Search results for: data security
23209 Control of Sensors in Metering System of Fluid
Authors: A. Harrouz, O. Harrouz, A. Benatiallah
Abstract:
This paper is to review the essential definitions, roles, and characteristics of communication of metering system. We discuss measurement, data acquisition, and metrological control of a signal sensor from dynamic metering system. After that, we present control of instruments of metering system of fluid with more detailed discussions to the reference standards.Keywords: data acquisition, dynamic metering system, reference standards, metrological control
Procedia PDF Downloads 49223208 Advantages of Neural Network Based Air Data Estimation for Unmanned Aerial Vehicles
Authors: Angelo Lerro, Manuela Battipede, Piero Gili, Alberto Brandl
Abstract:
Redundancy requirements for UAV (Unmanned Aerial Vehicle) are hardly faced due to the generally restricted amount of available space and allowable weight for the aircraft systems, limiting their exploitation. Essential equipment as the Air Data, Attitude and Heading Reference Systems (ADAHRS) require several external probes to measure significant data as the Angle of Attack or the Sideslip Angle. Previous research focused on the analysis of a patented technology named Smart-ADAHRS (Smart Air Data, Attitude and Heading Reference System) as an alternative method to obtain reliable and accurate estimates of the aerodynamic angles. This solution is based on an innovative sensor fusion algorithm implementing soft computing techniques and it allows to obtain a simplified inertial and air data system reducing external devices. In fact, only one external source of dynamic and static pressures is needed. This paper focuses on the benefits which would be gained by the implementation of this system in UAV applications. A simplification of the entire ADAHRS architecture will bring to reduce the overall cost together with improved safety performance. Smart-ADAHRS has currently reached Technology Readiness Level (TRL) 6. Real flight tests took place on ultralight aircraft equipped with a suitable Flight Test Instrumentation (FTI). The output of the algorithm using the flight test measurements demonstrates the capability for this fusion algorithm to embed in a single device multiple physical and virtual sensors. Any source of dynamic and static pressure can be integrated with this system gaining a significant improvement in terms of versatility.Keywords: aerodynamic angles, air data system, flight test, neural network, unmanned aerial vehicle, virtual sensor
Procedia PDF Downloads 22123207 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 8923206 From Madrassah to Elite Schools; The Political Economy of Pluralistic Educational Systems in Pakistan
Authors: Ahmad Zia
Abstract:
This study problematizes the notion that the pluralistic educational system in Pakistan fosters equality. Instead, it argues that this system not only reflects but also sustains existing class divisions, with implications for the future economic and social mobility of children. The primary goal of this study is to explore unequal access to educational opportunities in Pakistan. By examining the intersection between education and socioeconomic status, it attempts to explore the implications of key disparities in different tiers of education systems in Pakistan like between madrassahs, public schools and private schools, with an emphasis on how these institutions contribute to the maintenance of class hierarchies. This is a primary data based case study and the most recent data has been directly gathered Qualitative methods have been used to collect data from the units of data collection (UDCs). it have used Bourdieu’s theory as a leading framework. Its application in the context of country like Pakistan is very productive. it choose the thematic analysis method to analyse the data. This process helped me to identify relevant main themes and subthemes emerging from my data, which could comprise my analysis. Findings reveal that the educational landscape in Pakistan is deeply divided having far-reaching implications for social mobility and access to opportunities. This study found profound disparities among various educational institutions with respect to widening socioeconomic divides. Every kind of educational institution operates in a distinct socio-cultural and economic environment. Therefore, access to quality education is highly stratified and remains a privilege for only those who can afford it. This widens the socioeconomic gap that already exists. There has not been an extensive investigation of the relationship between pluralistic educations with class stratification in the literature so far. This study adds to a multifaceted understanding of educational disparities in Pakistan by analysing the intersections between socioeconomic divisions and educational access. It offers valuable theoretical and practical insights into the subject. This study provides theoretical concepts and empirical data to enhance scholars' understanding of socioeconomic inequality, specifically in relation to education systems.Keywords: social inequality, pluralism, class divide, capitalism, globalisation, elitism, education
Procedia PDF Downloads 1023205 TRACE/FRAPTRAN Analysis of Kuosheng Nuclear Power Plant Dry-Storage System
Authors: J. R. Wang, Y. Chiang, W. Y. Li, H. T. Lin, H. C. Chen, C. Shih, S. W. Chen
Abstract:
The dry-storage systems of nuclear power plants (NPPs) in Taiwan have become one of the major safety concerns. There are two steps considered in this study. The first step is the verification of the TRACE by using VSC-17 experimental data. The results of TRACE were similar to the VSC-17 data. It indicates that TRACE has the respectable accuracy in the simulation and analysis of the dry-storage systems. The next step is the application of TRACE in the dry-storage system of Kuosheng NPP (BWR/6). Kuosheng NPP is the second BWR NPP of Taiwan Power Company. In order to solve the storage of the spent fuels, Taiwan Power Company developed the new dry-storage system for Kuosheng NPP. In this step, the dry-storage system model of Kuosheng NPP was established by TRACE. Then, the steady state simulation of this model was performed and the results of TRACE were compared with the Kuosheng NPP data. Finally, this model was used to perform the safety analysis of Kuosheng NPP dry-storage system. Besides, FRAPTRAN was used tocalculate the transient performance of fuel rods.Keywords: BWR, TRACE, FRAPTRAN, dry-storage
Procedia PDF Downloads 51923204 An Authentication Protocol for Quantum Enabled Mobile Devices
Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
Abstract:
The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party
Procedia PDF Downloads 17423203 Evaluating Learning Outcomes in the Implementation of Flipped Teaching Using Data Envelopment Analysis
Authors: Huie-Wen Lin
Abstract:
This study integrated various teaching factors -based on the idea of a flipped classroom- in a financial management course. The study’s aim was to establish an effective teaching implementation strategy and evaluation mechanism with respect to learning outcomes, which can serve as a reference for the future modification of teaching methods. This study implemented a teaching method in five stages and estimated the learning efficiencies of 22 students (in the teaching scenario and over two semesters). Subsequently, data envelopment analysis (DEA) was used to compare, for each student, between the learning efficiencies before and after participation in the flipped classroom -in the first and second semesters, respectively- to identify the crucial external factors influencing learning efficiency. According to the results, the average overall student learning efficiency increased from 0.901 in the first semester to 0.967 in the second semester, which demonstrate that the flipped classroom approach can improve teaching effectiveness and learning outcomes. The results also revealed a difference in learning efficiency between male and female students.Keywords: data envelopment analysis, flipped classroom, learning outcome, teaching and learning
Procedia PDF Downloads 15623202 Using RASCAL and ALOHA Codes to Establish an Analysis Methodology for Hydrogen Fluoride Evaluation
Authors: J. R. Wang, Y. Chiang, W. S. Hsu, H. C. Chen, S. H. Chen, J. H. Yang, S. W. Chen, C. Shih
Abstract:
In this study, the RASCAL and ALOHA codes are used to establish an analysis methodology for hydrogen fluoride (HF) evaluation. There are three main steps in this study. First, the UF6 data were collected. Second, one postulated case was analyzed by using the RASCAL and UF6 data. This postulated case assumes that fire occurring and UF6 is releasing from a building. Third, the results of RASCAL for HF mass were as the input data of ALOHA. Two postulated cases of HF were analyzed by using ALOHA code and the results of RASCAL. These postulated cases assume fire occurring and HF is releasing with no raining (Case 1) or raining (Case 2) condition. According to the analysis results of ALOHA, the HF concentration of Case 2 is smaller than Case 1. The results can be a reference for the preparing of emergency plans for the release of HF.Keywords: RASCAL, ALOHA, UF₆, hydrogen fluoride
Procedia PDF Downloads 75123201 Information Technology Governance Implementation and Its Determinants in the Egyptian Market
Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb
Abstract:
Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.Keywords: effective IT governance, Egyptian market, information security, risk controls
Procedia PDF Downloads 16723200 Infringement of Patent Rights with Doctrine of Equivalent for Turkey
Authors: Duru Helin Ozaner
Abstract:
Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.Keywords: patent, infringement, intellectual property, the doctrine of equivalent
Procedia PDF Downloads 21423199 Heart Ailment Prediction Using Machine Learning Methods
Authors: Abhigyan Hedau, Priya Shelke, Riddhi Mirajkar, Shreyash Chaple, Mrunali Gadekar, Himanshu Akula
Abstract:
The heart is the coordinating centre of the major endocrine glandular structure of the body, which produces hormones that profoundly affect the operations of the body, and diagnosing cardiovascular disease is a difficult but critical task. By extracting knowledge and information about the disease from patient data, data mining is a more practical technique to help doctors detect disorders. We use a variety of machine learning methods here, including logistic regression and support vector classifiers (SVC), K-nearest neighbours Classifiers (KNN), Decision Tree Classifiers, Random Forest classifiers and Gradient Boosting classifiers. These algorithms are applied to patient data containing 13 different factors to build a system that predicts heart disease in less time with more accuracy.Keywords: logistic regression, support vector classifier, k-nearest neighbour, decision tree, random forest and gradient boosting
Procedia PDF Downloads 5123198 A Case Study of the Political Determinant of Health on the Public Health Crisis of Malaria in Nigeria
Authors: Bisola Olumegbon
Abstract:
Globally, there were about 229 million cases of malaria in 2022. The sub-Saharan African region accounted for 92% of the reported cases and 94% of deaths. Nigeria had the highest number of malaria cases and deaths, representing 27% of global cases. This scholarly project was a case study guided by the political determinants of health. Triangulation of data using thematic analysis was used to identify the political determinants of malaria in Nigeria and to understand how the concept of interaction contributes to the persistence of the disease. The analysis involved a deductive and inductive approach based on the literature review and the evidence of political determinants gathered in the data. Participants’ in-depth interviews were used to collect data from frontline personnel. Data triangulation was done using thematic analysis, a method used to identify patterns and themes in qualitative data. The study findings revealed a correlation between political determinants of health and malaria management efforts in Nigeria. Some influencing factors included voting challenges, inadequate funding, lack of health priority from the government, noncompliance among patients, and hurdles to effective communication. The findings suggest a need to deliberately increase dedication to the political agenda, provide sufficient financial resources, enhance communication, and active community involvement to address the persistent malaria endemic effectively. Further study is recommended to identify interventions to address identified factors of political determinants of health to reduce malaria in Nigeria. Such intervention must involve collaboration with diverse stakeholders such as policymakers, healthcare professionals, community leaders, and researchers.Keywords: malaria, malaria management, health worker, stakeholders, political determinant of health
Procedia PDF Downloads 7123197 Even When the Passive Resistance Is Obligatory: Civil Intellectuals’ Solidarity Activism in Tea Workers Movement
Authors: Moshreka Aditi Huq
Abstract:
This study shows how a progressive portion of civil intellectuals in Bangladesh contributed as the solidarity activist entities in a movement of tea workers that became the symbol of their unique moral struggle. Their passive yet sharp way of resistance, with the integration of mass tea workers of a tea estate, got demonstrated against certain private companies and government officials who approached to establish a special economic zone inside the tea garden without offering any compensation and rehabilitation for poor tea workers. Due to massive protests and rebellion, the authorized entrepreneurs had to step back and called off the project immediately. The extraordinary features of this movement generated itself from the deep core social need of indigenous tea workers who are still imprisoned in the colonial cage. Following an anthropological and ethnographic perspective, this study adopted the main three techniques of intensive interview, focus group discussion, and laborious observation, to extract empirical data. The intensive interviews were undertaken informally using a mostly conversational approach. Focus group discussions were piloted among various representative groups where observations prevailed as part of the regular documentation process. These were conducted among civil intellectual entities, tea workers, tea estate authorities, civil service authorities, and business officials to obtain a holistic view of the situation. The fieldwork was executed in capital Dhaka city, along with northern areas like Chandpur-Begumkhan Tea Estate of Chunarughat Upazilla and Habiganj city of Habiganj District of Bangladesh. Correspondingly, secondary data were accessed through books, scholarly papers, archives, newspapers, reports, leaflets, posters, writing blog, and electronic pages of social media. The study results find that: (1) civil intellectuals opposed state-sponsored business impositions by producing counter-discourse and struggled against state hegemony through the phases of the movement; (2) instead of having the active physical resistance, civil intellectuals’ strength was preferably in passive form which was portrayed through their intellectual labor; (3) the combined movement of tea workers and civil intellectuals reflected on social security of ethnic worker communities that contrasts state’s pseudo-development motives which ultimately supports offensive and oppressive neoliberal growths of economy; (4) civil intellectuals are revealed as having certain functional limitations in the process of movement organization as well as resource mobilization; (5) in specific contexts, the genuine need of protest by indigenous subaltern can overshadow intellectual elitism and helps to raise the voices of ‘subjugated knowledge’. This study is quite likely to represent two sets of apparent protagonist entities in the discussion of social injustice and oppressive development intervention. On the one, hand it may help us to find the basic functional characteristics of civil intellectuals in Bangladesh when they are in a passive mode of resistance in social movement issues. On the other hand, it represents the community ownership and inherent protest tendencies of indigenous workers when they feel threatened and insecure. The study seems to have the potential to understand the conditions of ‘subjugated knowledge’ of subalterns. Furthermore, being the memory and narratives, these ‘activism mechanisms’ of social entities broadens the path to understand ‘power’ and ‘resistance’ in more fascinating ways.Keywords: civil intellectuals, resistance, subjugated knowledge, indigenous
Procedia PDF Downloads 12523196 Evaluation and Assessment of Bioinformatics Methods and Their Applications
Authors: Fatemeh Nokhodchi Bonab
Abstract:
Bioinformatics, in its broad sense, involves application of computer processes to solve biological problems. A wide range of computational tools are needed to effectively and efficiently process large amounts of data being generated as a result of recent technological innovations in biology and medicine. A number of computational tools have been developed or adapted to deal with the experimental riches of complex and multivariate data and transition from data collection to information or knowledge. These bioinformatics tools are being evaluated and applied in various medical areas including early detection, risk assessment, classification, and prognosis of cancer. The goal of these efforts is to develop and identify bioinformatics methods with optimal sensitivity, specificity, and predictive capabilities. The recent flood of data from genome sequences and functional genomics has given rise to new field, bioinformatics, which combines elements of biology and computer science. Bioinformatics is conceptualizing biology in terms of macromolecules (in the sense of physical-chemistry) and then applying "informatics" techniques (derived from disciplines such as applied maths, computer science, and statistics) to understand and organize the information associated with these molecules, on a large-scale. Here we propose a definition for this new field and review some of the research that is being pursued, particularly in relation to transcriptional regulatory systems.Keywords: methods, applications, transcriptional regulatory systems, techniques
Procedia PDF Downloads 12723195 Geological Mapping of Gabel Humr Akarim Area, Southern Eastern Desert, Egypt: Constrain from Remote Sensing Data, Petrographic Description and Field Investigation
Authors: Doaa Hamdi, Ahmed Hashem
Abstract:
The present study aims at integrating the ASTER data and Landsat 8 data to discriminate and map alteration and/or mineralization zones in addition to delineating different lithological units of Humr Akarim Granites area. The study area is located at 24º9' to 24º13' N and 34º1' to 34º2'45"E., covering a total exposed surface area of about 17 km². The area is characterized by rugged topography with low to moderate relief. Geologic fieldwork and petrographic investigations revealed that the basement complex of the study area is composed of metasediments, mafic dikes, older granitoids, and alkali-feldspar granites. Petrographic investigations revealed that the secondary minerals in the study area are mainly represented by chlorite, epidote, clay minerals and iron oxides. These minerals have specific spectral signatures in the region of visible near-infrared and short-wave infrared (0.4 to 2.5 µm). So that the ASTER imagery processing was concentrated on VNIR-SWIR spectrometric data in order to achieve the purposes of this study (geologic mapping of hydrothermal alteration zones and delineate possible radioactive potentialities). Mapping of hydrothermal alterations zones in addition to discriminating the lithological units in the study area are achieved through the utilization of some different image processing, including color band composites (CBC) and data transformation techniques such as band ratios (BR), band ratio codes (BRCs), principal component analysis(PCA), Crosta Technique and minimum noise fraction (MNF). The field verification and petrographic investigation confirm the results of ASTER imagery and Landsat 8 data, proposing a geological map (scale 1:50000).Keywords: remote sensing, petrography, mineralization, alteration detection
Procedia PDF Downloads 16423194 Measuring Student Teachers' Attitude and Intention toward Cell-Phone Use for Learning in Nigeria
Authors: Shittu Ahmed Tajudeen
Abstract:
This study examines student-teachers’ attitude and intention towards cell-phone use for learning. The study involves one hundred and ninety (190) trainee teachers in one of the Institutes of Education in Nigeria. The data of the study was collected through a questionnaire on a rating of seven point likert-type Scale. The data collected was used to test the hypothesized model of the study using Structural Equation Modeling approach. The finding of the study revealed that Perceived Usefulness (PU), Perceived Ease of Use (PEU), Subjective Norm (SN) and Attitude significantly influence students’ intention towards adoption of cell-phone for learning. The study showed that perceived ease of use stands to be the strongest predictor of cell-phone use. The model of the study exhibits a good-fit with the data and provides an explanation on student- teachers’ attitude and intention towards cell-phone for learning.Keywords: cell-phone, adoption, structural equation modeling, technology acceptance model
Procedia PDF Downloads 45323193 Appraisal of the Nutritional Potential and Safety of Wild Vegetables of South Africa
Authors: Thozama Kwinana-Mandindi
Abstract:
The contribution made by wild edible plants to the livelihoods, food baskets and diets of the indigenous people, particularly among the rural dwellers is invaluable. These wild vegetables are among the non-conventional crops which are widely distributed throughout the wild regions in South Africa, indigenous communities have always exploited for micro-nutrient supply. They also supply significant complex, recently discovered compounds, naturally occurring phytonutrients. In order to protect and promote sustainable use of these plants for household food security, there is a need to better understand them through studies and innovations. Assessment of the wild edible plants’ safety is very key to the promotion as an agricultural product which can be utilised during dry seasons and periods of food scarcity to alleviate nutrient insecurity. Through the use of Scanning Electron Microscope (SEM) and energy dispersive X-ray spectroscopy (EDXS), the study is seen as the vital step in taking a holistic view of the value of the four most consumed wild vegetables in the Eastern Cape Province of South Africa as they were analysed for safety and appraised for components that can influence utilisation. Results indicate that they can be relied upon and cultivation be promoted.Keywords: nature’s resource, wild vegetables, appraisal for safety, SEM
Procedia PDF Downloads 44123192 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009
Authors: Bekim Avdiaj
Abstract:
The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.Keywords: crime, occurrence, culture, Gjakova Region
Procedia PDF Downloads 35123191 Architectural Framework to Preserve Information of Cardiac Valve Control
Authors: Lucia Carrion Gordon, Jaime Santiago Sanchez Reinoso
Abstract:
According to the relation of Digital Preservation and the Health field as a case of study, the architectural model help us to explain that definitions. .The principal goal of Data Preservation is to keep information for a long term. Regarding of Mediacal information, in order to perform a heart transplant, physicians need to preserve this organ in an adequate way. This approach between the two perspectives, the medical and the technological allow checking the similarities about the concepts of preservation. Digital preservation and medical advances are related in the same level as knowledge improvement.Keywords: medical management, digital, data, heritage, preservation
Procedia PDF Downloads 42023190 A Small-Scale Flexible Test Bench for the Investigation of Fertigation Strategies in Soilless Culture
Authors: Giacomo Barbieri
Abstract:
In soilless culture, the management of the nutrient solution is the most important aspect for crop growing. Fertigation dose, frequency and nutrient concentration must be planned with the objective of reaching an optimal crop growth by limiting the utilized resources and the associated costs. The definition of efficient fertigation strategies is a complex problem since fertigation requirements vary on the basis of different factors, and crops are sensitive to small variations on fertigation parameters. To the best of author knowledge, a small-scale test bench that is flexible for both nutrient solution preparation and precise irrigation is currently missing, limiting the investigations in standard practices for soilless culture. Starting from the analysis of the state of the art, this paper proposes a small-scale system that is potentially able to concurrently test different fertigation strategies. The system will be designed and implemented throughout a three year project started on August 2018. However, due to the importance of the topic within current challenges as food security and climate change, this work is spread considering that may inspire other universities and organizations.Keywords: soilless culture, fertigation, test bench, small-scale, automation
Procedia PDF Downloads 17723189 Study and Analysis of the Factors Affecting Road Safety Using Decision Tree Algorithms
Authors: Naina Mahajan, Bikram Pal Kaur
Abstract:
The purpose of traffic accident analysis is to find the possible causes of an accident. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. This paper discusses the classification techniques C4.5 and ID3 using the WEKA Data mining tool. These techniques use on the NH (National highway) dataset. With the C4.5 and ID3 technique it gives best results and high accuracy with less computation time and error rate.Keywords: C4.5, ID3, NH(National highway), WEKA data mining tool
Procedia PDF Downloads 33823188 Geopotential Models Evaluation in Algeria Using Stochastic Method, GPS/Leveling and Topographic Data
Authors: M. A. Meslem
Abstract:
For precise geoid determination, we use a reference field to subtract long and medium wavelength of the gravity field from observations data when we use the remove-compute-restore technique. Therefore, a comparison study between considered models should be made in order to select the optimal reference gravity field to be used. In this context, two recent global geopotential models have been selected to perform this comparison study over Northern Algeria. The Earth Gravitational Model (EGM2008) and the Global Gravity Model (GECO) conceived with a combination of the first model with anomalous potential derived from a GOCE satellite-only global model. Free air gravity anomalies in the area under study have been used to compute residual data using both gravity field models and a Digital Terrain Model (DTM) to subtract the residual terrain effect from the gravity observations. Residual data were used to generate local empirical covariance functions and their fitting to the closed form in order to compare their statistical behaviors according to both cases. Finally, height anomalies were computed from both geopotential models and compared to a set of GPS levelled points on benchmarks using least squares adjustment. The result described in details in this paper regarding these two models has pointed out a slight advantage of GECO global model globally through error degree variances comparison and ground-truth evaluation.Keywords: quasigeoid, gravity aomalies, covariance, GGM
Procedia PDF Downloads 13723187 Design of Strain Sensor Based on Cascaded Fiber Bragg Grating for Remote Sensing Monitoring Application
Authors: Arafat A. A. Shabaneh
Abstract:
Harsh environments demand a developed detection of an optical communication system to ensure a high level of security and safety. Fiber Bragg gratings (FBG) are emerging sensing instruments that respond to variations in strain and temperature via varying wavelengths. In this paper, cascaded uniform FBG as a strain sensor for 6 km length at 1550 nm wavelength with 30 oC is designed with analyzing of dynamic strain and wavelength shifts. FBG is placed in a small segment of optical fiber, which reflects light of a specific wavelength and passes the remaining wavelengths. This makes a periodic alteration in the refractive index within the fiber core. The alteration in the modal index of fiber produced due to strain consequences in a Bragg wavelength. When the developed sensor exposure to a strain of cascaded uniform FBG by 0.01, the wavelength is shifted to 0.0000144383 μm. The sensing accuracy of the developed sensor is 0.0012. Simulation results show reliable and effective strain monitoring sensors for remote sensing applications.Keywords: Cascaded fiber Bragg gratings, Strain sensor, Remote sensing, Wavelength shift
Procedia PDF Downloads 20123186 Analysis of Transformer Reactive Power Fluctuations during Adverse Space Weather
Authors: Patience Muchini, Electdom Matandiroya, Emmanuel Mashonjowa
Abstract:
A ground-end manifestation of space weather phenomena is known as geomagnetically induced currents (GICs). GICs flow along the electric power transmission cables connecting the transformers and between the grounding points of power transformers during significant geomagnetic storms. Geomagnetically induced currents have been studied in other regions and have been noted to affect the power grid network. In Zimbabwe, grid failures have been experienced, but it is yet to be proven if these failures have been due to GICs. The purpose of this paper is to characterize geomagnetically induced currents with a power grid network. This paper analyses data collected, which is geomagnetic data, which includes the Kp index, DST index, and the G-Scale from geomagnetic storms and also analyses power grid data, which includes reactive power, relay tripping, and alarms from high voltage substations and then correlates the data. This research analysis was first theoretically analyzed by studying geomagnetic parameters and then experimented upon. To correlate, MATLAB was used as the basic software to analyze the data. Latitudes of the substations were also brought into scrutiny to note if they were an impact due to the location as low latitudes areas like most parts of Zimbabwe, there are less severe geomagnetic variations. Based on theoretical and graphical analysis, it has been proven that there is a slight relationship between power system failures and GICs. Further analyses can be done by implementing measuring instruments to measure any currents in the grounding of high-voltage transformers when geomagnetic storms occur. Mitigation measures can then be developed to minimize the susceptibility of the power network to GICs.Keywords: adverse space weather, DST index, geomagnetically induced currents, KP index, reactive power
Procedia PDF Downloads 11423185 A Study on the HTML5 Based Multi Media Contents Authority Tool
Authors: Heesuk Seo, Yongtae Kim
Abstract:
Online learning started in the 1990s, the spread of the Internet has been through the era of e-learning paradigm of online education in the era of smart learning change. Reflecting the different nature of the mobile to anywhere anytime, anywhere was also allows the form of learning, it was also available through the learning content and interaction. We are developing a cloud system, 'TLINKS CLOUD' that allows you to configure the environment of the smart learning without the need for additional infrastructure. Using the big-data analysis for e-learning contents, we provide an integrated solution for e-learning tailored to individual study.Keywords: authority tool, big data analysis, e-learning, HTML5
Procedia PDF Downloads 40723184 Arduino Pressure Sensor Cushion for Tracking and Improving Sitting Posture
Authors: Andrew Hwang
Abstract:
The average American worker sits for thirteen hours a day, often with poor posture and infrequent breaks, which can lead to health issues and back problems. The Smart Cushion was created to alert individuals of their poor postures, and may potentially alleviate back problems and correct poor posture. The Smart Cushion is a portable, rectangular, foam cushion, with five strategically placed pressure sensors, that utilizes an Arduino Uno circuit board and specifically designed software, allowing it to collect data from the five pressure sensors and store the data on an SD card. The data is then compiled into graphs and compared to controlled postures. Before volunteers sat on the cushion, their levels of back pain were recorded on a scale from 1-10. Data was recorded for an hour during sitting, and then a new, corrected posture was suggested. After using the suggested posture for an hour, the volunteers described their level of discomfort on a scale from 1-10. Different patterns of sitting postures were generated that were able to serve as early warnings of potential back problems. By using the Smart Cushion, the areas where different volunteers were applying the most pressure while sitting could be identified, and the sitting postures could be corrected. Further studies regarding the relationships between posture and specific regions of the body are necessary to better understand the origins of back pain; however, the Smart Cushion is sufficient for correcting sitting posture and preventing the development of additional back pain.Keywords: Arduino Sketch Algorithm, biomedical technology, pressure sensors, Smart Cushion
Procedia PDF Downloads 13423183 Project Management Practices and Operational Challenges in Conflict Areas: Case Study Kewot Woreda North Shewa Zone, Amhara Region, Ethiopia
Authors: Rahel Birhane Eshetu
Abstract:
This research investigates the complex landscape of project management practices and operational challenges in conflict-affected areas, with a specific focus on Kewot Woreda in the North Shewa Zone of the Amhara region in Ethiopia. The study aims to identify essential project management methodologies, the significant operational hurdles faced, and the adaptive strategies employed by project managers in these challenging environments. Utilizing a mixed-methods approach, the research combines qualitative and quantitative data collection. Initially, a comprehensive literature review was conducted to establish a theoretical framework. This was followed by the administration of questionnaires to gather empirical data, which was then analyzed using statistical software. This sequential approach ensures a robust understanding of the context and challenges faced by project managers. The findings reveal that project managers in conflict zones encounter a range of escalating challenges. Initially, they must contend with immediate security threats and the presence of displaced populations, which significantly disrupt project initiation and execution. As projects progress, additional challenges arise, including limited access to essential resources and environmental disruptions such as natural disasters. These factors exacerbate the operational difficulties that project managers must navigate. In response to these challenges, the study highlights the necessity for project managers to implement formal project plans while simultaneously adopting adaptive strategies that evolve over time. Key adaptive strategies identified include flexible risk management frameworks, change management practices, and enhanced stakeholder engagement approaches. These strategies are crucial for maintaining project momentum and ensuring that objectives are met despite the unpredictable nature of conflict environments. The research emphasizes that structured scope management, clear documentation, and thorough requirements analysis are vital components for effectively navigating the complexities inherent in conflict-affected regions. However, the ongoing threats and logistical barriers necessitate a continuous adjustment to project management methodologies. This adaptability is not only essential for the immediate success of projects but also for fostering long-term resilience within the community. Concluding, the study offers actionable recommendations aimed at improving project management practices in conflict zones. These include the adoption of adaptive frameworks specifically tailored to the unique conditions of conflict environments and targeted training for project managers. Such training should focus on equipping managers with the skills to better address the dynamic challenges presented by conflict situations. The insights gained from this research contribute significantly to the broader field of project management, providing a practical guide for practitioners operating in high-risk areas. By emphasizing sustainable and resilient project outcomes, this study underscores the importance of adaptive management strategies in ensuring the success of projects in conflict-affected regions. The findings serve not only to enhance the understanding of project management practices in Kewot Woreda but also to inform future research and practice in similar contexts, ultimately aiming to promote stability and development in areas beset by conflict.Keywords: project management practices, operational challenges, conflict zones, adaptive strategies
Procedia PDF Downloads 1523182 Calculation the Left Ventricle Wall Radial Strain and Radial SR Using Tagged Magnetic Resonance Imaging Data (tMRI)
Authors: Mohammed Alenezy
Abstract:
The function of cardiac motion can be used as an indicator of the heart abnormality by evaluating longitudinal, circumferential, and Radial Strain of the left ventricle. In this paper, the Radial Strain and SR is studied using tagged MRI (tMRI) data during the cardiac cycle on the mid-ventricle level of the left ventricle. Materials and methods: The short-axis view of the left ventricle of five healthy human (three males and two females) and four healthy male rats were imaged using tagged magnetic resonance imaging (tMRI) technique covering the whole cardiac cycle on the mid-ventricle level. Images were processed using Image J software to calculate the left ventricle wall Radial Strain and radial SR. The left ventricle Radial Strain and radial SR were calculated at the mid-ventricular level during the cardiac cycle. The peak Radial Strain for the human and rat heart was 40.7±1.44, and 46.8±0.68 respectively, and it occurs at 40% of the cardiac cycle for both human and rat heart. The peak diastolic and systolic radial SR for human heart was -1.78 s-1 ± 0.02 s-1 and 1.10±0.08 s-1 respectively, while for rat heart it was -5.16± 0.23s-1 and 4.25±0.02 s-1 respectively. Conclusion: This results show the ability of the tMRI data to characterize the cardiac motion during the cardiac cycle including diastolic and systolic phases which can be used as an indicator of the cardiac dysfunction by estimating the left ventricle Radial Strain and radial SR at different locations of the cardiac tissue. This study approves the validity of the tagged MRI data to describe accurately the cardiac radial motion.Keywords: left ventricle, radial strain, tagged MRI, cardiac cycle
Procedia PDF Downloads 48323181 Humanitarian Aid and National Sovereignty: The Case of Kosovo
Authors: Nick Papanikolaou
Abstract:
In modern world politics, International relations are very complex not only in their construction but also in their interpretation the ex-Yugoslavian(western Balkans) countries, due to the establishment of independent states, have also risen pending geopolitical and territorial issues such as the Kosovo dispute widely known as an active frozen conflict. Science of anthropology and its subfield of anthropology of conflict can suggest a sustainable plan of communities coexistence and abolishment of fondamentalism. The 1244 Security Council Resolution provides a framework of implementation of a transitional international joint international armed presence for ensuring control and stability in the territory. The changing international relations landscape and the rise of the integration of the Western Balkans in the European Union have brought the question of Kosovo and all the till now internationally controlled system of governance to a dead end. A new solution that will ensure a sustainable future needs to be applied in order to solve this case in a way that rights of both albanians and Serbians will be equally respected and both populations will coexist peacefully. What this presentation aims for is to present a plan for the peaceful coexistence and sovreignty of habitants of Kosovo in a whole new way of governance.Keywords: sovereignty, Kosovo, Western Balkans, anthropology of conflict
Procedia PDF Downloads 7023180 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population
Authors: Blanka Havlickova
Abstract:
In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.Keywords: terrorism, security measures, priming, risk perception
Procedia PDF Downloads 250