Search results for: domestic integrated batteries
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4515

Search results for: domestic integrated batteries

1515 Plasmodium falciparum and Scistosoma haematobium Co-infection in School Aged Children in Jinduut, Shendam Local Government Area of Plateau State, North Central Nigeria

Authors: D. A. Dakul, T. M. Akindigh, B. J. Dogonyaro, O. J. Abba, K. T. Tangtur, N. Sambo, J. A. E. Okopi, J. A. Yohanna, G. E. Imade, G. S. Mwansat, S. Oguche

Abstract:

Malaria and urinary Schistosomaisis are both endemic in Nigeria and pose a serious health challenge in rural areas where co-infections are common. This descriptive cross sectional study was carried out to determine the prevalence of co-infection and the impact of concurrent infection on haemoglobin concentration, Eosinophil and CD4+ T-lymphocyte counts. Plasmodium falciparum and Schistosoma haematobium infection were determined by Malaria Rapid Diagnostic Test (MRDT) kits and the presence of visible haematuria respectively and confirmed by conventional Polymerase Chain Reaction (cPCR). P values < 0.05 were considered statistically significant. Of the 110 children examined, 13 (11.8%) had concurrent infection with Schistosoma haematobium falciparum, 46(41.8%) had Plasmodium falciparum infection while 16(14.5%) had Schistosoma haematobium infection. A strong association between co-infection and the ages of 10-15 years with a 36.4% prevalence of anaemia was observed. Malaria was significantly associated with anaemia than with concurrent infections or schistomiasis alone. Co-infection with both pathogens and a high prevalence of anaemia was observed in Jinduut community. Although the causes of anaemia are multi-factorial, further investigation into the extent to which malaria and urinary schistosomiasis contribute to anaemia is needed. Also, integrated control efforts must be strengthened to mitigate the impact of concurrent infection in this group of vulnerable members in the community. The results can be applied to other communities during control.

Keywords: co-Infection, plasmodium falciparum and scistosoma haematobium, Jinduut, Nigeria

Procedia PDF Downloads 318
1514 Treatment of Sanitary Landfill Leachate by Advanced Oxidation Techniques

Authors: R. Kerbachi , Y. Medkour, F. Sahnoune

Abstract:

The integrated waste management is an important aspect in the implementation of sustainable development. Leachate generated by sanitary landfills is a high-strength wastewater that is likely to contain large amounts of organic and inorganic matter, with humic substances, as well as ammonia nitrogen, heavy metals, chlorinated organic and inorganic salts. Untreated leachates create a great potential for harm to the environment, they can permeate ground water or mix with surface water and contribute to the pollution of soil, ground water, and surface water. In Algeria, the treatment of landfill leachate is the weakest link in the solid waste management. This study focuses on the evaluation of the pollution load carried by leachate produced in a former sanitary landfill located to the west of Algiers and the implementation of advanced oxidation treatment (advanced oxidation process, AOP), Fenton, electro-Fenton etc. The characterization of these leachates shows that they have a high organic load, mineral and nitrogen. Measured COD reaches very high values of the order of 5000 to 20,000 mg O2 / L. On this non-biodegradable leachate, treatment tests have been carried out by the methods of coagulation-flocculation, Fenton oxidation, electrocoagulation and electro-Fenton. The removal efficiencies of pollution obtained for each of these modes of treatment are respectively 69, 80, 84 and 97%. The study shows that advanced oxidation processes are very suitable for the treatment of poorly biodegradable leachate.

Keywords: advanced oxidation processes, electrocoagulation, electro-Fenton, leachates treatment, sanitary landfill

Procedia PDF Downloads 284
1513 Non-Invasive Pre-Implantation Genetic Assessment Using NGS in IVF Clinical Routine

Authors: Katalin Gombos, Bence Gálik, Krisztina Ildikó Kalács, Krisztina Gödöny, Ákos Várnagy, József Bódis, Attila Gyenesei, Gábor L. Kovács

Abstract:

Although non-invasive pre-implantation genetic testing for aneuploidy (NIPGT-A) is potentially appropriate to assess chromosomal ploidy of the embryo, practical application of it in a routine IVF center has not been started in the absence of a recommendation. We developed a comprehensive workflow for a clinically applicable strategy for NIPGT-A based on next-generation sequencing (NGS) technology. We performed MALBAC whole genome amplification and NGS on spent blastocyst culture media of Day 3 embryos fertilized with intra-cytoplasmic sperm injection (ICSI). Spent embryonic culture media of morphologically good quality score embryos were enrolled in further analysis with the blank culture media as background control. Chromosomal abnormalities were identified by an optimized bioinformatics pipeline applying a copy number variation (CNV) detecting algorithm. We demonstrate a comprehensive workflow covering both wet- and dry-lab procedures supporting a clinically applicable strategy for NIPGT-A. It can be carried out within 48 h which is critical for the same-cycle blastocyst transfer, but also suitable for “freeze all” and “elective frozen embryo” strategies. The described integrated approach of non-invasive evaluation of embryonic DNA content of the culture media can potentially supplement existing pre-implantation genetic screening methods.

Keywords: next generation sequencing, in vitro fertilization, embryo assessment, non-invasive pre-implantation genetic testing

Procedia PDF Downloads 141
1512 Accentuation Moods of Blaming Utterances in Egyptian Arabic: A Pragmatic Study of Prosodic Focus

Authors: Reda A. H. Mahmoud

Abstract:

This paper investigates the pragmatic meaning of prosodic focus through four accentuation moods of blaming utterances in Egyptian Arabic. Prosodic focus results in various pragmatic meanings when the speaker utters the same blaming expression in different emotional moods: the angry, the mocking, the frustrated, and the informative moods. The main objective of this study is to interpret the meanings of these four accentuation moods in relation to their illocutionary forces and pre-locutionary effects, the integrated features of prosodic focus (e.g., tone movement distributions, pitch accents, lengthening of vowels, deaccentuation of certain syllables/words, and tempo), and the consonance between the former prosodic features and certain lexico-grammatical components to communicate the intentions of the speaker. The data on blaming utterances has been collected via elicitation and pre-recorded material, and the selection of blaming utterances is based on the criteria of lexical and prosodic regularity to be processed and verified by three computer programs, Praat, Speech Analyzer, and Spectrogram Freeware. A dual pragmatic approach is established to interpret expressive blaming utterance and their lexico-grammatical distributions into intonational focus structure units. The pragmatic component of this approach explains the variable psychological attitudes through the expressions of blaming and their effects whereas the analysis of prosodic focus structure is used to describe the intonational contours of blaming utterances and other prosodic features. The study concludes that every accentuation mood has its different prosodic configuration which influences the listener’s interpretation of the pragmatic meanings of blaming utterances.

Keywords: pragmatics, pragmatic interpretation, prosody, prosodic focus

Procedia PDF Downloads 136
1511 Hand Gesture Interface for PC Control and SMS Notification Using MEMS Sensors

Authors: Keerthana E., Lohithya S., Harshavardhini K. S., Saranya G., Suganthi S.

Abstract:

In an epoch of expanding human-machine interaction, the development of innovative interfaces that bridge the gap between physical gestures and digital control has gained significant momentum. This study introduces a distinct solution that leverages a combination of MEMS (Micro-Electro-Mechanical Systems) sensors, an Arduino Mega microcontroller, and a PC to create a hand gesture interface for PC control and SMS notification. The core of the system is an ADXL335 MEMS accelerometer sensor integrated with an Arduino Mega, which communicates with a PC via a USB cable. The ADXL335 provides real-time acceleration data, which is processed by the Arduino to detect specific hand gestures. These gestures, such as left, right, up, down, or custom patterns, are interpreted by the Arduino, and corresponding actions are triggered. In the context of SMS notifications, when a gesture indicative of a new SMS is recognized, the Arduino relays this information to the PC through the serial connection. The PC application, designed to monitor the Arduino's serial port, displays these SMS notifications in the serial monitor. This study offers an engaging and interactive means of interfacing with a PC by translating hand gestures into meaningful actions, opening up opportunities for intuitive computer control. Furthermore, the integration of SMS notifications adds a practical dimension to the system, notifying users of incoming messages as they interact with their computers. The use of MEMS sensors, Arduino, and serial communication serves as a promising foundation for expanding the capabilities of gesture-based control systems.

Keywords: hand gestures, multiple cables, serial communication, sms notification

Procedia PDF Downloads 34
1510 A Study of Semantic Analysis of LED Illustrated Traffic Directional Arrow in Different Style

Authors: Chia-Chen Wu, Chih-Fu Wu, Pey-Weng Lien, Kai-Chieh Lin

Abstract:

In the past, the most comprehensively adopted light source was incandescent light bulbs, but with the appearance of LED light sources, traditional light sources have been gradually replaced by LEDs because of its numerous superior characteristics. However, many of the standards do not apply to LEDs as the two light sources are characterized differently. This also intensifies the significance of studies on LEDs. As a Kansei design study investigating the visual glare produced by traffic arrows implemented with LEDs, this study conducted a semantic analysis on the styles of traffic arrows used in domestic and international occasions. The results will be able to reduce drivers’ misrecognition that results in the unsuccessful arrival at the destination, or in traffic accidents. This study started with a literature review and surveyed the status quo before conducting experiments that were divided in two parts. The first part involved a screening experiment of arrow samples, where cluster analysis was conducted to choose five representative samples of LED displays. The second part was a semantic experiment on the display of arrows using LEDs, where the five representative samples and the selected ten adjectives were incorporated. Analyzing the results with Quantification Theory Type I, it was found that among the composition of arrows, fletching was the most significant factor that influenced the adjectives. In contrast, a “no fletching” design was more abstract and vague. It lacked the ability to convey the intended message and might bear psychological negative connotation including “dangerous,” “forbidden,” and “unreliable.” The arrow design consisting of “> shaped fletching” was found to be more concrete and definite, showing positive connotation including “safe,” “cautious,” and “reliable.” When a stimulus was placed at a farther distance, the glare could be significantly reduced; moreover, the visual evaluation scores would be higher. On the contrary, if the fletching and the shaft had a similar proportion, looking at the stimuli caused higher evaluation at a closer distance. The above results will be able to be applied to the design of traffic arrows by conveying information definitely and rapidly. In addition, drivers’ safety could be enhanced by understanding the cause of glare and improving visual recognizability.

Keywords: LED, arrow, Kansei research, preferred imagery

Procedia PDF Downloads 230
1509 Wellbore Stability Evaluation of Ratawi Shale Formation

Authors: Raed Hameed Allawi

Abstract:

Wellbore instability problems are considered the majority challenge for several wells in the Ratawi shale formation. However, it results in non-productive (NPT) time and increased well-drilling expenditures. This work aims to construct an integrated mechanical earth model (MEM) to predict the wellbore failure and design optimum mud weight to improve the drilling efficiency of future wells. The MEM was based on field data, including open-hole wireline logging and measurement data. Several failure criteria were applied in this work, including Modified Lade, Mogi-Coulomb, and Mohr-Coulomb that utilized to calculate the proper mud weight and practical drilling paths and orientations. Results showed that the leading cause of wellbore instability problems was inadequate mud weight. Moreover, some improper drilling practices and heterogeneity of Ratawi formation were additional causes of the increased risk of wellbore instability. Therefore, the suitable mud weight for safe drilling in the Ratawi shale formation should be 11.5-13.5 ppg. Furthermore, the mud weight should be increased as required depending on the trajectory of the planned well. The outcome of this study is as practical tools to reduce non-productive time and well costs and design future neighboring deviated wells to get high drilling efficiency. In addition, the current results serve as a reference for similar fields in that region because of the lacking of published studies regarding wellbore instability problems of the Ratawi Formation in southern Iraqi oilfields.

Keywords: wellbore stability, hole collapse, horizontal stress, MEM, mud window

Procedia PDF Downloads 168
1508 Progress in Combining Image Captioning and Visual Question Answering Tasks

Authors: Prathiksha Kamath, Pratibha Jamkhandi, Prateek Ghanti, Priyanshu Gupta, M. Lakshmi Neelima

Abstract:

Combining Image Captioning and Visual Question Answering (VQA) tasks have emerged as a new and exciting research area. The image captioning task involves generating a textual description that summarizes the content of the image. VQA aims to answer a natural language question about the image. Both these tasks include computer vision and natural language processing (NLP) and require a deep understanding of the content of the image and semantic relationship within the image and the ability to generate a response in natural language. There has been remarkable growth in both these tasks with rapid advancement in deep learning. In this paper, we present a comprehensive review of recent progress in combining image captioning and visual question-answering (VQA) tasks. We first discuss both image captioning and VQA tasks individually and then the various ways in which both these tasks can be integrated. We also analyze the challenges associated with these tasks and ways to overcome them. We finally discuss the various datasets and evaluation metrics used in these tasks. This paper concludes with the need for generating captions based on the context and captions that are able to answer the most likely asked questions about the image so as to aid the VQA task. Overall, this review highlights the significant progress made in combining image captioning and VQA, as well as the ongoing challenges and opportunities for further research in this exciting and rapidly evolving field, which has the potential to improve the performance of real-world applications such as autonomous vehicles, robotics, and image search.

Keywords: image captioning, visual question answering, deep learning, natural language processing

Procedia PDF Downloads 58
1507 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 238
1506 A Machine Learning Based Framework for Education Levelling in Multicultural Countries: UAE as a Case Study

Authors: Shatha Ghareeb, Rawaa Al-Jumeily, Thar Baker

Abstract:

In Abu Dhabi, there are many different education curriculums where sector of private schools and quality assurance is supervising many private schools in Abu Dhabi for many nationalities. As there are many different education curriculums in Abu Dhabi to meet expats’ needs, there are different requirements for registration and success. In addition, there are different age groups for starting education in each curriculum. In fact, each curriculum has a different number of years, assessment techniques, reassessment rules, and exam boards. Currently, students that transfer curriculums are not being placed in the right year group due to different start and end dates of each academic year and their date of birth for each year group is different for each curriculum and as a result, we find students that are either younger or older for that year group which therefore creates gaps in their learning and performance. In addition, there is not a way of storing student data throughout their academic journey so that schools can track the student learning process. In this paper, we propose to develop a computational framework applicable in multicultural countries such as UAE in which multi-education systems are implemented. The ultimate goal is to use cloud and fog computing technology integrated with Artificial Intelligence techniques of Machine Learning to aid in a smooth transition when assigning students to their year groups, and provide leveling and differentiation information of students who relocate from a particular education curriculum to another, whilst also having the ability to store and access student data from anywhere throughout their academic journey.

Keywords: admissions, algorithms, cloud computing, differentiation, fog computing, levelling, machine learning

Procedia PDF Downloads 122
1505 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 306
1504 Enabling Affirmative Futures: Making Use of Virtual Spaces and New Social Technologies in Co-Production Research with Marginalised Young People

Authors: Kirsty Liddiard

Abstract:

In this paper, we detail the politics and practicalities of co-produced disability research with disabled young people with life-limiting and life-threatening impairments in our ESRC funded project, Life, Death, Disability and the Human: Living Life to the Fullest. We centre our Co-Researcher Collective of disabled young people who, through virtual research methods and social technologies, are co-leading this innovative project exploring the lives, hopes, desires and ambitions of young disabled people living short(er) lives. Co-production is an established approach; however, our co-researchers have led us to develop inclusive and transformative research practices that engage with online social research methods in innovative ways. Through this discussion, we demarcate the Academy and ‘research process’ as potentially deeply ableist spaces that propogate the normative researcher as non-disabled; someone integrated into the Academy and insecure employment; and who enacts normative modes of leadership. We use our experiences of co-production in Living Life to the Fullest, then, to show that research – as a discipline, a set of politics, and scholarly practice – must be transformed in order to enable new inclusive research futures that support meaningful co-production with marginalised young people. In conclusion, as we detail our experiences, we aim to encourage disability studies researchers and others to adopt virtual environments and social technologies when researching with and for the lives of disabled people.

Keywords: co-production, illness, youth, technology

Procedia PDF Downloads 135
1503 Business and Psychological Principles Integrated into Automated Capital Investment Systems through Mathematical Algorithms

Authors: Cristian Pauna

Abstract:

With few steps away from the 2020, investments in financial markets is a common activity nowadays. In the electronic trading environment, the automated investment software has become a major part in the business intelligence system of any modern financial company. The investment decisions are assisted and/or made automatically by computers using mathematical algorithms today. The complexity of these algorithms requires computer assistance in the investment process. This paper will present several investment strategies that can be automated with algorithmic trading for Deutscher Aktienindex DAX30. It was found that, based on several price action mathematical models used for high-frequency trading some investment strategies can be optimized and improved for automated investments with good results. This paper will present the way to automate these investment decisions. Automated signals will be built using all of these strategies. Three major types of investment strategies were found in this study. The types are separated by the target length and by the exit strategy used. The exit decisions will be also automated and the paper will present the specificity for each investment type. A comparative study will be also included in this paper in order to reveal the differences between strategies. Based on these results, the profit and the capital exposure will be compared and analyzed in order to qualify the investment methodologies presented and to compare them with any other investment system. As conclusion, some major investment strategies will be revealed and compared in order to be considered for inclusion in any automated investment system.

Keywords: Algorithmic trading, automated investment systems, limit conditions, trading principles, trading strategies

Procedia PDF Downloads 173
1502 Noise and Thermal Analyses of Memristor-Based Phase Locked Loop Integrated Circuit

Authors: Naheem Olakunle Adesina

Abstract:

The memristor is considered as one of the promising candidates for mamoelectronic engineering and applications. Owing to its high compatibility with CMOS, nanoscale size, and low power consumption, memristor has been employed in the design of commonly used circuits such as phase-locked loop (PLL). In this paper, we designed a memristor-based loop filter (LF) together with other components of PLL. Following this, we evaluated the noise-rejection feature of loop filter by comparing the noise levels of input and output signals of the filter. Our SPICE simulation results showed that memristor behaves like a linear resistor at high frequencies. The result also showed that loop filter blocks the high-frequency components from phase frequency detector so as to provide a stable control voltage to the voltage controlled oscillator (VCO). In addition, we examined the effects of temperature on the performance of the designed phase locked loop circuit. A critical temperature, where there is frequency drift of VCO as a result of variations in control voltage, is identified. In conclusion, the memristor is a suitable choice for nanoelectronic systems owing to a small area, low power consumption, dense nature, high switching speed, and endurance. The proposed memristor-based loop filter, together with other components of the phase locked loop, can be designed using memristive emulator and EDA tools in current CMOS technology and simulated.

Keywords: Fast Fourier Transform, hysteresis curve, loop filter, memristor, noise, phase locked loop, voltage controlled oscillator

Procedia PDF Downloads 164
1501 Electrical and Thermal Characteristics of a Photovoltaic Solar Wall with Passive and Active Ventilation through a Room

Authors: Himanshu Dehra

Abstract:

An experimental study was conducted for ascertaining electrical and thermal characteristics of a pair of photovoltaic (PV) modules integrated with solar wall of an outdoor room. A pre-fabricated outdoor room was setup for conducting outdoor experiments on a PV solar wall with passive and active ventilation through the outdoor room. The selective operating conditions for glass coated PV modules were utilized for establishing their electrical and thermal characteristics. The PV solar wall was made up of glass coated PV modules, a ventilated air column, and an insulating layer of polystyrene filled plywood board. The measurements collected were currents, voltages, electric power, air velocities, temperatures, solar intensities, and thermal time constant. The results have demonstrated that: i) a PV solar wall installed on a wooden frame was of more heat generating capacity in comparison to a window glass or a standalone PV module; ii) generation of electric power was affected with operation of vertical PV solar wall; iii) electrical and thermal characteristics were not significantly affected by heat and thermal storage losses; and iv) combined heat and electricity generation were function of volume of thermal and electrical resistances developed across PV solar wall. Finally, a comparison of temperature plots of passive and active ventilation envisaged that fan pressure was necessary to avoid overheating of the PV solar wall. The active ventilation was necessary to avoid over-heating of the PV solar wall and to maintain adequate ventilation of room under mild climate conditions.

Keywords: photovoltaic solar wall, solar energy, passive ventilation, active ventilation

Procedia PDF Downloads 378
1500 Mosque as a Sustainable Model in Iranian Traditional Urban Development: The Case Study of Vakil Mosque in Shiraz

Authors: Amir Hossein Ashari, Sedighe Erfan Manesh

Abstract:

When investigating Iranian traditional and historical urban development, such as that seen in Shiraz, our attention is drawn to mosques as a focal point. Vakil Mosque in Shiraz is completely consistent, coordinated and integrated with the Bazaar, square and school. This is a significant example of traditional urban development. The position of the mosque in the most important urban joint near bazaar in a way that it is considered part of the bazaar structure are factors that have given it social, political, and economic roles in addition to the original religious role. These are among characteristics of sustainable development. The mosque has had an important effect in formation of the city because it is connected to main gates. In terms of access, the mosque has different main and peripheral access paths from different parts of the city. The courtyard of the mosque was located next to the main elements of the city so that it was considered as an urban open space, which made it a more active and more dynamic place. This study is carried out via library and field research with the purpose of finding strategies for taking advantage of useful features of the mosque in traditional urban development. These features include its role as a gathering center for people and city in sustainable urban development. Mosque can be used as a center for enhancing social interactions and creating a sense of association that leads to sustainable social space. These can act as a model which leads us to sustainable cities in terms of social and economic factors.

Keywords: mosque, traditional urban development, sustainable social space, Vakil Mosque, Shiraz

Procedia PDF Downloads 387
1499 Spectroscopic and 1.08mm Laser Properties of Nd3+ Doped Oxy-Fluoro Borate Glasses

Authors: Swapna Koneru, Srinivasa Rao Allam, Vijaya Prakash Gaddem

Abstract:

The different concentrations of neodymium-doped (Nd-doped) oxy fluoroborate (OFB) glasses were prepared by melt quenching method and characterized through optical absorption, emission and decay curve measurements to understand the lasing potentialities of these glasses. Optical absorption spectra were recorded and have been analyzed using Judd–Ofelt theory. The dipole strengths are parameterized in terms of three phenomenological Judd–Ofelt intensity parameters Ωλ (λ=2, 4 and 6) to elucidate the glassy matrix around Nd3+ ion as well as to determine the 4F3/2 metastable state radiative properties such as the transition probability (AR), radiative lifetime (τR), branching ratios (βR) and integrated absorption cross-section (σa) have been measured for most of the fluorescent levels of Nd3+. The emission spectra recorded for these glasses exhibit two peaks at 1085 and 1328 nm corresponding to 4F3/2 to 4I11/2 and 4I13/2 transitions have been obtained for all the glasses upon 808 nm diode laser excitation in the near infrared region. The emission intensity of the 4F3/2 to 4I11/2 transition increases with increase of Nd3+ concentration up to 1 mol% and then concentration quenching is observed for 2.0 mol% of Nd3+ concentration. The lifetimes for the 4F3/2 level are found to decrease with increase in Nd2O3 concentration in the glasses due to the concentration quenching. The decay curves of all these glasses show single exponential behavior. The spectroscopy of Nd3+ in these glasses is well understood and laser properties can be accurately determined from measured spectroscopic properties. The results obtained are compared with reports on similar glasses. The results indicate that the present glasses could be useful for 1.08 µm laser applications.

Keywords: glasses, luminescence, optical properties, photoluminescence spectroscopy

Procedia PDF Downloads 273
1498 Metal Contamination in an E-Waste Recycling Community in Northeastern Thailand

Authors: Aubrey Langeland, Richard Neitzel, Kowit Nambunmee

Abstract:

Electronic waste, ‘e-waste’, refers generally to discarded electronics and electrical equipment, including products from cell phones and laptops to wires, batteries and appliances. While e-waste represents a transformative source of income in low- and middle-income countries, informal e-waste workers use rudimentary methods to recover materials, simultaneously releasing harmful chemicals into the environment and creating a health hazard for themselves and surrounding communities. Valuable materials such as precious metals, copper, aluminum, ferrous metals, plastic and components are recycled from e-waste. However, persistent organic pollutants such as polychlorinated biphenyls (PCBs) and some polybrominated diphenyl ethers (PBDEs), and heavy metals are toxicants contained within e-waste and are of great concern to human and environmental health. The current study seeks to evaluate the environmental contamination resulting from informal e-waste recycling in a predominantly agricultural community in northeastern Thailand. To accomplish this objective, five types of environmental samples were collected and analyzed for concentrations of eight metals commonly associated with e-waste recycling during the period of July 2016 through July 2017. Rice samples from the community were collected after harvest and analyzed using inductively coupled plasma mass spectrometry (ICP-MS) and gas furnace atomic spectroscopy (GF-AS). Soil samples were collected and analyzed using methods similar to those used in analyzing the rice samples. Surface water samples were collected and analyzed using absorption colorimetry for three heavy metals. Environmental air samples were collected using a sampling pump and matched-weight PVC filters, then analyzed using Inductively Coupled Argon Plasma-Atomic Emission Spectroscopy (ICAP-AES). Finally, surface wipe samples were collected from surfaces in homes where e-waste recycling activities occur and were analyzed using ICAP-AES. Preliminary1 results indicate that some rice samples have concentrations of lead and cadmium significantly higher than limits set by the United States Department of Agriculture (USDA) and the World Health Organization (WHO). Similarly, some soil samples show levels of copper, lead and cadmium more than twice the maximum permissible level set by the USDA and WHO, and significantly higher than other areas of Thailand. Surface water samples indicate that areas near e-waste recycling activities, particularly the burning of e-waste products, result in increased levels of cadmium, lead and copper in surface waters. This is of particular concern given that many of the surface waters tested are used in irrigation of crops. Surface wipe samples measured concentrations of metals commonly associated with e-waste, suggesting a danger of ingestion of metals during cooking and other activities. Of particular concern is the relevance of surface contamination of metals to child health. Finally, air sampling showed that the burning of e-waste presents a serious health hazard to workers and the environment through inhalation and deposition2. Our research suggests a need for improved methods of e-waste recycling that allows workers to continue this valuable revenue stream in a sustainable fashion that protects both human and environmental health. 1Statistical analysis to be finished in October 2017 due to follow-up field studies occurring in July and August 2017. 2Still awaiting complete analytic results.

Keywords: e-waste, environmental contamination, informal recycling, metals

Procedia PDF Downloads 348
1497 Wireworms under the Sword of Damocles: Attraction to Maize Root Volatiles

Authors: Diana La Forgia, Jean Baptiste Thibord, François Verheggen

Abstract:

Volatiles Organic Compound (VOCs) are one of the many features of defense used by plants in their eternal fight against pests. Their main role is to attract the natural enemies of the herbivores. But on another hand, they can be used by the same herbivores to locate plants while foraging. In an attempt to fill a gap of knowledge in a complex web of interactions, we focused on wireworms (Coleoptera:Elateridae). Wireworms whose larvae feed on roots are one of the most spread pests of valuable crops such as maize and potatoes, causing important economical damage. Little is known about the root compounds that are playing a role in the attraction of the larvae. In order to know more about these compounds, we compared four different maize varieties (Zea mays mays) that are known to have different levels of attraction, from weak to strong, for wireworms in fields. We tested the attraction of larvae in laboratory conditions in dual-choice olfactometer assays where they were offered all possible combinations of the four maize varieties. Contemporary, we collected the VOCs of each variety during 24h using a push-and-pull system. The collected samples were then analyzed by gas chromatography coupled with a mass spectrometer (GC-MS) to identify their molecular profiles. The choice of the larvae was dependent on the offered combination and some varieties were preferred to others. Differences were also observed in terms of quantitative and qualitative emissions of volatile profiles between the maize varieties. Our aim is to develop traps based on VOCs from maize roots to open a new frontier in wireworms management.

Keywords: integrated pest management, maize roots, plant defense, volatile organic compounds, wireworms

Procedia PDF Downloads 140
1496 The Boy Who Cried Wolf-North Korea Nuclear Test and Its Implication to the Regional Stability

Authors: Mark Wenyi Lai

Abstract:

The very lethal weapon of nuclear warhead had threatened the survival of the world for half of the 20th century. When most of the countries have already denounced and stopped the development, one country is eager to produce and use them. Since 2006, Pyongyang has launched six times of nuclear tests. The most recent one in September 2017 signaled North Korea’s military capability to project the mass destruction through ICBM (Intercontinental Ballistic Missile) over Seoul, Tokyo, Guam, Hawaii, Alaska or probably the West Coast of the United States with the explosive energy ten times of the atom bombing of Hiroshima in 1945. This research paper adopted time-series content analysis focusing on the related countries responses to North Korea’s tests in 2006, 2009, 2013, and 2016. The preliminary hypotheses are first, North Korea determined to protect the regime by having triad nuclear capability. Negotiations are mere means to this end. Second, South Korea is paralyzed by its ineffective domestic politics and unable to develop its independent strategy toward the North. Third, Japan was using the external threat to campaign for its rearmament plan and brought instability in foreign relations. Fourth, China found herself in the strange position of defending the loyal buffer state meanwhile witnessing the fourth and dangerous neighboring country gaining the card into nuclear club. Fifth, the United States had admitted that North Korea’s going nuclear is unstoppable. Therefore, to keep the regional stability in the East Asia, the US relied on the new balance of power formed by everyone versus Pyongyang. But, countries in East Asia actually have problems getting along with each other. Sixth, Russia distanced herself from the North Kore row but benefitted by advancing its strategic importance in the Far East. Tracing back the history of nuclear states, this research paper concluded that North Korea will head on becoming a more confident country. The regional stability will restore once related countries deal with the new fact and treat Pyongyang regime with a new strategy. The gradual opening and economic reform are on the way for the North Korea in the near future.

Keywords: nuclear test, North Korea, six party talk, US foreign policy

Procedia PDF Downloads 263
1495 Effect of Rural Entrepreneurship in Rural Development in Nigeria: A Study of Selected Entrepreneurs in Ikwuano Local Government Area, Abia State, Nigeria

Authors: Ifeanyi Charles Otuokere, Victoria Nneoma Nnochiri

Abstract:

Entrepreneurship generally and specifically within the rural communities in Nigeria is a fast means of bringing development within the communities. This is made possible by utmost maximization and management of available local resources to develop rural areas through good management of these local resources. This study anchors on the rural development paradigm and the integrated rural development theories to understudy the knowledge of rural entrepreneurs on rural economic development. The research study made use of surveys and descriptive analysis. The assessable population for the study, which was randomly selected, is 100 rural entrepreneurs from ten rural communities within the Ikwuano Local Government Area of Abia State. The study made use of both primary and secondary as a source of data collection with much emphasis on a primary source, although secondary data such as journals, textbooks electronic sources were also utilised. A carefully structured questionnaire drafted to extract raw data was administered to selected entrepreneurs. The findings of the study showed that developments within rural communities can only be achieved through rural entrepreneurship. This is evidenced in increased output, job creation, and most importantly, reduction of rural to urban migration, among other things. Recommendations were also made based on these findings; the researchers recommended that infrastructural developments should be made available in the rural communities and government policies should create enabling environments along with other assistance to help these rural entrepreneurs achieve their sole aim.

Keywords: economic developments, rural communities, rural development, rural entrepreneurship

Procedia PDF Downloads 208
1494 A Postcolonial Feminist Exploration of Zulu Girl Child’s Position and Gender Dynamics in Religio-Cultural Context

Authors: G. T. Ntuli

Abstract:

This paper critically examines the gender dynamics of a Zulu girl child in her religio-cultural context from the postcolonial feminist perspective. As one of the former colonized ethnic groups in the South African context, the Zulu tribe used to have particular and contextual religio-cultural ways of a girl’s upbringing. This included traditional and cultural norms that any member of the community could not infringe without serious repercussions from the community members. However, the postcolonial social position of a girl child within this community became ambiguous and unpredictable due to colonial changes that enhanced gender dynamics that propelled tribal communities into deeper patriarchal structures. In the empirical study conducted within the Zulu context, which investigated the retrieval of ubuntombi (virginity) as a Zulu cultural heritage, identity and sex education as a path to adulthood, it was found that a Zulu girl child’s social position is geared towards double oppression due to gender dynamics that she experiences in her lifetime. It is these gender dynamics that are examined in this paper from the postcolonial feminist perspective. These gender dynamics are at play from the birth of a girl child, developmental stage to puberty and marriage rituals. These rituals and religio-cultural practices are meant to shape and mold a ‘good woman’ in the Zulu cultural context but social gender inequality that elevates males over females propel women social status into life denying peripheral positions. Consequently, in the place of a ‘good woman’ in the communal view, an oppressed and dehumanized woman becomes the outcome of such gender dynamics, more often treated with contempt, despised and violated in many demeaning ways. These do not only leave women economically and socio-politically impoverished, but also having to face violence of all kinds such as domestic, emotional, sexual and gender-based violence that are increasingly becoming a scourge in some of the sub-Saharan African countries including South Africa. It is for this reason that this paper becomes significant, not only within the Zulu context where the research was conducted, but also in all the countries that practice and promote patriarchal tendencies in the name of religio-cultural practices. There is a need for a different outlook as to what it means to be a ‘good woman’ in the cultural context, because if the goodness of a woman is determined by life denying cultural practices, such practices need to be deconstructed and discarded.

Keywords: feminist, gender dynamics, postcolonial, religio-cultural, Zulu girl child

Procedia PDF Downloads 137
1493 Experimental Study on the Effectiveness of Functional Training for Female College Students' Physical Fitness and Sport Skills

Authors: Yangming Zhu, Mingming Guo, Xiaozan Wang

Abstract:

Introduction: The purpose of this study is to integrate functional training into physical education to test the effectiveness of functional training in improving the physical fitness (PF) and sport skills (SS) of female college students. Methods: A total of 54 female college students from East China Normal University were selected for this study (27 in the experimental group and 27 in the control group), and 13 weeks of the experimental intervention was conducted during the semester. During the experimental period, the experimental group was functionally trained for 1 hour per week. The control group performed one-hour weekly sports (such as basketball, football, etc.) as usual. Before and after the experiment, the national students' physical fitness test was used to test the PF of the experimental group and the control group, and the SS of the experimental group and the control group were tested before and after the intervention. Then using SPSS and Excel to organize and analyze the data. Results: The independent sample T-test showed that there was no significant difference in the PF and SS between the experimental group and the control group before the experiment (T PF=71.86, p PF> 0.05, Tₛₛ=82.41,pₛₛ > 0.05); After the experiment, the PF of the experimental group was significantly higher than that of the control group (T Improve=71.86, p Improve < 0.05); after the experiment, the SS of the experimental group was significantly higher than that of the control group (Tₛₛ = 1.31, pₛₛ <0.01) Conclusions: Integrating functional training into physical education can improve the PF of female college students. At the same time, the integration of functional training into physical education can also effectively improve the SS of female college students. Therefore, it is suggested that functional training be integrated into the daily physical education of female college students so as to improve their PF and SS.

Keywords: functional training, physical fitness, sport skills, female college students

Procedia PDF Downloads 116
1492 Thermodynamic Analysis of Wet Compression Integrated with Air-Film Blade Cooling in Gas Turbine Power Plants

Authors: Hassan Athari, Alireza Ruhi Sales, Amin Pourafshar, Seyyed Mehdi Pestei, Marc. A. Rosen

Abstract:

In order to achieve high efficiency and high specific work with lower emissions, the use of advanced gas turbine cycles for power generation is useful and advantageous. Here, evaporative inlet air cooling is analyzed thermodynamically in the form of air film blade cooling of gas turbines. As the ambient temperature increases during summer months, the performance of gas turbines particularly the output power and energy efficiency are significantly decreased. The utilization of evaporative inlet cooling in gas turbine cycles increases gas turbine performance, which can assist to solve the problem in meeting the increasing demands for electrical power and offsetting shortages during peak load times. In the present research, because of the importance of turbine blade cooling, the turbine is investigated with cold compressed air used for cooling the turbine blades. The investigation of the basic and modified cycles shows that, by adding an evaporative cooler to a simple gas turbine cycle, for a turbine inlet temperature of 1400 °C, an ambient temperature of 45 °C and a relative humidity of 15%, the specific work can reach 331 (kJ/kg air), while the maximum specific work of a simple cycle for the same conditions is 273.7 (kJ/kg air). The exergy results reveal that the highest exergy destruction occurs in the combustion chamber, where the large temperature differences and highly exothermic chemical reactions are the main sources of the irreversibility.

Keywords: energy, exergy, wet compression, air-film cooling blade, gas turbine

Procedia PDF Downloads 129
1491 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 329
1490 The Impact of Mergers and Acquisitions on Financial Deepening in the Nigerian Banking Sector

Authors: Onyinyechi Joy Kingdom

Abstract:

Mergers and Acquisitions (M&A) have been proposed as a mechanism through which, problems associated with inefficiency or poor performance in financial institution could be addressed. The aim of this study is to examine the proposition that recapitalization of banks, which encouraged Mergers and Acquisitions in Nigeria banking system, would strengthen the domestic banks, improve financial deepening and the confidence of depositors. Hence, this study examines the impact of the 2005 M&A in the Nigerian-banking sector on financial deepening using mixed method (quantitative and qualitative approach). The quantitative process of this study utilised annual time series for financial deepening indicator for the period of 1997 to 2012. While, the qualitative aspect adopted semi-structured interview to collate data from three merged banks and three stand-alone banks to explore, understand and complement the quantitative results. Furthermore, a framework thematic analysis is employed to analyse the themes developed using NVivo 11 software. Using the quantitative approach, findings from the equality of mean test (EMT) used suggests that M&A have significant impact on financial deepening. However, this method is not robust enough given its weak validity as it does not control for other potential factors that may determine financial deepening. Thus, to control for other factors that may affect the level of financial deepening, a Multiple Regression Model (MRM) and Interrupted Times Series Analysis (ITSA) were applied. The coefficient for M&A dummy turned negative and insignificant using MRM. In addition, the estimated linear trend of the post intervention when ITSA was applied suggests that after M&A, the level of financial deepening decreased annually; however, this was statistically insignificant. Similarly, using the qualitative approach, the results from the interview supported the quantitative results from ITSA and MRM. The result suggests that interest rate should fall when capital base is increased to improve financial deepening. Hence, this study contributes to the existing literature the importance of other factors that may affect financial deepening and the economy when policies that will enhance bank performance and the economy are made. In addition, this study will enable the use of valuable policy instruments relevant to monetary authorities when formulating policies that will strengthen the Nigerian banking sector and the economy.

Keywords: mergers and acquisitions, recapitalization, financial deepening, efficiency, financial crisis

Procedia PDF Downloads 378
1489 Displaced People in International Marriage Law: Choice of Law and the 1951 Convention Relating to the Status of Refugees

Authors: Rorick Daniel Tovar Galvan

Abstract:

The 1951 Convention relating to the status of refugees contains a conflict of law rule for the determination of the applicable law to marriage. The wording of this provision leaves much to be desired as it uses the domicile and the residence of the spouses as single main and subsidiary connecting factors. In cases where couples live in different countries, the law applicable to the case is unclear. The same problem arises when refugees are married to individuals outside of the convention’s scope of application. Different interpretations of this legal provision have arisen to solve this problem. Courts in a number of European countries apply the so-called modification doctrine: states should apply their domestic private international rules in all cases involving refugees. Courts shall, however, replace the national connecting factor by the domicile or residence in situations where nationality is used to determine the applicable law. The internal conflict of law rule will then be slightly modified in order to be applied according to the convention. However, this approach excludes these people from using their national law if they so desire. As nationality is, in all cases, replaced by domicile or residence as connecting factor, refugees are automatically deprived of the possibility to choose this law in jurisdictions that include the party autonomy in international marriage law. This contribution aims to shed light on the international legal framework applicable to marriages celebrated by refugees and the unnecessary restrictions to the exercise of the party autonomy these individuals are subjected to. The interest is motivated by the increasing number of displaced people, the significant number of states party to the Refugee Convention – approximately 150 – and the fact that more and more countries allow choice of law agreements in marriage law. Based on a study of German, Spanish and Swiss case law, the current practices in Europe, as well as some incoherencies derived from the current interpretation of the convention, will be discussed. The main objective is showing that there is neither an economic nor a legal basis to deny refugees the right to choose the law of their country of origin in those jurisdictions providing for this possibility to other foreigners. Quite the contrary, after analyzing other provisions contained in the conventions, this restriction would mean a contravention of other obligations included in the text.

Keywords: choice of law, conflict of laws, international marriage law, refugees

Procedia PDF Downloads 129
1488 Characterization of the Intestinal Microbiota: A Signature in Fecal Samples from Patients with Irritable Bowel Syndrome

Authors: Mina Hojat Ansari, Kamran Bagheri Lankarani, Mohammad Reza Fattahi, Ali Reza Safarpour

Abstract:

Irritable bowel syndrome (IBS) is a common bowel disorder which is usually diagnosed through the abdominal pain, fecal irregularities and bloating. Alteration in the intestinal microbial composition is implicating to inflammatory and functional bowel disorders which is recently also noted as an IBS feature. Owing to the potential importance of microbiota implication in both efficiencies of the treatment and prevention of the diseases, we examined the association between the intestinal microbiota and different bowel patterns in a cohort of subjects with IBS and healthy controls. Fresh fecal samples were collected from a total of 50 subjects, 30 of whom met the Rome IV criteria for IBS and 20 Healthy control. Total DNA was extracted and library preparation was conducted following the standard protocol for small whole genome sequencing. The pooled libraries sequenced on an Illumina Nextseq platform with a 2 × 150 paired-end read length and obtained sequences were analyzed using several bioinformatics programs. The majority of sequences obtained in the current study assigned to bacteria. However, our finding highlighted the significant microbial taxa variation among the studied groups. The result, therefore, suggests a significant association of the microbiota with symptoms and bowel characteristics in patients with IBS. These alterations in fecal microbiota could be exploited as a biomarker for IBS or its subtypes and suggest the modification of the microbiota might be integrated into prevention and treatment strategies for IBS.

Keywords: irritable bowel syndrome, intestinal microbiota, small whole genome sequencing, fecal samples, Illumina

Procedia PDF Downloads 139
1487 An Integrated Approach for Risk Management of Transportation of HAZMAT: Use of Quality Function Deployment and Risk Assessment

Authors: Guldana Zhigerbayeva, Ming Yang

Abstract:

Transportation of hazardous materials (HAZMAT) is inevitable in the process industries. The statistics show a significant number of accidents has occurred during the transportation of HAZMAT. This makes risk management of HAZMAT transportation an important topic. The tree-based methods including fault-trees, event-trees and cause-consequence analysis, and Bayesian network, have been applied to risk management of HAZMAT transportation. However, there is limited work on the development of a systematic approach. The existing approaches fail to build up the linkages between the regulatory requirements and the safety measures development. The analysis of historical data from the past accidents’ report databases would limit our focus on the specific incidents and their specific causes. Thus, we may overlook some essential elements in risk management, including regulatory compliance, field expert opinions, and suggestions. A systematic approach is needed to translate the regulatory requirements of HAZMAT transportation into specified safety measures (both technical and administrative) to support the risk management process. This study aims to first adapt the House of Quality (HoQ) to House of Safety (HoS) and proposes a new approach- Safety Function Deployment (SFD). The results of SFD will be used in a multi-criteria decision-support system to develop find an optimal route for HazMats transportation. The proposed approach will be demonstrated through a hypothetical transportation case in Kazakhstan.

Keywords: hazardous materials, risk assessment, risk management, quality function deployment

Procedia PDF Downloads 123
1486 Crime Victim Support Services in Bangladesh: An Analysis

Authors: Mohammad Shahjahan, Md. Monoarul Haque

Abstract:

In the research work information and data were collected from both types of sources, direct and indirect. Numerological, qualitative and participatory analysis methods have been followed. There were two principal sources of collecting information and data. Firstly, the data provided by the service recipients (300 nos. of women and children victims) in the Victim Support Centre and service providing policemen, executives and staffs (60 nos.). Secondly, data collected from Specialists, Criminologists and Sociologists involved in victim support services through Consultative Interview, KII, Case Study and FGD etc. The initial data collection has been completed with the help of questionnaires as per strategic variations and with the help of guidelines. It is to be noted that the main objective of this research was to determine whether services provided to the victims for their facilities, treatment/medication and rehabilitation by different government/non-government organizations was veritable at all. At the same time socio-economic background and demographic characteristics of the victims have also been revealed through this research. The results of the study show that although the number of victims has increased gradually due to socio-economic, political and cultural realities in Bangladesh, the number of victim support centers has not increased as expected. Awareness among the victims about the effectiveness of the 8 centers working in this regard is also not up to the mark. Two thirds of the victims coming to get service were not cognizant regarding the victim support services at all before getting the service. Most of those who have finally been able to come under the services of the Victim Support Center through various means, have received sheltering (15.5%), medical services (13.32%), counseling services (13.10%) and legal aid (12.66%). The opportunity to stay in security custody and psycho-physical services were also notable. Usually, women and children from relatively poor and marginalized families of the society come to victim support center for getting services. Among the women, young unmarried women are the biggest victims of crime. Again, women and children employed as domestic workers are more affected. A number of serious negative impacts fall on the lives of the victims. Being deprived of employment opportunities (26.62%), suffering from psycho-somatic disorder (20.27%), carrying sexually transmitted diseases (13.92%) are among them. It seems apparent to urgently enact distinct legislation, increase the number of Victim Support Centers, expand the area and purview of services and take initiative to increase public awareness and to create mass movement.

Keywords: crime, victim, support, Bangladesh

Procedia PDF Downloads 73