towards renewable energy is an expensive move not only for the government because of high capital investment but also to consumers; however, the Green Energy Option (a policy mechanism which gives consumers the option to decide where their electricity comes from) can potentially balance the shift of the economic burden by transitioning from a uniformly charged electricity rate to equitably charging consumers based on their willingness to pay for renewably sourced energy.

Keywords: contingent valuation, dichotomous choice, Philippines, solar energy

Procedia PDF Downloads 344
28410 The Potential of Dinar (Gold) Currency as the Main Object Transaction in Indonesia

Authors: Muhammad Ilham Agus Salim, Mohammad Ali

Abstract:

In this article, we have elaborated a study over the nature of Islamic financial transaction by comparing between Dinar and IDR currency in Indonesia. We have found the interesting issue among scholars and practitioners in which Dinar would be a single currency ASEAN Economic Community (AEC), then becoming motivation and added value research. The assessment among dinar volatility analysis for three years ago and IDR fluctuation as well as outlook qualitative test regarding dinar are components of analysis that weak Indonesian currency should be altered to be better coinage. The value of dinar more stable than IDR and also eligible as a currency e.g. limited quantities, easy to carry, durable, easy to saved, and has the same quality. On the other hand, the existing of IDR has defeated by inflation. The EViews program explained that Dinar at current level still fluctuate, but in the first different have fixed variant. The result of analysis describing that dinar has potential as the medium exchange, because the material of dinar is relevant and feasible since 14 century until present. Therefore, dinar should be considered to solve Indonesia crisis today.

Keywords: medium of exchange, dinar & IDR currency, volatility analysis, EViews program

Procedia PDF Downloads 363
28409 The Pharmacogenetics of Type 1 Cannabinoid Receptor (CB1) Gene Associated with Adverse Drug Reactions in Thai Patients

Authors: Kittitara Chunlakittiphan, Patompong Satapornpong

Abstract:

Introduction: The variation of genetics affects how our body responds to pharmaceuticals elucidates the correlation between long-term use of medical cannabis and adverse drug reactions (ADRs). Medical cannabis is regarded as the treatment for chronic pain, cancer pain, acute pain, psychological disorders, multiple sclerosis and migraine management. However, previous studies have shown that delta-9-Tetrahydrocannabinol (THC), an ingredient found in cannabis, was the cause of ADRs in CB1 receptors found in humans. Previous research suggests that distributions of the cannabinoid type 1 (CB1) receptor gene and pharmacogenetic markers, which vary amongst different populations, might affect incidences of ADRs. Although there is an evident need to investigate the level of the CB1 receptor gene (rs806365), studies on the distribution of CB1-pharmacogenetics markers in Thai patients are limited. Objective: Therefore, the aim of this study is to investigate the distribution of the rs806365 polymorphism in Thai patients who have been treated with medical cannabis. Materials and Methods: We enrolled 31 Thai patients with THC-induced ADRs and 34 THC-tolerant controls to take part in this study. All patients with THC-induced ADRs were accessed through a review of medical records by physicians. EDTA blood of 3ml was collected to obtain the CNR1 gene (rs806365) and genotyping of this gene was conducted using the real-time PCR ViiA7 (ABI, Foster City, CA, USA) following the manufacturer’s instruction. Results: The sample consisted of 65 patients (40/61.54%) were females and (25/38.46%) were males, with an age range of 19-87 years, who have been treated with medical cannabis. In this study, the most common THC-induced ADRs were dry mouth and/or dry throat, tachycardia, nausea, and arrhythmia. Across the whole sample, we found that 52.31% of Thai patients carried a heterozygous variant (rs806365, CT allele). Moreover, the number of rs806365 (CC, homozygous variant) carriers totaled seventeen people (26.15%) amongst the subjects of Thai patients treated with medical cannabis. Furthermore, 17 out of 22 patients (77.27%) who experienced severe ADRs: Tachycardia and/or arrhythmia, carried an abnormal rs806365 gene (CT and CC alleles). Conclusions: The results propose that the rs806365 gene is widely distributed amongst the Thai population and there is a link between this gene and vulnerability to developing THC-induced ADRs after being treated with medical cannabis. Therefore, it is necessary to screen for the rs806365 gene before using medical cannabis to treat a patient.

Keywords: rs806365, THC-induced adverse drug reactions, CB1 receptor, Thai population

Procedia PDF Downloads 101
28408 Impact of Risk Management Practices on Company Performance

Authors: Syed Atif Ali, Farzan Yahya

Abstract:

This research paper covers the issue of risk management impact on the company performance. Degree of financial leverage (DFL), degree of operating leverage (DOL) and the working capital ratio (WCR) are taken as independent variables which are the representative of risk and the earning price per share (EPS), return on assets (ROA), return on equity (ROE), Sales and Net profits which are the representative of performance. Last 10 years (2004-2013) of Cement sector of Pakistan data is chosen as sample for analyze their relations by multiple regression technique. Through analyses, it is found that WCR impact adequately on the company performance because if company has enough liquidity than it perform its operations smoothly and enhance its performance very well. DFL should be control moderately because enough DFL leads performance of company downward. On the other hand, the DOL should be less because it causes the less profitability for a company from its operations.

Keywords: degree of financial leverage (DFL), degree of operating leverage (DOL), working capital ratio (WCR), earning per share (EPS), return on equity (ROE), return on assets (ROA)

Procedia PDF Downloads 454
28407 Mobile Application Set to Empower SME Farmers in Peri-Urban Sydney Region

Authors: A. Hol

Abstract:

Even in the well developed countries like Australia, Small to Medium Farmers do not often have the power over the market prices as they are more often than not set by the farming agents. This in turn creates problems as farmers only get to know for how much their produce has been sold for by the agents three to four weeks after the sale has taken the place. To see and identify if and how peri-urban Sydney farmers could be assisted, carefully selected group of peri-urban Sydney farmers of the stone fruit has been interviewed. Following the case based interviews collected data was analyzed in detail using the Scenario Based Transformation principles. Analyzed data was then used to create a most common transformation case. The case identified that a mobile web based system could be develop so that framers can monitor agent earnings and in turn gain more power over the markets. It is expected that after the system has been in action for six months to a year, farmers will become empowered and they will gain means to monitor the market and negotiate agent prices.

Keywords: mobile applications, farming, scenario-based analysis, scenario-based transformation, user empowerment

Procedia PDF Downloads 382
28406 Periplasmic Expression of Anti-RoxP Antibody Fragments in Escherichia Coli.

Authors: Caspar S. Carson, Gabriel W. Prather, Nicholas E. Wong, Jeffery R. Anton, William H. McCoy

Abstract:

Cutibacterium acnes is a commensal bacterium found on human skin that has been linked to acne. C. acnes can also be an opportunistic pathogen when it infiltrates the body during surgery. This pathogen can cause dangerous infections of medical implants, such as shoulder replacements, leading to life-threatening blood infections. Compounding this issue, C. acnes resistance to many antibiotics has become an increasing problem worldwide, creating a need for special forms of treatment. C. acnes expresses the protein RoxP, and it requires this protein to colonize human skin. Though this protein is required for C. acnes skin colonization, its function is not yet understood. Inhibition of RoxP function might be an effective treatment for C. acnes infections. To develop such reagents, the McCoy Laboratory generated four unique anti-RoxP antibodies. Preliminary studies in the McCoy Lab have established that each antibody binds a distinct site on RoxP. To assess the potential of these antibodies as therapeutics, it is necessary to specifically characterize these antibody epitopes and evaluate them in assays that assess their ability to inhibit RoxP-dependent C. acnes growth. To provide material for these studies, an antibody expression construct, Fv-clasp(v2), was adapted to encode anti-RoxP antibody sequences. The author hypothesizes that this expression strategy can produce sufficient amounts of >95% pure antibody fragments for further characterization of these antibodies. Four anti-RoxP Fv-clasp(v2) expression constructs (pET vector-based) were transformed into E. coli BL21-Gold(DE3) cells and a small-scale expression and purification trial was performed for each construct to evaluate anti-RoxP Fv-clasp(v2) yield and purity. Successful expression and purification of these antibody constructs will allow for their use in structural studies, such as protein crystallography and cryogenic electron microscopy. Such studies would help to define the antibody binding sites on RoxP, which could then be leveraged in the development of certain methods to treat C. acnes infection through RoxP inhibition.

Keywords: structural biology, protein expression, infectious disease, antibody, therapeutics, E. coli

Procedia PDF Downloads 60
28405 Examining Institutional and Structural Racism to Address Persistent Racial Inequities in US Cities

Authors: Zoe Polk

Abstract:

In cities across the US, race continues to predict an individual’s likelihood to be employed, to receive a quality education, to live in a safe neighborhood, to life expectancy to contacts with the criminal justice system. Deep and pervasive disparities exist despite laws enacted at the federal, state and local level to eliminate discrimination. This paper examines the strengths of the U.S. civil rights movement in making discrimination a moral issue. Following the passage of the 1964 Civil Rights Act, cities throughout the US adopted laws that mirror the language, theories of practice and enforcement of the law. This paper argues that while those laws were relevant to the way discrimination was conducted in that time, they are limited in their ability to help cities address discrimination today. This paper reviews health indicators This paper concludes that in order for cities to create environments where race no longer predicts one’s success, cities must conduct institutional and structural racism audits.

Keywords: racism, racial equity, constitutional law, social justice

Procedia PDF Downloads 368
28404 How to “Eat” without Actually Eating: Marking Metaphor with Spanish Se and Italian Si

Authors: Cinzia Russi, Chiyo Nishida

Abstract:

Using data from online corpora (Spanish CREA, Italian CORIS), this paper examines the relatively understudied use of Spanish se and Italian si exemplified in (1) and (2), respectively. (1) El rojo es … el que se come a los demás. ‘The red (bottle) is the one that outshines/*eats the rest.’(2) … ebbe anche la saggezza di mangiarsi tutto il suo patrimonio. ‘… he even had the wisdom to squander/*eat all his estate.’ In these sentences, se/si accompanies the consumption verb comer/mangiare ‘to eat’, without which the sentences would not be interpreted appropriately. This se/si cannot readily be attributed to any of the multiple functions so far identified in the literature: reflexive, ergative, middle/passive, inherent, benefactive, and complete consumptive. In particular, this paper argues against the feasibility of a recent construction-based analysis of sentences like (1) and (2), which situates se/si within a prototype-based network of meanings all deriving from the central meaning of 'COMPLETE CONSUMPTION' (e.g., Alice se comió toda la torta/Alicesi è mangiata tutta la torta ‘John ate the whole cake’). Clearly, the empirical adequacy of such an account is undermined by the fact that the events depicted in the se/si-sentences at issue do not always entail complete consumption because they may lack an INCREMENTAL THEME, the distinguishing property of complete consumption. Alternatively, it is proposed that the sentences under analysis represent instances of verbal METAPHORICAL EXTENSION: se/si represents an explicit marker of this cognitive process, which has independently developed from the complete consumptive se/si, and the meaning extension is captured by the general tenets of Conceptual Metaphor Theory (CMT). Two conceptual domains, Source (DS) and target (DT), are related by similarity, assigning an appropriate metaphorical interpretation to DT. The domains paired here are comer/mangiare (DS) and comerse/mangiarsi (DT). The eating event (DS) involves (a) the physical process of xEATER grinding yFOOD-STUFF into pieces and swallowing it; and (b) the aspect of xEATER savoring yFOOD-STUFF and being nurtured by it. In the physical act of eating, xEATER has dominance and exercises his force over yFOOD-STUFF. This general sense of dominance and force is mapped onto DT and is manifested in the ways exemplified in (1) and (2), and many others. According to CMT, two other properties are observed in each pair of DS & DT. First, DS tends to be more physical and concrete and DT more abstract, and systematic mappings are established between constituent elements in DS and those in DT: xEATER corresponds to the element that destroys and yFOOD-STUFF to the element that is destroyed in DT, as exemplified in (1) and (2). Though the metaphorical extension marker se/si appears by far most frequently with comer/mangiare in the corpora, similar systematic mappings are observed in several other verb pairs, for example, jugar/giocare ‘to play (games)’ and jugarse/giocarsi ‘to jeopardize/risk (life, reputation, etc.)’, perder/perdere ‘to lose (an object)’ and perderse/perdersi ‘to miss out on (an event)’, etc. Thus, this study provides evidence that languages may indeed formally mark metaphor using means available to them.

Keywords: complete consumption value, conceptual metaphor, Italian si/Spanish se, metaphorical extension.

Procedia PDF Downloads 53