Search results for: wireless sensor network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5974

Search results for: wireless sensor network

514 Sand Dollars: Sex Tourism and Coloniality of Power in the Dominican Republic

Authors: Fernando Valerio-Holguin

Abstract:

Over the recent three decades, the tourism industry in the Dominican Republic has had an enormous impact on the country’s culture. The arrival of tourists from Germany, France, Italy, Russia and the United States has rewritten Dominican cultural identity and created a cultural palimpsest in the areas of language, gastronomy, habits, fashion, values, and gender relations. As a consequence of tourism, a prostitution network has flourished across the country. In the film Sand Dollars (2015) directed by Laura Amelia Guzmán and Israel Cárdenas, Noelí (Janet Mojica), a young mulatto woman, altogether with her boyfriend (Ricardo Ariel Toribio), strips tourists of dollars and euro through prostitution. One of her frequent clients is Anne, a mature French woman (Geraldine Chaplin). While Noeli’s goal is to get all the euros she can, Anne falls in love with her and tries to bring her to France. Both the content of the film and its cinematographic languages are analyzed in light of theory of coloniality. This concept shows how European and American tourism, through the power of money, perpetuates colonial discourse, i. e., how race and ethnocentrism permeate cultural activities in their former colonies. Moreover, in the content analysis of the film the concepts of exchange value and fetishism are crucial to understanding how the colonial body becomes sexual commodity. They facilitate grasping the film’s inequity in terms of power in the relationship between the two women: the white old European woman and the young, poor, third-world mulatta. Even though the film attempts to break away from compulsory heterosexuality, the power relation between the two women persists due to the presence of the axis of race, ethnicity, age and gender. Both the novel Les dollars des sables written by Jean-Noel Pancrazi, and the film Sand Dollars offer an interesting insight into sex tourism and coloniality and shed additional light on the power relations between the former colonizers and its colonies.

Keywords: coloniality, ethnocentrism, exchange value, Europe, fetishism, money, power, prostitution, sex tourism, United States of America

Procedia PDF Downloads 414
513 Highlighting Strategies Implemented by Migrant Parents to Support Their Child's Educational and Academic Success in the Host Society

Authors: Josee Charette

Abstract:

The academic and educational success of migrant students is a current issue in education, especially in western societies such in the province of Quebec, in Canada. For people who immigrate with school-age children, the success of the family’s migratory project is often measured by the benefits drawn by children from the educational institutions of their host society. In order to support the academic achievement of their children, migrant parents try to develop practices that derive from their representations of school and related challenges inspired by the socio-cultural context of their country of origin. These findings lead us to the following question: How does strategies implemented by migrant parents to manage the representational distance between school of their country of origin and school of their host society support or not the academic and educational success of their child? In the context of a qualitative exploratory approach, we have made interviews in the French , English and Spanish languages with 32 newly immigrated parents and 10 of their children. Parents were invited to complete a network of free associations about «School in Quebec» as a premise for the interview. The objective of this paper is to present strategies implemented by migrant parents to manage the distance between their representations of schools in their country of origin and in the host society, and to explore the influence of this management on their child’s academic and educational trajectories. Data analysis led us to develop various types of strategies, such as continuity, adaptation, resources mobilization, compensation and "return to basics" strategies. These strategies seem to be part of a continuum from oppositional-conflict scenario, in which parental strategies act as a risk factor, to conciliator-integrator scenario, in which parental strategies act as a protective factor for migrant students’ academic and educational success. In conclusion, we believe that our research helps in highlighting strategies implemented by migrant parents to support their child’s academic and educational success in the host society and also helps in providing a more efficient support to migrant parents and contributes to develop a wider portrait of migrant students’ academic achievement.

Keywords: academic and educational achievement of immigrant students, family’s migratory project, immigrants parental strategies, representational distance between school of origin and school of host society

Procedia PDF Downloads 421
512 Performance Improvement of Long-Reach Optical Access Systems Using Hybrid Optical Amplifiers

Authors: Shreyas Srinivas Rangan, Jurgis Porins

Abstract:

The internet traffic has increased exponentially due to the high demand for data rates by the users, and the constantly increasing metro networks and access networks are focused on improving the maximum transmit distance of the long-reach optical networks. One of the common methods to improve the maximum transmit distance of the long-reach optical networks at the component level is to use broadband optical amplifiers. The Erbium Doped Fiber Amplifier (EDFA) provides high amplification with low noise figure but due to the characteristics of EDFA, its operation is limited to C-band and L-band. In contrast, the Raman amplifier exhibits a wide amplification spectrum, and negative noise figure values can be achieved. To obtain such results, high powered pumping sources are required. Operating Raman amplifiers with such high-powered optical sources may cause fire hazards and it may damage the optical system. In this paper, we implement a hybrid optical amplifier configuration. EDFA and Raman amplifiers are used in this hybrid setup to combine the advantages of both EDFA and Raman amplifiers to improve the reach of the system. Using this setup, we analyze the maximum transmit distance of the network by obtaining a correlation diagram between the length of the single-mode fiber (SMF) and the Bit Error Rate (BER). This hybrid amplifier configuration is implemented in a Wavelength Division Multiplexing (WDM) system with a BER of 10⁻⁹ by using NRZ modulation format, and the gain uniformity noise ratio (signal-to-noise ratio (SNR)), the efficiency of the pumping source, and the optical signal gain efficiency of the amplifier are studied experimentally in a mathematical modelling environment. Numerical simulations were implemented in RSoft OptSim simulation software based on the nonlinear Schrödinger equation using the Split-Step method, the Fourier transform, and the Monte Carlo method for estimating BER.

Keywords: Raman amplifier, erbium doped fibre amplifier, bit error rate, hybrid optical amplifiers

Procedia PDF Downloads 22
511 The Role of Twitter Bots in Political Discussion on 2019 European Elections

Authors: Thomai Voulgari, Vasilis Vasilopoulos, Antonis Skamnakis

Abstract:

The aim of this study is to investigate the effect of the European election campaigns (May 23-26, 2019) on Twitter achieving with artificial intelligence tools such as troll factories and automated inauthentic accounts. Our research focuses on the last European Parliamentary elections that took place between 23 and 26 May 2019 specifically in Italy, Greece, Germany and France. It is difficult to estimate how many Twitter users are actually bots (Echeverría, 2017). Detection for fake accounts is becoming even more complicated as AI bots are made more advanced. A political bot can be programmed to post comments on a Twitter account for a political candidate, target journalists with manipulated content or engage with politicians and artificially increase their impact and popularity. We analyze variables related to 1) the scope of activity of automated bots accounts and 2) degree of coherence and 3) degree of interaction taking into account different factors, such as the type of content of Twitter messages and their intentions, as well as the spreading to the general public. For this purpose, we collected large volumes of Twitter accounts of party leaders and MEP candidates between 10th of May and 26th of July based on content analysis of tweets based on hashtags while using an innovative network analysis tool known as MediaWatch.io (https://mediawatch.io/). According to our findings, one of the highest percentage (64.6%) of automated “bot” accounts during 2019 European election campaigns was in Greece. In general terms, political bots aim to proliferation of misinformation on social media. Targeting voters is a way that it can be achieved contribute to social media manipulation. We found that political parties and individual politicians create and promote purposeful content on Twitter using algorithmic tools. Based on this analysis, online political advertising play an important role to the process of spreading misinformation during elections campaigns. Overall, inauthentic accounts and social media algorithms are being used to manipulate political behavior and public opinion.

Keywords: artificial intelligence tools, human-bot interactions, political manipulation, social networking, troll factories

Procedia PDF Downloads 108
510 Experiential Language Learning as a Tool for Effective Global Leadership

Authors: Christiane Dumont

Abstract:

This paper proposes to revisit foreign-language learning as a tool to increase motivation through advocacy and develop effective natural communication skills, which are critical leadership qualities. To this end, collaborative initiatives undertaken by advanced university students of French with local and international community partners will be reviewed. Close attention will be paid to the acquisition of intercultural skills, the reflective process, as well as the challenges and outcomes. Two international development projects conducted in Haiti will be highlighted, i.e., collaboration with a network of providers in the Haitian cultural heritage preservation and tourism sector (2014-15) and development of investigation and teacher training tools for a primary/secondary school in the Port-au-Prince area (current). The choice of community-service learning as a framework to teach French-as-a-second-language stemmed from the need to raise awareness against stereotypes and prejudice, which hinder the development of effective intercultural skills. This type of experiential education also proved very effective in identifying and preventing miscommunication caused by the lack of face-to-face interaction in our increasingly technology-mediated world. Learners experienced first-hand, the challenges and advantages of face-to-face communication, which, in turn, enhanced their motivation for developing effective intercultural skills. Vygotsky's and Kolb's theories, current research on service learning (Dwight, Eyler), action/project-based pedagogy (Beckett), and reflective learning (TSC Farrell), will provide useful background to analyze the benefits and challenges of community-service learning. The ultimate goal of this paper is to find out what makes experiential learning truly unique and transformative for both the learners and the community they wish to serve. It will demonstrate how enhanced motivation, community engagement, and clear, concise, and respectful communication impact and empower learners. The underlying hope is to help students in high-profile, and leading-edge industries become effective global leaders.

Keywords: experiential learning, intercultural communication, reflective learning, effective leadership, learner motivation

Procedia PDF Downloads 78
509 Dynamic Ambulance Deployment to Reduce Ambulance Response Times Using Geographic Information Systems

Authors: Masoud Swalehe, Semra Günay

Abstract:

Developed countries are losing many lives to non-communicable diseases as compared to their developing counterparts. The effects of these diseases are mostly sudden and manifest at a very short time prior to death or a dangerous attack and this has consolidated the significance of emergency medical system (EMS) as one of the vital areas of healthcare service delivery. The primary objective of this research is to reduce ambulance response times (RT) of Eskişehir province EMS since a number of studies have established a relationship between ambulance response times and survival chances of patients especially out of hospital cardiac arrest (OHCA) victims. It has been found out that patients who receive out of hospital medical attention in few (4) minutes after cardiac arrest because of low ambulance response times stand higher chances of survival than their counterparts who take longer times (more than 12 minutes) to receive out of hospital medical care because of higher ambulance response times. The study will make use of geographic information systems (GIS) technology to dynamically reallocate ambulance resources according to demand and time so as to reduce ambulance response times. Geospatial-time distribution of ambulance calls (demand) will be used as a basis for optimal ambulance deployment using system status management (SSM) strategy to achieve much demand coverage with the same number of ambulance resources to cause response time reduction. Drive-time polygons will be used to come up with time specific facility coverage areas and suggesting additional facility candidate sites where ambulance resources can be moved to serve higher demands making use of network analysis techniques. Emergency Ambulance calls’ data from 1st January 2014 to 31st December 2014 obtained from Eskişehir province health directorate will be used in this study. This study will focus on the reduction of ambulance response times which is a key Emergency Medical Services performance indicator.

Keywords: emergency medical services, system status management, ambulance response times, geographic information system, geospatial-time distribution, out of hospital cardiac arrest

Procedia PDF Downloads 278
508 Reducing the Stigma of Homelessness through Community Engagement and Reciprocity

Authors: Jessica Federman

Abstract:

The current research offers a longitudinal and qualitative study design to examine how reciprocity improves relations between the homeless and various stakeholders within a community. The study examines a homeless shelter that sought to establish a facility within a community of Los Angeles, that was initially met with strong resistance and opposition from a variety of organizations due to deeply entrenched views about the negative impact of having homeless individuals within the community. The project tested an intervention model that targets the reduction of stigmatization of homeless individuals and promotes synergistic exchanges between conflicted organizational entities in communities. Years later, the data show that there has been a remarkable reversal in the perception of the agency by the very forces that initially prevented it from being established. This reversal was achieved by a few key strategic decisions. Community engagement was the first step toward changing people’s minds and demonstrating how the homeless shelter was helping to alleviate the problem of homelessness instead of contributing to it. Central to the non-profit’s success was the agency’s pioneering formulation of a treatment model known as, Reciprocal Community Engagement Model (RCEM). The model works by reintegrating the homeless back into society through relationship building within a network of programs that foster positive human connections. This approach aims to draw the homeless out of the debilitating isolation of their situation, reintegrate them through purposeful roles in the community while simultaneously providing a reciprocal benefit to the community at large. Through multilevel, simultaneous social interaction, RCEM has a direct impact not only on the homeless shelter’s clients but also for the community as well. The agency’s approach of RCEM led to their homeless clients getting out of the shelter and getting to work in the community directly alongside other community volunteers and for the benefit of other city and community organizations. This led to several opportunities for community members and residents to interact in meaningful ways. Through each successive exposure, the resident and community members’ distrust in one another was gradually eased and a mutually supportive relationship restored. In this process, the community member becomes the locus of change as much as the residents of the shelter. Measurements of community trust and resilience increased while negative perceptions of homeless people decreased.

Keywords: stigma, homelessness, reciprocity, identity

Procedia PDF Downloads 133
507 Energy Dissipation Characteristics of an Elastomer under Dynamic Condition: A Comprehensive Assessment Using High and Low Frequency Analyser

Authors: K. Anas, M. Selvakumar, Samson David, R. R. Babu, S. Chattopadhyay

Abstract:

The dynamic deformation of a visco elastic material can cause heat generation. This heat generation is aspect energy dissipation. The present work investigates the contribution of various factors like; elastomer structure, cross link type and density, filler networking, reinforcement potential and temperature at energy dissipation mechanism. The influences of these elements are investigated using very high frequency analyzer (VHF ) and dynamical mechanical analysis(DMA).VHF follows transmissibility and vibration isolation principle whereas DMA works on dynamical mechanical deformation principle. VHF analysis of different types of elastomers reveals that elastomer can act as a transmitter or damper of energy depending on the applied frequency ratio (ω/ωn). Dynamic modulus (G') of low damping rubbers like natural rubber does not varies rapidly with frequency but vice-versa for high damping rubber like butyl rubber (IIR). VHF analysis also depicts that polysulfidic linkages has high damping ratio (ζ) than mono sulfidic linkages due to its dissipative nature. At comparable cross link density, mono sulfidic linkages shows higher glass transition temperature (Tg) than poly sulfidic linkages. The intensity and location of loss modulus (G'') peak of different types of carbon black filled natural rubber compounds suggests that segmental relaxation at glass transition temperature (Tg) is seldom affected by filler particles, but the filler networks can influence the cross link density by absorbing the curatives. The filler network breaking and reformation during a dynamic strain is a thermally activated process. Thus, stronger aggregates are highly dissipative in nature. Measurements indicate that at lower temperature regimes polymeric chain friction is highly dissipative in nature.

Keywords: damping ratio, natural frequency, crosslinking density, segmental motion, surface activity, dissipative, polymeric chain friction

Procedia PDF Downloads 266
506 Incidence of Lymphoma and Gonorrhea Infection: A Retrospective Study

Authors: Diya Kohli, Amalia Ardeljan, Lexi Frankel, Jose Garcia, Lokesh Manjani, Omar Rashid

Abstract:

Gonorrhea is the second most common sexually transmitted disease (STDs) in the United States of America. Gonorrhea affects the urethra, rectum, or throat and the cervix in females. Lymphoma is a cancer of the immune network called the lymphatic system that includes the lymph nodes/glands, spleen, thymus gland, and bone marrow. Lymphoma can affect many organs in the body. When a lymphocyte develops a genetic mutation, it signals other cells into rapid proliferation that causes many mutated lymphocytes. Multiple studies have explored the incidence of cancer in people infected with STDs such as Gonorrhea. For instance, the studies conducted by Wang Y-C and Co., as well as Caini, S and Co. established a direct co-relationship between Gonorrhea infection and incidence of prostate cancer. We hypothesize that Gonorrhea infection also increases the incidence of Lymphoma in patients. This research study aimed to evaluate the correlation between Gonorrhea infection and the incidence of Lymphoma. The data for the research was provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database. This database was utilized to evaluate patients infected with Gonorrhea versus the ones who were not infected to establish a correlation with the prevalence of Lymphoma using ICD-10 and ICD-9 codes. Access to the database was granted by the Holy Cross Health, Fort Lauderdale for academic research. Standard statistical methods were applied throughout. Between January 2010 and December 2019, the query was analyzed and resulted in 254 and 808 patients in both the infected and control group, respectively. The two groups were matched by Age Range and CCI score. The incidence of Lymphoma was 0.998% (254 patients out of 25455) in the Gonorrhea group (patients infected with Gonorrhea that was Lymphoma Positive) compared to 3.174% and 808 patients in the control group (Patients negative for Gonorrhea but with Lymphoma). This was statistically significant by a p-value < 2.210-16 with an OR= 0.431 (95% CI 0.381-0.487). The patients were then matched by antibiotic treatment to avoid treatment bias. The incidence of Lymphoma was 1.215% (82 patients out of 6,748) in the Gonorrhea group compared to 2.949% (199 patients out of 6748) in the control group. This was statistically significant by a p-value <5.410-10 with an OR= 0.468 (95% CI 0.367-0.596). The study shows a statistically significant correlation between Gonorrhea and a reduced incidence of Lymphoma. Further evaluation is recommended to assess the potential of Gonorrhea in reducing Lymphoma.

Keywords: gonorrhea, lymphoma, STDs, cancer, ICD

Procedia PDF Downloads 166
505 On the Survival of Individuals with Type 2 Diabetes Mellitus in the United Kingdom: A Retrospective Case-Control Study

Authors: Njabulo Ncube, Elena Kulinskaya, Nicholas Steel, Dmitry Pshezhetskiy

Abstract:

Life expectancy in the United Kingdom (UK) has been near constant since 2010, particularly for the individuals of 65 years and older. This trend has been also noted in several other countries. This slowdown in the increase of life expectancy was concurrent with the increase in the number of deaths caused by non-communicable diseases. Of particular concern is the world-wide exponential increase in the number of diabetes related deaths. Previous studies have reported increased mortality hazards among diabetics compared to non-diabetics, and on the differing effects of antidiabetic drugs on mortality hazards. This study aimed to estimate the all-cause mortality hazards and related life expectancies among type 2 diabetes (T2DM) patients in the UK using the time-variant Gompertz-Cox model with frailty. The study also aimed to understand the major causes of the change in life expectancy growth in the last decade. A total of 221 182 (30.8% T2DM, 57.6% Males) individuals aged 50 years and above, born between 1930 and 1960, inclusive, and diagnosed between 2000 and 2016, were selected from The Health Improvement Network (THIN) database of the UK primary care data and followed up to 31 December 2016. About 13.4% of participants died during the follow-up period. The overall all-cause mortality hazard ratio of T2DM compared to non-diabetic controls was 1.467 (1.381-1.558) and 1.38 (1.307-1.457) when diagnosed between 50 to 59 years and 60 to 74 years, respectively. The estimated life expectancies among T2DM individuals without further comorbidities diagnosed at the age of 60 years were 2.43 (1930-1939 birth cohort), 2.53 (1940-1949 birth cohort) and 3.28 (1950-1960 birth cohort) years less than those of non-diabetic controls. However, the 1950-1960 birth cohort had a steeper hazard function compared to the 1940-1949 birth cohort for both T2DM and non-diabetic individuals. In conclusion, mortality hazards for people with T2DM continue to be higher than for non-diabetics. The steeper mortality hazard slope for the 1950-1960 birth cohort might indicate the sub-population contributing to a slowdown in the growth of the life expectancy.

Keywords: T2DM, Gompetz-Cox model with frailty, all-cause mortality, life expectancy

Procedia PDF Downloads 93
504 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 44
503 Suitable Site Selection of Small Dams Using Geo-Spatial Technique: A Case Study of Dadu Tehsil, Sindh

Authors: Zahid Khalil, Saad Ul Haque, Asif Khan

Abstract:

Decision making about identifying suitable sites for any project by considering different parameters is difficult. Using GIS and Multi-Criteria Analysis (MCA) can make it easy for those projects. This technology has proved to be an efficient and adequate in acquiring the desired information. In this study, GIS and MCA were employed to identify the suitable sites for small dams in Dadu Tehsil, Sindh. The GIS software is used to create all the spatial parameters for the analysis. The parameters that derived are slope, drainage density, rainfall, land use / land cover, soil groups, Curve Number (CN) and runoff index with a spatial resolution of 30m. The data used for deriving above layers include 30-meter resolution SRTM DEM, Landsat 8 imagery, and rainfall from National Centre of Environment Prediction (NCEP) and soil data from World Harmonized Soil Data (WHSD). Land use/Land cover map is derived from Landsat 8 using supervised classification. Slope, drainage network and watershed are delineated by terrain processing of DEM. The Soil Conservation Services (SCS) method is implemented to estimate the surface runoff from the rainfall. Prior to this, SCS-CN grid is developed by integrating the soil and land use/land cover raster. These layers with some technical and ecological constraints are assigned weights on the basis of suitability criteria. The pairwise comparison method, also known as Analytical Hierarchy Process (AHP) is taken into account as MCA for assigning weights on each decision element. All the parameters and group of parameters are integrated using weighted overlay in GIS environment to produce suitable sites for the Dams. The resultant layer is then classified into four classes namely, best suitable, suitable, moderate and less suitable. This study reveals a contribution to decision-making about suitable sites analysis for small dams using geospatial data with minimal amount of ground data. This suitability maps can be helpful for water resource management organizations in determination of feasible rainwater harvesting structures (RWH).

Keywords: Remote sensing, GIS, AHP, RWH

Procedia PDF Downloads 358
502 Molecular Pathogenesis of NASH through the Dysregulation of Metabolic Organ Network in the NASH-HCC Model Mouse Treated with Streptozotocin-High Fat Diet

Authors: Bui Phuong Linh, Yuki Sakakibara, Ryuto Tanaka, Elizabeth H. Pigney, Taishi Hashiguchi

Abstract:

NASH is an increasingly prevalent chronic liver disease that can progress to hepatocellular carcinoma and now is attracting interest worldwide. The STAM™ model is a clinically-correlated murine NASH model which shows the same pathological progression as NASH patients and has been widely used for pharmacological and basic research. The multiple parallel hits hypothesis suggests abnormalities in adipocytokines, intestinal microflora, and endotoxins are intertwined and could contribute to the development of NASH. In fact, NASH patients often exhibit gut dysbiosis and dysfunction in adipose tissue and metabolism. However, the analysis of the STAM™ model has only focused on the liver. To clarify whether the STAM™ model can also mimic multiple pathways of NASH progression, we analyzed the organ crosstalk interactions between the liver and the gut and the phenotype of adipose tissue in the STAM™ model. NASH was induced in male mice by a single subcutaneous injection of 200 µg streptozotocin 2 days after birth and feeding with high-fat diet after 4 weeks of age. The mice were sacrificed at NASH stage. Colon samples were snap-frozen in liquid nitrogen and stored at -80˚C for tight junction-related protein analysis. Adipose tissue was prepared into paraffin blocks for HE staining. Blood adiponectin was analyzed to confirm changes in the adipocytokine profile. Tight junction-related proteins in the intestine showed that expression of ZO-1 decreased with the progression of the disease. Increased expression of endotoxin in the blood and decreased expression of Adiponectin were also observed. HE staining revealed hypertrophy of adipocytes. Decreased expression of ZO-1 in the intestine of STAM™ mice suggests the occurrence of leaky gut, and abnormalities in adipocytokine secretion were also observed. Together with the liver, phenotypes in these organs are highly similar to human NASH patients and might be involved in the pathogenesis of NASH.

Keywords: Non-alcoholic steatohepatitis, hepatocellular carcinoma, fibrosis, organ crosstalk, leaky gut

Procedia PDF Downloads 128
501 Neuroevolution Based on Adaptive Ensembles of Biologically Inspired Optimization Algorithms Applied for Modeling a Chemical Engineering Process

Authors: Sabina-Adriana Floria, Marius Gavrilescu, Florin Leon, Silvia Curteanu, Costel Anton

Abstract:

Neuroevolution is a subfield of artificial intelligence used to solve various problems in different application areas. Specifically, neuroevolution is a technique that applies biologically inspired methods to generate neural network architectures and optimize their parameters automatically. In this paper, we use different biologically inspired optimization algorithms in an ensemble strategy with the aim of training multilayer perceptron neural networks, resulting in regression models used to simulate the industrial chemical process of obtaining bricks from silicone-based materials. Installations in the raw ceramics industry, i.e., bricks, are characterized by significant energy consumption and large quantities of emissions. In addition, the initial conditions that were taken into account during the design and commissioning of the installation can change over time, which leads to the need to add new mixes to adjust the operating conditions for the desired purpose, e.g., material properties and energy saving. The present approach follows the study by simulation of a process of obtaining bricks from silicone-based materials, i.e., the modeling and optimization of the process. Optimization aims to determine the working conditions that minimize the emissions represented by nitrogen monoxide. We first use a search procedure to find the best values for the parameters of various biologically inspired optimization algorithms. Then, we propose an adaptive ensemble strategy that uses only a subset of the best algorithms identified in the search stage. The adaptive ensemble strategy combines the results of selected algorithms and automatically assigns more processing capacity to the more efficient algorithms. Their efficiency may also vary at different stages of the optimization process. In a given ensemble iteration, the most efficient algorithms aim to maintain good convergence, while the less efficient algorithms can improve population diversity. The proposed adaptive ensemble strategy outperforms the individual optimizers and the non-adaptive ensemble strategy in convergence speed, and the obtained results provide lower error values.

Keywords: optimization, biologically inspired algorithm, neuroevolution, ensembles, bricks, emission minimization

Procedia PDF Downloads 70
500 Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba

Authors: Mavis Ofosuah Asante, Abena Abokoma Asemanyi, Belinda Osei-mensah, Stephen Osei Akyiaw

Abstract:

The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services.

Keywords: mobile money, fraud, telecommunication, merchant

Procedia PDF Downloads 33
499 Women Perception of Spatial Safety Relating to Working in Historic Cairo’s Retail Street Markets

Authors: Toka M. Abufarag

Abstract:

This research primarily studies the correlation between the existence of different spatial factors in relation to the perception of females towards safely participating in the labor force within selected areas of economic bustle in Historic Cairo. This research measures the following independent variables: (1) perception regarding spatial safety on the street as controlled by street network, (2) vegetation as a facilitator and inhibitor of feeling safe in public places, and (3) outdoor lighting; in relation to the following dependent variable: the perception of females towards safely participating in the labor force in Historic Cairo. The objective of this research lies within adding to the design guidelines of urban design and planning in terms of design recommendations, making them more inclusive, especially those dealing with conserving and enhancing the built environment of old and historic cities. It is hypothesized that a balanced male-to-female ratio in terms of street activity, increased visibility of street in terms of its volume, a decrease in street obstacles, creation of open sighted vegetation, and increased visibility due to proper lighting will show up as positive response relating to the female perception of safety. The site chosen as an area to host this exercise of data collection is Al-Ataba. The site is within the borders of Historic Cairo and was chosen for two reasons: firstly, it provides a major source of economic bustle in Historic Cairo; and secondly, it hosts retail economic activities. This is a cross-sectional study. The data collected will consist of three parts: (1) observations by the researcher regarding the percentage of female participation, as well as perception of females on site, (2) interviews with women working on-site regarding the percentage of female participation, as well as their perception on participating, and (3) an anonymous online survey that studies the perception of a random sample of women towards the site as a place to exist in. The survey will aid in producing design recommendations on how to design an open 'souk' that suits women’s perception of a safe space.

Keywords: urban design, women empowerment, safety perception, street markets, historic Cairo

Procedia PDF Downloads 96
498 Determination of the Structural Parameters of Calcium Phosphate for Biomedical Use

Authors: María Magdalena Méndez-González, Miguel García Rocha, Carlos Manuel Yermo De la Cruz

Abstract:

Calcium phosphate (Ca5(PO4)3(X)) is widely used in orthopedic applications and is widely used as powder and granules. However, their presence in bone is in the form of nanometric needles 60 nm in length with a non-stoichiometric phase of apatite contains CO3-2, Na+, OH-, F-, and other ions in a matrix of collagen fibers. The crystal size, morphology control and interaction with cells are essential for the development of nanotechnology. The structural results of calcium phosphate, synthesized by chemical precipitation with crystal size of 22.85 nm are presented in this paper. The calcium phosphate powders were analyzed by X-ray diffraction, energy dispersive spectroscopy (EDS), infrared spectroscopy and FT-IR transmission electron microscopy. Network parameters, atomic positions, the indexing of the planes and the calculation of FWHM (full width at half maximum) were obtained. The crystal size was also calculated using the Scherer equation d (hkl) = cλ/βcosѲ. Where c is a constant related to the shape of the crystal, the wavelength of the radiation used for a copper anode is 1.54060Å, Ѳ is the Bragg diffraction angle, and β is the width average peak height of greater intensity. Diffraction pattern corresponding to the calcium phosphate called hydroxyapatite phase of a hexagonal crystal system was obtained. It belongs to the space group P63m with lattice parameters a = 9.4394 Å and c = 6.8861 Å. The most intense peak is obtained 2Ѳ = 31.55 (FWHM = 0.4798), with a preferred orientation in 121. The intensity difference between the experimental data and the calculated values is attributable to the temperature at which the sintering was performed. The intensity of the highest peak is at angle 2Ѳ = 32.11. The structure of calcium phosphate obtained was a hexagonal configuration. The intensity changes in the peaks of the diffraction pattern, in the lattice parameters at the corners, indicating the possible presence of a dopant. That each calcium atom is surrounded by a tetrahedron of oxygen and hydrogen was observed by infrared spectra. The unit cell pattern corresponds to hydroxyapatite and transmission electron microscopic crystal morphology corresponding to the hexagonal phase with a preferential growth along the c-plane was obtained.

Keywords: structure, nanoparticles, calcium phosphate, metallurgical and materials engineering

Procedia PDF Downloads 473
497 Geospatial Multi-Criteria Evaluation to Predict Landslide Hazard Potential in the Catchment of Lake Naivasha, Kenya

Authors: Abdel Rahman Khider Hassan

Abstract:

This paper describes a multi-criteria geospatial model for prediction of landslide hazard zonation (LHZ) for Lake Naivasha catchment (Kenya), based on spatial analysis of integrated datasets of location intrinsic parameters (slope stability factors) and external landslides triggering factors (natural and man-made factors). The intrinsic dataset included: lithology, geometry of slope (slope inclination, aspect, elevation, and curvature) and land use/land cover. The landslides triggering factors included: rainfall as the climatic factor, in addition to the destructive effects reflected by proximity of roads and drainage network to areas that are susceptible to landslides. No published study on landslides has been obtained for this area. Thus, digital datasets of the above spatial parameters were conveniently acquired, stored, manipulated and analyzed in a Geographical Information System (GIS) using a multi-criteria grid overlay technique (in ArcGIS 10.2.2 environment). Deduction of landslide hazard zonation is done by applying weights based on relative contribution of each parameter to the slope instability, and finally, the weighted parameters grids were overlaid together to generate a map of the potential landslide hazard zonation (LHZ) for the lake catchment. From the total surface of 3200 km² of the lake catchment, most of the region (78.7 %; 2518.4 km²) is susceptible to moderate landslide hazards, whilst about 13% (416 km²) is occurring under high hazards. Only 1.0% (32 km²) of the catchment is displaying very high landslide hazards, and the remaining area (7.3 %; 233.6 km²) displays low probability of landslide hazards. This result confirms the importance of steep slope angles, lithology, vegetation land cover and slope orientation (aspect) as the major determining factors of slope failures. The information provided by the produced map of landslide hazard zonation (LHZ) could lay the basis for decision making as well as mitigation and applications in avoiding potential losses caused by landslides in the Lake Naivasha catchment in the Kenya Highlands.

Keywords: decision making, geospatial, landslide, multi-criteria, Naivasha

Procedia PDF Downloads 171
496 Overcoming Challenges of Teaching English as a Foreign Language in Technical Classrooms: A Case Study at TVTC College of Technology

Authors: Sreekanth Reddy Ballarapu

Abstract:

The perception of the whole process of teaching and learning is undergoing a drastic and radical change. More and more student-centered, pragmatic, and flexible approaches are gradually replacing teacher-centered lecturing and structural-syllabus instruction. The issue of teaching English as a Foreign language is no exception in this regard. The traditional Present-Practice-Produce (P-P-P) method of teaching English is overtaken by Task-Based Teaching which is a subsidiary branch of Communicative Language Teaching. At this juncture this article strongly tries to convey that - Task-based learning, has an advantage over other traditional methods of teaching. All teachers of English must try to customize their texts into productive tasks, apply them, and evaluate the students as well as themselves. Task Based Learning is a double edged tool which can enhance the performance of both the teacher and the taught. The sample for this case study is a class of 35 students from Semester III - Network branch at TVTC College of Technology, Adhum - Kingdom of Saudi Arabia. The students are high school passed out and aged between 19-21years.For the present study the prescribed textbook Technical English 1 by David Bonamy was used and a number of language tasks were chalked out during the pre- task stage and the learners were made to participate voluntarily and actively. The Action Research methodology was adopted within the dual framework of Communicative Language Teaching and Task-Based Learning. The different tools such as questionnaires, feedback and interviews were used to collect data. This study provides information about various techniques of Communicative Language Teaching and Task Based Learning and focuses primarily on the advantages of using a Task Based Learning approach. This article presents in detail the objectives of the study, the planning and implementation of the action research, the challenges encountered during the execution of the plan, and the pedagogical outcome of this project. These research findings serve two purposes: first, it evaluates the effectiveness of Task Based Learning and, second, it empowers the teacher's professionalism in designing and implementing the tasks. In the end, the possibility of scope for further research is presented in brief.

Keywords: action research, communicative language teaching, task based learning, perception

Procedia PDF Downloads 205
495 Sustainable Integrated Waste Management System

Authors: Lidia Lombardi

Abstract:

Waste management in Europe and North America is evolving towards sustainable materials management, intended as a systemic approach to using and reusing materials more productively over their entire life cycles. Various waste management strategies are prioritized and ranked from the most to the least environmentally preferred, placing emphasis on reducing, reusing, and recycling as key to sustainable materials management. However, non-recyclable materials must also be appropriately addressed, and waste-to-energy (WtE) offers a solution to manage them, especially when a WtE plant is integrated within a complex system of waste and wastewater treatment plants and potential users of the output flows. To evaluate the environmental effects of such system integration, Life Cycle Assessment (LCA) is a helpful and powerful tool. LCA has been largely applied to the waste management sector, dating back to the late 1990s, producing a large number of theoretical studies and applications to the real world as support to waste management planning. However, LCA still has a fundamental role in helping the development of waste management systems supporting decisions. Thus, LCA was applied to evaluate the environmental performances of a Municipal Solid Waste (MSW) management system, with improved separate material collection and recycling and an integrated network of treatment plants including WtE, anaerobic digestion (AD) and also wastewater treatment plant (WWTP), for a reference study case area. The proposed system was compared to the actual situation, characterized by poor recycling, large landfilling and absence of WtE. The LCA results showed that the increased recycling significantly increases the environmental performances, but there is still room for improvement through the introduction of energy recovery (especially by WtE) and through its use within the system, for instance, by feeding the heat to the AD, to sludge recovery processes and supporting the water reuse practice. WtE offers a solution to manage non-recyclable MSW and allows saving important resources (such as landfill volumes and non-renewable energy), reducing the contribution to global warming, and providing an essential contribution to fulfill the goals of really sustainable waste management.

Keywords: anaerobic digestion, life cycle assessment, waste-to-energy, municipal solid waste

Procedia PDF Downloads 17
494 Building Social Capital for Social Inclusion: The Use of Social Networks in Government

Authors: Suha Alawadhi, Malak Alrasheed

Abstract:

In the recent past, public participation in governments has been declined to a great extent, as citizens have been isolated from community life and their ability to articulate demands for good government has been noticeably decreased. However, the Internet has introduced new forms of interaction that could enhance different types of relationships, including government-public relationship. In fact, technology-enabled government has become a catalyst for enabling social inclusion. This exploratory study seeks to investigate public perceptions in Kuwait regarding the use of social media networks in government where social capital is built to achieve social inclusion. Social capital has been defined as social networks and connections amongst individuals, that are based on shared trust, ideas and norms, enable participants of a network to act effectively to pursue a shared objective. The quantitative method was used to generate empirical evidence. A questionnaire was designed to address the research objective and reflect the identified constructs: social capital dimensions (bridging, bonding and maintaining social capital), social inclusion, and social equality. In this pilot study, data was collected from a random sample of 61 subjects. The results indicate that all participants have a positive attitude towards the dimensions of social capital (bridging, bonding and maintaining), social inclusion and social equality constructs. Tests of identified constructs against demographic characteristics indicate that there are significant differences between male and female as they perceived bonding and maintaining social capital, social inclusion and social equality whereas no difference was identified in their perceptions of bridging social capital. Also, those who are aged 26-30 perceived bonding and maintaining social capital, social inclusion and social equality negatively compared to those aged 20-25, 31-35, and 40-above whose perceptions were positive. With regard to education, the results also show that those holding high school, university degree and diploma perceived maintaining social capital positively higher than with those who hold graduate degrees. Moreover, a regression model is proposed to study the effect of bridging, bonding, and maintaining social capital on social inclusion via social equality as a mediator. This exploratory study is necessary for testing the validity and reliability of the questionnaire which will be used in the main study that aims to investigate the perceptions of individuals towards building social capital to achieve social inclusion.

Keywords: government, social capital, social inclusion, social networks

Procedia PDF Downloads 293
493 Spatial Structure of First-Order Voronoi for the Future of Roundabout Cairo Since 1867

Authors: Ali Essam El Shazly

Abstract:

The Haussmannization plan of Cairo in 1867 formed a regular network of roundabout spaces, though deteriorated at present. The method of identifying the spatial structure of roundabout Cairo for conservation matches the voronoi diagram with the space syntax through their geometrical property of spatial convexity. In this initiative, the primary convex hull of first-order voronoi adopts the integral and control measurements of space syntax on Cairo’s roundabout generators. The functional essence of royal palaces optimizes the roundabout structure in terms of spatial measurements and the symbolic voronoi projection of 'Tahrir Roundabout' over the Giza Nile and Pyramids. Some roundabouts of major public and commercial landmarks surround the pole of 'Ezbekia Garden' with a higher control than integral measurements, which filter the new spatial structure from the adjacent traditional town. Nevertheless, the least integral and control measures correspond to the voronoi contents of pollutant workshops and the plateau of old Cairo Citadel with the visual compensation of new royal landmarks on top. Meanwhile, the extended suburbs of infinite voronoi polygons arrange high control generators of chateaux housing in 'garden city' environs. The point pattern of roundabouts determines the geometrical characteristics of voronoi polygons. The measured lengths of voronoi edges alternate between the zoned short range at the new poles of Cairo and the distributed structure of longer range. Nevertheless, the shortest range of generator-vertex geometry concentrates at 'Ezbekia Garden' where the crossways of vast Cairo intersect, which maximizes the variety of choice at different spatial resolutions. However, the symbolic 'Hippodrome' which is the largest public landmark forms exclusive geometrical measurements, while structuring a most integrative roundabout to parallel the royal syntax. Overview of the symbolic convex hull of voronoi with space syntax interconnects Parisian Cairo with the spatial chronology of scattered monuments to conceive one universal Cairo structure. Accordingly, the approached methodology of 'voronoi-syntax' prospects the future conservation of roundabout Cairo at the inferred city-level concept.

Keywords: roundabout Cairo, first-order Voronoi, space syntax, spatial structure

Procedia PDF Downloads 470
492 Technique for Online Condition Monitoring of Surge Arresters

Authors: Anil S. Khopkar, Kartik S. Pandya

Abstract:

Overvoltage in power systems is a phenomenon that cannot be avoided. However, it can be controlled to a certain extent. Power system equipment is to be protected against overvoltage to avoid system failure. Metal Oxide Surge Arresters (MOSA) are connected to the system for the protection of the power system against overvoltages. The MOSA will behave as an insulator under normal working conditions, where it offers a conductive path under voltage conditions. MOSA consists of zinc oxide elements (ZnO Blocks), which have non-linear V-I characteristics. ZnO blocks are connected in series and fitted in ceramic or polymer housing. This degrades due to the aging effect under continuous operation. Degradation of zinc oxide elements increases the leakage current flowing from the surge arresters. This Increased leakage current results in the increased temperature of the surge arrester, which further decreases the resistance of zinc oxide elements. As a result, leakage current increases, which again increases the temperature of a MOSA. This creates thermal runaway conditions for MOSA. Once it reaches the thermal runaway condition, it cannot return to normal working conditions. This condition is a primary cause of premature failure of surge arresters, as MOSA constitutes a core protective device for electrical power systems against transients. It contributes significantly to the reliable operation of the power system network. Hence, the condition monitoring of surge arresters should be done at periodic intervals. Online and Offline condition monitoring techniques are available for surge arresters. Offline condition monitoring techniques are not very popular as they require removing surge arresters from the system, which requires system shutdown. Hence, online condition monitoring techniques are very popular. This paper presents the evaluation technique for the surge arrester condition based on the leakage current analysis. Maximum amplitude of total leakage current (IT), Maximum amplitude of fundamental resistive leakage current (IR) and maximum amplitude of third harmonic resistive leakage current (I3rd) have been analyzed as indicators for surge arrester condition monitoring.

Keywords: metal oxide surge arrester (MOSA), over voltage, total leakage current, resistive leakage current

Procedia PDF Downloads 22
491 Data and Model-based Metamodels for Prediction of Performance of Extended Hollo-Bolt Connections

Authors: M. Cabrera, W. Tizani, J. Ninic, F. Wang

Abstract:

Open section beam to concrete-filled tubular column structures has been increasingly utilized in construction over the past few decades due to their enhanced structural performance, as well as economic and architectural advantages. However, the use of this configuration in construction is limited due to the difficulties in connecting the structural members as there is no access to the inner part of the tube to install standard bolts. Blind-bolted systems are a relatively new approach to overcome this limitation as they only require access to one side of the tubular section to tighten the bolt. The performance of these connections in concrete-filled steel tubular sections remains uncharacterized due to the complex interactions between concrete, bolt, and steel section. Over the last years, research in structural performance has moved to a more sophisticated and efficient approach consisting of machine learning algorithms to generate metamodels. This method reduces the need for developing complex, and computationally expensive finite element models, optimizing the search for desirable design variables. Metamodels generated by a data fusion approach use numerical and experimental results by combining multiple models to capture the dependency between the simulation design variables and connection performance, learning the relations between different design parameters and predicting a given output. Fully characterizing this connection will transform high-rise and multistorey construction by means of the introduction of design guidance for moment-resisting blind-bolted connections, which is currently unavailable. This paper presents a review of the steps taken to develop metamodels generated by means of artificial neural network algorithms which predict the connection stress and stiffness based on the design parameters when using Extended Hollo-Bolt blind bolts. It also provides consideration of the failure modes and mechanisms that contribute to the deformability as well as the feasibility of achieving blind-bolted rigid connections when using the blind fastener.

Keywords: blind-bolted connections, concrete-filled tubular structures, finite element analysis, metamodeling

Procedia PDF Downloads 131
490 Crack Growth Life Prediction of a Fighter Aircraft Wing Splice Joint Under Spectrum Loading Using Random Forest Regression and Artificial Neural Networks with Hyperparameter Optimization

Authors: Zafer Yüce, Paşa Yayla, Alev Taşkın

Abstract:

There are heaps of analytical methods to estimate the crack growth life of a component. Soft computing methods have an increasing trend in predicting fatigue life. Their ability to build complex relationships and capability to handle huge amounts of data are motivating researchers and industry professionals to employ them for challenging problems. This study focuses on soft computing methods, especially random forest regressors and artificial neural networks with hyperparameter optimization algorithms such as grid search and random grid search, to estimate the crack growth life of an aircraft wing splice joint under variable amplitude loading. TensorFlow and Scikit-learn libraries of Python are used to build the machine learning models for this study. The material considered in this work is 7050-T7451 aluminum, which is commonly preferred as a structural element in the aerospace industry, and regarding the crack type; corner crack is used. A finite element model is built for the joint to calculate fastener loads and stresses on the structure. Since finite element model results are validated with analytical calculations, findings of the finite element model are fed to AFGROW software to calculate analytical crack growth lives. Based on Fighter Aircraft Loading Standard for Fatigue (FALSTAFF), 90 unique fatigue loading spectra are developed for various load levels, and then, these spectrums are utilized as inputs to the artificial neural network and random forest regression models for predicting crack growth life. Finally, the crack growth life predictions of the machine learning models are compared with analytical calculations. According to the findings, a good correlation is observed between analytical and predicted crack growth lives.

Keywords: aircraft, fatigue, joint, life, optimization, prediction.

Procedia PDF Downloads 133
489 Reflecting on Deafblindness: Recommendations for Implementing Effective Strategies

Authors: V. Argyropoulos, M. Nikolaraizi, K. Tanou

Abstract:

There is little available information concerning the cognitive and communicative abilities of the people who are deaf-blind. This mainly stems from the general inadequacy of existing assessment instruments employed with deafblind individuals. Although considerable variability exists with regard to cognitive capacities of the deaf-blind, careful examination of the literature reveals that the majority of these persons suffer from significant deficits in cognitive and adaptive functioning. The few reports available primarily are case studies, narrative program descriptions, or position papers by workers in the field. Without the objective verification afforded by controlled research, specialists in psychology, education, and other rehabilitation services must rely on personal speculations or biases to guide their decisions in the planning, implementation, and evaluation of services to deaf-blind children and adults. This paper highlights the framework and discusses the results of an action research network. The aim of this study was twofold: a) to describe and analyse the different ways in which a student with deafblindness approached a number of developmental issues such as novel tasks, exploration and manipulation of objects, reactions to social stimuli, motor coordination, and quality of play and b) to map the appropriate functional approach for the specific student that could be used to develop strategies for classroom participation and socialization. The persons involved in this collaborative action research scheme were general teachers, a school counsellor, academic staff and student teachers. Rating scales and checklists were used to gather information in natural activities and settings, and additional data were also obtained through interviews with the educators of the student. The findings of this case study indicated that there is a great need to focus on the development of effective intervention strategies. The results showed that the identification of positive reinforcers for this population might represent an important and challenging aspect of behaviour programmes. Finally, the findings suggest that additional empirical work is needed to increase attention to methodological and social validity issues.

Keywords: action research, cognitive and communicative abilities, deafblindness, effective strategies

Procedia PDF Downloads 154
488 Community Health Workers’ Performance and Their Influence in the Adoption of Strategies to Address Malaria Burden at a Subnational Level Health System in Cameroon

Authors: Tacho Rubby Kong

Abstract:

Community health workers’ performances are known to influence members’ behaviours and practices while translating policies into service delivery. However, little remains known about the extent to which this remains true within interventions aimed at addressing malaria burden in low-resource settings like Cameroon. The objective of this study was to examine the health workers’ performance and their influence on the adoption of strategies to address the malaria burden at a subnational level health system in Cameroon. A qualitative exploratory design was adopted on a purposively selected sample of 18 key informants. The study was conducted in Konye health district among sub-national health systems, managers, health facility in-charges, and frontline community health workers. Data was collected using semi-structured interview guides in a face-to-face interview with respondents. The analysis adopted a thematic approach utilising journals, credible authors, and peer review articles for data management. Participants acknowledged that workplace networks were influential during the implementation of policies to address malaria. The influence exerted was in form of linkage with other services, caution, and advice regarding strict adherence to policy recommendations, perhaps reflective of the level of trust in providers’ ability to adhere to policy provisions. At the district health management level and among non-state actors, support in perceived areas of weak performance in policy implementation was observed. In addition, timely initiation of contact and subsequent referral was another aspect where community health workers exerted influence while translating policies to address the malaria burden. While the level of support from among network peers was observed to influence community health workers’ adoption and implementation of strategies to address the malaria burden, different mechanisms triggered subsequent response and level of adherence to recommended policy aspects. Drawing from the elicited responses, it was infer that community health workers’ performance influence the direction and extent of success in policy implementation to address the malaria burden at the subnational level.

Keywords: subnational, community, malaria, strategy

Procedia PDF Downloads 64
487 Thermal Perception by Older People in Open Spaces in Madrid: Relationships between Weather Parameters and Personal Characteristics

Authors: María Teresa Baquero, Ester Higueras

Abstract:

One of the challenges facing 21st century cities, is their adaptation to the phenomenon of an ageing population. International policies have been developed, such as the "Global Network for Age-friendly Cities and Communities". These cities must recognize the diversity of the elderly population, and facilitate an active, healthy, satisfied aging and promote inclusion. In order to promote active and healthy aging, older people should be encouraged to engage in physical activity, sunbathe, socialize and enjoy the public open spaces in the city. Some studies recognize thermal comfort as one of the factors that most influence the use of public open spaces. However, although some studies have shown vulnerability to thermal extremes and environmental conditions in older people, there is little research on thermal comfort for older adults, because it is usually analyzed based on the characteristics of the ¨average young person¨ without considering the physiological, physical and psychological differences that characterize the elderly. This study analyzes the relationship between the microclimate parameters as air temperature, relative humidity, wind speed and sky view factor (SVF) with the personal thermal perception of older adults in three public spaces in Madrid, through a mixed methodology that combines weather measurements with interviews, made during the year 2018. Statistical test like Chi-square, Spearman, and analysis of variance were used to analyze the relationship between preference votes and thermal sensation votes with environmental and personal parameters. The results show that there is a significant correlation between thermal sensation and thermal preference with the measured air temperature, age, level of clothing, the color of clothing, season, time of the day and kind of space while no influence of gender or other environmental variables was detected. These data would contribute to the design of comfortable public spaces that improve the welfare of the elderly contributing to "active and healthy aging" as one of the 21st century challenges cities face.

Keywords: healthy ageing, older adults, outdoor public space, thermal perception

Procedia PDF Downloads 104
486 A Hedonic Valuation Approach to Valuing Combined Sewer Overflow Reductions

Authors: Matt S. Van Deren, Michael Papenfus

Abstract:

Seattle is one of the hundreds of cities in the United States that relies on a combined sewer system to collect and convey municipal wastewater. By design, these systems convey all wastewater, including industrial and commercial wastewater, human sewage, and stormwater runoff, through a single network of pipes. Serious problems arise for combined sewer systems during heavy precipitation events when treatment plants and storage facilities are unable to accommodate the influx of wastewater needing treatment, causing the sewer system to overflow into local waterways through sewer outfalls. CSOs (Combined Sewer Overflows) pose a serious threat to human and environmental health. Principal pollutants found in CSO discharge include microbial pathogens, comprising of bacteria, viruses, parasites, oxygen-depleting substances, suspended solids, chemicals or chemical mixtures, and excess nutrients, primarily nitrogen and phosphorus. While concentrations of these pollutants can vary between overflow events, CSOs have the potential to spread disease and waterborne illnesses, contaminate drinking water supplies, disrupt aquatic life, and effect a waterbody’s designated use. This paper estimates the economic impact of CSOs on residential property values. Using residential property sales data from Seattle, Washington, this paper employs a hedonic valuation model that controls for housing and neighborhood characteristics, as well as spatial and temporal effects, to predict a consumer’s willingness to pay for improved water quality near their homes. Initial results indicate that a 100,000-gallon decrease in the average annual overflow discharged from a sewer outfall within 300 meters of a home is associated with a 0.053% increase in the property’s sale price. For the average home in the sample, the price increase is estimated to be $18,860.23. These findings reveal some of the important economic benefits of improving water quality by reducing the frequency and severity of combined sewer overflows.

Keywords: benefits, hedonic, Seattle, sewer

Procedia PDF Downloads 142
485 The Saying of Conceptual Metaphors about Law, Righteousness, and Justice in the Old Testament: Cardinal Tendencies

Authors: Ivana Prochazkova

Abstract:

Cognitive linguistics offers biblical scholarship a specific methodological tool for analysis and interpretation of metaphorical expressions. Its methodology makes it possible to study processes involved in constructing the meaning of individual metaphorical expressions and whole conceptual metaphors; to analyze their function in the text; to follow the semantic development of concepts and conceptual domains, and to trace semantic changes and their motivation. The legal language in the Hebrew canon is extremely specific and formalized. Especially in the preambles to the collections of laws in the Pentateuch, more general considerations of the motif of keeping and breaking the law are encountered. This is also true in the psalms and wisdom literature. Legal theory and the philosophy of law deal with these motifs today. Metaphors play an important role in texts that reflect on more general issues. The purpose of this conference contribution is to write all over the central metaphorical concept, conceptual metaphor ךרד תורה (TORAH/LAW IS A JOURNEY), its function in the Torah and principal trends of the further development in the Prophets and the Writings. The conceptual metaphor תורה ךרד (TORAH/LAW IS A JOURNEY) constitutes a coherent system in conjunction with other metaphors that include e.g., conceptual metaphors נחה תורה (TORAH/LAW LEADS); its variant רעה תורה (TORAH IS A SHEPHERD/GUIDE); מקור תורה (TORAH/LAW IS A FOUNTAIN/A SOURCE OF LIFE). Some conceptual metaphors are well known, and their using are conventional (עשׁר תורה TORAH/LAW IS RICHES, שׂשׂון תורה TORAH/LAW IS DELIGHT, דבשׁ תורה TORAH/LAW IS HONEY, שׁמשׁ תורה TORAH/LAW IS SUN ). But some conceptual metaphors are by its occurrence innovative and unique (e.g., שׁריון תורה TORAH /LAW IS BODY ARMOR, כובע תורה TORAH /LAW IS A HELMET, בגד תורה TORAH/LAW IS A GARMENT, etc.). There will be given examples. Conceptual metaphors will be described by means of some 'metaphorical vehicles,' which are Hebrew expressions in the source domain that are repeatedly used in metaphorical conceptualizations of the target domain(s). Conceptual metaphors will be further described by means of 'generic narrative structures,' which are the particular aspects of a conceptual metaphor that emerge during the metaphorical structuring of concepts. They are the units of the metaphorical vehicles – the Hebrew expressions in the source domain – that structure concepts in much the same way that the conceptual metaphor in the target domain does. And finally, they will be described by means of the network of correspondences that exist between metaphorical vehicles – or generic metaphorical structures – and the Hebrew expressions in the target domain.

Keywords: cognitive theology, conceptual metaphor in the Old Testament, conceptual metaphors of the Torah, conceptual domain of law, righteousness, and justice

Procedia PDF Downloads 170