Search results for: Judiciary Acts 1789
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 384

Search results for: Judiciary Acts 1789

294 Lithium-Ion Battery State of Charge Estimation Using One State Hysteresis Model with Nonlinear Estimation Strategies

Authors: Mohammed Farag, Mina Attari, S. Andrew Gadsden, Saeid R. Habibi

Abstract:

Battery state of charge (SOC) estimation is an important parameter as it measures the total amount of electrical energy stored at a current time. The SOC percentage acts as a fuel gauge if it is compared with a conventional vehicle. Estimating the SOC is, therefore, essential for monitoring the amount of useful life remaining in the battery system. This paper looks at the implementation of three nonlinear estimation strategies for Li-Ion battery SOC estimation. One of the most common behavioral battery models is the one state hysteresis (OSH) model. The extended Kalman filter (EKF), the smooth variable structure filter (SVSF), and the time-varying smoothing boundary layer SVSF are applied on this model, and the results are compared.

Keywords: state of charge estimation, battery modeling, one-state hysteresis, filtering and estimation

Procedia PDF Downloads 409
293 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 41
292 Nature, Elixir of Architecture: A Contemplation on Human, Nature and Architecture in Islam

Authors: A. Kabiri-Samani, M. J. Seddighi

Abstract:

There is no doubt that a key factor in the manifestation of architecture is the interaction of human and nature. Explaining the type of relationship defined by “the architect” between architecture and nature opens a window towards understanding the theoretical conceptions of the architect as the creator of “architecture”. Now, if these theoretical foundations are put under scrutiny from the viewpoint of Islam, and an architect considers the relationship of human and nature within the context of Islam, he would let nature to manifest itself in architecture. The reasons for such a relationship is explicable in terms of the degree and nature of knowledge of the architect about nature; while the way it comes to existence is explained by defining the force of nature – ruling the entire nature – and its acts. It is by the scientific command of the architect and his mastery in the hermetic force of nature that the material bodies of buildings evolve from artificial to natural. Additionally, the presence of nature creates hermetic architectural spaces for the spiritual development of humans while serving for living at different levels.

Keywords: nature, Islam, cognition, science, presence, elixir

Procedia PDF Downloads 452
291 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 336
290 Functionalized PU Foam for Water Filtration

Authors: Nidal H. Abu-Zahra, Subhashini Gunashekar

Abstract:

Polyurethane foam is functionalized with Sulfonic acid groups to remove lead ions (Pb2+) from drinking water through a action exchange process. The synthesis is based on addition polymerization of the -NCO groups of an isocyanine with the –OH groups of a polio to form the urethane. Toluene-diisocyanateis reacted with Polypropylene glycol to form a linear pre-polymer, which is further polymerized using a chain extender, N, N-bis(2-hydorxyethyl)-2-aminoethane-sulfonic acid (BES). BES acts as a functional group site to exchange Pb2+ ions. A set of experiments was designed to study the effect of various processing parameters on the performance of the synthesized foam. The maximum Pb2+ ion exchange capacity of the foam was found to be 47ppb/g from a 100ppb Pb2+ solution over a period of 60 minutes. A multistage batch filtration process increased the lead removal to 50-54ppb/3g of foam over a period of 90 minutes.

Keywords: adsorption, functionalized, ion exchange, polyurethane, sulfonic

Procedia PDF Downloads 223
289 Transparency in Politics: Evaluation Rules and Principles

Authors: Stylianos Galoukas

Abstract:

since the eve of human societies, the need for survival and covering even the most basic needs such as hunting for food, led to the realization of the need for regulation between the personal and common interest. This led to the establishment of initially unwritten and later on, written rules which then became the Law. Transparency as a word has been used for more than 2.500 years. Born in ancient Greece around the 5th BC century and although it was not originally correlated to political or public administration acts, its enclosed principles and rules, were given even then, great attention. In today’s times of fake news and meta-politics, transparency has greatly correlated with the fight against corruption especially in the financially related matters. It is believed however that transparency, being a much wider than corruption meaning, has an even greater role to play than the corruption counterpart. It can be further used to unveil or examine the genuineness of the will towards the public interest, behind every public policy or political act. Therefore, herein the timeless and fundamental principles of institutional and public administration transparency are made clear as well as their application rules that can and ought to be used as evaluation criteria.

Keywords: evaluation citeria, policies, politics, principles, rules, transparency

Procedia PDF Downloads 162
288 Out of the Shadows: Constructing a Female Gaze in Neo-Noir: Exegesis and Screenplay, The Lonely Drive

Authors: Jade Bitomsky

Abstract:

We all consume films on a daily basis. Yet, we frequently fail to recognize that these narratives shape our social, political, cultural, and economic values and attitudes. Narratives influence our perception; specifically, for this research, our perception of women within the genre of film noir. This creative research project examines to what extent film noir has perpetuated the male gaze and how noir’s representation of women has scripted female gender identity through perpetuated performative acts of femininity. Evolving from this research will be a deconstruction and (re)presentation of the femininity in noir. It will go beyond reiterated examinations, which developed awareness of Hollywood’s oppressive cinematic structures, to subvert the usual phallic diegesis and construct a female gaze in neo-noir screenplay, The Lonely Drive.

Keywords: femme fatale, film noir (classic), male gaze, neo-noir (contemporary), scopophilia

Procedia PDF Downloads 207
287 Numerical Study of Fiber Bragg Grating Sensor: Longitudinal and Transverse Detection of Temperature and Strain

Authors: K. Khelil, H. Ammar, K. Saouchi

Abstract:

Fiber Bragg Grating (FBG) structure is an periodically modulated optical fiber. It acts as a selective filter of wavelength whose reflected peak is called Bragg wavelength and it depends on the period of the fiber and the refractive index. The simulation of FBG is based on solving the Coupled Mode Theory equation by using the Transfer Matrix Method which is carried out using MATLAB. It is found that spectral reflectivity is shifted when the change of temperature and strain is uniform. Under non-uniform temperature or strain perturbation, the spectrum is both shifted and destroyed. In case of transverse loading, reflectivity spectrum is split into two peaks, the first is specific to X axis, and the second belongs to Y axis. FBGs are used in civil engineering to detect perturbations applied to buildings.

Keywords: Bragg wavelength, coupled mode theory, optical fiber, temperature measurement

Procedia PDF Downloads 467
286 The Effect of Precipitation on Weed Infestation of Spring Barley under Different Tillage Conditions

Authors: J. Winkler, S. Chovancová

Abstract:

The article deals with the relation between rainfall in selected months and subsequent weed infestation of spring barley. The field experiment was performed at Mendel University agricultural enterprise in Žabčice, Czech Republic. Weed infestation was measured in spring barley vegetation in years 2004 to 2012. Barley was grown in three tillage variants: conventional tillage technology (CT), minimization tillage technology (MT), and no tillage (NT). Precipitation was recorded in one-day intervals. Monthly precipitation was calculated from the measured values in the months of October through to April. The technique of canonical correspondence analysis was applied for further statistical processing. 41 different species of weeds were found in the course of the 9-year monitoring period. The results clearly show that precipitation affects the incidence of most weed species in the selected months, but acts differently in the monitored variants of tillage technologies.

Keywords: weeds, precipitation, tillage, weed infestation forecast

Procedia PDF Downloads 456
285 Low-Cost Space-Based Geoengineering: An Assessment Based on Self-Replicating Manufacturing of in-Situ Resources on the Moon

Authors: Alex Ellery

Abstract:

Geoengineering approaches to climate change mitigation are unpopular and regarded with suspicion. Of these, space-based approaches are regarded as unworkable and enormously costly. Here, a space-based approach is presented that is modest in cost, fully controllable and reversible, and acts as a natural spur to the development of solar power satellites over the longer term as a clean source of energy. The low-cost approach exploits self-replication technology which it is proposed may be enabled by 3D printing technology. Self-replication of 3D printing platforms will enable mass production of simple spacecraft units. Key elements being developed are 3D-printable electric motors and 3D-printable vacuum tube-based electronics. The power of such technologies will open up enormous possibilities at low cost including space-based geoengineering.

Keywords: 3D printing, in-situ resource utilization, self-replication technology, space-based geoengineering

Procedia PDF Downloads 384
284 A System to Detect Inappropriate Messages in Online Social Networks

Authors: Shivani Singh, Shantanu Nakhare, Kalyani Nair, Rohan Shetty

Abstract:

As social networking is growing at a rapid pace today it is vital that we work on improving its management. Research has shown that the content present in online social networks may have significant influence on impressionable minds. If such platforms are misused, it will lead to negative consequences. Detecting insults or inappropriate messages continues to be one of the most challenging aspects of Online Social Networks (OSNs) today. We address this problem through a Machine Learning Based Soft Text Classifier approach using Support Vector Machine algorithm. The proposed system acts as a screening mechanism the alerts the user about such messages. The messages are classified according to their subject matter and each comment is labeled for the presence of profanity and insults.

Keywords: machine learning, online social networks, soft text classifier, support vector machine

Procedia PDF Downloads 476
283 Treatment of Acid Mine Drainage with Modified Fly Ash

Authors: Sukla Saha, Alok Sinha

Abstract:

Acid mine drainage (AMD) is the generation of acidic water from active as well as abandoned mines. AMD generates due to the oxidation of pyrites present in the rock in mining areas. Sulfur oxidizing bacteria such as Thiobacillus ferrooxidans acts as a catalyst in this oxidation process. The characteristics of AMD is extreme low pH (2-3) with elevated concentration of different heavy metals such as Fe, Al, Zn, Mn, Cu and Co and anions such sulfate and chloride. AMD contaminate the ground water as well as surface water which leads to the degradation of water quality. Moreover, it carries detrimental effect for aquatic organism and degrade the environment. In the present study, AMD is treated with fly ash, modified with alkaline agent (NaOH). This modified fly ash (MFA) was experimentally proven as a very effective neutralizing agent for the treatment of AMD. It was observed that pH of treated AMD raised to 9.22 from 1.51 with 100g/L of MFA dose. Approximately, 99% removal of Fe, Al, Mn, Cu and Co took place with the same MFA dose. The treated water comply with the effluent discharge standard of (IS: 2490-1981).

Keywords: acid mine drainage, heavy metals, modified fly ash, neutralization

Procedia PDF Downloads 121
282 Effect of the Structural Parameters on Subbands of Fibonacci AlxGa1-xAs/GaAs Superlattices

Authors: Y. Sefir, Z. Aziz, S. Cherid, Z. F. Meghoufel, F. Bendahama, S. Terkhi, B. Bouadjemi. A. Zitouni S. Bentata

Abstract:

This work is to study the effect of the variation of structural parameters on the band structure in the quasiperiodic Fibonacci superlattices AlxGa1-xAs/GaAs using the formalism of the transfer matrix and Airy function. Our results show that increasing the width of Fibonacci’s wells of allows to the confinement of subminibands with a widening of minigaps, this causes a consistent and coherent fragmentation. The barrier thickness of Fibonacci bf acts on the width of subminibands by controlling the interaction force between neighboring eigenstates. Its increase gives rise to singularly extended states. The barrier height Fibonacci Vf permit to control the degree of structural disorder in these structures. The variation of these parameters permits the design of laser with modulated wavelength.

Keywords: transmission coefficient – Quasiperiodic superlattices- singularly localized and extended states- structural parameters- Laser with modulated wavelength

Procedia PDF Downloads 342
281 Smartphone Video Source Identification Based on Sensor Pattern Noise

Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.

Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification

Procedia PDF Downloads 405
280 Excitation Experiments of a Cone Loudspeaker and Vibration-Acoustic Analysis Using FEM

Authors: Y. Hu, X. Zhao, T. Yamaguchi, M. Sasajima, Y. Koike

Abstract:

To focus on the vibration mode of a cone loudspeaker, which acts as an electroacoustic transducer, excitation experiments were performed using two types of loudspeaker units: one employing an impulse hammer and the other a sweep signal. The on-axis sound pressure frequency properties of the loudspeaker were evaluated, and the characteristic properties of the loudspeakers were successfully determined in both excitation experiments. Moreover, under conditions identical to the experiment conditions, a coupled analysis of the vibration-acoustics of the cone loudspeaker was performed using an acoustic analysis software program that considers the impact of damping caused by air viscosity. The result of sound pressure frequency properties with the numerical analysis are the most closely match that measured in the excitation experiments over a wide range of frequency bands.

Keywords: anechoic room, finite element method, impulse hammer, loudspeaker, reverberation room, sweep signal

Procedia PDF Downloads 395
279 Recognition of Noisy Words Using the Time Delay Neural Networks Approach

Authors: Khenfer-Koummich Fatima, Mesbahi Larbi, Hendel Fatiha

Abstract:

This paper presents a recognition system for isolated words like robot commands. It’s carried out by Time Delay Neural Networks; TDNN. To teleoperate a robot for specific tasks as turn, close, etc… In industrial environment and taking into account the noise coming from the machine. The choice of TDNN is based on its generalization in terms of accuracy, in more it acts as a filter that allows the passage of certain desirable frequency characteristics of speech; the goal is to determine the parameters of this filter for making an adaptable system to the variability of speech signal and to noise especially, for this the back propagation technique was used in learning phase. The approach was applied on commands pronounced in two languages separately: The French and Arabic. The results for two test bases of 300 spoken words for each one are 87%, 97.6% in neutral environment and 77.67%, 92.67% when the white Gaussian noisy was added with a SNR of 35 dB.

Keywords: TDNN, neural networks, noise, speech recognition

Procedia PDF Downloads 253
278 Anti-Language in Jordanian Spoken Arabic: A Sociolinguistic Perspective

Authors: Ahmad Mohammad Al-Harahsheh

Abstract:

Anti-language reflects anti-society; it is a restricted spoken code used among a group of interlocutors because of anti-society. This study aims to shed light on the sociolinguistic characteristics of anti-language used by prisoners in Jordan. The participants included were 15 male-Jordanian prisoners who have recently been released. The data were written, transliterated, and analyzed on the basis of sociolinguistics and discourse analysis. This study draws on sociolinguistic theory of language codes as the theoretical framework. The study concludes that anti-language is a male language and is used for secrecy, as the prisoners' tendency to protect themselves from the police; it is a verbal competition, contest and display. In addition, it is employed to express obnoxious ideas and acts by using more pleasant or blurred words and expressions. Also, the anti-language used by prisoners has six linguistic characteristics in JSA (Jordanian Spoken Arabic), such as relexicalization, neologism, rhyme formation, semantic change, derivation, and metaphorical expressions.

Keywords: anti-language, Jordanian Spoken Arabic, sociolinguistics, prisoners

Procedia PDF Downloads 339
277 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism

Authors: Allan Munyao Mukuki

Abstract:

The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 375
276 Corrosion Inhibition of Copper in 1M HNO3 Solution by Oleic Acid

Authors: S. Nigri, R. Oumeddour, F. Djazi

Abstract:

The inhibition of the corrosion of copper in 1 M HNO3 solution by oleic acid was investigated by weight loss measurement, potentiodynamic polarization and scanning electron microscope (SEM) studies. The experimental results have showed that this compound revealed a good corrosion inhibition and the inhibition efficiency is increased with the inhibitor concentration to reach 98%. The results obtained revealed that the adsorption of the inhibitor molecule onto metal surface is found to obey Langmuir adsorption isotherm. The temperature effect on the corrosion behavior of copper in 1 M HNO3 without and with inhibitor at different concentration was studied in the temperature range from 303 to 333 K and the kinetic parameters activation such as Ea, ∆Ha and ∆Sa were evaluated. Tafel plot analysis revealed that oleic acid acts as a mixed type inhibitor. SEM analysis substantiated the formation of protective layer over the copper surface.

Keywords: oleic acid, weight loss, electrochemical measurement, SEM analysis

Procedia PDF Downloads 366
275 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 90
274 Metric Suite for Schema Evolution of a Relational Database

Authors: S. Ravichandra, D. V. L. N. Somayajulu

Abstract:

Requirement of stakeholders for adding more details to the database is the main cause of the schema evolution in the relational database. Further, this schema evolution causes the instability to the database. Hence, it is aimed to define a metric suite for schema evolution of a relational database. The metric suite will calculate the metrics based on the features of the database, analyse the queries on the database and measures the coupling, cohesion and component dependencies of the schema for existing and evolved versions of the database. This metric suite will also provide an indicator for the problems related to the stability and usability of the evolved database. The degree of change in the schema of a database is presented in the forms of graphs that acts as an indicator and also provides the relations between various parameters (metrics) related to the database architecture. The acquired information is used to defend and improve the stability of database architecture. The challenges arise in incorporating these metrics with varying parameters for formulating a suitable metric suite are discussed. To validate the proposed metric suite, an experimentation has been performed on publicly available datasets.

Keywords: cohesion, coupling, entropy, metric suite, schema evolution

Procedia PDF Downloads 421
273 Flame Acceleration of Premixed Natural Gas/Air Explosion in Closed Pipe

Authors: H. Mat Kiah, Rafiziana M. Kasmani, Norazana Ibrahim, Roshafima R. Ali, Aziatul N.Sadikin

Abstract:

An experimental study has been done to investigate the flame acceleration in a closed pipe. A horizontal steel pipe, 2m long and 0.1 m in diameter (L/D of 20), was used in this work. For tests with 90 degree bends, the bend had a radius of 0.1 m and thus, the pipe was lengthened 1 m (based on the centreline length of the segment). Ignition was affected one end of the vessel while the other end was closed. Only stoichiometric concentration (Ф, = 1.0) of natural gas/air mixtures will be reported in this paper. It was demonstrated that bend pipe configuration gave three times higher in maximum over-pressure (5.5 bars) compared to straight pipe (2.0 bars). From the results, the highest flame speed of 63 m s-1 was observed in a gas explosion with bent pipe, greater by a factor of ~3 as compared with straight pipe (23 m s-1). This occurs because bending acts similar to an obstacle, in which this mechanism can induce more turbulence, initiating combustion in an unburned pocket at the corner region and causing a high mass burning rate which increases the flame speed.

Keywords: bending, gas explosion, bending, flame acceleration, over-pressure

Procedia PDF Downloads 377
272 Food Waste Management in the Restaurant Industry

Authors: Vijayakumar Karunamoothei, Stephen Wylie, Andy Shaw, Al Shamma'A Ahmed

Abstract:

The main aim of this research is to investigate, analyse and provide solutions for the reduction of food waste in the restaurant industry. The amount of food waste that is sent to landfill by UK restaurants and food chains is considerably high, and also acts as an additional cost to the restaurants, as well as being a significant environmental issue. Food waste, for the most part, is disposed in landfill, but due to rising costs associated with waste disposal, it increases public concerns about the environmental issue. This makes conversion of food waste to energy an economic solution. The relevant properties, such as water content and calorific value, will vary considerably, depending on the particular type of food. This work, therefore, includes the collection and analysis of real data from restaurants on weekly basis. It will also investigate how the waste destined for landfill can be instead reused to produce fuels such as syngas or ethanol, or alternatively as fertilizer. The potential for syngas production will be tested using a microwave plasma reactor.

Keywords: fertilizer, microwave, plasma reactor, syngas

Procedia PDF Downloads 326
271 Adsorption of Reactive Dye Using Entrapped nZVI

Authors: P. Gomathi Priya, M. E. Thenmozhi

Abstract:

Iron nanoparticles were used to cleanup effluents. This paper involves synthesis of iron nanoparticles chemically by sodium borohydride reduction of ammonium ferrous sulfate solution (FAS). Iron oxide nanoparticles have lesser efficiency of adsorption than Zero Valent Iron nanoparticles (nZVI). Glucosamine acts as a stabilizing agent and chelating agent to prevent Iron nanoparticles from oxidation. nZVI particles were characterized using Scanning Electron Microscopy (SEM). Thus, the synthesized nZVI was subjected to entrapment in biopolymer, viz. barium (Ba)-alginate beads. The beads were characterized using SEM. Batch dye degradation studies were conducted using Reactive black Water soluble Nontoxic Natural substances (WNN) dye which is one of the most hazardous dyes used in textile industries. Effect of contact time, effect of pH, initial dye concentration, adsorbent dosage, isotherm and kinetic studies were carried out.

Keywords: ammonium ferrous sulfate solution, barium, alginate beads, reactive black WNN dye, zero valent iron nanoparticles

Procedia PDF Downloads 299
270 Host-Guest Interaction in a Homestay Setting a Study Based on Homestays in Sabah and Sarawak, Malaysia

Authors: Lau Sing Yew

Abstract:

The purpose of this research is to investigate and analyse the host-guests interaction in a homestay setting with the sub context of cultural exchange and cultural differences between both parties. The research were carried out in Malaysia, specifically in the state of Sabah and Sarawak which are more well-known for its’ rural tourism and homestay programs. The research problem addressed here is on the suitability of the homestay setting as a platform for intercultural communication between the host and foreign tourists. The key issues that were discussed include ‘cultural representations’, ‘touristic representations’ and ‘social representations’ which contoured the image that tourists form about destinations and local communities while debating on the benefits and disbenefits of cultural exchange. These issues were deliberated through observation and interviews and it was found that the homestay setting in Malaysia though there are varied types available acts as a suitable platform to encourage intercultural interaction between tourists and local communities.

Keywords: homestay program, Malaysia, host-guest interactions, cultural representations

Procedia PDF Downloads 314
269 Language and Power Relations in Selected Political Crisis Speeches in Nigeria: A Critical Discourse Analysis

Authors: Isaiah Ifeanyichukwu Agbo

Abstract:

Human speech is capable of serving many purposes. Power and control are not always exercised overtly by linguistic acts, but maybe enacted and exercised in the myriad of taken-for-granted actions of everyday life. Domination, power control, discrimination and mind control exist in human speech and may lead to asymmetrical power relations. In discourse, there are persuasive and manipulative linguistic acts that serve to establish solidarity and identification with the 'we group' and polarize with the 'they group'. Political discourse is crafted to defend and promote the problematic narrative of outright controversial events in a nation’s history thereby sustaining domination, marginalization, manipulation, inequalities and injustices, often without the dominated and marginalized group being aware of them. They are designed and positioned to serve the political and social needs of the producers. Political crisis speeches in Nigeria, just like in other countries concentrate on positive self-image, de-legitimization of political opponents, reframing accusation to one’s advantage, redefining problematic terms and adopting reversal strategy. In most cases, the people are ignorant of the hidden ideological positions encoded in the text. Few researches have been conducted adopting the frameworks of critical discourse analysis and systemic functional linguistics to investigate this situation in the political crisis speeches in Nigeria. In this paper, we focus attention on the analyses of the linguistic, semantic, and ideological elements in selected political crisis speeches in Nigeria to investigate if they create and sustain unequal power relations and manipulative tendencies from the perspectives of Critical Discourse Analysis (CDA) and Systemic Functional Linguistics (SFL). Critical Discourse Analysis unpacks both opaque and transparent structural relationships of power dominance, power relations and control as manifested in language. Critical discourse analysis emerged from a critical theory of language study which sees the use of language as a form of social practice where social relations are reproduced or contested and different interests are served. Systemic function linguistics relates the structure of texts to their function. Fairclough’s model of CDA and Halliday’s systemic functional approach to language study are adopted in this paper. This paper probes into language use that perpetuates inequalities. This study demystifies the hidden implicature of the selected political crisis speeches and reveals the existence of information that is not made explicit in what the political actors actually say. The analysis further reveals the ideological configurations present in the texts. These ideological standpoints are the basis for naturalizing implicit ideologies and hegemonic influence in the texts. The analyses of the texts further uncovered the linguistic and discursive strategies deployed by text producers to manipulate the unsuspecting members of the public both mentally and conceptually in order to enact, sustain and maintain unhealthy power relations at crisis times in the Nigerian political history.

Keywords: critical discourse analysis, language, political crisis, power relations, systemic functional linguistics

Procedia PDF Downloads 306
268 Analysis of the Transcriptional Response of Rhazia stricta to Jasmonic Acid Induction

Authors: Nahid H. Hajrah, Jamal S. M. Sabir, Neil Hall

Abstract:

The jasmonic pathway is ubiquitous in plants and is crucial to plant development. It Is involved in fertility, ripening, and sex determination as well as in response to environmental stresses such as herbivory, pathogen drought or temperature shock. Essentially the jasmonic pathway acts to shut down growth in order to induce defence pathways. These pathways include the production of secondary metabolites which have evolved to defend against herbivores and pathogens but are of increasing interest due to their roll in medicine and biotechnology. Here we describe the transcriptional response of Rhazia stricta (a poisonous shrub widely used in traditional medicine) to jasmonic acid, in order to better characterize the genes involved in secondary metabolite production and its response to stress. We observe coordinated upregulation of flavonoid biosynthesis pathway leading to flavonols, flavones and anthocyanins but no similar coordination of the monoterpene indole alkaloid pathway.

Keywords: medicinal plants, Rhazia stricta, jasmonic acid, transcriptional analysis

Procedia PDF Downloads 109
267 Is Brain Death Reversal Possible in Near Future: Intrathecal Sodium Nitroprusside (SNP) Superfusion in Brain Death Patients=The 10,000 Fold Effect

Authors: Vinod Kumar Tewari, Mazhar Husain, Hari Kishan Das Gupta

Abstract:

Background: Primary or secondary brain death is also accompanied with vasospasm of the perforators other than tissue disruption & further exaggerates the anoxic damage, in the form of neuropraxia. In normal conditions the excitatory impulse propagates as anterograde neurotransmission (ANT) and at the level of synapse, glutamate activates NMDA receptors on postsynaptic membrane. Nitric oxide (NO) is produced by Nitric oxide Synthetase (NOS) in postsynaptic dendride or cell body and travels backwards across a chemical synapse to bind to the axon terminal of a presynaptic neuron for regulation of ANT this process is called as the retrograde neurotransmission (RNT). Thus the primary function of NO is RNT and the purpose of RNT is regulation of chemical neurotransmission at synapse. For this reason, RNT allows neural circuits to create feedback loops. The haem is the ligand binding site of NO receptor (sGC) at presynaptic membrane. The affinity of haem exhibits > 10,000-fold excess for NO than Oxygen (THE 10,000 FOLD EFFECT). In pathological conditions ANT, normal synaptic activity including RNT is absent. NO donors like sodium nitroprusside (SNP) releases NO by activating NOS at the level of postsynaptic area. NO now travels backwards across a chemical synapse to bind to the haem of NO receptor at axon terminal of a presynaptic neuron as in normal condition. NO now acts as impulse generator (at presynaptic membrane) thus bypasses the normal ANT. Also the arteriolar perforators are having Nitric Oxide Synthetase (NOS) at the adventitial side (outer border) on which sodium nitroprusside (SNP) acts; causing release of Nitric Oxide (NO) which vasodilates the perforators causing gush of blood in brain’s tissue and reversal of brain death. Objective: In brain death cases we only think for various transplantations but this study being a pilot study reverses some criteria of brain death by vasodilating the arteriolar perforators. To study the effect of intrathecal sodium nitroprusside (IT SNP) in cases of brain death in which: 1. Retrograde transmission = assessed by the hyperacute timings of reversal 2. The arteriolar perforator vasodilatation caused by NO and the maintenance of reversal of brain death reversal. Methods: 35 year old male, who became brain death after head injury and has not shown any signs of improvement after every maneuver for 6 hours, a single superfusion done by SNP via transoptic canal route for quadrigeminal cistern and cisternal puncture for IV ventricular with SNP done. Results: He showed spontaneous respiration (7 bouts) with TCD studies showing start of pulsations of various branches of common carotid arteries. Conclusions: In future we can give this SNP via transoptic canal route and in IV ventricle before declaring the body to be utilized for transplantations or dead or in broader way we can say that in near future it is possible to revert back from brain death or we have to modify our criterion.

Keywords: brain death, intrathecal sodium nitroprusside, TCD studies, perforators, vasodilatations, retrograde transmission, 10, 000 fold effect

Procedia PDF Downloads 373
266 Violence against Women: Exploring Discursive Resistance in the Frames of Gender Violence in South Africa

Authors: Kunle Oparinde, Rachel Matteau-Matsha, Felix Awung

Abstract:

In recent times, the issue of gender-based violence against women in South Africa is prevalent in headlines due to the high rate of attacks directed towards women. Ranging from teenagers to adults, women are continuously targeted indiscriminately in what is seemingly becoming a prolonged cycle in the country. To this end, human rights activists, organisations, and political leaders have managed to somewhat verbally condemn the atrocious acts. Further, interested people in South Africa, through walks and protests, have continued to speak against the swinging violence against women in the country. The thrust in this study is to explore and analyse how discourse (language) has been employed as a resounding voice against gender violence in the country. Through a purposive sampling of materials employed during walks and protests, collected from online sources, we examine how language is being used to combat and confront the issue of gender violence viz-a-viz how it continues to serve as a crucial tool in repelling gender violence.

Keywords: gender, violence, language, discourse, resistance

Procedia PDF Downloads 105
265 Inter-Filling of CaO and MgO Mixed Layer in Surface Behavior of Al-Mg Alloys Containing Al2Ca

Authors: Seong-Ho Ha, Young-Ok Yoon, Shae K. Kim

Abstract:

Oxide layer of normal Al-Mg alloy can be characterized by upper MgO and lower MgAl2O4 spinel. The formation of the MgO outmost layer occurs by the surface segregation of Mg in the initial oxidation. After then, the oxidation is proceeded with the formation of MgA12O4 spinel beneath the MgO. Growth of the oxide layer is accelerated by constant formation of MgA12O4 spinel. On the other hand, the oxidation resistance of Al-Mg alloys can be significantly improved simply by Mg+Al2Ca master alloy use as the Mg alloying element and such an improvement is attributed to the CaO/MgO mixed layer. Al-Mg alloy containing Al2Ca shows CaO as the upper layer and MgO as the lower one without MgA12O4 spinel. Such a dense oxide film acts as a protective layer. However, the CaO/MgO scale has the outmost MgO, partly, after a long time exposure to a harsh oxidation condition. The aim of this study is to investigate the inter-filling behaviour of CaO and MgO mixed layer in oxidation resistance mechanism of Al-Mg alloys containing Al2Ca. The process of outmost MgO layer formation will be clarified.

Keywords: Al-Mg alloy, Al2Ca, oxidation, MgO

Procedia PDF Downloads 250