Search results for: external risks
1472 Comparative Analysis between Different Proposed Responsive Facade Designs for Reducing the Solar Radiation on the West Facade in the Hot Arid Region
Authors: Merna Ibrahim
Abstract:
Designing buildings which are sustainable and can control and reduce the solar radiation penetrated from the building facades is such an architectural turn. One of the most important methods of saving energy in a building is carefully designing its facade. Building’s facade is one of the most significant contributors to the energy budget as well as the comfort parameters of a building. Responsive architecture adapts to the surrounding environment causing alteration in the envelope configuration to perform in a more effective way. One of the objectives of the responsive facades is to protect the building’s users from the external environment and to achieve a comfortable indoor environment. Solar radiation is one of the aspects that affects the comfortable indoor environment, as well as affects the energy consumption consumed by the HVAC systems for maintaining the indoor comfortable conditions. The aim of the paper is introducing and comparing between four different proposed responsive facade designs in terms of solar radiation reduction on the west facade of a building located in the hot arid region. In addition, the paper highlights the reducing amount of solar radiation for each proposed responsive facade on the west facade. At the end of the paper, a proposal is introduced which combines the four different axis of movements which reduces the solar radiation the most. Moreover, the paper highlights the definition and aim of the responsive architecture, as well as the focusing on the solar radiation aspect in the hot arid zones. Besides, the paper analyzes an international responsive façade building in Essen, Germany, focusing on the type of responsive facades, angle of rotation, mechanism of movement and the effect of the responsive facades on the building’s performance.Keywords: kinetic facades, mechanism of movement, responsive architecture, solar radiation
Procedia PDF Downloads 1551471 The Construction of the Bridge between Mrs Dalloway and to the Lighthouse: The Combination of Codes and Metaphors in the Structuring of the Plot in the Work of Virginia Woolf
Authors: María Rosa Mucci
Abstract:
Tzvetan Todorov (1971) designs a model of narrative transformation where the plot is constituted by difference and resemblance. This binary opposition is a synthesis of a central figure within narrative discourse: metaphor. Narrative operates as a metaphor since it combines different actions through similarities within a common plot. However, it sounds paradoxical that metonymy and not metaphor should be the key figure within the narrative. It is a metonymy that keeps the movement of actions within the story through syntagmatic relations. By the same token, this articulation of verbs makes it possible for the reader to engage in a dynamic interaction with the text, responding to the plot and mediating meanings with the contradictory external world. As Roland Barthes (1957) points out, there are two codes that are irreversible within the process: the codes of actions and the codes of enigmas. Virginia Woolf constructs her plots through a process of symbolism; a scene is always enduring, not only because it stands for something else but also because it connotes it. The reader is forced to elaborate the meaning at a mythological level beyond the lines. In this research, we follow a qualitative content analysis to code language through the proairetic (actions) and hermeneutic (enigmas) codes in terms of Barthes. There are two novels in particular that engage the reader in this process of construction: Mrs Dalloway (1925) and To the Lighthouse (1927). The bridge from the first to the second brings memories of childhood, allowing for the discovery of these enigmas hidden between the lines. What survives? Who survives? It is the reader's task to unravel these codes and rethink this dialogue between plot and reader to contribute to the predominance of texts and the textuality of narratives.Keywords: metonymy, code, metaphor, myth, textuality
Procedia PDF Downloads 581470 Levels of Microcystin in the Coastal Waters of Nigeria
Authors: Medina Kadiri
Abstract:
Blue-green otherwise called cyanobacteria, produce an array of biotoxins grouped into five categories notably hapatotoxins, neurotoxins, cytotoxins, dermatotoxins, and irritant toxins. Microcystins which are examples of hepatotoxins produced by blue-green algae Microcystins comprise the most common group of the cyanobacterial toxins. Blue-green algae flourish in aquatic environments, whether marine, brackish or freshwater, producing blooms in different forms such as microscopic, mats, or unsightly odoriferous scums. Microcystins biotoxins cause a plethora of animal and human hazards such as liver damage/cirrhosis and cancer, kidney damage, dermatitis, tinnitus, gastroenteritis, sore throat, nausea, myalgia, neurological problems, respiratory irritation and death. Water samples were collected from coastal regions of Nigeria in March 2014, June 2014, October 2014 and January 2015 and analyzed with Enzyme Linked Immunosorbent Assay (ELISA) kits. Microcystin biotoxin was recorded in all sites both during dry and wet seasons. The range of microcystins found was 0.000041-There was a seasonal trend of increasing microcystin concentrations from March till Octobers and a decrease thereafter. Generally in the oceanic waters, microcystin levels were highest at Cross Rivers in March and January, Barbeach in June and Lekki in October. In the adjoining riverine ecosystems, on the other hand, the highest concentrations of microcystin were observed at Akwa Ibom in March, June and October and in Bayelsa in January. Continuous monitoring and screening of coastal water bodies is suggested to minimize the health risks of cyanobacterial biotoxins to coastal communities of Nigeria.Keywords: biotoxins, harmful algae, marine, microcystin, Nigeria
Procedia PDF Downloads 2841469 Management of Fitness-For-Duty for Human Error Prevention in Nuclear Power Plants
Authors: Hyeon-Kyo Lim, Tong-Il Jang, Yong-Hee Lee
Abstract:
For the past several decades, not a few researchers have warned that even a trivial human error may result in unexpected accidents, especially in Nuclear Power Plants. To prevent accidents in Nuclear Power Plants, it is quite indispensable to make any factors under the effective control that may raise the possibility of human errors for accident prevention. This study aimed to develop a risk management program, especially in the sense that guaranteeing Fitness-for-Duty (FFD) of human beings working in Nuclear Power Plants. Throughout a literal survey, it was found that work stress and fatigue are major psychophysical factors requiring sophisticated management. A set of major management factors related to work stress and fatigue was through repetitive literal surveys and classified into several categories. To maintain the fitness of human workers, a 4-level – individual worker, team, staff within plants, and external professional - approach was adopted for FFD management program. Moreover, the program was arranged to envelop the whole employment cycle from selection and screening of workers, job allocation, and job rotation. Also, a managerial care program was introduced for employee assistance based on the concept of Employee Assistance Program (EAP). The developed program was reviewed with repetition by ex-operators in nuclear power plants, and assessed in the affirmative. As a whole, responses implied additional treatment to guarantee high performance of human workers not only in normal operations but also in emergency situations. Consequently, the program is under administrative modification for practical application.Keywords: fitness-for-duty (FFD), human error, work stress, fatigue, Employee-Assistance-Program (EAP)
Procedia PDF Downloads 3021468 Examining the Relationship between Concussion and Neurodegenerative Disorders: A Review on Amyotrophic Lateral Sclerosis and Alzheimer’s Disease
Authors: Edward Poluyi, Eghosa Morgan, Charles Poluyi, Chibuikem Ikwuegbuenyi, Grace Imaguezegie
Abstract:
Background: Current epidemiological studies have examined the associations between moderate and severe traumatic brain injury (TBI) and their risks of developing neurodegenerative diseases. Concussion, also known as mild TBI (mTBI), is however quite distinct from moderate or severe TBIs. Only few studies in this burgeoning area have examined concussion—especially repetitive episodes—and neurodegenerative diseases. Thus, no definite relationship has been established between them. Objectives : This review will discuss the available literature linking concussion and amyotrophic lateral sclerosis (ALS) and Alzheimer’s disease (AD). Materials and Methods: Given the complexity of this subject, a realistic review methodology was selected which includes clarifying the scope and developing a theoretical framework, developing a search strategy, selection and appraisal, data extraction, and synthesis. A detailed literature matrix was set out in order to get relevant and recent findings on this topic. Results: Presently, there is no objective clinical test for the diagnosis of concussion because the features are less obvious on physical examination. Absence of an objective test in diagnosing concussion sometimes leads to skepticism when confirming the presence or absence of concussion. Intriguingly, several possible explanations have been proposed in the pathological mechanisms that lead to the development of some neurodegenerative disorders (such as ALS and AD) and concussion but the two major events are deposition of tau proteins (abnormal microtubule proteins) and neuroinflammation, which ranges from glutamate excitotoxicity pathways and inflammatory pathways (which leads to a rise in the metabolic demands of microglia cells and neurons), to mitochondrial function via the oxidative pathways.Keywords: amyotrophic lateral sclerosis, Alzheimer's disease, mild traumatic brain injury, neurodegeneration
Procedia PDF Downloads 891467 Stress Analysis of Buried Pipes from Soil and Traffic Loads
Authors: A. Mohamed, A. El-Hamalawi, M. Frost, A. Connell
Abstract:
Often design standards do not provide guidance or formulae for the calculation of stresses on buried pipelines caused by external loads. Frequently engineers rely on other methods and published sources of information to calculate such imposed stresses and a variety of methods can be used. This paper reviews three current approaches to soil pipeline interaction modelling to predict stresses on buried pipelines subjected to soil overburden and traffic loading. The traditional approach to use empirical stress formulas to calculate circumferential bending stresses on pipelines. The alternative approaches considered are the use of a finite element package to compute an estimate of circumferential bending stress and a proprietary stress analysis system (SURFLOAD) to estimate the circumferential bending stress. The results from analysis using the methods are presented and compared to experimental results in terms of predicted and measured circumferential stresses. This study shows that the approach used to assess externally generated stress is important and can lead to an over-conservative analysis. Using FE analysis either through SURFLOAD or a general FE package to predict circumferential stress is the most accurate way to undertake stress analysis due to traffic and soil loads. Although conservative, classical empirical methods will continue to be applied to the analysis of buried pipelines, an opportunity exists, therefore, in many circumstances, to use applied numerical techniques, made possible by advances in finite element analysis.Keywords: buried pipelines, circumferential bending stress, finite element analysis, soil overburden, soil pipeline interaction analysis (SPIA), traffic loadings
Procedia PDF Downloads 4411466 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 3611465 Radiation Risks for Nurses: The Unrecognized Consequences of ERCP Procedures
Authors: Ava Zarif Sanayei, Sedigheh Sina
Abstract:
Despite the advancement of radiation-free interventions in the gastrointestinal and hepatobiliary fields, endoscopy and endoscopic retrograde cholangiopancreatography (ERCP) remain indispensable procedures that necessitate radiation exposure. ERCP, in particular, relies heavily on radiation-guided imaging to ensure precise delivery of therapy. Meanwhile, interventional radiology (IR) procedures also utilize imaging modalities like X-rays and CT scans to guide therapy, often under local anesthesia via small needle insertion. However, the complexity of these procedures raises concerns about radiation exposure to healthcare professionals, including nurses, who play a crucial role in these interventions. This study aims to assess the radiation exposure to the hands and fingers of nurses 1 and 2, who are directly involved in ERCP procedures utilizing (TLD-100) dosimeters at the Gastrointestinal Endoscopy department of a clinic in Shiraz, Iran. The dosimeters were initially calibrated using various phantoms and then a group was prepared and used over a two-month period. For personal equivalent dose measurement, two TLD chips were mounted on a finger ring to monitor exposure to the hands and fingers. Upon completion of the monitoring period, the TLDs were analyzed using a TLD reader, showing that Nurse 1 received an equivalent dose of 298.26 µSv and Nurse 2 received an equivalent dose of 195.39 µSv. The investigation revealed that the total radiation exposure to the nurses did not exceed the annual limit for occupational exposure. Nevertheless, it is essential to prioritize radiation protection measures to prevent potential harm. The study showed that positioning staff members and placing two nurses in a specific location contributed to somehow equal doses. To reduce exposure further, we suggest providing education and training on radiation safety principles, particularly for technologists.Keywords: dose measurement, ERCP, interventional radiology, medical imaging
Procedia PDF Downloads 341464 Space Debris: An Environmental Hazard
Authors: Anwesha Pathak
Abstract:
Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts
Procedia PDF Downloads 911463 Investigation of the Low-Level Jet Role in Transportation of Shamal Dust Storms in Southwest Iran
Authors: Nasim Hossein Hamzeh, Abbas Ranjbar Saadat Abadi, Maggie Chel Gee Ooi, Steven Soon-Kai Kong, Christian Opp
Abstract:
Dust storm is one of the most important natural disasters in the world, where the Middle East suffers frequently due to the existence of the dust belt region. As a country in the Middle East, Iran mostly is affected by the dust storms from some internal and also external dust sources, mostly originating from deserts in Iraq, Syria, and Saudi Arabia. In this study, some severe Shamal dust storms were investigated in Southwest Iran. The measured 〖PM〗_10 reached up to 834 μg m-3 in some stations in west Iran and Iran-Iraq borders, while the measured 〖PM〗_10 reached up to 4947 μg m-3 SW stations in northern shores of the Persian Gulf. During these severe dust storms, a low-level jet was observed at 930hPa atmospheric level in north Iraq and south Iraq. the jet core and its width were about 16 ms-1 and 100 km, respectively, in the cases where it is located in the NW regions of Iraq and northeastern Syria (at 35°N and 40-41°E), So the jet was stronger at higher latitudes (34°N - 35°N) than at lower latitudes (32°N). Therefore, suitable conditions have been created for lifting of dust sources located in northwestern Iraq and northeastern Syria. The topography surrounding the Mesopotamia and north of the Persian Gulf play a major role in the development of the Low-Level Jet through the interaction of meteorological conditions and mountain forcing. Also, the output of CALIPSO satellite images show dust rising to higher than 5 km in these dust cases, that confirming the influence of Shamal wind on the dust storm occurrence.Keywords: dust storm, shamal wind, the persian gulf, southwest Iran
Procedia PDF Downloads 941462 Pneumoperitoneum Creation Assisted with Optical Coherence Tomography and Automatic Identification
Authors: Eric Yi-Hsiu Huang, Meng-Chun Kao, Wen-Chuan Kuo
Abstract:
For every laparoscopic surgery, a safe pneumoperitoneumcreation (gaining access to the peritoneal cavity) is the first and essential step. However, closed pneumoperitoneum is usually obtained by blind insertion of a Veress needle into the peritoneal cavity, which may carry potential risks suchas bowel and vascular injury.Until now, there remains no definite measure to visually confirm the position of the needle tip inside the peritoneal cavity. Therefore, this study established an image-guided Veress needle method by combining a fiber probe with optical coherence tomography (OCT). An algorithm was also proposed for determining the exact location of the needle tip through the acquisition of OCT images. Our method not only generates a series of “live” two-dimensional (2D) images during the needle puncture toward the peritoneal cavity but also can eliminate operator variation in image judgment, thus improving peritoneal access safety. This study was approved by the Ethics Committee of Taipei Veterans General Hospital (Taipei VGH IACUC 2020-144). A total of 2400 in vivo OCT images, independent of each other, were acquired from experiments of forty peritoneal punctures on two piglets. Characteristic OCT image patterns could be observed during the puncturing process. The ROC curve demonstrates the discrimination capability of these quantitative image features of the classifier, showing the accuracy of the classifier for determining the inside vs. outside of the peritoneal was 98% (AUC=0.98). In summary, the present study demonstrates the ability of the combination of our proposed automatic identification method and OCT imaging for automatically and objectively identifying the location of the needle tip. OCT images translate the blind closed technique of peritoneal access into a visualized procedure, thus improving peritoneal access safety.Keywords: pneumoperitoneum, optical coherence tomography, automatic identification, veress needle
Procedia PDF Downloads 1341461 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security
Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone
Abstract:
One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden
Procedia PDF Downloads 161460 Self-Care Behavior and Performance Level Associated with Algerian Chronically Ill Patients
Authors: S. Aberkane, N. Djabali, S. Fafi, A. Baghezza
Abstract:
Chronic illnesses affect many Algerians. It is possible to investigate the impact of illness representations and coping on quality of life and whether illness representations are indirectly associated with quality of life through their influence on coping. This study aims at investigating the relationship between illness perception, coping strategies and quality of life with chronic illness. Illness perceptions are indirectly associated with the quality of life through their influence on coping mediation. A sample of 316 participants with chronic illness living in the region of Batna, Algeria, has been adopted in this study. A correlation statistical analysis is used to determine the relationship between illness perception, coping strategies, and quality of life. Multiple regression analysis was employed to highlight the predictive ability of the dimensions of illness perception and coping strategies on the dependent variables of quality of life, where mediation analysis is considered in the exploration of the indirect effect significance of the mediator. This study provides insights about the relationship between illness perception, coping strategies and quality of life in the considered sample (r = 0.39, p < 0.01). Therefore, it proves that there is an effect of illness identity perception, external and medical attributions related to emotional role, physical functioning, and mental health perceived, and these were fully mediated by the asking for assistance (c’= 0.04, p < 0.05), the guarding (c’= 0.00, p < 0.05), and the task persistence strategy (c’= 0.05, p < 0.05). The findings imply partial support for the common-sense model of illness representations in a chronic illness population. Directions for future research are highlighted, as well as implications for psychotherapeutic interventions which target unhelpful beliefs and maladaptive coping strategies (e.g., cognitive behavioral therapy).Keywords: chronic illness, coping, illness perception, quality of life, self- regulation model
Procedia PDF Downloads 2241459 The Mask of Motherhood a Changing Identity During the Transition to Motherhood
Authors: Geraldine Mc Loughlin, Mary Horgan, Rosaleen Murphy
Abstract:
Childbirth is a life-changing event, a psychological transition for the mother that must be viewed in a social context. Much has been written and documented regarding the preparation for birth and the immediate postnatal period, but the full psychological impact on the mother is not clear. One aspect of the transition process is Identity. Depending on a person’s worldview, the concept of identity is viewed differently; the nature of reality and how they construct knowledge influence these perspectives. Becoming a mother is not just an event but a process that time and experience will help to shape the understanding of the woman. To explore the emotional and psychological aspects of first-time mother’s experience during the transition to new motherhood. To identify factors affecting women’s identities in the period of 36 weeks gestation to 12 weeks postpartum. Interpretative Phenomenological Analysis (IPA) was used. It explores how these women make sense of and give meaning to their experiences. IPA is underpinned by 3 key principles: phenomenology, hermeneutics and idiographics. A purposeful sample of 10 women was recruited for this longitudinal study, to enable data to be collected during the transition to motherhood. Individual identity was interpreted and viewed as developing in response to changing contexts, such as the birth event becoming a parent, enabling one to construct one’s own sense of a meaningful life. Women effectively differentiated themselves from their personal and social identities and took responsibility for their actions. Identity is culturally and socially shaped and experienced, though not experienced similarly by all women. The individualized perspective on identity recognizes that (a) social influences are seen as external to the individual and (b) the view that social influences are, in fact, internalized by the individual.Keywords: motherhood, transition, identity, IPA
Procedia PDF Downloads 621458 Quantum Engine Proposal using Two-level Atom Like Manipulation and Relativistic Motoring Control
Authors: Montree Bunruangses, Sonath Bhattacharyya, Somchat Sonasang, Preecha Yupapin
Abstract:
A two-level system is manipulated by a microstrip add-drop circuit configured as an atom like system for wave-particle behavior investigation when its traveling speed along the circuit perimeter is the speed of light. The entangled pair formed by the upper and lower sideband peaks is bound by the angular displacement, which is given by 0≤θ≤π/2. The control signals associated with 3-peak signal frequencies are applied by the external inputs via the microstrip add-drop multiplexer ports, where they are time functions without the space term involved. When a system satisfies the speed of light conditions, the mass term has been changed to energy based on the relativistic limit described by the Lorentz factor and Einstein equation. The different applied frequencies can be utilized to form the 3-phase torques that can be applied for quantum engines. The experiment will use the two-level system circuit and be conducted in the laboratory. The 3-phase torques will be recorded and investigated for quantum engine driving purpose. The obtained results will be compared to the simulation. The optimum amplification of torque can be obtained by the resonant successive filtering operation. Torque will be vanished when the system is balanced at the stopped position, where |Time|=0, which is required to be a system stability condition. It will be discussed for future applications. A larger device may be tested in the future for realistic use. A synchronous and asynchronous driven motor is also discussed for the warp drive use.Keywords: quantum engine, relativistic motor, 3-phase torque, atomic engine
Procedia PDF Downloads 621457 Chinese Übermensches: Mobility Capital and the Entrepreneurial Experiences of Young Privileged Chinese Migrants
Authors: Wenfu Zhang
Abstract:
This study examines why young, privileged Chinese individuals emigrate, how they sustain fluid, ongoing movement, and the life goals through migrant entrepreneurship. Through interviews with 30 young Chinese migrant entrepreneurs in the UK, this study reveals that they migrate primarily to escape an increasingly "risk society", characterized by reduced social and personal freedoms, a hostile business environment, and hyper-competition within professional and entrepreneurial sectors in the PRC. In this context, elite-oriented immigration policies of Northern countries align with these migrants' goals, creating a duality of 'neoliberalism as exception' and 'exceptions to neoliberalism', which facilitates selective entry for young, privileged Chinese. Intriguingly, even within the perceived context of an increasingly 'risk society,' young, privileged migrants are hesitant to relinquish their Chinese nationality, despite having diligently obtained UK residency. This choice reflects a deliberate strategy to cultivate 'mobility capital'. A Northern country's residency offers mobility to exit China when “risks” emerge, while Chinese nationality enables a strategic return when advantageous. This study contributes to the literature on how young, privileged Chinese individuals from the not-so-distant ‘Deng Xiaoping Era’ view China’s ongoing “New Era” as shaping their future aspirations with uncertainty; it examines how revenue-driven immigration controls in postcolonial Northern countries impact Southern elites by enabling them to project their domestic inequality issues onto a global scale through the use of mobility capital. In this study, it term these young Chinese elites "Chinese Übermensches," an unparalleled phenomenon in Chinese migration history.Keywords: mobility capital, elite migration, entrepreneurship, neoliberalism, risk society
Procedia PDF Downloads 81456 Self Help Groups among the Ao Nagas : A Case Study of Alongkima of Nagaland, NorthEast India
Authors: Imkongtenla Pongen
Abstract:
Self Help Groups (SGHs) are socio-commercial instruments in addressing urban poverty and strengthening livelihoods. Being a member of Self Help Group helped in mutual exchanges of ideas, develop risk taking behaviour, learns flexibility in planning of a programme, and interpersonal communication within the group. In the present study, an attempt has been made to examine the functions, characteristics and practices of Self Help Groups and its impact on sustainable development among the Ao Nagas of Alongkima, Nagaland, NorthEast India. They are a tribal group and racially belong to the Mongoloid stock and linguistically to the Tibeto-Burman group. They follow endogamous, patriarchal, and patrilineal system. Major characteristics of Self Help groups in this study are found to be team spirit and group cohesiveness. Such groups are found to be geared towards a number of self-sufficiency based business ventures. The problems faced in normal functioning of the groups are unpunctuality and the inability to attend a meeting by all the members .Participation in such groups has increased women’s influence over the economic resources and decision making in the household, improved self-confidence and living standard, capacity building, self- dependent and self-reliant with no educational and entrepreneurial background, generate savings and hone their skills as motivators and leaders. All these has enhanced her status in every sphere of life in par with the opposite gender. In a nutshell, we can say that what she cannot achieve as an individual, she can achieve as a member of a Self Help Group. Hence, we should try to develop mechanisms to guarantee the sustainability of Self Help Groups which depends on the way they can deal with both internal and external conflicts like globalization and competition from new markets.Keywords: Ao nagas, microfinance, self help group, women empowerment
Procedia PDF Downloads 3411455 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars
Authors: Busra Nur Ozguler Aktel
Abstract:
This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.Keywords: civil wars, tribes, alignment formation, side-switching, Iraq
Procedia PDF Downloads 871454 Numerical Simulation of the Flowing of Ice Slurry in Seawater Pipe of Polar Ships
Authors: Li Xu, Huanbao Jiang, Zhenfei Huang, Lailai Zhang
Abstract:
In recent years, as global warming, the sea-ice extent of North Arctic undergoes an evident decrease and Arctic channel has attracted the attention of shipping industry. Ice crystals existing in the seawater of Arctic channel which enter the seawater system of the ship with the seawater were found blocking the seawater pipe. The appearance of cooler paralysis, auxiliary machine error and even ship power system paralysis may be happened if seriously. In order to reduce the effect of high temperature in auxiliary equipment, seawater system will use external ice-water to participate in the cooling cycle and achieve the state of its flow. The distribution of ice crystals in seawater pipe can be achieved. As the ice slurry system is solid liquid two-phase system, the flow process of ice-water mixture is very complex and diverse. In this paper, the flow process in seawater pipe of ice slurry is simulated with fluid dynamics simulation software based on k-ε turbulence model. As the ice packing fraction is a key factor effecting the distribution of ice crystals, the influence of ice packing fraction on the flowing process of ice slurry is analyzed. In this work, the simulation results show that as the ice packing fraction is relatively large, the distribution of ice crystals is uneven in the flowing process of the seawater which has such disadvantage as increase the possibility of blocking, that will provide scientific forecasting methods for the forming of ice block in seawater piping system. It has important significance for the reliability of the operating of polar ships in the future.Keywords: ice slurry, seawater pipe, ice packing fraction, numerical simulation
Procedia PDF Downloads 3671453 Maintaining Minority Languages; Evidence from Italy
Authors: Carmela Perta
Abstract:
Following the example of both International and European legislation, on 15 December 1999 the national law 482/99 Regulations regarding the protection of historic language minorities was approved, providing a national framework for the preservation and renaissance of minority languages «The Italian Republic sustains the language and culture of people speaking Albanian, Catalan, German, Greek, Slovene, Croatian, French, Francoprovençal, Friulan, Ladin, Occitan and Sard». The legislation made it possible to use these languages in education, in public offices, in local government, in the judicial system, in mass media, and allowed for the reinstatement of place and personal names. However, several practical problems have emerged, particularly those concerning the variety that should be used in education, in official documents and in other formal domains, i.e. the local variety, the standard of reference (if there is any), or an over regional koinè. In minority settings, it might seem eminently sensible to use the ready made standard of reference, accepting the Ausbausprache, rather than the language as practice, that is the local variety. However, this process seems to be pointless, as is demonstrated by the results of a fieldwork that was carried out in a small town in the South of Italy where members speak Faetar, the local variety of Francoprovençal. Here the language is largely used by the community members in all domains, moreover a deep sense of loyalty towards the variety they use and a manifested minority identity can be observed analysing the speakers’ attitudes. However, these positive attitudes are towards the vehicle for their distinctive history and culture, and not for an “external” standard, a system which local authorities and planners are trying to introduce in the community. In other words, according to the speakers' reactions, there is little point in struggling to maintain a language, if what is conserved is not the group’s language but another.Keywords: maintenance, minority languages, endangered languages, francoprovençal
Procedia PDF Downloads 4351452 Cultural Self-Efficacy of Child Protection Social Workers in Norway: Barriers and Opportunities in Working with Migrant Families
Authors: Justyna Mroczkowska
Abstract:
Social worker's ability to provide culturally sensitive assistance in child protection is taken for granted; given limited training opportunities and lack of clear guidance, practitioners report working with migrant families more demanding in comparison to working with native families. In this study, the author developed and factor analyzed the Norwegian Cultural Self-Efficacy Scale to describe the level of cultural capability among Norwegian child protection professionals. The study aimed to determine the main influencing factors to cultural efficacy and examine the relationship between self-efficacy and perceived difficulty in working with migrant families. The scale was administered to child protection workers in Norway (N=251), and the reliability of the scale measured by Cronbach's alpha coefficient was .904. The confirmatory factor analysis of social work cultural self-efficacy found support for four separate but correlated subscales: Assessment, Communication, Support Request, and Teamwork. Regression analyses found the experience in working with migrant families, training and support from external agencies, and colleague support to be significant predictors of cultural self-efficacy. Self-efficacy in assessment skills and self-efficacy in communication skills were moderately related to the perceived difficulty to work with migrant families. The findings conclude with previous research and highlight the need for both professional development programs and institutional resources to be provided to support the practitioner's preparation for multicultural practice in child protection.Keywords: child protection, cultural self-efficacy, cultural competency, migration, resources
Procedia PDF Downloads 1431451 Contribution to the Study of Reproduction of Water Birds (Case of Marsh Bouessdra, North East Algeria)
Authors: Wahiba Boudraa, Khalil Draidi, Badis Bakhouch, Farah Chettibi, Meriem Aberkane, Zihad Bouslama, Moussa Houhamdi
Abstract:
The Gulf of Annaba, located at the extreme north eastern Algerian; our site of study is a marsh administratively it is part of the wilaya of Annaba, municipality of El-Bouni; extends on a surface from 55 hectare, the maximum depth is of less 2m. A scheme of work was adopted for an evaluation and characterization of the reproduction of the water nicheurs birds in the marsh of Boussedra. Some important parameters described by the scientific literature; According to standardized methods, variables were the object of a regular follow-up during the period of reproduction. These parameters were taken into account: the installation date of the nests, the vegetable support; blossoming of eggs, causes of the failure of the blossomings (predation or abandonment), characteristics of the nests (composition, internal diameter, external diameter, depth and heightening), measurements of the distances nest-nest nearest, Depth of water, the measurement of eggs, size of laying, size of laying. The follow-up in the marsh was carried out between March 2013 until the month of July 2014 at a rate of two outputs per weeks, one located and noted the nests to control them each week. The study on the reproduction of the water birds enables us to note that this site plays a very important part in the wintering and the reproduction of certain species important. This study opens broad prospects for study of several phenomena related to the ecology of the water birds, and the conservation of the wetlands.Keywords: Algeria, Boussedra, nests, reproduction, water birds
Procedia PDF Downloads 2571450 Rights-Based Approach to Artificial Intelligence Design: Addressing Harm through Participatory ex ante Impact Assessment
Authors: Vanja Skoric
Abstract:
The paper examines whether the impacts of artificial intelligence (AI) can be meaningfully addressed through the rights-based approach to AI design, investigating in particular how the inclusive, participatory process of assessing the AI impact would make this viable. There is a significant gap between envisioning rights-based AI systems and their practical application. Plausibly, internalizing human rights approach within AI design process might be achieved through identifying and assessing implications of AI features human rights, especially considering the case of vulnerable individuals and communities. However, there is no clarity or consensus on how such an instrument should be operationalised to usefully identify the impact, mitigate harms and meaningfully ensure relevant stakeholders’ participation. In practice, ensuring the meaningful inclusion of those individuals, groups, or entire communities who are affected by the use of the AI system is a prerequisite for a process seeking to assess human rights impacts and risks. Engagement in the entire process of the impact assessment should enable those affected and interested to access information and better understand the technology, product, or service and resulting impacts, but also to learn about their rights and the respective obligations and responsibilities of developers and deployers to protect and/or respect these rights. This paper will provide an overview of the study and practice of the participatory design process for AI, including inclusive impact assessment, its main elements, propose a framework, and discuss the lessons learned from the existing theory. In addition, it will explore pathways for enhancing and promoting individual and group rights through such engagement by discussing when, how, and whom to include, at which stage of the process, and what are the pre-requisites for meaningful and engaging. The overall aim is to ensure using the technology that works for the benefit of society, individuals, and particular (historically marginalised) groups.Keywords: rights-based design, AI impact assessment, inclusion, harm mitigation
Procedia PDF Downloads 1501449 Early-Stage Venture Investment Model: Evidence from Saudi Arabia
Authors: Tibah Alharbi, Renzo Cordina, David Power
Abstract:
Relatively few studies have explored how venture capitalist investors (VCs) make investment decisions and the information they rely on when taking an equity stake in an investee company. In addition, little is known about how much investors monitor start-ups after the decision to invest has been made. The VC scene in the US or European context is understood better than that of developing countries such as those in the Middle East. Although some differences among VC investors have been identified, the reasons behind such differences have not been fully explored – especially in a country such as Saudi Arabia. Therefore, this research seeks to understand the impact of external factors on the VC investor’ behaviour. The unique cultural and legal environments in the Kingdom of Saudi Arabia, the growing VC sector in the country, and the increasing importance attached to start-ups under the Saudi Government’s Vision 2030 program make such an investigation timely. Ascertaining the perceptions of VC investors in such a context will provide a deeper understanding of the determinants of VC investment in a novel setting. Using semi-structured interviews with over 20 participants, the research explores the structure of VC funds, the cycle of the VC investment in a start-up from the sourcing of deals, the screening and evaluation of such deals, the closing of such deals, and finally, the monitoring of such investments before the decision to exit such deals at the appropriate time. The results show some similarities to the VC model, which characterizes such investment in the US and Europe, but several differences emerge given the unique cultural and legal settings within the Kingdom. The results provide an in-depth understanding of the VC investors’ mindset relative to the existing studies in the literature.Keywords: exit, monitoring, start-ups, venture capital
Procedia PDF Downloads 1451448 High-Resolution Flood Hazard Mapping Using Two-Dimensional Hydrodynamic Model Anuga: Case Study of Jakarta, Indonesia
Authors: Hengki Eko Putra, Dennish Ari Putro, Tri Wahyu Hadi, Edi Riawan, Junnaedhi Dewa Gede, Aditia Rojali, Fariza Dian Prasetyo, Yudhistira Satya Pribadi, Dita Fatria Andarini, Mila Khaerunisa, Raditya Hanung Prakoswa
Abstract:
Catastrophe risk management can only be done if we are able to calculate the exposed risks. Jakarta is an important city economically, socially, and politically and in the same time exposed to severe floods. On the other hand, flood risk calculation is still very limited in the area. This study has calculated the risk of flooding for Jakarta using 2-Dimensional Model ANUGA. 2-Dimensional model ANUGA and 1-Dimensional Model HEC-RAS are used to calculate the risk of flooding from 13 major rivers in Jakarta. ANUGA can simulate physical and dynamical processes between the streamflow against river geometry and land cover to produce a 1-meter resolution inundation map. The value of streamflow as an input for the model obtained from hydrological analysis on rainfall data using hydrologic model HEC-HMS. The probabilistic streamflow derived from probabilistic rainfall using statistical distribution Log-Pearson III, Normal and Gumbel, through compatibility test using Chi Square and Smirnov-Kolmogorov. Flood event on 2007 is used as a comparison to evaluate the accuracy of model output. Property damage estimations were calculated based on flood depth for 1, 5, 10, 25, 50, and 100 years return period against housing value data from the BPS-Statistics Indonesia, Centre for Research and Development of Housing and Settlements, Ministry of Public Work Indonesia. The vulnerability factor was derived from flood insurance claim. Jakarta's flood loss estimation for the return period of 1, 5, 10, 25, 50, and 100 years, respectively are Rp 1.30 t; Rp 16.18 t; Rp 16.85 t; Rp 21.21 t; Rp 24.32 t; and Rp 24.67 t of the total value of building Rp 434.43 t.Keywords: 2D hydrodynamic model, ANUGA, flood, flood modeling
Procedia PDF Downloads 2751447 Efficacy of Comprehensive Diabetic Care Program with the Reduction of HbA1c in Overweight Type II Diabetes Mellitus Patients: A Retrospective Study
Authors: Rohit Sane, Pravin Ghadigaonkar, Purvi Ahuja, Suvarna Tirmare, Archana Kelhe, Kranti Shinde, Rahul Mandole
Abstract:
To evaluate the efficacy of Comprehensive Diabetic Care Program with the reduction of HbA1c in overweight Diabetes Mellitus Type II patients retrospectively. Methods: Retrospective study was carried out on 34 overweight type II diabetic patients (Mean Age = 54.58 ±11.38 yrs). A total of 34 patients were enrolled after screening of 68 patients (HbA1c 7-10%). The patients were on concomitant drugs namely insulin (11.76%), DPP-4 inhibitor (17.64%), Biguanide (55.88%), Sulfonylurea (52.94%), thiazolidinedione (11.76%), other medications (20.58%) and no allopathic medications (14.70%). The patients were given Comprehensive Diabetic Care Program consisting of panchkarma procedures namely snehana (external oleation), swedana (passive heat therapy) and basti (enema), which was completed in 15 sittings. During the therapy and next 90 days, the patients followed low carbohydrate and moderate protein & fat diet. The primary endpoint of this study was the evaluation of reduction in HbA1c at the end of the follow-up after 90 days. Results: Thirty-four overweight type II diabetic patients (mean age: 54.58[±11.38], HbA1c[7-10%], 67.64% male and 32.35% female) were enrolled in the study. A significant reduction was observed in HbA1c levels (14.30%, p<0.05) at the end of the 90 days follow-up as compared to baseline. Also, BMI was reduced by 5.87%. There was reduction in the usage of the concomitant drugs namely insulin (2.94%), DPP-4 inhibitor (2.94%), Biguanide (32.35%), Sulfonylurea (35.29%), thiazolidinedione (5.88%), other medications(17.64%) and no allopathic medications (32.35%). Conclusion: The results of the study highlight not only in the reduction of HbA1c, but also in BMI and drug tapering of the CDC program in the overweight type II diabetic patients with HbA1c (7-10%).Keywords: HbA1c, low carb diet, Panchakarma therapy, Type II Diabetes
Procedia PDF Downloads 2811446 Identification and Prioritisation of Students Requiring Literacy Intervention and Subsequent Communication with Key Stakeholders
Authors: Emilie Zimet
Abstract:
During networking and NCCD moderation meetings, best practices for identifying students who require Literacy Intervention are often discussed. Once these students are identified, consideration is given to the most effective process for prioritising those who have the greatest need for Literacy Support and the allocation of resources, tracking of intervention effectiveness and communicating with teachers/external providers/parents. Through a workshop, the group will investigate best practices to identify students who require literacy support and strategies to communicate and track their progress. In groups, participants will examine what they do in their settings and then compare with other models, including the researcher’s model, to decide the most effective path to identification and communication. Participants will complete a worksheet at the beginning of the session to deeply consider their current approaches. The participants will be asked to critically analyse their own identification processes for Literacy Intervention, ensuring students are not overlooked if they fall into the borderline category. A cut-off for students to access intervention will be considered so as not to place strain on already stretched resources along with the most effective allocation of resources. Furthermore, communicating learning needs and differentiation strategies to staff is paramount to the success of an intervention, and participants will look at the frequency of communication to share such strategies and updates. At the end of the session, the group will look at creating or evolving models that allow for best practices for the identification and communication of Literacy Interventions. The proposed outcome for this research is to develop a model of identification of students requiring Literacy Intervention that incorporates the allocation of resources and communication to key stakeholders. This will be done by pooling information and discussing a variety of models used in the participant's school settings.Keywords: identification, student selection, communication, special education, school policy, planning for intervention
Procedia PDF Downloads 471445 Liver and Liver Lesion Segmentation From Abdominal CT Scans
Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid
Abstract:
The interpretation of medical images benefits from anatomical and physiological priors to optimize computer- aided diagnosis applications. Segmentation of liver and liver lesion is regarded as a major primary step in computer aided diagnosis of liver diseases. Precise liver segmentation in abdominal CT images is one of the most important steps for the computer-aided diagnosis of liver pathology. In this papers, a semi- automated method for medical image data is presented for the liver and liver lesion segmentation data using mathematical morphology. Our algorithm is currency in two parts. In the first, we seek to determine the region of interest by applying the morphological filters to extract the liver. The second step consists to detect the liver lesion. In this task; we proposed a new method developed for the semi-automatic segmentation of the liver and hepatic lesions. Our proposed method is based on the anatomical information and mathematical morphology tools used in the image processing field. At first, we try to improve the quality of the original image and image gradient by applying the spatial filter followed by the morphological filters. The second step consists to calculate the internal and external markers of the liver and hepatic lesions. Thereafter we proceed to the liver and hepatic lesions segmentation by the watershed transform controlled by markers. The validation of the developed algorithm is done using several images. Obtained results show the good performances of our proposed algorithmKeywords: anisotropic diffusion filter, CT images, hepatic lesion segmentation, Liver segmentation, morphological filter, the watershed algorithm
Procedia PDF Downloads 4511444 Magnetic Silica Nanoparticles as Viable Support for the Immobilization of Oxidative Enzymes
Authors: Y. Moldes-Diz, M. Gamallo, G. Eibes, C. Vazquez-Vazquez, G. Feijoo, J. M. Lema, M. T. Moreira
Abstract:
Laccases (benzenediol oxygen oxidoreductases, EC 1.10.3.2) are excellent biocatalysts for biotechnological and environmental applications because of their high activity, selectivity, and specificity. Specifically, these characteristics allow them to perform the oxidation of recalcitrant compounds with simple requirements for the catalysis (presence of molecular oxygen). Nevertheless, the low stability under unfavorable conditions (pH, inactivating agents or temperature) and high production costs still limits their use for practical applications. Immobilization of enzymes has proven particularly valuable to avoid some of the aforementioned drawbacks. Magnetic nanoparticles (MNPs) have received increasing attention as carriers for enzyme immobilization since they can potentially provide an easy recovery of the biocatalyst from the reaction medium under an external magnetic field. In the present work, silica-coated magnetic nanoparticles (Fe3O4@SiO2) were prepared, characterized and used for laccase immobilization by covalent binding. The synthesis of Fe3O4@SiO2 was performed in a two-step procedure: co-precipitation and reverse microemulsion. The influence of immobilization conditions: concentrations of the functionalization agent (3-aminopropyl-triethoxy-silane) and the cross-linker (glutaraldehyde) as well as the influence of pH, T or inactivating agents were evaluated. In general, immobilized laccase showed superior stability compared to that of free enzyme. The reusability of the biocatalyst was demonstrated in successive batch reactions, where enzyme activity was maintained above 65% after 8 cycles of oxidation of the substrate 2,2'-azinobis-(3-ethylbenzothiazoline-6-sulfonate).Keywords: silica-coated magnetic nanoparticles, laccase, immobilization, regeneration
Procedia PDF Downloads 2181443 The Effect of Perceived Environmental Uncertainty on Corporate Entrepreneurship Performance: A Field Study in a Large Industrial Zone in Turkey
Authors: Adem Öğüt, M. Tahir Demirsel
Abstract:
Rapid changes and developments today, besides the opportunities and facilities they offer to the organization, may also be a source of danger and difficulties due to the uncertainty. In order to take advantage of opportunities and to take the necessary measures against possible uncertainties, organizations must always follow the changes and developments that occur in the business environment and develop flexible structures and strategies for the alternative cases. Perceived environmental uncertainty is an outcome of managers’ perceptions of the combined complexity, instability and unpredictability in the organizational environment. An environment that is perceived to be complex, changing rapidly, and difficult to predict creates high levels of uncertainty about the appropriate organizational responses to external circumstances. In an uncertain and complex environment, organizations experiencing cutthroat competition may be successful by developing their corporate entrepreneurial ability. Corporate entrepreneurship is a process that includes many elements such as innovation, creating new business, renewal, risk-taking and being predictive. Successful corporate entrepreneurship is a critical factor which has a significant contribution to gain a sustainable competitive advantage, to renew the organization and to adapt the environment. In this context, the objective of this study is to investigate the effect of perceived environmental uncertainty of managers on corporate entrepreneurship performance. The research was conducted on 222 business executives in one of the major industrial zones of Turkey, Konya Organized Industrial Zone (KOS). According to the results, it has been observed that there is a positive statistically significant relationship between perceived environmental uncertainty and corporate entrepreneurial activities.Keywords: corporate entrepreneurship, entrepreneurship, industrial zone, perceived environmental uncertainty, uncertainty
Procedia PDF Downloads 314