Search results for: preventing violence.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 185

Search results for: preventing violence.

95 The Lubrication Regimes Recognition of a Pressure-Fed Journal Bearing by Time and Frequency Domain Analysis of Acoustic Emission Signals

Authors: S. Hosseini, M. Ahmadi Najafabadi, M. Akhlaghi

Abstract:

The health of the journal bearings is very important in preventing unforeseen breakdowns in rotary machines, and poor lubrication is one of the most important factors for producing the bearing failures. Hydrodynamic lubrication (HL), mixed lubrication (ML), and boundary lubrication (BL) are three regimes of a journal bearing lubrication. This paper uses acoustic emission (AE) measurement technique to correlate features of the AE signals to the three lubrication regimes. The transitions from HL to ML based on operating factors such as rotating speed, load, inlet oil pressure by time domain and time-frequency domain signal analysis techniques are detected, and then metal-to-metal contacts between sliding surfaces of the journal and bearing are identified. It is found that there is a significant difference between theoretical and experimental operating values that are obtained for defining the lubrication regions.

Keywords: Acoustic emission technique, pressure fed journal bearing, time and frequency signal analysis, metal-to-metal contact.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 738
94 The Arab Spring and Extremism: Case Study to the Evolution of Extreme-Islamism in Egypt

Authors: Ayman M. Mottaleb

Abstract:

In conducting a case study to analyze the status-quo of the extremists’ dominance in Egypt, the author of this paper uses qualitative research method to analyze the evolution of extreme Islamist groups in Egypt. In conducting this qualitative research, the author of this paper intends to use several lenses to understand the rise and the evolution of the hegemony of extremist groups, such as the Muslim Brotherhood and other groups in Egypt. Therefore, unless he intends to show an important nexus between the Egyptian groups and their sister-groups in other countries, he will intentionally exclude analyzing extreme Islamism of non-Egyptian origins. This case study relies on the moral disengagement theory to shed light on the ideological evolution of extremism in Egypt. The goal of this case study is to help in understanding extreme-Islamism adverse to the mainstream Islam; therefore, understanding the concept here should help in preventing similar groups from threatening the international community.

Keywords: Extremism, International Terrorism, Islamists, Middle East, Muslim Brotherhood.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2673
93 Identification of High Stress and Strain Regions in Proximal Femur during Single-Leg Stance and Sideways Fall Using QCT-Based Finite Element Model

Authors: H. Kheirollahi, Y. Luo

Abstract:

Studying stress and strain trends in the femur and recognizing femur failure mechanism is very important for preventing hip fracture in the elderly. The aim of this study was to identify high stress and strain regions in the femur during normal walking and falling to find the mechanical behavior and failure mechanism of the femur. We developed a finite element model of the femur from the subject’s quantitative computed tomography (QCT) image and used it to identify potentially high stress and strain regions during the single-leg stance and the sideways fall. It was found that fracture may initiate from the superior region of femoral neck and propagate to the inferior region during a high impact force such as sideways fall. The results of this study showed that the femur bone is more sensitive to strain than stress which indicates the effect of strain, in addition to effect of stress, should be considered for failure analysis.

Keywords: Finite element analysis, hip fracture, strain, stress.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2464
92 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: Human security, asymmetric war, counter insurgency, fragile state, insurgency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1502
91 Anti-Corruption Conventions in Nigeria: Legal and Administrative Challenges

Authors: Mohammed Albakariyu Kabir

Abstract:

There is a trend in development discourse to understand and explain the level of corruption in Nigeria, its anticorruption crusade and why it is failing, as well as its level of compliance with International standards of United Nations Convention against Corruption (UNCAC) & African Union Convention on Converting and Preventing Corruption) to which Nigeria is a signatory. This paper discusses the legal and Constitutional provisions relating to corrupt practices and safeguards in Nigeria, as well as the obstacles to the implementation of these Conventions. The paper highlights the challenges posed to the Anti-Corruption crusade by analysing the loopholes that exist both in administrative structure and in scope of the relevant laws. The paper argues that Nigerian Constitution did not make adequate provisions for the implementation of the conventions, hence a proposal which will ensure adequate provision for implementing the conventions to better the lives of Nigerians. The paper concludes that there is the need to build institutional parameters, adequate constitutional and structural safeguards, as well as to synergise strategies, collaborations and alliances to facilitate the timely domestication and implementation of the conventions.

Keywords: Anti-Corruption, Corruption, Convention, domestication, poverty, State Parties.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2591
90 Teachers’ and Students’ Causal Explanations for Classroom Misbehavior: Similarities and Differences

Authors: Rachel C. F. Sun

Abstract:

This study aimed to examine the similarities and differences between teachers’ and students’ causal explanations of classroom misbehavior. In-depth semi-structured interviews were conducted with twelve teachers and eighteen Grade 7-9 students. The qualitative data were analyzed, in which the attributed causes of classroom misbehavior were categorized into student, family, school and peer factors. Findings showed that both interviewed teachers and students shared similarity in attributing to student factors, such as ‘fun and pleasure seeking’ and ‘attention seeking’ as the leading causes of misbehavior. However, the students accounted to school factors, particularly ‘boring lessons’ as the next attributed causes, while the teachers accounted to family factors, such as ‘lack of parent demandingness’. By delineating the factors at student, family, school, and peer levels, these findings help drawing corresponding implications for preventing and mitigating misbehavior in school.

Keywords: Causal explanation, misbehavior, student, teacher.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5237
89 Sustainable Architecture Analyses of Walls in Miyaneh Village Houses, Iran

Authors: Zohreh Salavatizadeh, Feridoun NahidiAzar, Sara Salavatizadeh, Seyyed Hossein Salehi, Ahadollah Azami

Abstract:

Even though so many efforts have been taken to renovate and renew the architecture of Miyaneh villages in cold and dry regions of Iran-s northwest, these efforts failed due to lack of significant study and ignoring the past and sustainable history of those villages. Considering the overpopulation of Iran-s villages as well as the importance in preventing their immigration to cities, recognizing village architecture and its construction technology is of great significance to attain sustainable residence in villages. As the only vertical surface in the space, wall possesses its unique special characteristics, and it is also a very important architectural element able to provide the immunity and comfort space for the residents. This article analyzes the characteristics of this vertical element, main types of adobe and stone walls, locally constructed technologies, implementation, the elements forming the walls in the frame of village house typology of Miyaneh, which has the most villages in East Azerbaijan, based on sustainable architectural construction materials of walls.

Keywords: Typology, Sustainable Construction, Wall Architecture

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1912
88 A Proposal on the Educational Transactional Analysis as a Dialogical Vision of Culture: Conceptual Signposts and Practical Tools for Educators

Authors: Marina Sartor Hoffer

Abstract:

The multicultural composition of today's societies poses new challenges to educational contexts. Schools are therefore called first to develop dialogic aptitudes and communicative skills adapted to the complex reality of post-modern societies. It is indispensable for educators and for young people to learn theoretical and practical tools during their scholastic path, in order to allow the knowledge of themselves and of the others with the aim of recognizing the value of the others regardless of their culture. Dialogic Skills help to understand and manage individual differences by allowing the solution of problems and preventing conflicts. The Educational Sector of Eric Berne’s Transactional Analysis offers a range of methods and techniques for this purpose. Educational Transactional Analysis is firmly anchored in the Personalist Philosophy and deserves to be promoted as a theoretical frame suitable to face the challenges of contemporary education. The goal of this paper is therefore to outline some conceptual and methodological signposts for the education to dialogue by drawing concepts and methodologies from educational transactional analysis.

Keywords: Dialogic process, education to dialogue, educational transactional analysis, personalism, the good of the relationship.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 861
87 The Appeal of Vocal Islamism in the West: The Case of Hizb ut-Tahrir vis-à-vis Its Competitors

Authors: Elisa Orofino

Abstract:

Islamism is a very debated topic in the West but almost exclusively explored in its violent forms. Nevertheless, a number of “vocal radical Islamist” groups exist in the West and legally operate because of their non-violent nature. Vocal radicals continually inspire individuals and lead them towards specific goals and priorities, sometimes even towards violence. This paper uses the long-living group Hizb ut-Tahrir (HT) to explore the elements that make the organization appealing to segments of Muslim community in the West. This paper uses three agency variables - reflexive monitoring, the rationalization of action and the motivations for actions – to analyze HT’s appeal vis-à-vis two other Islamist groups, Ikhwan al-Muslimun and Jamaat-e-Islami (JeI), having similar goals and the same high international profile. This paper concludes that HT’s uniqueness is given by its method, detailed vision of the caliphate, consistency over time and the emphasis placed on the caliphate as the leading force of HT’s unchanged motivation for action.

Keywords: Agency, Caliphate, Radicalization, Vocal Radicals.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 728
86 High Precision Draw Bending of Asymmetric Channel Section with Restriction Dies and Axial Tension

Authors: Y. Okude, S. Sakaki, S. Yoshihara, B. J. MacDonald

Abstract:

In recent years asymmetric cross section aluminum alloy stock has been finding increasing use in various industrial manufacturing areas such as general structures and automotive components. In these areas, components are generally required to have complex curved configuration and, as such, a bending process is required during manufacture. Undesirable deformation in bending processes such as flattening or wrinkling can easily occur when thin-walled sections are bent. Hence, a thorough understanding of the bending behavior of such sections is needed to prevent these undesirable deformations. In this study, the bending behavior of asymmetric channel section was examined using finite element analysis (FEA). Typical methods of preventing undesirable deformation, such as asymmetric laminated elastic mandrels were included in FEA model of draw bending. Additionally, axial tension was applied to prevent wrinkling. By utilizing the FE simulations effect of restriction dies and axial tension on undesirable deformation during the process was clarified.

Keywords: bending, draw bending, asymmetric channel section, restriction dies, axial tension, FEA

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1666
85 Bone Proteome Study in Ovariectomised Rats Supplemented with Palm Vitamin E

Authors: Patrick Nwabueze Okechukwu, Ima Nirwana Soelaiman, Gabriele Anisah Ruth Froemming, Mohd Yusri Idorus, Norazlina Mohamed

Abstract:

Supplementation of palm vitamin E has been reported to prevent loss of bone density in ovariectomised female rats. The mechanism by which palm vitamin E exerts these effects is still unknown. We hypothesized that palm vitamin E may act by preventing the protein expression changes. Two dimensional poly acyrilamide gel electrophoresis (2-D PAGE) and PD Quest software genomic solutions Investigator (proteomics) was used to analyze the differential protein expression profile in femoral and humeri bones harvested from three groups of rats; sham-operated rats (SO), ovariectomised rats (Ovx) and ovariectomised rats supplemented for 2 months with palm vitamin E. The results showed that there were over 300 valued spot on each of the groups PVE and OVX as compared to about 200 in SO. Comparison between the differential protein expression between OVX and PVE groups showed that ten spots were down –regulated in OVX but up-regulated in PVE. The ten differential spots were separately named P1-P10. The identification and understanding of the pathway of the differential protein expression among the groups is ongoing and may account for the molecular mechanism through which palm vitamin E exert its anti-osteoporotic effect.

Keywords: Palm vitamin E, ovariectomised, osteoporosis protein expression, 2-d-page.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1831
84 Applying the Integrative Design Process in Architectural Firms: An Analytical Study on Egyptian Firms

Authors: Carole A. El Raheb, Hassan K. Abdel-Salam, Ingi Elcherif

Abstract:

An architect carrying the design process alone is the main reason for the deterioration of the quality of the architectural product as the complexity of the projects makes it a multi-disciplinary work; then, the Integrative Design Process (IDP) must be applied in the architectural firm especially from the early design phases to improve the product’s quality and to eliminate the ignorance of the principles of design causing the occurrence of low-grade buildings. The research explores the Integrative Design (ID) principles that fit in the architectural practice. Constraints facing this application are presented with strategies and solutions to overcome them. A survey questionnaire was conducted to collect data from a number of recognized Egyptian Architecture, Engineering and Construction (AEC) firms that explores their opinions on using the IDP. This survey emphasizes the importance of the IDP in firms and presents the reasons preventing the firms from applying the IDP. The aim here is to investigate the potentials of integrating this approach into architectural firms emphasizing the importance of this application which ensures the realization of the project’s goal and eliminates the reduction in the project’s quality.

Keywords: Application, architectural firms, integrative design principles, integrative design process, the project quality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 691
83 Feature Extraction from Aerial Photos

Authors: Mesut Gündüz, Ferruh Yildiz, Ayşe Onat

Abstract:

In Geographic Information System, one of the sources of obtaining needed geographic data is digitizing analog maps and evaluation of aerial and satellite photos. In this study, a method will be discussed which can be used to extract vectorial features and creating vectorized drawing files for aerial photos. At the same time a software developed for these purpose. Converting from raster to vector is also known as vectorization and it is the most important step when creating vectorized drawing files. In the developed algorithm, first of all preprocessing on the aerial photo is done. These are; converting to grayscale if necessary, reducing noise, applying some filters and determining the edge of the objects etc. After these steps, every pixel which constitutes the photo are followed from upper left to right bottom by examining its neighborhood relationship and one pixel wide lines or polylines obtained. The obtained lines have to be erased for preventing confusion while continuing vectorization because if not erased they can be perceived as new line, but if erased it can cause discontinuity in vector drawing so the image converted from 2 bit to 8 bit and the detected pixels are expressed as a different bit. In conclusion, the aerial photo can be converted to vector form which includes lines and polylines and can be opened in any CAD application.

Keywords: Vectorization, Aerial Photos, Vectorized DrawingFile.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570
82 Effectiveness of Infrastructure Flood Control Due to Development Upstream Land Use: Case Study of Ciliwung Watershed

Authors: Siti Murniningsih, Evi Anggraheni

Abstract:

Various infrastructures such as dams, flood control dams and reservoirs have been developed in the 19th century until the 20th century. These infrastructures are very effective in controlling the river flows and in preventing inundation in the urban area prone to flooding. Flooding in the urban area often brings large impact, affecting every aspect of life and also environment. Ciliwung is one of the rivers allegedly contributes to the flooding problems in Jakarta; various engineering work has been done in Ciliwung river to help controlling the flooding. One of the engineering work is to build Ciawi Dam and Sukamahi Dam. In this research, author is doing the flood calculation with Nakayasu Method, while the previous flooding in that case study is computed using Level Pool Routine. The effectiveness of these dams can be identified by using flood simulation of existing condition and compare it to the flood simulation after the dam construction. The final goal of this study is to determine the effectiveness of flood mitigation infrastructure located at upstream area in reducing the volume of flooding in Jakarta.

Keywords: Effectiveness, flood simulation, infrastructure flooding, level pool routine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1185
81 Identification of Binding Proteins That Interact with BVDV E2 Protein in Bovine Trophoblast Cell

Authors: Yan Ren, Fei Guo, Jun Qiao, Shengwei Hu, Hui Zhang, Yuanzhi Wang, Pengyan Wang, Jinliang Sheng, Xinli Gu, Xiaojun Liu, Chuangfu Chen

Abstract:

Bovine viral diarrhea virus (BVDV) can cause lifelong persistent infection. One reason for the phenomena is attributed to BVDV infection to placenta tissue. However the mechanisms that BVDV invades into placenta tissue remain unclear. To clarify the molecular mechanisms, we investigated the possible means that BVDV entered into bovine trophoblast cells (TPC). Yeast two-hybrid system was used to identify proteins extracted from TPC, which interact with BVDV envelope glycoprotein E2. A PGbkt7-E2 yeast expression vector and TPC cDNA library were constructed. Through two rounds of screening, three positive clones were identified. Sequencing analysis indicated that all the three positive clones encoded the same protein clathrin. Physical interaction between clathrin and BVDV E2 protein was further confirmed by coimmunoprecipitation experiments. This result suggested that the clathrin might play a critical role in the process of BVDV entry into placenta tissue and might be a novel antiviral target for preventing BVDV infection.

Keywords: Bovine viral diarrhea virus, clathrin, glycoprotein E2, yeast two-hybrid system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1950
80 A New Strategy for Minimizing Precipitations during ASP Flooding in Carbonate Reservoirs

Authors: Khaled Abdalla Elraies, Shuaib Ahmed

Abstract:

A large quantity of world-s oil reserves exists in carbonate reservoirs. Carbonate reservoirs are very sensitive to chemical enhanced oil recovery process because of containing large amount of calcite, dolomite and calcium sulfate minerals. These minerals cause major obstacles during alkali-surfactant-polymer (ASP) flooding. Alkali reacts with these minerals and form undesired precipitations which plug effective porous openings, reduce permeability and cause scale occurrence at the wellbore. In this paper, a new chemical combination consists of acrylic acid and alkali was used to minimize precipitation problem during ASP flooding. A series of fluid-fluid compatibility tests were performed using acrylic acid and different concentrations of alkaline. Two types of alkalis namely; sodium carbonate and sodium metaborate were screened. As a result, the combination of acrylic acid and sodium carbonate was not effective in preventing calcium and magnesium precipitations. However, acrylic acid and sodium metaborate showed promising results for keeping all solutions without any precipitations. The ratio of acrylic acid to sodium metaborate of 0.7:1.0 was found to be optimum for achieving a compatible solution for 30 days at 80oC.

Keywords: Fluid-fluid compatibility test, Carbonate reservoirs, Precipitations and ASP flooding.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2691
79 The Impact of E-Learning on Medication Administration of Nursing Students: What Recent Studies Say?

Authors: Z. Karakus, Z. Ozer

Abstract:

Nurses are responsible for the care and treatment of individuals, as well as health maintenance and education. Medication administration is an important part of health promotion. The administration of a medicine is a common but important clinical procedure for nurses because of its complex structure. Therefore, medication errors are inevitable for nurses or nursing students. Medication errors can cause ineffective treatment, patient’s prolonged hospital stay, disablement or death. Additionally, medication errors affect the global economy adversely by increasing health costs. Hence, preventing or decreasing of medication errors is a critical and essential issue in nursing. Nurse educators are in pursuit of new teaching methods to teach students significance of medication application. In the light of technological developments of this age, e-learning has started to be accepted as an important teaching method. E-learning is the use of electronic media and information and communication technologies in education. It has advantages such as flexibility of time and place, lower costs, faster delivery and lower environmental impact. Students can make their own schedule and decide the learning method. This study is conducted to determine the impact of e-learning on medication administration of nursing students.

Keywords: E-Learning, Medication Administration, Nursing, Nursing Students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2688
78 Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Alshamrani, Maha Aljohni, Eman Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: Internet of Thing, Spoofing, IoT, Access control, Blockchain, Raspberry pi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29
77 Tracing Quality Cost in a Luggage Manufacturing Industry

Authors: S. B. Jaju, R. R. Lakhe

Abstract:

Quality costs are the costs associated with preventing, finding, and correcting defective work. Since the main language of corporate management is money, quality-related costs act as means of communication between the staff of quality engineering departments and the company managers. The objective of quality engineering is to minimize the total quality cost across the life of product. Quality costs provide a benchmark against which improvement can be measured over time. It provides a rupee-based report on quality improvement efforts. It is an effective tool to identify, prioritize and select quality improvement projects. After reviewing through the literature it was noticed that a simplified methodology for data collection of quality cost in a manufacturing industry was required. The quantified standard methodology is proposed for collecting data of various elements of quality cost categories for manufacturing industry. Also in the light of research carried out so far, it is felt necessary to standardise cost elements in each of the prevention, appraisal, internal failure and external failure costs. . Here an attempt is made to standardise the various cost elements applicable to manufacturing industry and data is collected by using the proposed quantified methodology. This paper discusses the case study carried in luggage manufacturing industry.

Keywords: Quality Costs, PAF model, quantified methodology, Case study.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2201
76 Protocol and Method for Preventing Attacks from the Web

Authors: Ryuya Uda

Abstract:

Nowadays, computer worms, viruses and Trojan horse become popular, and they are collectively called malware. Those malware just spoiled computers by deleting or rewriting important files a decade ago. However, recent malware seems to be born to earn money. Some of malware work for collecting personal information so that malicious people can find secret information such as password for online banking, evidence for a scandal or contact address which relates with the target. Moreover, relation between money and malware becomes more complex. Many kinds of malware bear bots to get springboards. Meanwhile, for ordinary internet users, countermeasures against malware come up against a blank wall. Pattern matching becomes too much waste of computer resources, since matching tools have to deal with a lot of patterns derived from subspecies. Virus making tools can automatically bear subspecies of malware. Moreover, metamorphic and polymorphic malware are no longer special. Recently there appears malware checking sites that check contents in place of users' PC. However, there appears a new type of malicious sites that avoids check by malware checking sites. In this paper, existing protocols and methods related with the web are reconsidered in terms of protection from current attacks, and new protocol and method are indicated for the purpose of security of the web.

Keywords: Information Security, Malware, Network Security, World Wide Web

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2053
75 Near Shore Wave Manipulation for Electricity Generation

Authors: K. D. R. Jagath-Kumara, D. D. Dias

Abstract:

The sea waves carry thousands of GWs of power globally. Although there are a number of different approaches to harness offshore energy, they are likely to be expensive, practically challenging, and vulnerable to storms. Therefore, this paper considers using the near shore waves for generating mechanical and electrical power. It introduces two new approaches, the wave manipulation and using a variable duct turbine, for intercepting very wide wave fronts and coping with the fluctuations of the wave height and the sea level, respectively. The first approach effectively allows capturing much more energy yet with a much narrower turbine rotor. The second approach allows using a rotor with a smaller radius but captures energy of higher wave fronts at higher sea levels yet preventing it from totally submerging. To illustrate the effectiveness of the first approach, the paper contains a description and the simulation results of a scale model of a wave manipulator. Then, it includes the results of testing a physical model of the manipulator and a single duct, axial flow turbine in a wave flume in the laboratory. The paper also includes comparisons of theoretical predictions, simulation results, and wave flume tests with respect to the incident energy, loss in wave manipulation, minimal loss, brake torque, and the angular velocity.

Keywords: Near-shore sea waves, Renewable energy, Wave energy conversion, Wave manipulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1934
74 Towards the Use of Renewable Energy Sources in the Home

Authors: Adriana Alexandru, Elena Jitaru, Rayner Mayer

Abstract:

The paper presents the results of the European EIE project “Realising the potential for small scale renewable energy sources in the home – Kyotointhehome". The project's global aim is to inform and educate teachers, students and their families so that they can realise the need and can assess the potential for energy efficiency (EE) measures and renewable energy sources (RES) in their homes. The project resources were translated and trialled by 16 partners in 10 European countries. A web-based methodology which will enable families to assess how RES can be incorporated into energy efficient homes was accomplished. The web application “KYOTOINHOME" will help the citizens to identify what they can do to help their community meet the Kyoto target for greenhouse gas reductions and prevent global warming. This application provides useful information on how the citizens can use renewable energy sources in their home to provide space heating and cooling, hot water and electricity. A methodology for assessing heat loss in a dwelling and application of heat pump system was elaborated and will be implemented this year. For schools, we developed a set of practical activities concerned with preventing climate change through using renewable energy sources. Complementary resources will also developed in the Romanian research project “Romania Contribution to the European Targets Regarding the Development of Renewable Energy Sources" - PROMES.

Keywords: Education, energy policy, Internet, renewable energy sources.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1657
73 Characterization of the Microbial Induced Carbonate Precipitation Technique as a Biological Cementing Agent for Sand Deposits

Authors: Sameh Abu El-Soud, Zahra Zayed, Safwan Khedr, Adel M. Belal

Abstract:

The population increase in Egypt is urging for horizontal land development which became a demand to allow the benefit of different natural resources and expand from the narrow Nile valley. However, this development is facing challenges preventing land development and agriculture development. Desertification and moving sand dunes in the west sector of Egypt are considered the major obstacle that is blocking the ideal land use and development. In the proposed research, the sandy soil is treated biologically using Bacillus pasteurii bacteria as these bacteria have the ability to bond the sand partials to change its state of loose sand to cemented sand, which reduces the moving ability of the sand dunes. The procedure of implementing the Microbial Induced Carbonate Precipitation Technique (MICP) technique is examined, and the different factors affecting on this process such as the medium of bacteria sample preparation, the optical density (OD600), the reactant concentration, injection rates and intervals are highlighted. Based on the findings of the MICP treatment for sandy soil, conclusions and future recommendations are reached.

Keywords: Soil stabilization, biological treatment, MICP, sand cementation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 987
72 Gender Mainstreaming in Public Universities in Mexico

Authors: Carlos David Carrillo Trujillo, Rebelín Echeverría Echeverría, Nancy Evia Alamilla, Rocío Quintal López

Abstract:

Gender as a social construct is a term now widely studied. Within the social sciences it has become very important. In this sense, psychology tries to make some contributions from your area. The intention is to promote equal opportunities for men and women. Social, employment and educational inequities perpetuate sexism, violence and other important social problems in Mexico. The gender perspective is conceptualized as a tool to promote laws, policies, plans, programs and procedures where women are made ​​visible and empowered. The aim of this is the pursuit of equality. Thus, gender mainstreaming is one of the main challenges of education in Mexico. Only a few universities have programs, research or subjects related to the topic. Human resources, and time allocated to teachers are identified as obstacles to the institutionalization of gender. The objective was to make a diagnosis on course offerings and policies on gender. A documentary study and interviews with managers of at least 20 higher education institutions (IES's) were performed. The results indicate the need for greater gender courses, research projects and intervention. The need to promote policies that seek equal opportunities between men and women is also noted.

Keywords: Gender mainstreaming, institutionalization, universities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1083
71 Identifying Karst Pattern to Prevent Bell Spring from Being Submerged in Daryan Dam Reservoir

Authors: H. Shafaattalab Dehghani, H. R. Zarei

Abstract:

The large karstic Bell spring with a discharge ranging between 250 and 5300 lit/ sec is one of the most important springs of Kermanshah Province. This spring supplies drinking water of Nodsheh City and its surrounding villages. The spring is located in the reservoir of Daryan Dam and its mouth would be submerged after impounding under a water column of about 110 m height. This paper has aimed to render an account of the karstification pattern around the spring under consideration with the intention of preventing Bell Spring from being submerged in Daryan Dam Reservoir. The studies comprise engineering geology and hydrogeology investigations. Some geotechnical activities included in these studies include geophysical studies, drilling, excavation of exploratory gallery and shaft and diving. The results depict that Bell is a single-conduit siphon spring with 4 m diameter and 85 m height that 32 m of the conduit is located below the spring outlet. To survive the spring, it was decided to plug the outlet and convey the water to upper elevations under the natural pressure of the aquifer. After plugging, water was successfully conveyed to elevation 837 meter above sea level (about 120 m from the outlet) under the natural pressure of the aquifer. This signifies the accuracy of the studies done and proper recognition of the karstification pattern of Bell Spring. This is a unique experience in karst problems in Iran.

Keywords: Bell spring, karst, Daryan Dam, submerged.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1164
70 An Image Processing Based Approach for Assessing Wheelchair Cushions

Authors: B. Farahani, R. Fadil, A. Aboonabi, B. Hoffmann, J. Loscheider, K. Tavakolian, S. Arzanpour

Abstract:

Wheelchair users spend long hours in a sitting position, and selecting the right cushion is highly critical in preventing pressure ulcers in that demographic. Pressure Mapping Systems (PMS) are typically used in clinical settings by therapists to identify the sitting profile and pressure points in the sitting area to select the cushion that fits the best for the users. A PMS is a flexible mat composed of arrays of distributed networks of pressure sensors. The output of the PMS systems is a color-coded image that shows the intensity of the pressure concentration. Therapists use the PMS images to compare different cushions fit for each user. This process is highly subjective and requires good visual memory for the best outcome. This paper aims to develop an image processing technique to analyze the images of PMS and provide an objective measure to assess the cushions based on their pressure distribution mappings. In this paper, we first reviewed the skeletal anatomy of the human sitting area and its relation to the PMS image. This knowledge is then used to identify the important features that must be considered in image processing. We then developed an algorithm based on those features to analyze the images and rank them according to their fit to the user's needs. 

Keywords: cushion, image processing, pressure mapping system, wheelchair

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 615
69 Cyber Bullying Victimization of Elementary School Students and their Reflections on the Victimization

Authors: Merve Sezer, Ismail Sahin, Ahmet Oguz Akturk

Abstract:

With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the Internet. In addition to the advantages provided by the Internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber bullying is the common name of the intensities which students are exposed on the Internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.

Keywords: Bullying, cyber-bullying, elementary, peer-relationship, virtual victimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1521
68 Evaluation of Attribute II Bt Sweet Corn Resistance and Reduced-Risk Insecticide Applications for Control of Corn Earworm

Authors: R. Weinzierl, R. Estes, N. Tinsley, M. Keshlaf

Abstract:

The corn earworm, Helicoverpa zea Boddie, is a serious pest of corn. Larval feeding in ear tips destroys kernels and allows growth of fungi and production of mycotoxins. Infested sweet corn is not marketable. Development of improved transgenic hybrids expressing insecticidal toxins from Bacillus thuringiensis (Bt) may limit or prevent crop losses. The effectiveness of Attribute® II Bt resistance and applications of Voliam Xpress insecticide were evaluated for effectiveness in controlling corn earworm in plots near Urbana, IL, USA, in 2013. Where no insecticides were applied, ear infestations and kernel damage in Attribute® II ‘Protector’ plots were consistently lower (near zero) than in plots of the non-Bt isoline ‘Garrison.’ Multiple applications of Voliam Xpress significantly reduced the number of corn earworm larvae and kernel damage in the Garrison plots, but infestations and damage in these plots were greater than in Protectorplots that did not receive insecticide applications. Our results indicate that Attribute® II Bt resistance is more effective than multiple applications of an insecticide for preventing losses caused by corn earworm in sweet corn.

Keywords: Bacillus thuringiensis, Helicoverpa zea, insect pest management, transgenic sweet corn.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2173
67 An Anomaly Detection Approach to Detect Unexpected Faults in Recordings from Test Drives

Authors: Andreas Theissler, Ian Dear

Abstract:

In the automotive industry test drives are being conducted during the development of new vehicle models or as a part of quality assurance of series-production vehicles. The communication on the in-vehicle network, data from external sensors, or internal data from the electronic control units is recorded by automotive data loggers during the test drives. The recordings are used for fault analysis. Since the resulting data volume is tremendous, manually analysing each recording in great detail is not feasible. This paper proposes to use machine learning to support domainexperts by preventing them from contemplating irrelevant data and rather pointing them to the relevant parts in the recordings. The underlying idea is to learn the normal behaviour from available recordings, i.e. a training set, and then to autonomously detect unexpected deviations and report them as anomalies. The one-class support vector machine “support vector data description” is utilised to calculate distances of feature vectors. SVDDSUBSEQ is proposed as a novel approach, allowing to classify subsequences in multivariate time series data. The approach allows to detect unexpected faults without modelling effort as is shown with experimental results on recordings from test drives.

Keywords: Anomaly detection, fault detection, test drive analysis, machine learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2433
66 Participatory Democracy to the Contemporary Problems of Polish Social Policy

Authors: Agnieszka Szczudlińska-Kanoś

Abstract:

Socio-economic development, which is seen around the world today, has contributed to the emergence of new problems of a social nature. Different political, historical, geographical or economic conditions cause that, in addition to global issues of social policy such as an aging population, unemployment, migration, countries, regions, there are also specific new problems that require diagnosis, individualized approach and efficient, planned solutions. These should include, among others, digital addiction, peer violence, obesity among children, the problem of ‘legal highs’, stress, depression, diseases associated with environmental pollution etc. The central authorities, selected most often with the tools specific to representative democracy, that is, the general election, for many reasons, inter alia, organizational, communication, are not able to effectively diagnose their intensity, territorial distribution, and thus to effectively fight them. This article aims to show how in Poland, citizens influence solving problems related to the broader social policy implemented at the local government level and indicates the possibilities of improving those solutions. The conclusions of theoretical analysis have been supported by empirical studies, which tested the use of instruments of participatory democracy in the planning and creation of communal strategies for solving social problems in one of the Polish voivodeships.

Keywords: Commune, democracy, participation, social policy, social problems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2513