Arguing that psychology and business ethics are best brought together through a multi-level, broad-based agenda, this essay articulates a vision of psychology and business ethics to frame a future research agenda. The essay draws upon work published in JBE, but also identifies gaps where published research is needed, to build upon psychological conceptions of business ethics. Psychological concepts, notably, are not restricted to phenomena “in the head”, but are discussed at the intra-psychic, relational, and contextual levels of analysis. On the (...) basis of this presentation, I discuss future directions for development in psychology and business ethics, including but not limited to studies of personality, emotion, decision making, motivation, and the biological bases of psychology and business ethics. An inclusive approach to these and related areas, it is argued, will both bring about depth of understanding on the psychological bases of business ethics, and allow dialogue across disciplinary areas within JBE. (shrink)
In this study, we examine investor and firm response to the California Transparency in Supply Chains Act of 2010. The CTSCA requires large retail and manufacturing firms to disclose efforts to eradicate slavery and human trafficking from their supply chains and is a rare example of mandated corporate social responsibility disclosure. Based on a sample of 105 retail companies subject to the CTSCA, we find a significant negative market reaction to the passing of the CTSCA. Furthermore, we find that the (...) reaction is significantly more negative for larger firms and companies facing greater supply chain risks, suggesting that investors place a negative value on exposure to legitimacy threats in the social domain. With respect to company disclosure response, we document relatively high compliance with the legislation, although we also find that the disclosure response appeared to be more symbolic than substantive in nature. Finally, our analysis indicates that both disclosure choice and disclosure extensiveness were significantly higher for the high-supply chain risk companies, suggesting that the response was influenced by concerns with strategic legitimation. Overall, the limited quality of disclosure suggests that, without additional rules and guidance, mandates alone may not lead to meaningful social disclosure. (shrink)
This paper demonstrates the political perspective of corporate social responsibility disclosures and, drawing on Weber’s notion of traditionalism, seeks to explain what motivates companies to make such disclosures in a traditional setting. Annual reports of 23 banking companies in Bangladesh are analysed over the period 2009–2012. This is supplemented by a review of documentary evidence on the political and social activities of corporations and reports published in national and international newspapers. We found that, in the banking companies over the period (...) of study, apparently neutral, corporate, philanthropic activities disclosed and promoted in CSR reports are inextricably linked to powerful leaders’ personal projects and the ruling party’s agendas. We have demonstrated elements of traditional societies, including personal loyalty and the public display of loyalty, the master–servant relationship, and obedience to personal rather than formal authority, provide an understanding of why banks have employed politically charged CSR disclosure strategies. The paper contributes to disclosure studies where political motivations of corporate disclosure rarely discussed. The paper extends the debate on political CSR by demonstrating that the role of family and familial values at the organisational and national levels may be much more important when it comes to CSR disclosure and activities. (shrink)
We provide two programmatic frameworks for integrating philosophical research on understanding with complementary work in computer science, psychology, and neuroscience. First, philosophical theories of understanding have consequences about how agents should reason if they are to understand that can then be evaluated empirically by their concordance with findings in scientific studies of reasoning. Second, these studies use a multitude of explanations, and a philosophical theory of understanding is well suited to integrating these explanations in illuminating ways.
This article examines the ethical framing of employment in contemporary human resource management (HRM). Using Axel Honneth's theory of recognition and classical critical notions of reification, I contrast recognition and reifying stances on labor. The recognition approach embeds work in its emotive and social particularity, positively affirming the basic dignity of social actors. Reifying views, by contrast, exhibit a forgetfulness of recognition, removing action from its existential and social moorings, and imagining workers as bundles of discrete resources or capacities. After (...) discussing why reification is a problem, I stress that recognition and reification embody different ethical standpoints with regards to organizational practices. Thus, I argue paradoxically that many current HRM best practices can be maintained while cultivating an attitude of recognition. If reification is a type of forgetting, cultivating a recognition attitude involves processes of "remembering" to foster work relations that reinforce employee dignity. (shrink)
The purpose of this paper is to investigate the nature of rhetoric and rhetorical strategies that are implicit in the standalone sustainability reporting of the top 24 companies of the Fortune 500 Global. We adopt Bormann’s :396–407, 1972) SCT framework to study the rhetorical situation and how corporate sustainability reporting messages can be communicated to the audience. The SCT concepts in the sustainability reporting’s communication are subject to different types of legitimacy strategies that are used by corporations as a validity (...) and legitimacy claim in the reports. A content analysis has been conducted and structural coding schemes have been developed based on the literature. The schemes are applied to the SCT model which recognizes the symbolic convergent processes of fantasy among communicators in a Society. The study reveals that most of the sample companies communicate fantasy type and rhetorical vision in their corporate sustainability reporting. However, the disclosure or messages are different across locations and other taxonomies of the SCT framework. This study contributes to the current CSR literature about how symbolic or fantasy understandings can be interpreted by the users. It also discusses the persuasion styles that are adopted by the companies for communication purposes. This study is the theoretical extension of the SCT. Researchers may be interested in further investigating other online communication paths, such as human rights reports and director’s reports. (shrink)
Social practices of quantification, or the production and communication of numbers, have been recognized as important foundations of organizational knowledge, as well as sources of power. With the advent of increasingly sophisticated digital tools to capture and extract numerical data from social life, however, there is a pressing need to understand the ethical stakes of quantification. The current study examines quantification from an ethical lens, to frame and promote a research agenda around the ethics of quantification. After a brief overview (...) of quantification research and its uses in state and market organization, I discuss quantification in terms of three core subprocesses—capture, specification, and appropriation, illustrating and identifying ethical concerns around each process. Linking these processes to the performative effects of measures, I present a working model of quantification from which the discussion builds ideas for developing a research agenda around quantification. (shrink)
This paper revisits a study by Machery et al., suggesting that, in experimental versions of Kripke’s fictional cases on the use of proper names, Westerners are more likely than East Asian participants to show intuitions compatible with Kripke’s causal-historical theory of reference. We conducted two experiments, recruting participants from Norway and Bangladesh, either in English or in the participants’ native languages, using modified cases and a new approach to data analysis. We replicated the results of Machery et al., but we (...) show that the residual finding—i.e., that participants who are not aligned with CH produce responses consistent with a definite descriptions theory of reference—does not hold. Most participants in our experiments, and nearly all those who do not provide CH answers, respond as predicted by a theory that accommodates speaker’s reference in reasoning about uses of proper names, not according to DD. We suggest that cross-cultural variation in this task is real. However, explanations of variation within or across cultures need not invoke competing theories of reference, and can be unified within a single, broadly Kripkean analysis that honors the basic distinction between semantic reference and speaker’s reference. (shrink)
SummaryThe aim of this study was to assess whether women’s empowerment ensures reduced intimate partner violence. The differential relationship between women’s empowerment and IPV among married women in Bangladesh was investigated using 2007 Demographic and Health Survey data. Logistic regression models were used to assess whether women’s empowerment had any influence on their likelihood of experiencing IPV while controlling for other covariates. The analyses revealed that older cohorts of women, who were more empowered, were more vulnerable to physical violence than (...) less-empowered, younger women. The likelihood of being affected by physical violence among less-empowered, childless women was greater than that of more-empowered women with only male children. Less-empowered, uneducated women were more likely to experience physical violence than more-empowered, primary-educated women. Less-empowered women who had been married for less than 5 years were more likely to suffer from physical violence than more-empowered women who had been married for more than 19 years. The likelihood of experiencing sexual violence was not found to have any significant association with women’s empowerment. The findings suggest that although women’s empowerment in Bangladesh is gradually improving, some sub-groups of empowered women are still susceptible to IPV. (shrink)
The purpose of this article is to problematise a particular social transparency and disclosure regulation in the UK, that transcend national boundaries in order to control slavery in supply chains operating in the developing world. Drawing on notions from the regulatory and sociology literature, i.e. transparency and normativity, and by interviewing anti-slavery activists and experts, this study explores the limitations of the disclosure and transparency requirements of the UK Modern Slavery Act and, more specifically, how anti-slavery activists experience and interpret (...) the new regulations and the regulators’ implementation of the regulation. This research found limited confidence among anti-slavery activists regarding the Act’s call for transparency in relation to the elimination of slavery from global supply chains. The research also found that the limits of the transparency provisions within the Act appear to hinder the attainment of normativity. This study provides new and unique insights into the critical role that social activists play in exposing the lack of corporate transparency and failures of responsibility to protect workers within global supply chains. (shrink)
This study explores the direct and interactive effects of individual differences in interpersonal trust and negotiation style on ethical decision-making processes across commonly faced negotiation situations. Individual differences influence basic ideas about legitimate negotiating behaviors, affect behavioral intentions directly, and interact with the favorability of negotiating situations, resulting in direct, indirect, and interactive effects on ethical decision-making processes. Using a sample of 298 participants in executive education workshops, the study analyzes the relationship between interpersonal trust, competitiveness, moral judgment, and behavioral (...) intentions in different negotiating conditions through a series of structural equation models and regression analyses. Our results suggest that individual difference variables exert a significant influence not only on how managers assess the morality of ethically ambiguous negotiation practices but also directly on their behavioral intentions, and that this effect changed across specific negotiation situations. We discuss these results in terms of their usefulness in explaining ethical decision-making processes in negotiations. (shrink)
Here, in this research article, we have investigated an incompressible viscoelastic fluid flow over a uniform stretching surface sheet along with slip boundary conditions in the presence of porous media. The partial differential equations which govern the fluid flow are changed into ordinary differential equations through suitable similarity transformation variables. Finally, the transformed ordinary differential equations are solved with the help of a seminumerical technique known as the homotopy analysis method. The uniqueness of our study is not only to analyze (...) and carry out the effect of the elastic parameter but also to account for viscous dissipation which is important in the case of optically transparent flow. The novel effects for the parameters which affect the flow and heat transfer, such as the Eckert number, porous medium parameter, and the velocity slip parameter, are studied through graphs. Also, the convergence analysis for the proposed method is addressed. Additionally, for the sake of validation, the present work is also compared with the already published work and an outstanding agreement is found. (shrink)
Reflection seismic data from block F3 in the Dutch North Sea exhibit many large-amplitude reflections at shallow horizons typically categorized as bright spots. In most cases, these bright reflections show a significant “flatness” that contrasts with local structural trends. Although flat spots in thick reservoirs are often easily identified, others within thin beds or near reservoir edges can be difficult to identify and are poorly understood. Many of the shallow large-amplitude reflections in this block are dominated by flat spots. We (...) investigated the tuning effects that such flat spots cause as they interacted with reflections from the top of the reservoir. We first studied the zero-offset “wedge-model” tuning effects of the flat spot with overlying bright spots, dim spots, or polarity reversals. We then expanded that model to examine prestack tuning effects, as well as the results from inclusion of postcritical flat spot reflections in the final stack. We observed that under certain conditions, the reflections could appear to be somewhat flattened bright spots; those conditions might be met frequently in practice, and they should be considered in routine interpretation. In the North Sea case, we concluded that this tuning effect was the primary cause of the brightness and flatness of these reflections. (shrink)
Decision-makers in governments, enterprises, businesses and agencies or individuals, typically, make decisions according to various regulations, guidelines and policies based on existing records stored in various databases, in particular, relational databases. To assist decision-makers, an expert system, encompasses interactive computer-based systems or subsystems to support the decision-making process. Typically, most expert systems are built on top of transaction systems, databases, and data models and restricted in decision-making to the analysis, processing and presenting data and information, and they do not provide (...) support for the normative layer. This paper will provide a solution to one specific problem that arises from this situation, namely the lack of tool/mechanism to demonstrate how an expert system is well-suited for supporting decision-making activities drawn from existing records and relevant legal requirements aligned existing records stored in various databases.We present a Rule-based reporting systems architecture, which is intended to integrate databases, in particular, relational databases, with a logic-based reasoner and rule engine to assist in decision-making or create reports according to legal norms. We argue that the resulting RuleRS provides an efficient and flexible solution to the problem at hand using defeasible inference. To this end, we have also conducted empirical evaluations of RuleRS performance. (shrink)
The increasing global demand for energy necessitates devoted attention to the formulation and exploration of mechanisms of thermal heat exchangers to explore and save heat energy. Thus, innovative thermal transport fluids require to boost thermal conductivity and heat flow features to upsurge convection heat rate, and nanofluids have been effectively employed as standard heat transfer fluids. With such intention, herein, we formulated and developed the constitutive flow laws by utilizing the Rossland diffusion approximation and Stephen’s law along with the MHD (...) effect. The mathematical formulation is based on boundary layer theory pioneered by Prandtl. Governing nonlinear partial differential flow equations are changed to ODEs via the implementation of the similarity variables. A well-known computational algorithm BVPh2 has been utilized for the solution of the nonlinear system of ODEs. The consequence of innumerable physical parameters on flow field, thermal distribution, and solutal field, such as magnetic field, Lewis number, velocity parameter, Prandtl number, drag force, Nusselt number, and Sherwood number, is plotted via graphs. Finally, numerical consequences are compared with the homotopic solution as a limiting case, and an exceptional agreement is found. (shrink)
SummaryThe nutritional status of under-five children is a sensitive sign of a country's health status as well as economic condition. This study investigated the differential impact of some demographic, socioeconomic, environmental and health-related factors on the nutritional status among under-five children in Bangladesh using Bangladesh Demographic and Health Survey 2007 data. Two-level random intercept binary logistic regression models were used to identify the determinants of under-five malnutrition. The analyses revealed that 16% of the children were severely stunted and 25% were (...) moderately stunted. Among the children under five years of age 3% were severely wasted and 14% were moderately wasted. Furthermore, 11% of the children were severely underweight and 28% were moderately underweight. The main contributing factors for under-five malnutrition were found to be child's age, mother's education, father's education, father's occupation, family wealth index, currently breast-feeding, place of delivery and division. Significant community-level variations were found in the analyses. (shrink)
China is moving from a centralized to a market economy to bring about efficiency in its economy and to form a business partnership with the West. With its reform adopting an open-door policy, there may be a need to assure its partners in the western world that appropriate steps would be taken to develop and foster a business culture with which the western countries and the Chinese businesses can work. The present study attempted to find whether there has been a (...) change in business ethical culture, accounting system and practice in the Chinese business between 1978 and the present, and the degree of similarity in the Chinese ethics and guidelines compared to Western ethics and guidelines. The result of the study has been analyzed from an institutional perspective to explore institutional change. The result showed that there is general growing support of Chinese management toward change in business ethical culture and practice. It was observed that there was not much similarity in the documents used for ethical guidance and control with those of the West. The findings of the paper are expected to be relevant to international investors and executives interested in investing or working in China. (shrink)
SummaryThis study aimed to investigate the regional variations in the prevalence of child marriage in Bangladesh with a view to providing recommendations for division-specific policy interventions. Data from the 2011 Bangladesh Demographic and Health Survey were analysed using multivariate logistic regression. Substantial regional variations in child marriage were found in Bangladesh. Rangpur and Khulna had more than four times higher odds of child marriage than Sylhet. Barisal and Rajshahi had more than three times higher odds of child marriage than Sylhet. (...) Chittagong and Dhaka had about two times odds of child marriage than Sylhet, even after controlling for selected socio-demographic, economic and cultural characteristics. Respondent’s education, employment status, husband’s education and wealth index were inversely associated with the prevalence of child marriage. The policy implications of these findings are discussed in the context of Bangladesh. (shrink)
Animals have encountered cruelty and suffering throughout the ages. It is something perpetrated up till this day, particularly, in factory farms, animal laboratories, and even in the name of sports or amusement. However, since the second half of the twentieth century, there has been growing concerns for animal welfare and the protection of animal rights within the discourse of environmentalism, developed mainly in the West. Nevertheless, a recently developed Islamic Ecological Paradigm rooted in the classical Islamic traditions contests the ‘Western’ (...) monopoly of modern environmentalism, suggesting that there is much in Islamic traditions dealing with environmental issues including non-human animal species. IEP asserts that several centuries ago Islamic traditions significantly focused on and strongly advocated for animal welfare and animal rights. This paper explores and examines animal rights within the broader spectrum of Islamic environmentalism or Islamic eco-ethic. While the philosophical roots of IEP concerning animal rights date far back in seventh century, it can potentially make both ethical and educational contributions to the twenty-first century environmentalism and animal rights movements. (shrink)
Purpose Along with the various beneficial uses of artificial intelligence, there are various unsavory concomitants including the inscrutability of AI tools, the fragility of AI models under adversarial settings, the vulnerability of AI models to bias throughout their pipeline, the high planetary cost of running large AI models and the emergence of exploitative surveillance capitalism-based economic logic built on AI technology. This study aims to document these harms of AI technology and study how these technologies and their developers and users (...) can be made more accountable. Design/methodology/approach Due to the nature of the problem, a holistic, multi-pronged approach is required to understand and counter these potential harms. This paper identifies the rationale for urgently focusing on human-centered AI and provide an outlook of promising directions including technical proposals. Findings AI has the potential to benefit the entire society, but there remains an increased risk for vulnerable segments of society. This paper provides a general survey of the various approaches proposed in the literature to make AI technology more accountable. This paper reports that the development of ethical accountable AI design requires the confluence and collaboration of many fields and that lack of diversity is a problem plaguing the state of the art in AI. Originality/value This paper provides a timely synthesis of the various technosocial proposals in the literature spanning technical areas such as interpretable and explainable AI; algorithmic auditability; as well as policy-making challenges and efforts that can operationalize ethical AI and help in making AI accountable. This paper also identifies and shares promising future directions of research. (shrink)
Metrics shape our social worlds in many and more ways. Everyday quantifications of our preferences, our behaviors and our relationships, alter us and the institutions that we constitute. This essay takes a brief look at the metrics of business ethics through two analytic devices. Representation explains the notion that metrics can capture or demonstrate ethics and performativity explains the notion that metrics can shape or constitute ethics. The analytic distinction between representation and performativity is obscured in practice when metrics become (...) targets, indeed much of the social power of metrics comes from their use as targets. Hence, we should pay attention to the world of practice in which measuring and doing are entangled. However, we should not lose sight of the limitations of measurement and the possibility that there are areas of ethical life best left unmeasured. (shrink)
We have reexamined the poststack seismic legacy and time-lapse data sets from the Teal South field in the Gulf of Mexico for insight into regional pressure changes from production at one reservoir and its effects on neighboring unproduced reservoirs. We support previous predictions of oil and gas leakage from neighboring reservoirs by providing direct evidence for leakage through 3D mapping of the hydrocarbons themselves. The use of the squared instantaneous amplitude as an attribute allowed visualization of the large amplitude changes (...) while minimizing the appearance of noise. The use of translucency in the 3D time-lapse difference volumes assisted in identifying features of interest that had been unrecognized in earlier studies. For example, this investigation found that hydrocarbons appeared to have escaped from one small reservoir through its spill point, only to be trapped in a nearby structure, from which it ultimately escaped through that trap’s spill point. Such fluid migration can occur in a period of a few years due to production, not geologic time. Time-lapse studies such as the one presented here can be very helpful in identifying such fluid movement, particularly in highly porous and unconsolidated reservoirs that are highly sensitive to pore-fluid type and stress changes. (shrink)
ICT for development projects often focus on integrating social factors in information systems design. A well-designed ICT4D solution must be tailored to the needs of the people who will use them and subsequently, requires an extensive understanding of the context and constraints in people’s lives. With an objective to explore how context-specific issues influence the conveyance of appropriate agricultural information to women, this paper uses PROTIC, a 5-year collaborative project between Monash University and Oxfam, as a case. PROTIC was implemented (...) in three climate vulnerable ecological zones of Bangladesh with an aim to overcome the agricultural information gap for rural women. Based on a study in mixed research method and triangulation, this paper brings evidence on the significance of considering context-specific attributes in designing effective and sustainable information services for marginalized women farmers in developing countries. The paper upfolds some significant recommendations which is expected to contribute to the domain of context-specific information system design in resolving socio-economic problems to pave the way of sustainable development. (shrink)
Against the backdrop of a global pandemic, this study investigates how U.S. higher education leaders have centered their crisis management on values and guiding ethical principles. We conducted 55 in-depth interviews with leaders from 30 U.S. higher education institutions, with most leaders participating in two interviews. We found that crisis plans created prior to the COVID-19 pandemic were inadequate due to the long duration and highly uncertain nature of the crisis. Instead, higher education leaders applied guiding principles on the fly (...) to support their decision-making. If colleges and universities infuse shared values into their future crisis plans, they will not have to develop a moral compass on the fly for the next pandemic. This paper suggests the following somewhat universal shared values: engage in accuracy, transparency, and accountability; foster deliberative dialog; prioritize safety; support justice, fairness, and equity; and engage in an ethic of care. To navigate ethics tensions, leaders need to possess crisis-relevant expertise or ensure that such expertise is present among crisis management team members. Standing up formal ethics committees composed of diverse stakeholders also is instrumental in navigating tensions inherent in crises. The next pandemic is already on the horizon according to experts. Through infusing values into future crisis plans, higher education leaders can be confident that their responses will be grounded in their communities’ shared values. (shrink)
This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...) to the context of SNS, which does not only build a decision tree but rather a forest allowing the exploration of more logic rules from a dataset. One logic rule that SysFor built in this study, for example, revealed that anyone having a profile picture showing just the face or a picture showing a family is less likely to be lonely. Another contribution of this article is the discussion of the implications of the data mining problem for governments, businesses, developers and the SNS users themselves. (shrink)
Nowadays, mobile telephony interruptions in our daily life activities are common because of the inappropriate ringing notifications of incoming phone calls in different contexts. Such interruptions may impact on the work attention not only for the mobile phone owners, but also for the surrounding people. Decision tree is the most popular machine-learning classification technique that is used in existing context-aware mobile intelligent interruption management model to overcome such issues. However, a single-decision tree-based context-aware model may cause over-fitting problem and thus (...) decrease the prediction accuracy of the inferred model. Therefore, in this paper, we propose an ensemble machine-learning-based context-aware mobile telephony model for the purpose of intelligent interruption management by taking into account multi-dimensional contexts and name it “E-MIIM”. The experimental results on individuals’ real-life mobile telephony data sets show that our E-MIIM model is more effective and outperforms existing MIIM model for predicting and managing individual’s mobile telephony interruptions based on their relevant contextual information. (shrink)
Hydrocarbon reservoirs are often monitored using repeated seismic observations to track fluid movement and other changes. Here, we present a study of compaction-induced anisotropy in an unconsolidated overpressured sandstone reservoir from Teal South field in the Gulf of Mexico. Previous work at Teal South had demonstrated that the time-lapse observations could not be satisfied through models of fluid changes without strong pressure effects acting on the formation rock framework. However, those studies are not highly quantitative, and some minor inconsistencies appear (...) on closer examination. We have examined the effect of the pressure-sensitivity of elastic moduli in the formation and carefully examined the offset-dependence of amplitudes in light of several rock-physics models, empirical and theoretical. The amplitude-variation-with-offset behavior for the interface between overlying shale and the hydrocarbon sand is best modeled under the assumption that this overpressured reservoir becomes anisotropic because it undergoes compaction during production, which reduces the reservoir pressure from highly overpressured to nearly normal for this depth. Although the results obtained here are only weakly constrained due to the limited offset ranges and low fold, this strongly suggests that anisotropic effects in poorly consolidated overpressured reservoirs undergoing primary depletion may in fact dominate over fluid effects after the bubble point has been reached. (shrink)
The nonlinear σ-model with vector mesons introduced as gauge bosons and an interacting chiral quark sector depicts the nucleon as a topological soliton embedded in a chiral condensate. High-energy elastic pp and ¯pp scattering data from CERN ISR and SPS Collider appear to provide strong evidence in favor of this nucleon structure.
Relativistic mean field theory with mesons σ, ω, π and ρ mediating interactions and nucleons as basic fermions has been very successful in describing nuclear matter and finite nuclei. However, in heavy-ion collisions, where the c. m. energy of two colliding nucleons will be in the hundreds of GeV region, nucleons are not expected to behave as point-like particles. Analyses of elastic pp and ¯pp scattering data in the relevant c. m. energy range show that the nucleon is a composite (...) object—a topological soliton or Skyrmion embedded in a condensed quark-antiquark ground state. Against this backdrop, we formulate an effective field theory model of nuclear matter based on the gauged linear σ-model where quarks are the basic fermions, but the mesons still mediate the interactions. The model describes the nucleon as a Skyrmion and produces a q¯q ground state analogous to a superconducting ground state. Quarks are quasi-particles in this ground state. When the temperature exceeds a critical value, the scalar field in the ground state vanishes, quarks become massless, and a chiral phase transition occurs leading to chiral symmetry restoration. We explore the possibility of a first order phase transition in this model by introducing suitable self-interactions of the scalar field. Internal structures of the Skyrmions are ignored, and they are treated as point-like fermions. (shrink)
In this paper, we focus on the human upper limb rehabilitation scheme that utilizes the concept ofteleoperation. Teleoperation can help the therapist demonstrate different rehab exercises to a different group of people at the same time remotely. Different groups of people from a different place connected to the same network can get therapy from the same therapist at the same time using the telerehabilitation scheme. Here, we presented a humanoid robot NAO that can be operated remotely by a therapist to (...) demonstrate the exercise to a patient. To mimic the movement demonstrated by the therapist, Kinect V2 sensor which is a markerless vision-based motion-tracking device, was used. Modified Denavit-Hartenberg convention was used for the kinematic modeling of the human upper arm. From the Kinect data, a geometric solution was developed to find a unique inverse kinematic solution of human upper-extremity. Experimental results revealed that NAO could be teleoperated successfully to instruct and demonstrate patients to perform different arm movement exercises in real-time. (shrink)
Caffeine, a known CNS stimulant is given as an adjunct component in most abused drugs which could be fatal with repeated administration in many circumstances. This paper presents a study to investigate the effect of repeated administration of caffeine at high dose on rat liver, and discusses ethical and policy issues of caffeine use. Long Evans rats were treated with pure caffeine solution in distilled water through intragastric route once daily for consecutive 56 days. Three groups of rats recognized as (...) low dose, high dose and control group received 6mg caffeine / kg BW, 12mg caffeine / kg BW and distilled water, respectively. Rat plasma was examined for liver transaminases and alkaline phosphatases concentrations which were significantly increased in plasma as compared to the control. Both rat plasma and liver homogenate were subjected to estimate malondialdehyde, advanced oxidation protein product, nitric oxide, antioxidant enzyme catalase, glutathione and superoxide dismutase activity. MDA, AOPP, NO levels increased and SOD activity decreased significantly in both plasma and liver as compared to those of control where as CAT and GSH activity remain unchanged. Rat liver tissues were studied histochemically with Hematoxylin and Eosin, and Picro Sirius Red staining. Significantly increased infiltration of inflammatory cells and progressive deposition of collagen fibre were visible in liver tissue of caffeine treated both dose groups as compared to the control. Long term administration of caffeine at higher dose, significantly contributes to liver inflammation and consequent fibrogenesis. This raises significant ethical and policy issues. (shrink)
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables and (...) control their behavior accordingly. As evident, these machines use sensors to collect vital information, which is then the complexity analyzed at a computational node that then smartly controls these devicesʼ operational behaviors. Deep learning-based guessing attack protection algorithms have been enhancing IoT security; however, it still has a critical challenge for the complex industries’ IoT networks. One of the crucial aspects of such systems is the need to have a significant training time for processing a large dataset from the networkʼs previous flow of data. Traditional deep learning approaches include decision trees, logistic regression, and support vector machines. However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication data and later utilize it for malicious purposes. This paper presents the experimental study of cryptographic algorithms to classify the types of encryption algorithms into the asymmetric and asymmetric encryption algorithm. It presents a deep analysis of AES, DES, 3DES, RSA, and Blowfish based on timing complexity, size, encryption, and decryption performances. It has been assessed in terms of the guessing attack in real-time deep learning complex IoT applications. The assessment has been done using the simulation approach and it has been tested the speed of encryption and decryption of the selected encryption algorithms. For each encryption and decryption, the tests executed the same encryption using the same plaintext for five separate times, and the average time is compared. The key size used for each encryption algorithm is the maximum bytes the cipher can allow. To the comparison, the average time required to compute the algorithm by the three devices is used. For the experimental test, a set of plaintexts is used in the simulation—password-sized text and paragraph-sized text—that achieves target fair results compared to the existing algorithms in real-time deep learning networks for IoT applications. (shrink)
Non-communicable diseases, which can largely be prevented by controlling avoidable lifestyle-related risk factors, are rapidly penetrating the entire world, including developing countries. The present study aimed to assess NCD lifestyle risk factors among the adult population in Bangladesh. The data used in the study were collected as part of a population-based cross-sectional survey covering rural and urban areas of Bangladesh conducted in 2015–16. The lifestyle factors considered were diet, sleeping patterns, smoking, smokeless tobacco consumption, and physical activity. The study found (...) that approximately 18.5% of participants had a non-daily consumption of fruit or vegetables, 46.6% used extra salt with their meals, 11.8% reported sleeping <7 hours daily, 25.7% smoked tobacco, 60.9% used smokeless tobacco and 69.7% were less physically active. The prevalence of improper lifestyle practices relevant to NCDs, such as an inadequate diet, poor sleeping pattern, tobacco consumption, and low physical activity, was significantly higher among older adults, women, the uneducated, the unemployed, urban dwellers, and people from rich households. The study found that NCD-related lifestyle characteristics were poorly compliant with standard guidelines among many adult populations in Bangladesh. The findings can inform preventative strategies to control the overwhelming NCD burden in Bangladesh, such as the promotion of physical exercise, healthy eating, and the cessation of the use of tobacco products. (shrink)
This study explores how TV commercials in Pakistan construct female identity in the present era. Advertising becomes an essential part in moulding and shaping our behaviour, attitude, values towards lifestyle and advertisers use visual, semiotic and printed text aims to convey their specific messages. This work attempts to analyze how the belief system of "flawless" and "perfect" society is created and constructed in and through advertisements. This study employed semiotic analysis as a research method to examine Pakistani TVCs. With stratified (...) sampling technique, ten TVCs selected that appeared during intervals breaks of famous TV serials,obtained from main three private Pakistani channels, on a week after week premise for a time of six months. TVCs were analyzed with reference to the representation of Pakistani women in selected time period. As sign frameworks are included in the construction of meaning and advertising utilizes these signs to transmit its message. The ideologically developed messages, TVCs not only depict the image of women but have additionally made that image into the affirmed part of the female identity in the society. The overall findings reveal that women identity thrive in TV commercials that repeatedly represent women as glamorized sex object, there by not reflecting the different and progressive roles of women. This study is an effort to examine the advertising practice in Pakistan that how it constructs and depicts Pakistani women. Most commercials reveal today’s Pakistani women as an independent glamorous and liberal object. This study would be significant for communication experts as well as for the policy makers who can apply it as a basis for creating and executing advertisements in future. (shrink)