Search results for: internet architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3244

Search results for: internet architecture

844 Amifostine Analogue, Drde-30, Attenuates Radiation-Induced Lung Injury in Mice

Authors: Aastha Arora, Vikas Bhuria, Saurabh Singh, Uma Pathak, Shweta Mathur, Puja P. Hazari, Rajat Sandhir, Ravi Soni, Anant N. Bhatt, Bilikere S. Dwarakanath

Abstract:

Radiotherapy is an effective curative and palliative option for patients with thoracic malignancies. However, lung injury, comprising of pneumonitis and fibrosis, remains a significant clin¬ical complication of thoracic radiation, thus making it a dose-limiting factor. Also, injury to the lung is often reported as part of multi-organ failure in victims of accidental radiation exposures. Radiation induced inflammatory response in the lung, characterized by leukocyte infiltration and vascular changes, is an important contributing factor for the injury. Therefore, countermeasure agents to attenuate radiation induced inflammatory response are considered as an important approach to prevent chronic lung damage. Although Amifostine, the widely used, FDA approved radio-protector, has been found to reduce the radiation induced pneumonitis during radiation therapy of non-small cell lung carcinoma, its application during mass and field exposure is limited due to associated toxicity and ineffectiveness with the oral administration. The amifostine analogue (DRDE-30) overcomes this limitation as it is orally effective in reducing the mortality of whole body irradiated mice. The current study was undertaken to investigate the potential of DRDE-30 to ameliorate radiation induced lung damage. DRDE-30 was administered intra-peritoneally, 30 minutes prior to 13.5 Gy thoracic (60Co-gamma) radiation in C57BL/6 mice. Broncheo- alveolar lavage fluid (BALF) and lung tissues were harvested at 12 and 24 weeks post irradiation for studying inflammatory and fibrotic markers. Lactate dehydrogenase (LDH) leakage, leukocyte count and protein content in BALF were used as parameters to evaluate lung vascular permeability. Inflammatory cell signaling (p38 phosphorylation) and anti-oxidant status (MnSOD and Catalase level) was assessed by Western blot, while X-ray CT scan, H & E staining and trichrome staining were done to study the lung architecture and collagen deposition. Irradiation of the lung increased the total protein content, LDH leakage and total leukocyte count in the BALF, reflecting endothelial barrier dysfunction. These disruptive effects were significantly abolished by DRDE-30, which appear to be linked to the DRDE-30 mediated abrogation of activation of the redox-sensitive pro- inflammatory signaling cascade, the MAPK pathway. Concurrent administration of DRDE-30 with radiation inhibited radiation-induced oxidative stress by strengthening the anti-oxidant defense system and abrogated p38 mitogen-activated protein kinase activation, which was associated with reduced vascular leak and macrophage recruitment to the lungs. Histopathological examination (by H & E staining) of the lung showed radiation-induced inflammation of the lungs, characterized by cellular infiltration, interstitial oedema, alveolar wall thickening, perivascular fibrosis and obstruction of alveolar spaces, which were all reduced by pre-administration of DRDE-30. Structural analysis with X-ray CT indicated lung architecture (linked to the degree of opacity) comparable to un-irradiated mice that correlated well with the lung morphology and reduced collagen deposition. Reduction in the radiation-induced inflammation and fibrosis brought about by DRDE-30 resulted in a profound increase in animal survival (72 % in the combination vs 24% with radiation) observed at the end of 24 weeks following irradiation. These findings establish the potential of the Amifostine analogue, DRDE-30, in reducing radiation induced pulmonary injury by attenuating the inflammatory and fibrotic responses.

Keywords: amifostine, fibrosis, inflammation, lung injury radiation

Procedia PDF Downloads 495
843 Monitor Vehicle Speed Using Internet of Things Based Wireless Sensor Network System

Authors: Akber Oumer Abdurezak

Abstract:

Road traffic accident is a major problem in Ethiopia, resulting in the deaths of many people and potential injuries and crash every year and loss of properties. According to the Federal Transport Authority, one of the main causes of traffic accident and crash in Ethiopia is over speeding. Implementation of different technologies is used to monitor the speed of vehicles in order to minimize accidents and crashes. This research aimed at designing a speed monitoring system to monitor the speed of travelling vehicles and movements, reporting illegal speeds or overspeeding vehicles to the concerned bodies. The implementation of the system is through a wireless sensor network. The proposed system can sense and detect the movement of vehicles, process, and analysis the data obtained from the sensor and the cloud system. The data is sent to the central controlling server. The system contains accelerometer and gyroscope sensors to sense and collect the data of the vehicle. Arduino to process the data and Global System for Mobile Communication (GSM) module for communication purposes to send the data to the concerned body. When the speed of the vehicle exceeds the allowable speed limit, the system sends a message to database as “over speeding”. Both accelerometer and gyroscope sensors are used to collect acceleration data. The acceleration data then convert to speed, and the corresponding speed is checked with the speed limit, and those above the speed limit are reported to the concerned authorities to avoid frequent accidents. The proposed system decreases the occurrence of accidents and crashes due to overspeeding and can be used as an eye opener for the implementation of other intelligent transport system technologies. This system can also integrate with other technologies like GPS and Google Maps to obtain better output.

Keywords: accelerometer, IOT, GSM, gyroscope

Procedia PDF Downloads 55
842 Evaluation of Digital Marketing Strategies by Behavioral Economics

Authors: Sajjad Esmaeili Aghdam

Abstract:

Economics typically conceptualizes individual behavior as the consequence of external states, for example, budgets and prices (or respective beliefs) and choices. As the main goal, we focus on the influence of a range of Behavioral Economics factors on Strategies of Digital Marketing, evaluation of strategies and deformation of it into highly prospective marketing strategies. The different forms of behavioral prospects all lead to the succeeding two main results. First, the steadiness of the economic dynamics in a currency union be contingent fatefully on the level of economic incorporation. More economic incorporation leads to more steady economic dynamics. Electronic word-of-mouth (eWOM) is “all casual communications focused at consumers through Internet-based technology connected to the usage or characteristics of specific properties and services or their venders.” eWOM can take many methods, the most significant one being online analyses. Writing this paper, 72 articles have been gathered, focusing on the title and the aim of the article from research search engines like Google Scholar, Web of Science, and PubMed. Recent research in strategic management and marketing proposes that markets should not be viewed as a given and deterministic setting, exogenous to the firm. Instead, firms are progressively abstracted as dynamic inventors of market prospects. The use of new technologies touches all spheres of the modern lifestyle. Social and economic life becomes unbearable without fast, applicable, first-class and fitting material. Psychology and economics (together known as behavioral economics) are two protruding disciplines underlying many theories in marketing. The wide marketing works papers consumers’ none balanced behavior even though behavioral biases might not continuously be steadily called or officially labeled.

Keywords: behavioral economics, digital marketing, marketing strategy, high impact strategies

Procedia PDF Downloads 165
841 Application of the EU Commission Waste Management Methodology Level(s) to a Construction and a Demolition in North-West Romania.

Authors: Valean Maria

Abstract:

Construction and demolition waste management is a timely topic, due to the urgency of its transition to sustainability. This sector is responsible for over a third of the waste generated in the E.U., while the legislation requires a proportion of at least 70% preparation for reuse and recycle, excluding backfilling. To this end, the E.U. Commission has provided the Level(s) methodology, allowing for the standardized planning and reporting of waste quantities across all levels of the construction process, from the architecture, to the demolition, from the estimation stage, to the actual measurements at the end of the operations. We applied Level(s) for the first time to the Romanian context, a developing E.U. country in which illegal dumping of contruction waste in nature and landfills, are still common practice. We performed the desk study of the buildings’ documents, followed by field studies of the sites, and finally the insertion and calculation of statistical data of the construction and demolition waste. We learned that Romania is far from the E.U. average in terms of the initial estimations of waste, with some numbers being higher, others lower, and that the price of evacuation to landfills is significantly lower in the developing country, a possible barrier to adopting the new regulations. Finally, we found that concrete is the predominant type waste, in terms of quantity as well as cost of disposal. Further directions of research are provided, such as mapping out all of the alternative facilities in the region and the calculation of the financial costs and of the CO2 footprint, for preparing and delivering waste sustainably, for a more sound and locally adapted model of waste management.

Keywords: construction, waste, management, levels, EU

Procedia PDF Downloads 62
840 The Reality of the Digital Inequality and Its Negative Impact on Virtual Learning during the COVID-19 Pandemic: The South African Perspective

Authors: Jacob Medupe

Abstract:

Life as we know it has changed since the global outbreak of Coronavirus Disease 2019 (COVID-19) and business as usual will not continue. The human impact of the COVID-19 crisis is already immeasurable. Moreover, COVID-19 has already negatively impacted economies, livelihoods and disrupted food systems around the world. The disruptive nature of the Corona virus has affected every sphere of life including the culture and teaching and learning. Right now the majority of education research is based around classroom management techniques that are no longer necessary with digital delivery. Instead there is a great need for new data about how to make the best use of the one-on-one attention that is now becoming possible (Diamandis & Kotler, 2014). The COVID-19 pandemic has necessitated an environment where the South African learners are focused to adhere to social distancing in order to minimise the wild spread of the Corona virus. This arrangement forces the student to utilise the online classroom technologies to continue with the lessons. The historical reality is that the country has not made much strides on the closing of the digital divide and this is particularly a common status quo in the deep rural areas. This will prove to be a toll order for most of the learners affected by the Corona Virus to be able to have a seamless access to the online learning facilities. The paper will seek to look deeply into this reality and how the Corona virus has brought us to the reality that South Africa remains a deeply unequal society in every sphere of life. The study will also explore the state of readiness for education system around the online classroom environment.

Keywords: virtual learning, virtual classroom, COVID-19, Corona virus, internet connectivity, blended learning, online learning, distance education, e-learning, self-regulated Learning, pedagogy, digital literacy

Procedia PDF Downloads 113
839 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 149
838 Modeling Factors Influencing Online Shopping Intention among Consumers in Nigeria: A Proposed Framework

Authors: Abubakar Mukhtar Yakasai, Muhammad Tahir Jan

Abstract:

Purpose: This paper is aimed at exploring factors influencing online shopping intention among the young consumers in Nigeria. Design/Methodology/approach: The paper adopted and extended Technology Acceptance Model (TAM) as the basis for literature review. Additionally, the paper proposed a framework with the inclusion of culture as a moderating factor of consumer online shopping intention among consumers in Nigeria. Findings: Despite high rate of internet penetration in Nigerian, as well as the rapid advancement of online shopping in the world, little attention was paid to this important revolution specifically among Nigeria’s consumers. Based on the review of extant literature, the TAM extended to include perceived risk and enjoyment (PR and PE) was discovered to be a better alternative framework for predicting Nigeria’s young consumers’ online shopping intention. The moderating effect of culture in the proposed model is shown to help immensely in ascertaining differences, if any, between various cultural groups among online shoppers in Nigeria. Originality/ value: The critical analysis of different factors will assist practitioners (like online retailers, e-marketing managers, website developers, etc.) by signifying which combinations of factors can best predict consumer online shopping behaviour in particular instances, thereby resulting in effective value delivery. Online shopping is a newly adopted technology in Nigeria, hence the paper will give a clear focus for effective e-marketing strategy. In addition, the proposed framework in this paper will guide future researchers by providing a tool for systematic evaluation and testing of real empirical situation of online shopping in Nigeria.

Keywords: online shopping, perceived ease of use, perceived usefulness, perceived enjoyment, technology acceptance model, Nigeria

Procedia PDF Downloads 259
837 Social Networks Global Impact on Protest Movements and Human Rights Activism

Authors: Marcya Burden, Savonna Greer

Abstract:

In the wake of social unrest around the world, protest movements have been captured like never before. As protest movements have evolved, so too have their visibility and sources of coverage. Long gone are the days of print media as our only glimpse into the action surrounding a protest. Now, with social networks such as Facebook, Instagram and Snapchat, we have access to real-time video footage of protest movements and human rights activism that can reach millions of people within seconds. This research paper investigated various social media network platforms’ statistical usage data in the areas of human rights activism and protest movements, paralleling with other past forms of media coverage. This research demonstrates that social networks are extremely important to protest movements and human rights activism. With over 2.9 billion users across social media networks globally, these platforms are the heart of most recent protests and human rights activism. This research shows the paradigm shift from the Selma March of 1965 to the more recent protests of Ferguson in 2014, Ni Una Menos in 2015, and End Sars in 2018. The research findings demonstrate that today, almost anyone may use their social networks to protest movement leaders and human rights activists. From a student to an 80-year-old professor, the possibility of reaching billions of people all over the world is limitless. Findings show that 82% of the world’s internet population is on social networks 1 in every 5 minutes. Over 65% of Americans believe social media highlights important issues. Thus, there is no need to have a formalized group of people or even be known online. A person simply needs to be engaged on their respective social media networks (Facebook, Twitter, Instagram, Snapchat) regarding any cause they are passionate about. Information may be exchanged in real time around the world and a successful protest can begin.

Keywords: activism, protests, human rights, networks

Procedia PDF Downloads 76
836 Study and Simulation of a Dynamic System Using Digital Twin

Authors: J.P. Henriques, E. R. Neto, G. Almeida, G. Ribeiro, J.V. Coutinho, A.B. Lugli

Abstract:

Industry 4.0, or the Fourth Industrial Revolution, is transforming the relationship between people and machines. In this scenario, some technologies such as Cloud Computing, Internet of Things, Augmented Reality, Artificial Intelligence, Additive Manufacturing, among others, are making industries and devices increasingly intelligent. One of the most powerful technologies of this new revolution is the Digital Twin, which allows the virtualization of a real system or process. In this context, the present paper addresses the linear and nonlinear dynamic study of a didactic level plant using Digital Twin. In the first part of the work, the level plant is identified at a fixed point of operation, BY using the existing method of least squares means. The linearized model is embedded in a Digital Twin using Automation Studio® from Famous Technologies. Finally, in order to validate the usage of the Digital Twin in the linearized study of the plant, the dynamic response of the real system is compared to the Digital Twin. Furthermore, in order to develop the nonlinear model on a Digital Twin, the didactic level plant is identified by using the method proposed by Hammerstein. Different steps are applied to the plant, and from the Hammerstein algorithm, the nonlinear model is obtained for all operating ranges of the plant. As for the linear approach, the nonlinear model is embedded in the Digital Twin, and the dynamic response is compared to the real system in different points of operation. Finally, yet importantly, from the practical results obtained, one can conclude that the usage of Digital Twin to study the dynamic systems is extremely useful in the industrial environment, taking into account that it is possible to develop and tune controllers BY using the virtual model of the real systems.

Keywords: industry 4.0, digital twin, system identification, linear and nonlinear models

Procedia PDF Downloads 126
835 Visualizing the Future of New York’s Southern Tier: Engaging Students to Help Create Sustainable Communities

Authors: William C. Dean

Abstract:

In the pedagogical sequence of the four- and five-year architectural programs at Alfred State, the fourth-year Urban Design Studio constitutes the first course where students directly explore design issues in the urban context. It is the first large-scale, community-based service learning project for most of the participating students. The students learn key lessons that include the benefits of working both individually and in groups of different sizes toward a common goal, accepting - and responding creatively too - criticism from stakeholders at different points in the project, and recognizing the role that local politics and activism can play in planning for community development. Above all, students are exposed to the importance of good planning in relation to preservation and community revitalization. The purpose of this paper is to discuss the use of community-based service-learning projects in undergraduate architectural education to promote student civic engagement as a means of helping communities visualize potential solutions for revitalizing their neighborhoods and business districts. A series of case studies will be presented in terms of challenges that were encountered, opportunities for student engagement and leadership, and the feasibility of sustainable community development resulting from those projects. The reader will be encouraged to consider how they can recognize needs within their own communities that could benefit from the assistance of architecture students and faculty.

Keywords: urban design, service-learning, civic engagement, community revitalization

Procedia PDF Downloads 74
834 Design and Implementation of a Software Platform Based on Artificial Intelligence for Product Recommendation

Authors: Giuseppina Settanni, Antonio Panarese, Raffaele Vaira, Maurizio Galiano

Abstract:

Nowdays, artificial intelligence is used successfully in academia and industry for its ability to learn from a large amount of data. In particular, in recent years the use of machine learning algorithms in the field of e-commerce has spread worldwide. In this research study, a prototype software platform was designed and implemented in order to suggest to users the most suitable products for their needs. The platform includes a chatbot and a recommender system based on artificial intelligence algorithms that provide suggestions and decision support to the customer. The recommendation systems perform the important function of automatically filtering and personalizing information, thus allowing to manage with the IT overload to which the user is exposed on a daily basis. Recently, international research has experimented with the use of machine learning technologies with the aim to increase the potential of traditional recommendation systems. Specifically, support vector machine algorithms have been implemented combined with natural language processing techniques that allow the user to interact with the system, express their requests and receive suggestions. The interested user can access the web platform on the internet using a computer, tablet or mobile phone, register, provide the necessary information and view the products that the system deems them most appropriate. The platform also integrates a dashboard that allows the use of the various functions, which the platform is equipped with, in an intuitive and simple way. Artificial intelligence algorithms have been implemented and trained on historical data collected from user browsing. Finally, the testing phase allowed to validate the implemented model, which will be further tested by letting customers use it.

Keywords: machine learning, recommender system, software platform, support vector machine

Procedia PDF Downloads 118
833 Analysis of Municipal Solid Waste Management in Nigeria

Authors: Anisa Gumel

Abstract:

This study examines the present condition of solid waste management in Nigeria. The author explores the challenges and opportunities affecting municipal solid waste management in "Nigeria" and determines the most profound challenges by analysing the interdependence and interrelationship among identified variables. In this study, multiple stakeholders, including 15 waste management professionals interviewed online, were utilised to identify the difficulties and opportunities affecting municipal solid waste in Nigeria. The interviews were transcribed and coded using NVivo to produce pertinent variables. An online survey of Nigerian internet and social media users was done to validate statements made by experts on the identified variable. In addition, a panel of five experts participated in a focus group discussion to discover the most influential factors that influence municipal solid waste management in Nigeria by analysing the interrelationships as well as the driving and reliant power of variables. The results show significant factors affecting municipal solid waste in Nigeria, including inadequate funding, lack of knowledge, and absence of legislation, as well as behavioural, financial, technological, and legal concerns grouped into five categories. Some claims stated by experts in the interview are supported by the survey data, while others are not. In addition, the focus group reveals patterns, correlations, and driving forces between variables that have been analysed. This study will provide decision-makers with a roadmap for resolving important waste management concerns in Nigeria and managing scarce resources effectively. It will also help non-governmental organisations combat malaria in Nigeria and other underdeveloped nations. In addition, the work contributes to the literature for future scholars to consult.

Keywords: municipal solid waste, stakeholders, public, experts

Procedia PDF Downloads 62
832 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 277
831 Exploring Challenges Faced by People Living with HIV/AIDS After Disclosure in Sub-Saharan Countries

Authors: Veliswa Nonfundo Hoho, Jabulani Gilford Kheswa

Abstract:

HIV/AIDS has been a long-term condition worldwide, which does not only affect physical health but also causes psychological and social challenges in people living with this condition. In Sub-Saharan countries, namely; Nigeria, Uganda, Zimbabwe and South Africa, people living with HIV/AIDS come across different challenges especially after one has disclosed his/her status. They experience stigma and discrimination, isolation, lack of accessing and receiving treatment, lack of support and experience psychological distress. By using the evidence-based systematic review as a form of methodology, journal articles, dissertations, internet, and books were explored. This paper seeks to describe the challenges faced by people living with HIV/AIDS after disclosure, which forms a critical component of HIV/AIDS prevention and treatment interventions. The disclosure process model is used to underpin the study. This theory allows one to understand when and why interpersonal and verbal self-disclosure is beneficial for individuals who live with concealable stigmatized identities such as HIV/AIDS. Literature findings advocate that both negative and positive results were noted after disclosing one’s HIV status and psychosocial well-being of the majority of people living with HIV/AIDS also get affected especially in societies which subscribe HIV/AIDS pandemic to witchcraft. As for the infected homosexuals, research indicates that they suffer in silence and to cover their emotional emptiness due to ostracism, they often report low- self-efficacy with regard to condom use and become susceptible to reinfections which further place their lives at heightened risk for low immune system. In this regard, this paper challenges the policies which protect the dignity of people living with HIV/AIDS and calls for unity and financial support in favour of psychoeducational programmes and support groups aimed at curbing discrimination.

Keywords: disclosure, discrimination, homosexuality, self-efficacy

Procedia PDF Downloads 209
830 Sick Minds and Social Media: Treacherous Trends in Online Stalking, Aggression, and Murder

Authors: Amanda Maitland

Abstract:

This preliminary study has examined ways in which social media may help cause stalker murder by individuals with personality disorders and a strong sense of sexual propriety. A public display on social media by the intended victim was felt to be a trigger that instigated interpersonal violence. To identify behavioural paradigms, case studies of intimate partner murders were explored using news media sources and documentaries. In all of the case studies, social media interaction and social media postings occurred shortly before the murder. The evidence suggested a preponderance of correlations between the social media postings, stalking behaviours, personality disorders, and the murder of an intimate partner. In addition to this, a profile for of Facebook/social media murder was gleaned from the paradigms of behavior found in the case studies. The evidence showed a complex relationship between severe violence, stalking, borderline personality, and intimate partner violence was identified through the study. The struggle clients have in dealing with the: public, ambiguous and unrelenting nature of social media postings was also observed. The murderers anguish and rage appeared to be further intensified by attitudes of sexual propriety and entitlement. These attitudes were evident in all the case studies. The study concluded with further research on how the public can protect themselves from entering situations where social media postings might trigger a violent response. Further to this, psychological approaches were identified that might support client’s with personality disorders to cope with perceived provocative and distressing data on the internet. Thus, the findings of this study will be of interest to: therapists, psychologists, nurses, criminologists and social workers.

Keywords: social media, borderline personality, murder, cyberstalking, intimate partner violence, sexual propriety, Facebook

Procedia PDF Downloads 228
829 The Capabilities of New Communication Devices in Development of Informing: Case Study Mobile Functions in Iran

Authors: Mohsen Shakerinejad

Abstract:

Due to the growing momentum of technology, the present age is called age of communication and information. And With Astounding progress of Communication and information tools, current world Is likened to the "global village". That a message can be sent from one point to another point of the world in a Time scale Less than a minute. However, one of the new sociologists -Alain Touraine- in describing the destructive effects of new changes arising from the development of information appliances refers to the "new fields for undemocratic social control And the incidence of acute and unrest social and political tensions", Yet, in this era That With the advancement of the industry, the life of people has been industrial too, quickly and accurately Data Transfer, Causes Blowing new life in the Body of Society And according to the features of each society and the progress of science and technology, Various tools should be used. One of these communication tools is Mobile. Cellular phone As Communication and telecommunication revolution in recent years, Has had a great influence on the individual and collective life of societies. This powerful communication tool Have had an Undeniable effect, On all aspects of life, including social, economic, cultural, scientific, etc. so that Ignoring It in Design, Implementation and enforcement of any system is not wise. Nowadays knowledge and information are one of the most important aspects of human life. Therefore, in this article, it has been tried to introduce mobile potentials in receive and transmit News and Information. As it follows, among the numerous capabilities of current mobile phones features such as sending text, photography, sound recording, filming, and Internet connectivity could indicate the potential of this medium of communication in the process of sending and receiving information. So that nowadays, mobile journalism as an important component of citizen journalism Has a unique role in information dissemination.

Keywords: mobile, informing, receiving information, mobile journalism, citizen journalism

Procedia PDF Downloads 390
828 Child of the Dark by Carolina Maria De Jesus in a Fundamental Rights Perspective

Authors: Eliziane Navarro, Aparecida Citta

Abstract:

Child of the dark is the work of the Brazilian author Carolina Maria de Jesus published at the first time by Ática & Francisco Alves in 1960. It is, mostly, a story of lack of rights. It lacks to men who live in the slums what is essential in order to take advantage of the privilege of rationality to develop themselves as civilized humans. It is, therefore, in the withholding of the basic rights that inequality finds space to build itself to be the main misery on Earth. Antonio Candido, a Brazilian sociologist, claims that it is the right to literature has the ability to humanize men, once the aptitude to create fiction and fable is essential to the social balance. Hence, for the forming role that literature holds, it must be thought as the number of rights that assure human dignity, such as housing, education, health, freedom, etc. When talking about her routine, Carolina puts in evidence something that has great influence over the formation of human beings, contributing to the way they live: the slum. Even though it happens in a distinct way and using her linguistics variation, Carolina writes about something that will only be discussed later on Brazil’s Cities Statute and Ermia Maricato: the right to the city, and how the slums are, although inserted in the city, an attachment, an illegal city, a dismissing room. It interests ourselves, for that matter, in this work, to analyse how the deprivation of the rights to the city and literature, detailed in Carolina’s journal, conditions human beings to a life where the instincts overcome the social values.

Keywords: Child of the dark, slum, Brazil, architecture and literature

Procedia PDF Downloads 235
827 Investigation of the Self-Healing Sliding Wear Characteristics of Niti-Based PVD Coatings on Tool Steel

Authors: Soroush Momeni

Abstract:

Excellent damping capacity and superelasticity of the bulk NiTi shape memory alloy (SMA) makes it a suitable material of choice for tools in machining process as well as tribological systems. Although thin film of NiTi SMA has a same damping capacity as NiTi bulk alloys, it has a poor mechanical properties and undesirable tribological performance. This study aims at eliminating these application limitations for NiTi SMA thin films. In order to achieve this goal, NiTi thin films were magnetron sputtered as an interlayer between reactively sputtered hard TiCN coatings and hard work tool steel substrates. The microstructure, composition, crystallographic phases, mechanical and tribological properties of the deposited thin films were analyzed by using field emission scanning electron microscopy (FESEM), X-ray diffraction (XRD), nanoindentation, ball–on-disc, scratch test, and three dimensional (3D) optical microscopy. It was found that under a specific coating architecture, the superelasticity of NiTi inter-layer can be combined with high hardness and wear resistance of TiCN protective layers. The obtained results revealed that the thickness of NiTi interlayers is an important factor controlling mechanical and tribological performance of bi-layer composite coating systems.

Keywords: PVD coatings, sliding wear, hardness, tool steel

Procedia PDF Downloads 267
826 The Prevalence of Cardiovascular Diseases in World-Class Triathletes: An Internet-Based Study from 2006 to 2019

Authors: Lingxia Li, Frédéric Schnell, Shuzhe Ding, Solène Le Douairon Lahaye

Abstract:

Background: The prevalence of cardiovascular diseases (CVD) in different triathlon sports disciplines has not been determined. Purpose: The present study aimed to determine the prevalence of CVD in world-class triathletes according to their sex, sports disciplines (aquathlon, duathlon, triathlon…), and formats (short/medium, long, and ultra-long distance). Methods: Male and female elite athletes from eleven triathlon sport disciplines, ranked in the internationally yearly top 10 between 2006 and 2019, were included. The athlete’s name was associated in a Google search with selected key terms related to heart disease and/or cardiac abnormalities. The prevalence and the hazard function of the variation were calculated, and the differences were then compared. Results: From 1329 athletes (male 639, female 690), 13 cases of CVD (0.98%, 95% CI: [0.45-1.51]) were identified, and the mean age of their occurrence was 29±6 years. Although no sex differences were found in each sport discipline/format (p > 0.05), severe outcomes (sudden cardiac arrest/death and those who had to stop their sports practice) were only observed in males. Short-distance triathlon (5.08%, 95% CI: [1.12-9.05]) was more affected than other disciplines in short/medium, long, and ultra-long formats. The prevalence of CVD in athletes who participated in multi-type of sports disciplines (4.14%, 95% CI: [1.14-7.15]) was higher than in those who participated in one type (0.52%, 95% CI: [0.10-0.93]) (p = 0.0004). Conclusion: Athletes in short-distance triathlon were more affected than other disciplines in short/medium, long and ultra-long formats. Athletes who participate in short/medium distances and those who participate in multi-type of sports disciplines should be closely monitored regardless of sex.

Keywords: cardiovascular diseases, sudden cardiac death, triathlon sport disciplines, world-class athletes

Procedia PDF Downloads 130
825 Fuzzy Inference-Assisted Saliency-Aware Convolution Neural Networks for Multi-View Summarization

Authors: Tanveer Hussain, Khan Muhammad, Amin Ullah, Mi Young Lee, Sung Wook Baik

Abstract:

The Big Data generated from distributed vision sensors installed on large scale in smart cities create hurdles in its efficient and beneficial exploration for browsing, retrieval, and indexing. This paper presents a three-folded framework for effective video summarization of such data and provide a compact and representative format of Big Video Data. In the first fold, the paper acquires input video data from the installed cameras and collect clues such as type and count of objects and clarity of the view from a chunk of pre-defined number of frames of each view. The decision of representative view selection for a particular interval is based on fuzzy inference system, acquiring a precise and human resembling decision, reinforced by the known clues as a part of the second fold. In the third fold, the paper forwards the selected view frames to the summary generation mechanism that is supported by a saliency-aware convolution neural network (CNN) model. The new trend of fuzzy rules for view selection followed by CNN architecture for saliency computation makes the multi-view video summarization (MVS) framework a suitable candidate for real-world practice in smart cities.

Keywords: big video data analysis, fuzzy logic, multi-view video summarization, saliency detection

Procedia PDF Downloads 172
824 Development of Partial Discharge Defect Recognition and Status Diagnosis System with Adaptive Deep Learning

Authors: Chien-kuo Chang, Bo-wei Wu, Yi-yun Tang, Min-chiu Wu

Abstract:

This paper proposes a power equipment diagnosis system based on partial discharge (PD), which is characterized by increasing the readability of experimental data and the convenience of operation. This system integrates a variety of analysis programs of different data formats and different programming languages and then establishes a set of interfaces that can follow and expand the structure, which is also helpful for subsequent maintenance and innovation. This study shows a case of using the developed Convolutional Neural Networks (CNN) to integrate with this system, using the designed model architecture to simplify the complex training process. It is expected that the simplified training process can be used to establish an adaptive deep learning experimental structure. By selecting different test data for repeated training, the accuracy of the identification system can be enhanced. On this platform, the measurement status and partial discharge pattern of each equipment can be checked in real time, and the function of real-time identification can be set, and various training models can be used to carry out real-time partial discharge insulation defect identification and insulation state diagnosis. When the electric power equipment entering the dangerous period, replace equipment early to avoid unexpected electrical accidents.

Keywords: partial discharge, convolutional neural network, partial discharge analysis platform, adaptive deep learning

Procedia PDF Downloads 62
823 A Study on Design for Parallel Test Based on Embedded System

Authors: Zheng Sun, Weiwei Cui, Xiaodong Ma, Hongxin Jin, Dongpao Hong, Jinsong Yang, Jingyi Sun

Abstract:

With the improvement of the performance and complexity of modern equipment, automatic test system (ATS) becomes widely used for condition monitoring and fault diagnosis. However, the conventional ATS mainly works in a serial mode, and lacks the ability of testing several equipments at the same time. That leads to low test efficiency and ATS redundancy. Especially for a large majority of equipment under test, the conventional ATS cannot meet the requirement of efficient testing. To reduce the support resource and increase test efficiency, we propose a method of design for the parallel test based on the embedded system in this paper. Firstly, we put forward the general framework of the parallel test system, and the system contains a central management system (CMS) and several distributed test subsystems (DTS). Then we give a detailed design of the system. For the hardware of the system, we use embedded architecture to design DTS. For the software of the system, we use test program set to improve the test adaption. By deploying the parallel test system, the time to test five devices is now equal to the time to test one device in the past. Compared with the conventional test system, the proposed test system reduces the size and improves testing efficiency. This is of great significance for equipment to be put into operation swiftly. Finally, we take an industrial control system as an example to verify the effectiveness of the proposed method. The result shows that the method is reasonable, and the efficiency is improved up to 500%.

Keywords: parallel test, embedded system, automatic test system, automatic test system (ATS), central management system, central management system (CMS), distributed test subsystems, distributed test subsystems (DTS)

Procedia PDF Downloads 283
822 EMS Providers' Ability and Willingness to Respond to Bioterrorism

Authors: Ryan Houser

Abstract:

Introduction: Previous studies have found that public health systems within the United States are inadequately prepared for an act of biological terrorism. As the COVID-19 pandemic continues, few studies have evaluated bioterrorism preparedness of Emergency Medical Services, even in the accelerating environment of biothreats. Methods: This study utilized an Internet-based survey to assess the level of preparedness and willingness to respond to a bioterrorism attack and identify factors that predict preparedness and willingness among Nebraska EMS (Emergency Medical Services ) providers. The survey was available for one month in 2021, during which 190 EMS providers responded to the survey. Results: Only 56.8% of providers were able to recognize an illness or injury as potentially resulting from exposure to a CBRN agent. The provider Clinical Competency levels range from a low of 13.6% (ability to initiate patient care within his/her professional scope of practice and arrange for prompt referral appropriate to the identified condition(s)) to a high of 74% (the ability to respond to an emergency within the emergency management system of his/her practice, institution and community). Only 10% of the respondents are both willing and able to effectively function in a bioterror environment. Discussion: In order to effectively prepare for and respond to a bioterrorist attack, all levels of the healthcare system need to have the clinical skills, knowledge, and abilities necessary to treat patients exposed. Policy changes and increased focus on training and drills are needed to ensure a prepared EMS system which is crucial to a resilient state. EMS entities need to be aware of the extent of their available workforce so that the country can be prepared for the increasing threat of bioterrorism or other novel emerging infectious disease outbreaks. A resilient nation relies on a prepared set of EMS providers who are willing to respond to biological terrorism events.

Keywords: bioterrorism, prehospital, EMS, disaster, emergency, medicine, preparedness, policy

Procedia PDF Downloads 142
821 Evolution of Approaches to Cost Calculation in the Conditions of the Modern Russian Economy

Authors: Elena Tkachenko, Vladimir Kokh, Alina Osipenko, Vladislav Surkov

Abstract:

The modern period of development of Russian economy is fraught with a number of problems related to limitations in the use of traditional planning and financial management tools. Restrictions in the use of foreign software when performing an order of the Russian Government, on the one hand, and sanctions limiting the support of the major ERP and MRP II systems in the Russian Federation, on the other hand, entail the necessity to appeal to the basics of developing budgeting and analysis systems for industrial enterprises. Thus, cost calculation theory becomes the theoretical foundation for the development of industrial cost management systems. Based on the foregoing, it would be fair to make an assumption that the development of a working managerial accounting model on an industrial enterprise using an automated enterprise resource management system should rest upon the concept of the inevitability of alterations of business processes. On the other hand, optimized business processes make the architecture of financial analytics more transparent and permit the use of all the benefits of data cubes. The metrics and indicator slices provide online assessment of the state of key business processes at a given moment of time, which improves the quality of managerial decisions considerably. Therefore, the bilateral sanctions situation boosted the development of corporate business analytics and took industrial companies to the next level of understanding of business processes.

Keywords: cost culculation, ERP, OLAP, modern Russian economy

Procedia PDF Downloads 207
820 Video Object Segmentation for Automatic Image Annotation of Ethernet Connectors with Environment Mapping and 3D Projection

Authors: Marrone Silverio Melo Dantas Pedro Henrique Dreyer, Gabriel Fonseca Reis de Souza, Daniel Bezerra, Ricardo Souza, Silvia Lins, Judith Kelner, Djamel Fawzi Hadj Sadok

Abstract:

The creation of a dataset is time-consuming and often discourages researchers from pursuing their goals. To overcome this problem, we present and discuss two solutions adopted for the automation of this process. Both optimize valuable user time and resources and support video object segmentation with object tracking and 3D projection. In our scenario, we acquire images from a moving robotic arm and, for each approach, generate distinct annotated datasets. We evaluated the precision of the annotations by comparing these with a manually annotated dataset, as well as the efficiency in the context of detection and classification problems. For detection support, we used YOLO and obtained for the projection dataset an F1-Score, accuracy, and mAP values of 0.846, 0.924, and 0.875, respectively. Concerning the tracking dataset, we achieved an F1-Score of 0.861, an accuracy of 0.932, whereas mAP reached 0.894. In order to evaluate the quality of the annotated images used for classification problems, we employed deep learning architectures. We adopted metrics accuracy and F1-Score, for VGG, DenseNet, MobileNet, Inception, and ResNet. The VGG architecture outperformed the others for both projection and tracking datasets. It reached an accuracy and F1-score of 0.997 and 0.993, respectively. Similarly, for the tracking dataset, it achieved an accuracy of 0.991 and an F1-Score of 0.981.

Keywords: RJ45, automatic annotation, object tracking, 3D projection

Procedia PDF Downloads 145
819 Design and Implementation of Agricultural Machinery Equipment Scheduling Platform Based On Case-Based Reasoning

Authors: Wen Li, Zhengyu Bai, Qi Zhang

Abstract:

The demand for smart scheduling platform in agriculture, particularly in the scheduling process of machinery equipment, is high. With the continuous development of agricultural machinery equipment technology, a large number of agricultural machinery equipment and agricultural machinery cooperative service organizations continue to appear in China. The large area of cultivated land and a large number of agricultural activities in the central and western regions of China have made the demand for smart and efficient agricultural machinery equipment scheduling platforms more intense. In this study, we design and implement a platform for agricultural machinery equipment scheduling to allocate agricultural machinery equipment resources reasonably. With agricultural machinery equipment scheduling platform taken as the research object, we discuss its research significance and value, use the service blueprint technology to analyze and characterize the agricultural machinery equipment schedule workflow, the network analytic method to obtain the demand platform function requirements, and divide the platform functions through the platform function division diagram. Simultaneously, based on the case-based reasoning (CBR) algorithm, the equipment scheduling module of the agricultural machinery equipment scheduling platform is realized; finally, a design scheme of the agricultural machinery equipment scheduling platform architecture is provided, and the visualization interface of the platform is established via VB programming language. It provides design ideas and theoretical support for the construction of a modern agricultural equipment information scheduling platform.

Keywords: case-based reasoning, service blueprint, system design, ANP, VB programming language

Procedia PDF Downloads 156
818 A Comparative Analysis of Carbon Footprints of Households in Different Housing Types and Seasons

Authors: Taehyun Kim

Abstract:

As a result of rapid urbanization, energy demands for lighting, heating and cooling of households have been concentrated in metropolitan areas. The energy resources for housing in urban areas are dominantly fossil fuel whose uses contribute to increase cost of living and carbon dioxide (CO2) emission. To achieve environmentally and economically sustainable residential development, it is important to know how energy use and cost of living can be reduced by planning and design. The purpose of this study is to examine which type of building requires less energy for housing. To do so, carbon footprint (CF) quiz survey was employed which estimates the amount of carbon dioxide required to support households’ consumption of energy uses for housing. The housing carbon footprints (HCF) of 500 households of Seoul, Korea in summer and winter were estimated and compared in three major types of housing: single-family (detached), row-house and apartment. In addition, its differences of HCF were estimated between tower and flat type of apartment. The results of T-test and analysis of variance (ANOVA) provide statistical evidence that housing type is related to housing energy use. Average HCF of detached house was higher than other housing types. Between two types of apartment, tower type shows higher HCF than flat type in winter. These findings may provide new perspectives on CF application in sustainable architecture and urban design.

Keywords: analysis of variance, carbon footprint, energy use, housing type

Procedia PDF Downloads 482
817 Influence of Socio-Economic Factors on Crime Perpetuation Among Inmates of Correctional Facilities in South-West Nigeria

Authors: Ebenezer Bayode Agboola

Abstract:

The study investigated the influence of socioeconomic factors on crime perpetuation among inmates of correctional facilities in South West Nigeria. A sample size of two hundred and forty-four inmates was drawn from Ado, Akure and Ilesha correctional facilities. The sample size consisted of both male and female inmates. Individual inmate was drawn through systematic sampling with the use of inmates’ register at the correctional facilities. The study employed a mixed design, which allowed the blend of both quantitative and qualitative methods. For the quantitative method, data was collected through the use of a questionnaire and for the qualitative method; data was collected with the aid of an in-depth interview (ID. Four research questions were raised for the study and analysed descriptively using simple frequency count and percentage. Five research hypotheses were formulated for the study and tested using Analysis of Variance (ANOVA) and Multiple Regressions. Based on the data analysis, findings revealed that there was a significant relationship between family history and perpetuation of crime among inmates. Though no significant relationship was found between employment and the perpetuation of crime, however, the rate of crime perpetuation by individuals was significantly found to be related to peer pressure. Also, the study further found that there was a significant relationship between the use of substances and perpetuation of crime. Lastly, it was found that there was a significant relationship between family history, employment, and peer pressure. The study recommended that Parents should pay adequate attention to their children, especially during the adolescent stage and that the Government should enact relevant laws that will checkmate the rising involvement of young people in cybercrime or internet fraud.

Keywords: crime, socio economic factor, inmates, correctional facilities, Southwest

Procedia PDF Downloads 64
816 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 128
815 Clinical and Sleep Features in an Australian Population Diagnosed with Mild Cognitive Impairment

Authors: Sadie Khorramnia, Asha Bonney, Kate Galloway, Andrew Kyoong

Abstract:

Sleep plays a pivotal role in the registration and consolidation of memory. Multiple observational studies have demonstrated that self-reported sleep duration and sleep quality are associated with cognitive performance. Montreal Cognitive Assessment questionnaire is a screening tool to assess mild cognitive (MCI) impairment with a 90% diagnostic sensitivity. In our current study, we used MOCA to identify MCI in patients who underwent sleep study in our sleep department. We then looked at the clinical risk factors and sleep-related parameters in subjects found to have mild cognitive impairment but without a diagnosis of sleep-disordered breathing. Clinical risk factors, including physician, diagnosed hypertension, diabetes, and depression and sleep-related parameters, measured during sleep study, including percentage time of each sleep stage, total sleep time, awakenings, sleep efficiency, apnoea hypopnoea index, and oxygen saturation, were evaluated. A total of 90 subjects who underwent sleep study between March 2019 and October 2019 were included. Currently, there is no pharmacotherapy available for MCI; therefore, identifying the risk factors and attempting to reverse or mitigate their effect is pivotal in slowing down the rate of cognitive deterioration. Further characterization of sleep parameters in this group of patients could open up opportunities for potentially beneficial interventions.

Keywords: apnoea hypopnea index, mild cognitive impairment, sleep architecture, sleep study

Procedia PDF Downloads 131