Search results for: branch and bound
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 741

Search results for: branch and bound

441 A Literature Review on Virtual Interventions for Midlife Women

Authors: Daniel D'Souza, Ping Zou

Abstract:

The period before, during, and after menopause is a sensitive time for women as they experience intense physical and psychological health changes and symptoms. These changes accompany the hormonal changes that mark the end of a woman’s reproductive age. To help mitigate and cope with these changes, prompt and correct treatment is needed. eHealth has emerged as a branch of telemedicine in the past few decades as an alternate avenue for patients to receive care quickly and conveniently, as it relies on the Internet and computers. Within the past few years, eHealth has also given rise to mHealth, which is the use of personal mobile devices to receive treatment and care. However, there is a lack of study on their use for menopause. This review aimed to review and summarize the literature for eHealth or mHealth and menopause. Several databases related to women’s health and digital health were searched for original studies about eHealth or mHealth and menopause. The search yielded 25 results. The results were generally positive, with these interventions being feasible and having positive effects on physical and psychosocial outcomes. However, several issues were raised regarding their design process that may inadvertently prevent these interventions from addressing the needs of all potential users. Therefore, while eHealth and mHealth certainly represent a future model of healthcare delivery for menopausal women, further research and design modifications are needed before this can happen.

Keywords: eHealth, menopause, mHealth, midlife women

Procedia PDF Downloads 121
440 Convergence Analysis of Training Two-Hidden-Layer Partially Over-Parameterized ReLU Networks via Gradient Descent

Authors: Zhifeng Kong

Abstract:

Over-parameterized neural networks have attracted a great deal of attention in recent deep learning theory research, as they challenge the classic perspective of over-fitting when the model has excessive parameters and have gained empirical success in various settings. While a number of theoretical works have been presented to demystify properties of such models, the convergence properties of such models are still far from being thoroughly understood. In this work, we study the convergence properties of training two-hidden-layer partially over-parameterized fully connected networks with the Rectified Linear Unit activation via gradient descent. To our knowledge, this is the first theoretical work to understand convergence properties of deep over-parameterized networks without the equally-wide-hidden-layer assumption and other unrealistic assumptions. We provide a probabilistic lower bound of the widths of hidden layers and proved linear convergence rate of gradient descent. We also conducted experiments on synthetic and real-world datasets to validate our theory.

Keywords: over-parameterization, rectified linear units ReLU, convergence, gradient descent, neural networks

Procedia PDF Downloads 120
439 Military Use of Artificial Intelligence under International Humanitarian Law: Insights from Canada

Authors: Mahshid TalebianKiakalayeh

Abstract:

As AI technologies can be used by both civilians and soldiers, it is vital to consider the consequences emanating from AI military as well as civilian use. Indeed, many of the same technologies can have a dual-use. This paper will explore the military uses of AI and assess its compliance with international legal norms. AI developments not only have changed the capacity of the military to conduct complex operations but have also increased legal concerns. The existence of a potential legal vacuum in legal principles on the military use of AI indicates the necessity of more study on compliance with International Humanitarian Law (IHL), the branch of international law which governs the conduct of hostilities. While capabilities of new means of military AI continue to advance at incredible rates, this body of law is seeking to limit the methods of warfare protecting civilian persons who are not participating in an armed conflict. Implementing AI in the military realm would result in potential issues, including ethical and legal challenges. For instance, when intelligence can perform any warfare task without any human involvement, a range of humanitarian debates will be raised as to whether this technology might distinguish between military and civilian targets or not. This is mainly because AI in fully military systems would not seem to carry legal and ethical judgment, which can interfere with IHL principles. The paper will take, as a case study, Canada’s compliance with IHL in the area of AI and the related legal issues that are likely to arise as this country continues to develop military uses of AI.

Keywords: artificial intelligence, military use, international humanitarian law, the Canadian perspective

Procedia PDF Downloads 153
438 Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud

Authors: Maha Shamseddine, Amjad Nusayr, Wassim Itani

Abstract:

In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform.

Keywords: privacy enforcement, platform-as-a-service privacy awareness, cloud computing privacy

Procedia PDF Downloads 201
437 A Case Study of Assessment of Fire Affected Concrete Structure by NDT

Authors: Nikhil Gopalkrishnan, Praveen Bhaskaran, Aditya Bhargava, Gyandeep Bhumarkar

Abstract:

The present paper is an attempt to perform various Non-Destructive Tests on concrete structure as NDT is gaining a wide importance in the branch of civil engineering these days. Various tests that are performed under NDT not only enable us to determine the strength of concrete structure, but also provide us in-hand information regarding the durability, in-situ properties of the concrete structure. Keeping these points in our mind, we have focused our views on performing a case study to show the comparison between the NDT test results performed on a particular concrete structure and another structure at the same site which is subjected to a continuous fire of say 48-72 hours. The mix design and concrete grade of both the structures were same before the one was affected by fire. The variations in the compressive strength, concrete quality and in-situ properties of the two structures have been discussed in this paper. NDT tests namely Ultrasonic Pulse Velocity Test, Rebound Hammer Test, Core-Cutter Test was performed at both the sites. The main objective of this research is to analyze the variations in the strength and quality of the concrete structure which is subjected to a high temperature fire and the one which isn’t exposed to it.

Keywords: core-cutter test, non-destructive test, rebound hammer test, ultrasonic pulse velocity test

Procedia PDF Downloads 325
436 Electrochemiluminescent Detection of DNA Damage Induced by Tetrachloro-1,4- Benzoquinone Using DNA Sensor

Authors: Tian-Fang Kang, Xue Sun

Abstract:

DNA damage induced by tetrachloro-1,4-benzoquinone (TCBQ), a reactive metabolite of pentachloro-phenol (PCP), was investigated using a glassy carbon electrode (GCE) modified with calf thymus double-stranded DNA (ds-DNA) in this work. DNA modified films were constructed by layer-by-layer adsorption of polycationic poly(diallyldimethyl- ammonium chloride) (PDDA) and negatively charged ds-DNA on the surface of a glassy carbon electrode. The DNA intercalator [Ru(bpy)2(dppz)]2+ (bpy=2, 2′-bipyridine, dppz0dipyrido [3, 2-a: 2′,3′-c] phenazine) was chosen as an electrochemical probe to detect DNA damage. After the sensor was incubated in 0.1 M pH 7.3 phosphate buffer solution (PBS) for 30min, the intact PDDA/DNA film produced a sensitive electrochemiluminescent (ECL) signal. However, after the sensor was incubated in 100 μM TCBQ or a mixed solution of 100 μM TCBQ and 2 mM H2O2, ECL signal decreased significantly. During the incubation of DNA in TCBQ or TCBQ-H2O2 solution, the double-helix of DNA was damaged, which resulted in the decrease of Ru-dppz bound to DNA. Additionally, the results were verified independently by fluorescence experiments. This paper provides a sensitive method to directly screen DNA damage induced by chemicals in the environment.

Keywords: DNA damage, detection, electrochemiluminescence, sensor

Procedia PDF Downloads 391
435 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network

Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang

Abstract:

As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.

Keywords: GUI, deep learning, GAN, data augmentation

Procedia PDF Downloads 163
434 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 124
433 The Pangs of Unemployment and Its Impediment to Nation Building

Authors: Vitalis Okwuchukwu Opara

Abstract:

The task of nation building primarily consist in welding together, diverse cultural groups into a united nation state, which develops a centripetal political culture that makes its people see themselves as members of one nation linked together by more reliable ties than the coercion offered by the state. Comparatively on the contrary, most countries in the world today are comprised of diverse nationalities, each with its unique set of norms and values, which often come into conflict with others. As such, the task of nation building is in uniting these diverse cultural groups into a united nation state and various human elements that make up its geopolitical zone. The most outstanding impediment to achieving this task is unemployment. Unemployment is like a peril against the nation building. Unemployment is an obstacle for growth of a nation. Often it is said that the wise see obstacles as stepping-stones to advance further. The pangs of unemployment impede nation building such that sometimes it takes very long time to do away with the problem. In recent times, there has been a revolutionary wind blowing across the world. This wind is bound to wake up nations leaders to sit up to their responsibility. Unemployment causes youth restiveness, brings leaders to their knees. It breeds problem. This work is intended to expose the pangs of unemployment and its impending peril to nation building.

Keywords: pangs, unemployment, obstacles, nation-building

Procedia PDF Downloads 339
432 Numerical Investigation Including Mobility Model for the Performances of Piezoresistive Sensors

Authors: Abdelaziz Beddiaf

Abstract:

In this work, we present an analysis based on the study of mobility which is a very important electrical parameter of a piezoresistor and which is directly bound to the piezoresistivity effect in piezoresistive pressure sensors. We determine how the temperature affects mobility when the electric potential is applied. For this, a theoretical approach based on mobility in a p-type Silicon piezoresistor with that of a finite difference model for self-heating is developed. So, the evolution of mobility has been established versus time for different doping levels and with temperature rise provoked by self-heating using a numerical model combined with that of mobility. Furthermore, it has been calculated for some geometrical parameters of the sensor, such as membrane side length and thickness. Also, it is computed as a function of bias voltage. It was observed that mobility is strongly affected by the temperature rise induced by the applied potential when the sensor is actuated for a prolonged time as a consequence of drifting in the output response of the sensor. Finally, this work makes it possible to predict their temperature behavior due to self-heating and to improve this effect by optimizing the geometric properties of the device and by reducing the voltage source applied to the bridge.

Keywords: Sensors, Piezoresistivity, Mobility, Bias voltage

Procedia PDF Downloads 70
431 Comparing the Theory to the Practice of Islamic Banking: A Case Study of Pakistan

Authors: Zareen Khan

Abstract:

Islamic Banking has experienced high growth in Pakistan in recent years and has successfully survived the economic downturn of 2009-2011. Despite the increase in branch network and expansion of services, it is unclear if Islamic banks are truly following the theory and practical application of Shariah Law. This paper explores the theological basis of Islamic finance and examines the discrepancies between the theory and practice of Islamic banking using Pakistan as a case study. It discusses areas where Islamic banks lack proper Shariah compliance and analyzes the financial weaknesses of Islamic banks in terms of the services offered. Furthermore, the paper offers plausible explanations for the clientele of Islamic banks. The case study has three major findings. Firstly, most of the employees of Islamic banks come from conventional banking backgrounds and the banks have to invest in additional trainings to specialize employees in Islamic Banking. Secondly despite the efforts of State Bank of Pakistan, there is a lack of accounting and auditing standards tailored for Islamic Banking. Thirdly, majority of the clients of Islamic banks in Pakistan are accustomed to conventional banking causing the bankers to “speak the conventional banking language.” Combined, these three factors can create gaps in the practical application of Islamic finance in Islamic banks in Pakistan.

Keywords: islamic finance, comparing theory with practice, islamic banking, Pakistan

Procedia PDF Downloads 435
430 Use of Fuzzy Logic in the Corporate Reputation Assessment: Stock Market Investors’ Perspective

Authors: Tomasz L. Nawrocki, Danuta Szwajca

Abstract:

The growing importance of reputation in building enterprise value and achieving long-term competitive advantage creates the need for its measurement and evaluation for the management purposes (effective reputation and its risk management). The paper presents practical application of self-developed corporate reputation assessment model from the viewpoint of stock market investors. The model has a pioneer character and example analysis performed for selected industry is a form of specific test for this tool. In the proposed solution, three aspects - informational, financial and development, as well as social ones - were considered. It was also assumed that the individual sub-criteria will be based on public sources of information, and as the calculation apparatus, capable of obtaining synthetic final assessment, fuzzy logic will be used. The main reason for developing this model was to fulfill the gap in the scope of synthetic measure of corporate reputation that would provide higher degree of objectivity by relying on "hard" (not from surveys) and publicly available data. It should be also noted that results obtained on the basis of proposed corporate reputation assessment method give possibilities of various internal as well as inter-branch comparisons and analysis of corporate reputation impact.

Keywords: corporate reputation, fuzzy logic, fuzzy model, stock market investors

Procedia PDF Downloads 216
429 Review of the Anatomy of the Middle Cerebral Artery and Its Anomalies

Authors: Karen Cilliers, Benedict John Page

Abstract:

The middle cerebral artery (MCA) is the most complex cerebral artery although few anomalies are found compared to the other cerebral arteries. The branches of the MCA cover a large part of each hemisphere, therefore it is exposed in various operations. Although the segments of the MCA are similarly described by most authors, there is some disagreement on the branching pattern of the MCA. The aim of this study was to review the available literature on the anatomy and variations of the MCA, and to compare this to a pilot study. For the pilot study, 20 hemispheres were perfused with coloured silicone and the MCA was dissected. According to the literature, the two most common branching configurations are the bifurcating and trifurcating patterns. In the pilot study, bifurcation was observed in 19 hemispheres, and in one hemisphere there was no branching (monofurcation). No trifurcation was observed. The most commonly duplicated branch was the anterior parietal artery in 30%, and most commonly absent was the common temporal artery in 65% and the temporal polar artery in 40%. Very few studies describe the origins of the branches of the MCA, therefore a detailed description is given. Middle cerebral artery variations that are occasionally reported in the literature include fenestration, and a duplicated or accessory MCA, although no variations were observed in the pilot study. Aneurysms can frequently be observed at the branching of cerebral vessels, therefore a thorough knowledge of the vascular anatomy is vital. Furthermore, knowledge of possible variations is important since variations can have serious clinical implications.

Keywords: anatomy, anomaly, description, middle cerebral artery, origin, variation

Procedia PDF Downloads 324
428 A Critical Analysis of Cognitive Explanations of Afterlife Belief

Authors: Mahdi Biabanaki

Abstract:

Religion is present in all human societies and has been for tens of thousands of years. What is noteworthy is that although religious traditions vary in different societies, there are considerable similarities in their religious beliefs. In all human cultures, for example, there is a widespread belief in the afterlife. Cognitive science of Religion (CSR), an emerging branch of cognitive science, searches for the root of these widespread similarities and the widespread prevalence of beliefs such as beliefs in the afterlife in common mental structures among humans. Accordingly, the cognitive architecture of the human mind has evolved to produce such beliefs automatically and non-reflectively. For CSR researchers, belief in the afterlife is an intuitive belief resulting from the functioning of mental tools. Our purpose in this article is to extract and evaluate the cognitive explanations presented in the CSR field for explaining beliefs in the afterlife. Our research shows that there are two basic theories in this area of CSR, namely "intuitive dualism" and "simulation constraint" theory. We show that these two theories face four major challenges and limitations in explaining belief in the afterlife: inability to provide a causal explanation, inability to explain cultural/religious differences in afterlife belief, the lack of distinction between the natural and the rational foundations of belief in the afterlife and disregarding the supernatural foundations of the afterlife belief.

Keywords: afterlife, cognitive science of religion, intuitive dualism, simulation constraint

Procedia PDF Downloads 185
427 Modern Technology for Strengthening Concrete Structures Makes Them Resistant to Earthquakes

Authors: Mohsen Abdelrazek Khorshid Ali Selim

Abstract:

Disadvantages and errors of current concrete reinforcement methodsL: Current concrete reinforcement methods are adopted in most parts of the world in their various doctrines and names. They adopt the so-called concrete slab system, where these slabs are semi-independent and isolated from each other and from the surrounding environment of concrete columns or beams, so that the reinforcing steel does not cross from one slab to another or from one slab to adjacent columns. It or the beams surrounding it and vice versa are only a few centimeters and no more. The same applies exactly to the concrete columns that support the building, where the reinforcing steel does not extend from the slabs or beams to the inside of the columns or vice versa except for a few centimeters and no more, just as the reinforcing steel does not extend from inside the column at the top. The ceiling is only a few centimetres, and the same thing is literally repeated in the concrete beams that connect the columns and separate the slabs, where the reinforcing steel does not cross from one beam to another or from one beam to the slabs or columns adjacent to it and vice versa, except for a few centimeters, which makes the basic building elements of columns, slabs and beams They all work in isolation from each other and from the environment surrounding them from all sides. This traditional method of reinforcement may be valid and lasting in geographical areas that are not exposed to earthquakes and earthquakes, where all the loads and tensile forces in the building are constantly directed vertically downward due to gravity and are borne directly by the vertical reinforcement of the building. However, in the case of earthquakes and earthquakes, the loads and tensile forces in the building shift from the vertical direction to the horizontal direction at an angle of inclination that depends on the strength of the earthquake, and most of them are borne by the horizontal reinforcement extending between the basic elements of the building, such as columns, slabs and beams, and since the crossing of the reinforcement between each of the columns, slabs and beams between them And each other, and vice versa, does not exceed several centimeters. In any case, the tensile strength, cohesion and bonding between the various parts of the building are very weak, which causes the buildings to disintegrate and collapse in the horrific manner that we saw in the earthquake in Turkey and Syria in February 2023, which caused the collapse of tens of thousands of buildings in A few seconds later, it left more than 50,000 dead, hundreds of thousands injured, and millions displaced. Description of the new earthquake-resistant model: The idea of the new model in the reinforcement of concrete buildings and constructions is based on the theory that we have formulated as follows: [The tensile strength, cohesion and bonding between the basic parts of the concrete building (columns, beams and slabs) increases as the lengths of the reinforcing steel bars increase and they extend and branch and the different parts of the building share them with each other.] . In other words, the strength, solidity, and cohesion of concrete buildings increase and they become resistant to earthquakes as the lengths of the reinforcing steel bars increase, extend, branch, and share with the various parts of the building, such as columns, beams, and slabs. That is, the reinforcing skewers of the columns must extend in their lengths without cutting to cross from one floor to another until their end. Likewise, the reinforcing skewers of the beams must extend in their lengths without cutting to cross from one beam to another. The ends of these skewers must rest at the bottom of the columns adjacent to the beams. The same thing applies to the reinforcing skewers of the slabs where they must These skewers should be extended in their lengths without cutting to cross from one tile to another, and the ends of these skewers should rest either under the adjacent columns or inside the beams adjacent to the slabs as follows: First, reinforce the columns: The columns have the lion's share of the reinforcing steel in this model in terms of type and quantity, as the columns contain two types of reinforcing bars. The first type is large-diameter bars that emerge from the base of the building, which are the nerves of the column. These bars must extend over their normal length of 12 meters or more and extend to a height of three floors, if desired. In raising other floors, bars with the same diameter and the same length are added to the top after the second floor. The second type is bars with a smaller diameter, and they are the same ones that are used to reinforce beams and slabs, so that the bars that reinforce the beams and slabs facing each column are bent down inside this column and along the entire length of the column. This requires an order. Most engineers do not prefer it, which is to pour the entire columns and pour the roof at once, but we prefer this method because it enables us to extend the reinforcing bars of both the beams and slabs to the bottom of the columns so that the entire building becomes one concrete block that is cohesive and resistant to earthquakes. Secondly, arming the cameras: The beams' reinforcing skewers must also extend to a full length of 12 meters or more without cutting. The ends of the skewers are bent and dropped inside the column at the beginning of the beam to its bottom. Then the skewers are extended inside the beam so that their other end falls under the facing column at the end of the beam. The skewers may cross over the head of a column. Another passes through another adjacent beam and rests at the bottom of a third column, according to the lengths of each of the skewers and beams. Third, reinforcement of slabs: The slab reinforcing skewers must also extend their entire length, 12 meters or more, without cutting, distinguishing between two cases. The first case is the skewers opposite the columns, and their ends are dropped inside one of the columns. Then the skewers cross inside the adjacent slab and their other end falls below the opposite column. The skewers may cross over The head of the adjacent column passes through another adjacent slab and rests at the bottom of a third column, according to the dimensions of the slabs and the lengths of the skewers. The second case is the skewers opposite the beams, and their ends must be bent in the form of a square or rectangle according to the dimensions of the beam’s width and height, and this square or rectangle is dropped inside the beam at the beginning of the slab, and it serves as The skewers are for the beams, then the skewers are extended along the length of the slab, and at the end of the slab, the skewers are bent down to the bottom of the adjacent beam in the shape of the letter U, after which the skewers are extended inside the adjacent slab, and this is repeated in the same way inside the other adjacent beams until the end of the skewer, then it is bent downward in the form of a square or rectangle inside the beam, as happened. In its beginning.

Keywords: earthquake resistant buildings, earthquake resistant concrete constructions, new technology for reinforcement of concrete buildings, new technology in concrete reinforcement

Procedia PDF Downloads 45
426 From Communalism to Individualism: Critical Insights on the Changing Nature of Hausa Society in Northern Nigeria

Authors: Waisu Iliyasu

Abstract:

It is a well-known fact that the Hausa people have, since time immemorial, had a distinct culture of living together and assisting one another. In fact, the communal bond has been an important aspect that bound society together. Over the years, this communal bond has been eroded, giving way to an individualistic society whereby everyone lives a different way of life free from social cohesion and family bonds. It is against this backdrop the paper examines the forces of change in Hausa society and their effect on communal living. The paper also highlights the factors and actors involved in such change and how, in the later years of Nigeria’s independence, such factors transformed the social, political and economic structures of Hausa society in Northern Nigeria. In writing this paper, qualitative research is used in which questionnaires and oral interviews were used as a method of data collection. Along this way, other sources like primary and secondary are also used extensively in writing the paper. The concluding part of the paper reveals that unless the problems of elitism, corruption and poverty are addressed, the gap between have and have-nots, wealthy and poor, literate and illiterate, will continue to widen, thereby leading to an individualistic society that negates all forms of communal living.

Keywords: communalism, individualism, historical insights, Hausa land

Procedia PDF Downloads 44
425 The Origin Variability of the Iliolumbar Artery

Authors: Raid Hommady, Waseem Al-Talalwah, Shorok Al Dorazi, Roger Soames

Abstract:

The iliolumbar artery is a regular branch of posterior division of the internal iliac artery. The present study investigate 82 specimens to identify the origin of iliolumbar artery. The present study targets the sciatic nerve root supply from iliolumbar artery based on its origin and course. In present study, the ililumbar artery arose from the posterior division of internal iliac artery in 52.2%. In few cases, it arose from dorsomedial aspect of the internal iliac artery in 28.8%. In few cases, the iliolumbar artery arose from the dorsal aspects of the internal iliac artery as well as from the common and external iliac artery 1.7%. Also, the iliolumbar artery arose from the sciatic artery as well as from superior and inferior gluteal arteries in 5.1%. Conversely, it found to be congenital absent in 8.5%. Therefore, the posterior trunk of the internal iliac artery is the most common origin of the iliolumbar artery. With the origin variability of the iliolumbar artery, there is a vascular supply variability of the lumbosacral trunk and sacral root of sciatic nerve. The iliolumbar artery provides vascular supply for lumbosacral trunk 57.3% in whereas the sacral root in 5.1%. As a result, surgeons should pay attention to these variations to decrease iatrogenic fault.

Keywords: iliolumbar, sciatic artery, internal iliac, external iliac, posterior division

Procedia PDF Downloads 293
424 Power, Values, Rules and Leader Decision Making: A Discourse Perspective

Authors: Cathryn Robinson, Bernard McKenna, David Rooney

Abstract:

This paper argues that the application of values-based leadership increasingly challenges leaders in rules-based organisations, particularly in bureaucratic organisations such as the military, public service, police, and emergency services. Leaders are grappling to reconcile how to enact values-based leadership and decision-making when they are bound by rules, policies, and procedures. This interpretive study used a multi-faceted vignette (critical incident) as the basis of an interview with air force officers at three levels: executive, senior, and junior. In this way, practice is forced to intersect with discourse. The findings revealed a shared set of discourse themes (legal; rules; safety and risk; operational practice/theatre discourses), but also clear dialectical tensions. These tensions were evident in executive officers and senior leaders emphasizing rules and information themes, whereas junior officers emphasized decision making, collateral, and situation. These findings reveal discourse and practice incommensurability that could have grave implications in the conduct of war.

Keywords: critical incident, discourse analysis, rules-based, values-based

Procedia PDF Downloads 164
423 An Assessment of the Effects of Microbial Products on the Specific Oxygen Uptake in Submerged Membrane Bioreactor

Authors: M. F. R. Zuthi, H. H. Ngo, W. S. Guo, S. S. Chen, N. C. Nguyen, L. J. Deng, T. D. C Tran

Abstract:

Sustaining a desired rate of oxygen transfer for microbial activity is a matter of major concern for Biological Wastewater Treatment (MBR). The study reported in the paper was aimed at assessing the effects of microbial products on the Specific Oxygen Uptake Rate (SOUR) in a Conventional Membrane Bioreactor (CMBR) and that in a Sponge Submerged MBR (SSMBR). The production and progressive accumulation of Soluble Microbial Products (SMP) and Bound-Extracellular Polymeric Substances (BEPS) were found affecting the SOUR of the microorganisms which varied at different stages of operation of the MBR systems depending on the variable concentrations of the SMP/bEPS. The effect of bEPS on the SOUR was stronger in the SSMBR compared to that of the SMP, while relative high concentrations of SMP had adverse effects on the SOUR of the CMBR system. Of the different mathematical correlations analyzed in the study, logarithmic mathematical correlations could be established between SOUR and bEPS in SSMBR, and similar correlations could also be found between SOUR and SMP concentrations in the CMBR.

Keywords: microbial products, microbial activity, specific oxygen uptake rate, membrane bioreactor

Procedia PDF Downloads 284
422 Seismic Activity in the Lake Kivu Basin: Implication for Seismic Risk Management

Authors: Didier Birimwiragi Namogo

Abstract:

The Kivu Lake Basin is located in the Western Branch of the East African Rift. In this basin is located a multitude of active faults, on which earthquakes occur regularly. The most recent earthquakes date from 2008, 2015, 2016, 2017 and 2019. The cities of Bukabu and Goma in DR Congo and Giseyi in Rwanda are the most impacted by this intense seismic activity in the region. The magnitude of the strongest earthquakes in the region is 6.1. The 2008 earthquake was particularly destructive, killing several people in DR Congo and Rwanda. This work aims to complete the distribution of seismicity in the region, deduce areas of weakness and establish a hazard map that can assist in seismic risk management. Using the local seismic network of the Goma Volcano Observatory, the earthquakes were relocated, and their focus mechanism was studied. The results show that most of these earthquakes occur on active faults described by Villeneuve in 1938. The alignment of the earthquakes shows a pace that follows directly the directions of the faults described by this author. The study of the focus mechanism of these earthquakes, also shows that these are in particular normal faults whose stresses show an extensive activity. Such study can be used for the establishment of seismic risk management tools.

Keywords: earthquakes, hazard map, faults, focus mechanism

Procedia PDF Downloads 116
421 A Theoretical Framework on International Voluntary Health Networks

Authors: Benet Reid, Nina Laurie, Matt Baillie-Smith

Abstract:

Trans-national and tropical medicine, historically associated with colonial power and missionary activity, is now central to discourses of global health and development, thrust into mainstream media by events like the 2014 Ebola crisis and enshrined in the Sustainable Development Goals. Research in this area remains primarily the province of health professional disciplines, and tends to be framed within a simple North-to-South model of development. The continued role of voluntary work in this field is bound up with a rhetoric of partnering and partnership. We propose, instead, the idea of International Voluntary Health Networks (IVHNs) as a means to de-centre global-North institutions in these debates. Drawing on our empirical work with IVHNs in countries both North and South, we explore geographical and sociological theories for mapping the multiple spatial and conceptual dynamics of power manifested in these phenomena. We make a radical break from conventional views of health as a de-politicised symptom or corollary of social development. In studying health work as it crosses between cultures and contexts, we demonstrate the inextricably political nature of health and health work everywhere.

Keywords: development, global health, power, volunteering

Procedia PDF Downloads 305
420 The Hawza Al-’Ilmiyya and Its Role in Preserving the Shia Identity through Jurisprudence

Authors: Raied Khayou

Abstract:

The Hawza Al-'Ilmiyya is a network of religious seminaries in the Shia branch of Islam. This research mainly focuses on the oldest school located in Najaf, Iraq, because its core curriculum and main characteristics have been unchanged since the fourth century of Islam. Relying on a thorough literature review of Arabic and English publications, and interviews with current and previous students of the seminary, the current research outlines the factors proving how this seminary was crucial in keeping the Shia religious identity intact despite sometimes gruesome attempts of interference and persecution. There are several factors that helped the seminary to preserve its central importance. First, rooted in their theology, Shia Muslims believe that the Hawza Al-’Ilmiyya and its graduates carry a sacred authority. Secondly, the financial independence of the Seminary helped to keep it intact from any governmental or political meddling. Third, its unique teaching method, its matchless openness for new students, and its flexible curriculum made it attractive for many students who were interested in learning more about Shia theology and jurisprudence. The Hawza Al-‘Ilmiyya has the exclusive right to train clerics who hold the religious authority of Shia Islamic jurisprudence, and the seminary’s success in staying independent throughout history kept Shia Islamic theology independent, as well.

Keywords: Hawza Al'Ilmiyya, religious seminary, Shia Muslim education, Islamic jurisprudence

Procedia PDF Downloads 82
419 Bound By Patriarchy: Women’s Experience of Internal Migration in Bangladesh

Authors: Fouzia Mannan, Deepa Joshi

Abstract:

Millions of Bangladeshis move from low-income agrarian villages to the country’s urban landscape with the hope to gain from the rapidly-growing middle-income urban, industrial future. However, the economic gains are mostly offset by new forms of extreme depravity, indignity, and inequality. Nonetheless, many scholars report unique gendered gains through migration - the rupture of traditional, entrenched inequalities by gender, providing women not only reliable incomes but also the opportunity to re-negotiate gendered roles, responsibilities and identities. In this study, we present the reflections of ten long-term urban migrant women in Dhaka city: of their gains, their losses as well as their aspirations for the future. Our findings show the incredibly high costs of a migration that is induced by desperate rural poverty. Further, we find that patriarchy persists - within the often 'kutcha' walls of urban low-income homes to the nature of so-called economic opportunities - in the constant intertwining of capitalism, globalization, and patriarchy. Caught in between, women have little choice but to cope with these new vulnerabilities by relying on the very norms and boundaries established by patriarchy and by recreating patriarchy to celebrate the (if) gains from displacement and migration.

Keywords: gender, internal migration, patriarchy, urbanization

Procedia PDF Downloads 165
418 Influence of Silica Fume on the Hydration of Cement Pastes Studied by Simultaneous TG-DSC Analysis

Authors: Anton Trník, Lenka Scheinherrová, Robert Černý

Abstract:

Silica fume is a by-product of the ferro-silicon and silicon metal industries. It is mainly in the form of amorphous silica. Silica fume belongs to pozzolanic active materials which can be used in concrete to improve its final properties. In this paper, the influence of silica fume on hydration of cement pastes is studied using differential scanning calorimetry (DSC) and thermogravimetry (TG) at various curing times (2, 7, 28, and 90 days) in the temperature range from 25 to 1000 °C in an argon atmosphere. Samples are prepared from Portland cement CEM I 42.5 R which is partially replaced with the silica fume of 4, 8, and 12 wt.%. The water/binder ratio is chosen as 0.5. It is identified and described the liberation of physically bound water, calcium–silicate–hydrates dehydration, portlandite and calcite decomposition in studied samples. Also, it is found out that an exothermic peak at 950 °C is observed without a significant mass change for samples with 12 wt.% of silica fume after two days of hydration. This peak is probably caused by the pozzolanic reaction between silica fume and Portland cement. Its size corresponds to the degree of crystallization between Ca and Si. The portlandite content is lower for the samples with a higher amount of silica fume.

Keywords: differential scanning calorimetry, hydration, silica fume, thermogravimetry

Procedia PDF Downloads 222
417 Online Robust Model Predictive Control for Linear Fractional Transformation Systems Using Linear Matrix Inequalities

Authors: Peyman Sindareh Esfahani, Jeffery Kurt Pieper

Abstract:

In this paper, the problem of robust model predictive control (MPC) for discrete-time linear systems in linear fractional transformation form with structured uncertainty and norm-bounded disturbance is investigated. The problem of minimization of the cost function for MPC design is converted to minimization of the worst case of the cost function. Then, this problem is reduced to minimization of an upper bound of the cost function subject to a terminal inequality satisfying the l2-norm of the closed loop system. The characteristic of the linear fractional transformation system is taken into account, and by using some mathematical tools, the robust predictive controller design problem is turned into a linear matrix inequality minimization problem. Afterwards, a formulation which includes an integrator to improve the performance of the proposed robust model predictive controller in steady state condition is studied. The validity of the approaches is illustrated through a robust control benchmark problem.

Keywords: linear fractional transformation, linear matrix inequality, robust model predictive control, state feedback control

Procedia PDF Downloads 374
416 Viral Metagenomics Revealed a Cardiovirus in Feces of Wild Rats

Authors: Shama, Asif Mahmood, Wen Zhang

Abstract:

Cardiovirus is a genus of viruses belonging to the family Picornaviridae. Here, we used viral metagenomic techniques to detect the viral nucleic acid in the fecal samples from wild rats in Zhenjiang city in China. Fecal samples were collected from 20 wild rats and pooled into four sample pools and then subjected to library construction, which were then sequenced on the Illumina MiSeq platform. The sequenced reads were analyzed using a viral metagenomic analysis pipeline. A cardiovirus from the feces of a wild rat was identified, named amzj-2018, of which the complete genome was acquired. Phylogenetic analysis based on the complete amino acid sequence of polyprotein revealed that amzj-2018 formed a separate branch located between clusters of Saffold virus and Rat Theilovirus 1 (RTV-1). Phylogenetic analysis based on different regions of the polyproteins, including P1, P2, P3, and P2+P3, respectively, showed discordant trees, where the tree based on the P3 region indicated that amzj-2018 clustered separately between Theiler's murine encephalomyelitis virus and RTV-1. The complete genome of a cardiovirus was determined from the feces of wild rats, which belonged to a novel type of cardiovirus based on phylogenetic analysis. Whether it is associated with disease needs further investigation.

Keywords: cardioviruses, viral metagenomics, novel viruses, virus-host interaction

Procedia PDF Downloads 53
415 Sea-Land Segmentation Method Based on the Transformer with Enhanced Edge Supervision

Authors: Lianzhong Zhang, Chao Huang

Abstract:

Sea-land segmentation is a basic step in many tasks such as sea surface monitoring and ship detection. The existing sea-land segmentation algorithms have poor segmentation accuracy, and the parameter adjustments are cumbersome and difficult to meet actual needs. Also, the current sea-land segmentation adopts traditional deep learning models that use Convolutional Neural Networks (CNN). At present, the transformer architecture has achieved great success in the field of natural images, but its application in the field of radar images is less studied. Therefore, this paper proposes a sea-land segmentation method based on the transformer architecture to strengthen edge supervision. It uses a self-attention mechanism with a gating strategy to better learn relative position bias. Meanwhile, an additional edge supervision branch is introduced. The decoder stage allows the feature information of the two branches to interact, thereby improving the edge precision of the sea-land segmentation. Based on the Gaofen-3 satellite image dataset, the experimental results show that the method proposed in this paper can effectively improve the accuracy of sea-land segmentation, especially the accuracy of sea-land edges. The mean IoU (Intersection over Union), edge precision, overall precision, and F1 scores respectively reach 96.36%, 84.54%, 99.74%, and 98.05%, which are superior to those of the mainstream segmentation models and have high practical application values.

Keywords: SAR, sea-land segmentation, deep learning, transformer

Procedia PDF Downloads 143
414 Explanation and Temporality in International Relations

Authors: Alasdair Stanton

Abstract:

What makes for a good explanation? Twenty years after Wendt’s important treatment of constitution and causation, non-causal explanations (sometimes referred to as ‘understanding’, or ‘descriptive inference’) have become, if not mainstream, at least accepted within International Relations. This article proceeds in two parts: firstly, it examines closely Wendt’s constitutional claims, and while it agrees there is a difference between causal and constitutional, rejects the view that constitutional explanations lack temporality. In fact, this author concludes that a constitutional argument is only possible if it relies upon a more foundational, causal argument. Secondly, through theoretical analysis of the constitutional argument, this research seeks to delineate temporal and non-temporal ways of explaining within International Relations. This article concludes that while the constitutional explanation, like other logical arguments, including comparative, and counter-factual, are not truly non-causal explanations, they are not bound as tightly to the ‘real world’ as temporal arguments such as cause-effect, process tracing, or even interpretivist accounts. However, like mathematical models, non-temporal arguments should aim for empirical testability as well as internal consistency. This work aims to give clear theoretical grounding to those authors using non-temporal arguments, but also to encourage them, and their positivist critics, to engage in thoroughgoing empirical tests.

Keywords: causal explanation, constitutional understanding, empirical, temporality

Procedia PDF Downloads 176
413 Analytic Network Process in Location Selection and Its Application to a Real Life Problem

Authors: Eylem Koç, Hasan Arda Burhan

Abstract:

Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.

Keywords: analytic network process (ANP), BOCR, multi-actor decision making, multi-criteria decision making, real-life problem, location selection

Procedia PDF Downloads 449
412 The Role of Sport-Centered Social Capitals on Student's Tendency in Sports Activities

Authors: Esmaeil Zabihi, Seyed Hossein Alavi

Abstract:

The purpose of this study is the review and prioritizes of sport-centered social capital on Islamic Azad university of Garmsar student’s tendency in sports activities, especially public sports based on Bourdieu viewpoint. 365 students at of 6254 students (3140 male and 3114 female) of Islamic Azad university of Garmsar branch were selected randomly, Morgan also used. 272 person answer questionnaire (with the help of specific questionnaires moeinaldini, 1391) it has 30 questions. Researchers have confirmed the validity of this questionnaire justifiability. Reliability was achieved through Cronbach's alpha 84%. The analysis of data done by, SPSS software and independent t-tests, friedman, u Mann Whitney, Kruskal Wallis test. friedman test showed below things : environmental dimension (MR=4.71) social and economic factors (MR=3.57) and family (MR=3.47). These factors have significant role on sports activities of students (P≤1.0). Also, comparison of these dimensions showed that the men believe to university (t-4.30) in increasing students participation. These results show that environment like (such as) governmental organization, going to the stadium and life environment is the most important factor which can effect on sport and body activities of the students.

Keywords: cultural capital, social capital, Bourdieu viewpoint, sport for all

Procedia PDF Downloads 437