Search results for: Adam Hacker
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 223

Search results for: Adam Hacker

223 Hackers’ Artwork in Search for a Name: An Analysis of Hackers’ Artwork

Authors: Sultana Ismet Jerin, Md. Waseq Ur Rahman

Abstract:

Artworks of hacker artists are one of the new trends in the field of new media arts. When someone hears a name of hacker or anything related to hacking, what comes to one’s mind is usually not connected to art due to its divisive meaning. While it is fascinating that every year a number of hacker summits and hacker art fest are being organized among the respective community, it is at the same time true that people are yet to understand what hacker art really is. However, this new phenomenon of artwork under the title ‘hacker art’ has little been studied. Understanding this new form of art is important as the artists of hacker art belong to the era of digital revolution which is a very significant part of our history. Therefore, it is important to find out the challenges in defining them and find out solutions to preserve them. In this paper, the key question that has been addressed is why artworks of hacker artists are facing the complicacies to be defined or categorized. Content analysis of the hacker manifesto (a short historical essay written by a hacker) and two hacker art projects has been conducted to find out the issues surrounding the key research questions. The paper ends with discussing the findings and possible solutions to the challenges hacker artists facing.

Keywords: media art, hacker art, hacker artist, new media

Procedia PDF Downloads 155
222 Professional Ambitions of Students of Faculty of Chemistry, Adam Mickiewicz University in the Context of Teaching Profession

Authors: Malgorzata Bartoszewicz, Grzegorz Krzysko

Abstract:

Chemistry students plan a career path based on their interests, predispositions, and preferences. This study aims to determine what percentage of all chemistry students selected teaching as a career. There is a lack of science teachers (especially physics and chemistry) in Poland, and there is limited research on students' choices and professional preferences. At the Faculty of Chemistry of the Adam Mickiewicz University in the academic year 2019/2020, changes were introduced to the study program resulting from legal regulations and as part of the funds raised from the project "Teacher - competent practitioner, supervisor, expert", No. POWR.03.01.00-00-KN40/18. The aim of the study was to determine how many first-cycle and second-cycle studies students declare the teaching profession as a career. In the case of first-cycle studies students, 9.5% of respondents choose the teaching profession and 9.2% of second-cycle studies students. It was found that the number of students who chose the teacher preparation programme at Faculty of Chemistry of the Adam Mickiewicz University has decreased since 5 years.

Keywords: faculty of chemistry, Adam Mickiewicz University, professional ambitions, students, teacher

Procedia PDF Downloads 103
221 Parabolic Impact Law of High Frequency Exchanges on Price Formation in Commodities Market

Authors: L. Maiza, A. Cantagrel, M. Forestier, G. Laucoin, T. Regali

Abstract:

Evaluation of High Frequency Trading (HFT) impact on financial markets is very important for traders who use market analysis to detect winning transaction opportunity. Analysis of HFT data on tobacco commodity market is discussed here and interesting linear relationship has been shown between trading frequency and difference between averaged trading prices above and below considered trading frequency. This may open new perspectives on markets data understanding and could provide possible interpretation of Adam Smith invisible hand.

Keywords: financial market, high frequency trading, analysis, impacts, Adam Smith invisible hand

Procedia PDF Downloads 323
220 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 360
219 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 92
218 Structural Development and Multiscale Design Optimization of Additively Manufactured Unmanned Aerial Vehicle with Blended Wing Body Configuration

Authors: Malcolm Dinovitzer, Calvin Miller, Adam Hacker, Gabriel Wong, Zach Annen, Padmassun Rajakareyar, Jordan Mulvihill, Mostafa S.A. ElSayed

Abstract:

The research work presented in this paper is developed by the Blended Wing Body (BWB) Unmanned Aerial Vehicle (UAV) team, a fourth-year capstone project at Carleton University Department of Mechanical and Aerospace Engineering. Here, a clean sheet UAV with BWB configuration is designed and optimized using Multiscale Design Optimization (MSDO) approach employing lattice materials taking into consideration design for additive manufacturing constraints. The BWB-UAV is being developed with a mission profile designed for surveillance purposes with a minimum payload of 1000 grams. To demonstrate the design methodology, a single design loop of a sample rib from the airframe is shown in details. This includes presentation of the conceptual design, materials selection, experimental characterization and residual thermal stress distribution analysis of additively manufactured materials, manufacturing constraint identification, critical loads computations, stress analysis and design optimization. A dynamic turbulent critical load case was identified composed of a 1-g static maneuver with an incremental Power Spectral Density (PSD) gust which was used as a deterministic design load case for the design optimization. 2D flat plate Doublet Lattice Method (DLM) was used to simulate aerodynamics in the aeroelastic analysis. The aerodynamic results were verified versus a 3D CFD analysis applying Spalart-Allmaras and SST k-omega turbulence to the rigid UAV and vortex lattice method applied in the OpenVSP environment. Design optimization of a single rib was conducted using topology optimization as well as MSDO. Compared to a solid rib, weight savings of 36.44% and 59.65% were obtained for the topology optimization and the MSDO, respectively. These results suggest that MSDO is an acceptable alternative to topology optimization in weight critical applications while preserving the functional requirements.

Keywords: blended wing body, multiscale design optimization, additive manufacturing, unmanned aerial vehicle

Procedia PDF Downloads 316
217 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 49
216 The Effect of the Deposition Parameters on the Microstructural and Optical Properties of Mn-Doped GeTe Chalcogenide Materials

Authors: Adam Abdalla Elbashir Adam, Xiaomin Cheng, Xiang Shui Miao

Abstract:

In this work, the effect of the magnetron sputtering system parameters on the optical properties of the Mn doped GeTe were investigated. The optical properties of the Ge1-xMnxTe thin films with different thicknesses are determined by analyzing the transmittance and reflectance data. The energy band gaps of the amorphous Mn-doped GeTe thin films with different thicknesses were calculated. The obtained results demonstrated that the energy band gap values of the amorphous films are quite different and they are dependent on the films thicknesses. The extinction coefficients of amorphous Mn-doped GeTe thin films as function of wavelength for different thicknesses were measured. The results showed that the extinction coefficients of all films are varying inversely with their optical transmission. Moreover, the results emphasis that, not only the microstructure, electrical and magnetic properties of Mn doped GeTe thin films vary with the films thicknesses but also the optical properties differ with the film thickness.

Keywords: phase change magnetic materials, transmittance, absorbance, extinction coefficients

Procedia PDF Downloads 371
215 Theoretical Appraisal of Satisfactory Decision: Uncertainty, Evolutionary Ideas and Beliefs, Satisfactory Time Use

Authors: Okay Gunes

Abstract:

Unsatisfactory experiences due to an information shortage regarding the future pay-offs of actual choices, yield satisficing decision-making. This research will examine, for the first time in the literature, the motivation behind suboptimal decisions due to uncertainty by subjecting Adam Smith’s and Jeremy Bentham’s assumptions about the nature of the actions that lead to satisficing behavior, in order to clarify the theoretical background of a “consumption-based satisfactory time” concept. The contribution of this paper with respect to the existing literature is threefold: Firstly, it is showed in this paper that Adam Smith’s uncertainty is related to the problem of the constancy of ideas and not related directly to beliefs. Secondly, possessions, as in Jeremy Bentham’s oeuvre, are assumed to be just as pleasing, as protecting and improving the actual or expected quality of life, so long as they reduce any displeasure due to the undesired outcomes of uncertainty. Finally, each consumption decision incurs its own satisfactory time period, owed to not feeling hungry, being healthy, not having transportation…etc. This reveals that the level of satisfaction is indeed a behavioral phenomenon where its value would depend on the simultaneous satisfaction derived from all activities.

Keywords: decision-making, idea and belief, satisficing, uncertainty

Procedia PDF Downloads 247
214 Exposing Latent Fingermarks on Problematic Metal Surfaces Using Time of Flight Secondary Ion Mass Spectroscopy

Authors: Tshaiya Devi Thandauthapani, Adam J. Reeve, Adam S. Long, Ian J. Turner, James S. Sharp

Abstract:

Fingermarks are a crucial form of evidence for identifying a person at a crime scene. However, visualising latent (hidden) fingermarks can be difficult, and the correct choice of techniques is essential to develop and preserve any fingermarks that might be present. Knives, firearms and other metal weapons have proven to be challenging substrates (stainless steel in particular) from which to reliably obtain fingermarks. In this study, time of flight secondary ion mass spectroscopy (ToF-SIMS) was used to image fingermarks on metal surfaces. This technique was compared to a conventional superglue based fuming technique that was accompanied by a series of contrast enhancing dyes (basic yellow 40 (BY40), crystal violet (CV) and Sudan black (SB)) on three different metal surfaces. The conventional techniques showed little to no evidence of fingermarks being present on the metal surfaces after a few days. However, ToF-SIMS images revealed fingermarks on the same and similar substrates with an exceptional level of detail demonstrating clear ridge definition as well as detail about sweat pore position and shape, that persist for over 26 days after deposition when the samples were stored under ambient conditions.

Keywords: conventional techniques, latent fingermarks, metal substrates, time of flight secondary ion mass spectroscopy

Procedia PDF Downloads 130
213 Finite-Sum Optimization: Adaptivity to Smoothness and Loopless Variance Reduction

Authors: Bastien Batardière, Joon Kwon

Abstract:

For finite-sum optimization, variance-reduced gradient methods (VR) compute at each iteration the gradient of a single function (or of a mini-batch), and yet achieve faster convergence than SGD thanks to a carefully crafted lower-variance stochastic gradient estimator that reuses past gradients. Another important line of research of the past decade in continuous optimization is the adaptive algorithms such as AdaGrad, that dynamically adjust the (possibly coordinate-wise) learning rate to past gradients and thereby adapt to the geometry of the objective function. Variants such as RMSprop and Adam demonstrate outstanding practical performance that have contributed to the success of deep learning. In this work, we present AdaLVR, which combines the AdaGrad algorithm with loopless variance-reduced gradient estimators such as SAGA or L-SVRG that benefits from a straightforward construction and a streamlined analysis. We assess that AdaLVR inherits both good convergence properties from VR methods and the adaptive nature of AdaGrad: in the case of L-smooth convex functions we establish a gradient complexity of O(n + (L + √ nL)/ε) without prior knowledge of L. Numerical experiments demonstrate the superiority of AdaLVR over state-of-the-art methods. Moreover, we empirically show that the RMSprop and Adam algorithm combined with variance-reduced gradients estimators achieve even faster convergence.

Keywords: convex optimization, variance reduction, adaptive algorithms, loopless

Procedia PDF Downloads 15
212 Distribution and Densities of Anopheles Mosquito in El Obied Town, Sudan

Authors: Adam Musa Adam Eissa

Abstract:

Environmental and weather changes especially rainfall affects the distribution and densities of mosquitoes. This work was carried out to study the distribution and densities of mosquitoes adults and larvae in a total of five selected stations in El Obied Town. A cross-sectional survey of Anopheline mosquito larval habitats was conducted. The survey was conducted during the dry season (January 2013). Larvae were collected by using the standard dipping technique, while adult stages were collected by rearing larvae in cage, because the density of adults Anopheles mosquito per room was zero by using spray sheet method by using Permethrin pesticide 25%E.C, during the study period. The results revealed that (2347) Anopheline mosquito larvae were found and collected from only one station. All of which (2347) larvae (100%) were classified as probably Anopheles Squamosus. The study also showed that, a number of 81 adults (100%) Anopheline mosquito were classified as probably Anopheles Squamosus. Anopheles Squamosus were found only in the shallow pond water habitat in Alrahma west area of El Obied, the mean Anopheline density in the study area for larvae was 0.313 per dip while the mean density of adult was 0 per room. The high mosquito larval density in Alrahma west area indicated that, this part of El Obied Town is at risk of mosquito-borne diseases including malaria. This study recommended to apply the control program against mosquito at this part of the Town.

Keywords: anopheles, squamosus, Alrahma, distribution

Procedia PDF Downloads 245
211 Manipulator Development for Telediagnostics

Authors: Adam Kurnicki, Bartłomiej Stanczyk, Bartosz Kania

Abstract:

This paper presents development of the light-weight manipulator with series elastic actuation for medical telediagnostics (USG examination). General structure of realized impedance control algorithm was shown. It was described how to perform force measurements based mainly on elasticity of manipulator links.

Keywords: telediagnostics, elastic manipulator, impedance control, force measurement

Procedia PDF Downloads 439
210 Effect of One-Period of SEAS Exercises on Some Spinal Biomechanical and Postural Parameters in the Students with Idiopathic Scoliosis

Authors: Zandi Ahmad, Sokhanguei Yahya, Saboonchi Reza

Abstract:

Objective: The new and modern lifestyle, especially in the twenty-first century and lack of movement in spinal structure have made patients and the physicians in the field of health and also other insurance companies in the developed and developing countries worry more than before about the abnormalities of spinal column- this great healthcare problem. The high prevalence of spinal column in all age groups -from children to adults- and in all professions have led the researchers to the idea of giving an opportunity to all those who worry about the dangers threatening the spinal column. Therefore, one of the corrective methods for these patients is using SEAS exercises. Materials and Methods: This study aims at investigating the effect of one-period of SEAS exercises on some spinal biomechanical and postural parameters in the students with idiopathic scoliosis. According to the nature of the study and research objectives as well as the data collection methods, the current research is a semi-empirical survey. The research population is comprised of students with idiopathic scoliosis. A total number of 30 students were selected using available sampling and divided into two groups of control and SEAS exercises. Scoliometer was used for data collection. Descriptive statistics were used to categorize the findings. Kolmogorov-Smirnov statistical models were used to confirm that the distribution of the data is normal and T-test was used for effectiveness. Hypothesis testing was done using SPSS21. Conclusion: Results show that SEAS exercises have a significant effect in Adam’s Test. Therefore, according to the obtained results, SEAS exercises can be used to recover idiopathic scoliosis among the students. Further studies in larger samples and treatment, periods as well as more follow-up investigations appear to be essential to prove these effects.

Keywords: SEAS exercises, idiopathic scoliosis, Adam’s test, exercise

Procedia PDF Downloads 253
209 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 151
208 Public Administrators, Code of Conduct and the Nigerian Society

Authors: Mahmud Adam, Inuwa Abdu Ibrahim

Abstract:

The issue of ethics and values of public office holders in Nigerian has been and still is a matter of great mystery. Their behaviours in the discharge of their official responsibility remain unsatisfactory. The paper looks at the code of conduct and the societal values with which the Nigerian Administrators function today. Secondary sources of data were used. In conclusion, a change in attitude, reorientation, harsh and enforceable laws is required to reverse the trend.

Keywords: society, administrators, code of conduct, Nigeria

Procedia PDF Downloads 306
207 Evaluation of Bucket Utility Truck In-Use Driving Performance and Electrified Power Take-Off Operation

Authors: Robert Prohaska, Arnaud Konan, Kenneth Kelly, Adam Ragatz, Adam Duran

Abstract:

In an effort to evaluate the in-use performance of electrified Power Take-off (PTO) usage on bucket utility trucks operating under real-world conditions, data from 20 medium- and heavy-duty vehicles operating in California, USA were collected, compiled, and analyzed by the National Renewable Energy Laboratory's (NREL) Fleet Test and Evaluation team. In this paper, duty-cycle statistical analyses of class 5, medium-duty quick response trucks and class 8, heavy-duty material handler trucks are performed to examine and characterize vehicle dynamics trends and relationships based on collected in-use field data. With more than 100,000 kilometers of driving data collected over 880+ operating days, researchers have developed a robust methodology for identifying PTO operation from in-field vehicle data. Researchers apply this unique methodology to evaluate the performance and utilization of the conventional and electric PTO systems. Researchers also created custom representative drive-cycles for each vehicle configuration and performed modeling and simulation activities to evaluate the potential fuel and emissions savings for hybridization of the tractive driveline on these vehicles. The results of these analyses statistically and objectively define the vehicle dynamic and kinematic requirements for each vehicle configuration as well as show the potential for further system optimization through driveline hybridization. Results are presented in both graphical and tabular formats illustrating a number of key relationships between parameters observed within the data set that relates specifically to medium- and heavy-duty utility vehicles operating under real-world conditions.

Keywords: drive cycle, heavy-duty (HD), hybrid, medium-duty (MD), PTO, utility

Procedia PDF Downloads 356
206 Block Implicit Adams Type Algorithms for Solution of First Order Differential Equation

Authors: Asabe Ahmad Tijani, Y. A. Yahaya

Abstract:

The paper considers the derivation of implicit Adams-Moulton type method, with k=4 and 5. We adopted the method of interpolation and collocation of power series approximation to generate the continuous formula which was evaluated at off-grid and some grid points within the step length to generate the proposed block schemes, the schemes were investigated and found to be consistent and zero stable. Finally, the methods were tested with numerical experiments to ascertain their level of accuracy.

Keywords: Adam-Moulton Type (AMT), off-grid, block method, consistent and zero stable

Procedia PDF Downloads 448
205 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 632
204 Deep Learning for Renewable Power Forecasting: An Approach Using LSTM Neural Networks

Authors: Fazıl Gökgöz, Fahrettin Filiz

Abstract:

Load forecasting has become crucial in recent years and become popular in forecasting area. Many different power forecasting models have been tried out for this purpose. Electricity load forecasting is necessary for energy policies, healthy and reliable grid systems. Effective power forecasting of renewable energy load leads the decision makers to minimize the costs of electric utilities and power plants. Forecasting tools are required that can be used to predict how much renewable energy can be utilized. The purpose of this study is to explore the effectiveness of LSTM-based neural networks for estimating renewable energy loads. In this study, we present models for predicting renewable energy loads based on deep neural networks, especially the Long Term Memory (LSTM) algorithms. Deep learning allows multiple layers of models to learn representation of data. LSTM algorithms are able to store information for long periods of time. Deep learning models have recently been used to forecast the renewable energy sources such as predicting wind and solar energy power. Historical load and weather information represent the most important variables for the inputs within the power forecasting models. The dataset contained power consumption measurements are gathered between January 2016 and December 2017 with one-hour resolution. Models use publicly available data from the Turkish Renewable Energy Resources Support Mechanism. Forecasting studies have been carried out with these data via deep neural networks approach including LSTM technique for Turkish electricity markets. 432 different models are created by changing layers cell count and dropout. The adaptive moment estimation (ADAM) algorithm is used for training as a gradient-based optimizer instead of SGD (stochastic gradient). ADAM performed better than SGD in terms of faster convergence and lower error rates. Models performance is compared according to MAE (Mean Absolute Error) and MSE (Mean Squared Error). Best five MAE results out of 432 tested models are 0.66, 0.74, 0.85 and 1.09. The forecasting performance of the proposed LSTM models gives successful results compared to literature searches.

Keywords: deep learning, long short term memory, energy, renewable energy load forecasting

Procedia PDF Downloads 224
203 New Method for the Synthesis of Different Pyrroloquinazolinoquinolin Alkaloids

Authors: Abdulkareem M. Hamid, Yaseen Elhebshi, Adam Daïch

Abstract:

Luotonins and its derivatives (Isoluotonins) are alkaloids from the aerial parts of Peganum nigellastrum Bunge that display three major skeleton types. Luotonins A, B, and E are pyrroloquinazolinoquinoline alkaloids. A few methods were known for the sysnthesis of Isoluotonin. All luotonins have shown promising cytotoxicities towards selected human cancer cell lines, especially against leukemia P-388 cells. Luotonin A is the most active one, with its activity stemming from topoisomerase I-dependent DNA-cleavage. Such intriguing biological activities and unique structures have led not only to the development of synthetic methods for the efficient synthesis of these compounds, but also to interest in structural modifications for improving the biological properties. Recent progress in the study of luotonins is covered.

Keywords: luotonin A, isoluotonin, pyrroloquiolines, alkaloids

Procedia PDF Downloads 380
202 Relationships between Social Entrepreneurship, CSR and Social Innovation: In Theory and Practice

Authors: Krisztina Szegedi, Gyula Fülöp, Ádám Bereczk

Abstract:

The shared goal of social entrepreneurship, corporate social responsibility and social innovation is the advancement of society. The business model of social enterprises is characterized by unique strategies based on the competencies of the entrepreneurs, and is not aimed primarily at the maximization of profits, but rather at carrying out goals for the benefit of society. Corporate social responsibility refers to the active behavior of a company, by which it can create new solutions to meet the needs of society, either on its own or in cooperation with other social stakeholders. The objectives of this article are to define concepts, describe and integrate relevant theoretical models, develop a model and introduce some examples of international practice that can inspire initiatives for social development.

Keywords: corporate social responsibility, CSR, social innovation, social entrepreneurship

Procedia PDF Downloads 289
201 The Influence of Music Education and the Order of Sounds on the Grouping of Sounds into Sequences of Six Tones

Authors: Adam Rosiński

Abstract:

This paper discusses an experiment conducted with two groups of participants, composed of musicians and non-musicians, in order to investigate the impact of the speed of a sound sequence and the order of sounds on the grouping of sounds into sequences of six tones. Significant differences were observed between musicians and non-musicians with respect to the threshold sequence speed at which the sequence was split into two streams. The differences in the results for the two groups suggest that the musical education of the participating listeners may be a vital factor. The criterion of musical education should be taken into account during experiments so that the results obtained are reliable, uniform, and free from interpretive errors.

Keywords: auditory scene analysis, education, hearing, psychoacoustics

Procedia PDF Downloads 60
200 Communication Training about Depression and Suicide Prevention for Pharmacists: A Hungarian Pilot Study

Authors: Mónika Ditta Tóth, Ádám Fritz, Balázs Hankó, György Purebl

Abstract:

Communication training about depression and suicide prevention for pharmacists – A Hungarian pilot study Mónika Ditta Tóth1, Ádám Fritz2, Balázs Hankó2, György Purebl1 1: Semmelweis University, Institute of Behavioural Sciences 2: Semmelweis University, University Pharmacy Department of Pharmacy Administration Background: Suicide rates in Hungary have been one of the highest in the European Union. Depression is one of the main risk factors for suicide and recognizing and treating depression is an effective way to prevent suicidal behaviour. In their daily practice, pharmacists meet patients with high risk of mental health problems. Therefore they have a key role in the prevention of depression and suicide. Aim: The main aim of this study is to raise pharmacists’ awareness about depression and suicide to enable better recognation of verbal and non-verbal signs of these deseases. Another important objective is to reduce their stigma about depression and increase their confidence in communication with depressed and/or suicidal patients. Methods: A 3-hour communication workshop has been delivered in this pilot study about the reasons, trigger factors, verbal and non-verbal signs of depression and suicide. The training includes communication techniques which have been developed to patients needs, as well as role-playing scenarios. Depression Stigma and Morris Confidence Scales were applied before, after and 6 weeks following the training. The results of the training group are then compared with two of the following pharmacist groups: 1. written material only (N=15), 2. no material (N=15). Results: One-way ANOVA revealed significant differences in the training group regarding the level of confidence in treating and communicating with patients with depression and/or suicide following the training, and after 6 weeks (F(2, 24)= 7,135, p=,004; baseline: 20,37, after training: 30,00, follow up: 27,66). After the 3-hour workshop the personal stigma about depression decreased (baselin: 19,75 after training: 17,00, p=0,075) in the training group (N=9), whilst the perceived stigma did not change (before: 33.54, after: 33,44, p=NS). Trainees assessed the workshop as ‘useful’ and ‘gap filling’. No significant differences was found in the group of pharmacisists who got written material only. Conclusions: Despite the high rates of depression and suicide in Hungary, pharmacists do not receive lectures or seminars about mental health during their university studies. Such half-day workshops could fill this gap and give practical help to recognize and communicate with depressed and/or suicidal patients in a more effective way. This way pharmacists, as community gate-keepers, could contribute to a more effective suicide prevention program in Hungary.

Keywords: communication training, pharmacists, depression, suicide

Procedia PDF Downloads 152
199 Projectification: Using Project Management Methodology to Manage the Academic Program Review

Authors: Adam Marks, Munir Majdalawieh, Maytha Al Ali

Abstract:

While research is rich with what criteria could be included in the academic program review processes, there is rarely any mention of how this significant and complex process should be managed. This paper proposes using project management methodology in alignment with the program review criteria of the Dickeson’s Prioritizing Academic Programs model. Project management and academic program review share two distinct characteristics; one is their life cycle, and the second is the core knowledge areas they use. This aligned and structured approach offers academic administrators a step-by-step guide that can help them manage this process and effectively assess academic programs.

Keywords: project management, academic program, program review, education, higher education institution, strategic management

Procedia PDF Downloads 331
198 Amyloid-β Fibrils Remodeling by an Organic Molecule: Insight from All-Atomic Molecular Dynamics Simulations

Authors: Nikhil Agrawal, Adam A. Skelton

Abstract:

Alzheimer’s disease (AD) is one of the most common forms of dementia, which is caused by misfolding and aggregation of amyloid beta (Aβ) peptides into amyloid-β fibrils (Aβ fibrils). To disrupt the remodeling of Aβ fibrils, a number of candidate molecules have been proposed. To study the molecular mechanisms of Aβ fibrils remodeling we performed a series of all-atom molecular dynamics simulations, a total time of 3µs, in explicit solvent. Several previously undiscovered candidate molecule-Aβ fibrils binding modes are unraveled; one of which shows the direct conformational change of the Aβ fibril by understanding the physicochemical factors responsible for binding and subsequent remodeling of Aβ fibrils by the candidate molecule, open avenues into structure-based drug design for AD can be opened.

Keywords: alzheimer’s disease, amyloid, MD simulations, misfolded protein

Procedia PDF Downloads 308
197 A Review of Transformer Modeling for Power Line Communication Applications

Authors: Balarabe Nkom, Adam P. R. Taylor, Craig Baguley

Abstract:

Power Line Communications (PLC) is being employed in existing power systems, despite the infrastructure not being designed with PLC considerations in mind. Given that power transformers can last for decades, the distribution transformer in particular exists as a relic of un-optimized technology. To determine issues that may need to be addressed in subsequent designs of such transformers, it is essential to have a highly accurate transformer model for simulations and subsequent optimization for the PLC environment, with a view to increase data speed, throughput, and efficiency, while improving overall system stability and reliability. This paper reviews various methods currently available for creating transformer models and provides insights into the requirements of each for obtaining high accuracy. The review indicates that a combination of traditional analytical methods using a hybrid approach gives good accuracy at reasonable costs.

Keywords: distribution transformer, modelling, optimization, power line communications

Procedia PDF Downloads 472
196 A Model of Preventing Global Financial Crisis: Gauss Law Model Proposal Used in Electrical Field Calculations

Authors: Arzu K. Kamberli

Abstract:

This article examines the relationship between economics and physics, starting with Adam Smith, with a new econophysics approach in Economics-Physics with the Gauss Law model proposal using for the Electric Field calculation, which will allow us to anticipate the Global Financial Crisis. For this purpose, the similarities between the Gauss Law using the electric field calculations and the global financial crisis have been explained on the formula, and a model has been suggested to predict the risks of the financial systems from the electricity field calculations. Thus, this study is expected to help for preventing the Global Financial Crisis with the contribution of the science of economics and physics from the aspect of econophysics.

Keywords: econophysics, electric field, financial system, Gauss law, global financial crisis

Procedia PDF Downloads 242
195 Investigating the Demand of Short-Shelf Life Food Products for SME Wholesalers

Authors: Yamini Raju, Parminder S. Kang, Adam Moroz, Ross Clement, Alistair Duffy, Ashley Hopwell

Abstract:

Accurate prediction of fresh produce demand is one the challenges faced by Small Medium Enterprise (SME) wholesalers. Current research in this area focused on limited number of factors specific to a single product or a business type. This paper gives an overview of the current literature on the variability factors used to predict demand and the existing forecasting techniques of short shelf life products. It then extends it by adding new factors and investigating if there is a time lag and possibility of noise in the orders. It also identifies the most important factors using correlation and Principal Component Analysis (PCA).

Keywords: demand forecasting, deteriorating products, food wholesalers, principal component analysis, variability factors

Procedia PDF Downloads 479
194 An Exploration of Early Cinematic Technology (1890s-1920s) and Shifting Cinematic Styles

Authors: Adam L. Miller

Abstract:

The aim of this paper is to look back to the very beginning of cinematic history and explore the connection between the differing technology used, and the varying styles adopted by early filmmakers. The paper will be structured chronologically, first looking at the advances that predated Thomas Edison and his Kinetograph and Kinetogram. This paper will then explore how Edison’s technology and films varied from the Lumiere brothers and their Cinematograph. Finally, the paper will go on to draw parallels and differences between French filmmakers such as Alice Guy and George Melies, and American filmmakers like Edwin S. Porter and D. W. Griffith.

Keywords: film studies, early cinema, silent cinema, early cinematic technology, Thomas Edison, Alice Guy, George Melies, Edwin S. Porter, Lumiere brothers, D. W. Griffith

Procedia PDF Downloads 162