Search results for: slope factor of safety
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8705

Search results for: slope factor of safety

4505 Futuristic Black Box Design Considerations and Global Networking for Real Time Monitoring of Flight Performance Parameters

Authors: K. Parandhama Gowd

Abstract:

The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.

Keywords: flight data recorder (FDR), black box, diagnostic tool, global networking, cockpit voice and data recorder (CVDR), air traffic control (ATC), air traffic, telemetry, tracking and control centers ATTTCC)

Procedia PDF Downloads 568
4504 Optimization of Pressure in Deep Drawing Process

Authors: Ajay Kumar Choubey, Geeta Agnihotri, C. Sasikumar, Rashmi Dwivedi

Abstract:

Deep-drawing operations are performed widely in industrial applications. It is very important for efficiency to achieve parts with no or minimum defects. Deep drawn parts are used in high performance, high strength and high reliability applications where tension, stress, load and human safety are critical considerations. Wrinkling is a kind of defect caused by stresses in the flange part of the blank during metal forming operations. To avoid wrinkling appropriate blank-holder pressure/force or drawbead can be applied. Now-a-day computer simulation plays a vital role in the field of manufacturing process. So computer simulation of manufacturing has much advantage over previous conventional process i.e. mass production, good quality of product, fast working etc. In this study, a two dimensional elasto-plastic Finite Element (F.E.) model for Mild Steel material blank has been developed to study the behavior of the flange wrinkling and deep drawing parameters under different Blank-Holder Pressure (B.H.P.). For this, commercially available Finite Element software ANSYS 14 has been used in this study. Simulation results are critically studied and salient conclusions have been drawn.

Keywords: ANSYS, deep drawing, BHP, finite element simulation, wrinkling

Procedia PDF Downloads 446
4503 Research Attitude: Its Factor Structure and Determinants in the Graduate Level

Authors: Janet Lynn S. Montemayor

Abstract:

Dropping survivability and rising drop-out rate in the graduate school is attributed to the demands that come along with research-related requirements. Graduate students tend to withdraw from their studies when confronted with such requirements. This act of succumbing to the challenge is primarily due to a negative mindset. An understanding of students’ view towards research is essential for teachers in facilitating research activities in the graduate school. This study aimed to develop a tool that accurately measures attitude towards research. Psychometric properties of the Research Attitude Inventory (RAIn) was assessed. A pool of items (k=50) was initially constructed and was administered to a development sample composed of Masters and Doctorate degree students (n=159). Results show that the RAIn is a reliable measure of research attitude (k=41, αmax = 0.894). Principal component analysis using orthogonal rotation with Kaiser normalization identified four underlying factors of research attitude, namely predisposition, purpose, perspective, and preparation. Research attitude among the respondents was analyzed using this measure.

Keywords: graduate education, principal component analysis, research attitude, scale development

Procedia PDF Downloads 189
4502 The Use of Semantic Mapping Technique When Teaching English Vocabulary at Saudi Schools

Authors: Mohammed Hassan Alshaikhi

Abstract:

Vocabulary is essential factor of learning and mastering any languages, and it helps learners to communicate with others and to be understood. The aim of this study was to examine whether semantic mapping technique was helpful in terms of improving student's English vocabulary learning comparing to the traditional technique. The students’ age was between 11 and 13 years old. There were 60 students in total who participated in this study. 30 students were in the treatment group (target vocabulary items were taught with semantic mapping). The other 30 students were in the control group (the target vocabulary items were taught by a traditional technique). A t-test was used with the results of pre-test and post-test in order to examine the outcomes of using semantic mapping when teaching vocabulary. The results showed that the vocabulary mastery in the treatment group was increased more than the control group.

Keywords: English language, learning vocabulary, Saudi teachers, semantic mapping, teaching vocabulary strategies

Procedia PDF Downloads 245
4501 Study of the Influence of Eccentricity Due to Configuration and Materials on Seismic Response of a Typical Building

Authors: A. Latif Karimi, M. K. Shrimali

Abstract:

Seismic design is a critical stage in the process of design and construction of a building. It includes strategies for designing earthquake-resistant buildings to ensure health, safety, and security of the building occupants and assets. Hence, it becomes very important to understand the behavior of structural members precisely, for construction of buildings that can yield a better response to seismic forces. This paper investigates the behavior of a typical structure when subjected to ground motion. The corresponding mode shapes and modal frequencies are studied to interpret the response of an actual structure using different fabricated models and 3D visual models. In this study, three different structural configurations are subjected to horizontal ground motion, and the effect of “stiffness eccentricity” and placement of infill walls are checked to determine how each parameter contributes in a building’s response to dynamic forces. The deformation data from lab experiments and the analysis on SAP2000 software are reviewed to obtain the results. This study revealed that seismic response in a building can be improved by introducing higher deformation capacity in the building. Also, proper design of infill walls and maintaining a symmetrical configuration in a building are the key factors in building stability during the earthquake.

Keywords: eccentricity, seismic response, mode shape, building configuration, building dynamics

Procedia PDF Downloads 196
4500 Problems Arising in Visual Perception

Authors: K. A. Tharanga, K. H. H. Damayanthi

Abstract:

Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object.seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just anmassive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.

Keywords: empirical, perception, sceptisism, nihilism

Procedia PDF Downloads 87
4499 Retrospective Analysis of Injuries to Flight Attendants in a Commercial Airliner

Authors: B. K. Umesh Kumar, Waleed Al Shukaili

Abstract:

Air travel is one of the safest modes of travel. Inflight injuries occur due to various factors such as air turbulence, spillage of hot liquids, and fall of improperly stowed overhead baggage. Injuries occur not only to passengers but also to the flight attendants who are handling the passengers throughout the flight. A retrospective study of all records of crew safety report by the captain of the aircraft for all the flights from 01 Mar 2015 to 31 Mar 2019 in a National Carrier of Middle Eastern country, were analyzed. There was one injury to Flight attendant every 1200 flights. Commonest aircraft involved was Boeing. Inflight phase had 82% of all injuries. 63% of accidents involved female Attendants. Commonest age group involved was from 25-30 years. Cart and container injuries were the commonest and accounted for nearly 62% of the total injuries followed by turbulence. Back injuries were the commonest injuries followed by ankle, shoulder, and burns. Mean days of absence from work seen in shoulder injuries 40 days followed by injuries to back, which accounted for 38 Days. Reduction in injuries to flight attendants can be brought about by proper selection of crew, reduction in cart load. Proper maintenance of cart and container plays a major role in prevention of occupational accidents.

Keywords: flight attendants, in-flight injuries, types of injuries, work related injury prevention

Procedia PDF Downloads 119
4498 The Appropriateness of Antibiotic Prescribing within Dundee Dental Hospital

Authors: Salma Ainine, Colin Ritchie, Tracey McFee

Abstract:

Background: The societal impact of antibiotic resistance is a major public health concern. The increase in the incidence of resistant bacteria can ultimately be fatal. Objective: To analyse the appropriateness of antibiotic prescribing in Dundee Dental Hospital, ultimately improving the safety and quality of patient care. Methods: Two examiners independently cross-checked approximately fifty consecutive prescriptions, and corresponding patient case notes, for three data collection cycles between August 2014–September 2015. The Scottish Dental Clinical Effectiveness Program (SDCEP) Drug Prescribing for Dentistry guidelines was the standard utilised. The criteria: clinical justification, regime justification, and review arrangements was measured, and compared to the standard. Results: Cycle one revealed 42% of antibiotic prescriptions were appropriate. Interventions included: multiple staff meetings, an introduction of a checklist attached to the prescription pack, and production of patient leaflets explaining indications for antibiotics. Cycle two and three revealed 44%, and 30% compliance, respectively. Conclusion: The results of the audit have yet to meet target standards set out in prescribing guidelines. However, steps are being taken and change has occurred on a cultural level.

Keywords: antibiotic resistance, antibiotic stewardship, dental infection, hygiene standards

Procedia PDF Downloads 224
4497 Disaster Nursing Competency of Nurses in Surattani Province, Thailand: A Factor Analysis

Authors: Rungnapa Chantra

Abstract:

As health care rapidly changes, the nursing profession is also evolving to improve quality of care while maintaining competency in their practice. The purpose of this study was to investigate the factors of disaster nurse competencies and investigate the predictable variables in disaster nurse competencies in Suratthani Province, Thailand. The sample consisted of 305 nurses who were recruited by simple random sampling. The development questionnaires from ICN Framework and research contains Pre/Mitigation, Preparedness, Response and Recovery/Rehabilitation Competencies (α=0.87). The data were analyzed using Principle Components Extraction and Orthogonal Rotation with Varimax Method. The findings were as follows; four significant factors of disaster nurse competencies in Suratthani Province, Thailand were identified. These factors were described by 62 variables that accounted for 50.01% of the total variance. The results of this study could be for agencies that are responsible for the development of nursing competencies and should be aware of the development of knowledge and skills in disaster management.

Keywords: disaster nursing competency of nurses, nursing informatics, health science, medical

Procedia PDF Downloads 362
4496 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 180
4495 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 263
4494 Heat and Flow Analysis of Solar Air Heaters with Artificial Roughness on the Absorber

Authors: Amel Boulemtafes-Boukadoum, Ahmed Benzaoui

Abstract:

Solar air heaters (SAH) are widely used in heating and drying applications using solar energy. Their efficiency needs to be improved to be competitive towards solar water heater. In this work, our goal is to study heat transfer enhancement in SAHs by the use of artificial roughness on the absorber. For this purpose, computational fluid dynamics (CFD) simulations were carried out to analyze the flow and heat transfer in the air duct of a solar air heater provided with transverse ribs. The air flows in forced convection and the absorber is heated with uniform flux. The effect of major parameters (Reynolds number, solar radiation, air inlet temperature, geometry of roughness) is examined and discussed. To highlight the effect of artificial roughness, we plotted the distribution of the important parameters: Nusselt number, friction factor, global thermohydraulic performance parameter etc. The results obtained are concordant to those found in the literature and shows clearly the heat transfer enhancement due to artifical roughness.

Keywords: solar air heater, artificial roughness, heat transfer enhancement, CFD

Procedia PDF Downloads 566
4493 Beliefs in Auspicious Materials of Shop Entrepreneurs in Maung Hat Yai, Thailand

Authors: Punya Tepsing

Abstract:

This research aimed to study the beliefs in auspicious materials of entrepreneurs in Muang Hat Yai. The data were collected via documentary research and field work including interviews, observations shops in Hat Yai which used auspicious materials to bring lucks to the shops. The results were as follows. The beliefs in auspicious materials that the entrepreneurs had were of three areas: 1) The auspicious materials could correct the improperness of the shop location, for example, the shop situated opposite a branch road, a shrine, or a bank. The owner usually corrected it by putting Chinese auspicious materials in front of or in the shop, for example, a lion holding a sword in his mouth, or a mirror, etc. 2) The auspicious materials could bring in more income. The owner of the shop usually put the auspicious materials such as a cat beckoning and a bamboo fish trap believed to trap money in front of or inside the shop. 3) The auspicious materials like turtles, paired fish and a monster holding the moon in his mouth could solve life problems including health, family, and safety problems. The use of these auspicious materials showed the blending of the beliefs of the Chinese shop entrepreneurs with the Thai folk beliefs. What is interesting is that Hat Yai is located near the three southern border provinces which are the unrest area and this may cause the number of tourists to decline. This prompted them to build a mechanism in adjusting themselves both to save their lives and to increase the number of customers. Auspicious materials can make them feel more confident.

Keywords: belief, auspicious materials, shop, entrepreneur, Maung Hat Yai

Procedia PDF Downloads 237
4492 CTHTC: A Convolution-Backed Transformer Architecture for Temporal Knowledge Graph Embedding with Periodicity Recognition

Authors: Xinyuan Chen, Mohd Nizam Husen, Zhongmei Zhou, Gongde Guo, Wei Gao

Abstract:

Temporal Knowledge Graph Completion (TKGC) has attracted increasing attention for its enormous value; however, existing models lack capabilities to capture both local interactions and global dependencies simultaneously with evolutionary dynamics, while the latest achievements in convolutions and Transformers haven't been employed in this area. What’s more, periodic patterns in TKGs haven’t been fully explored either. To this end, a multi-stage hybrid architecture with convolution-backed Transformers is introduced in TKGC tasks for the first time combining the Hawkes process to model evolving event sequences in a continuous-time domain. In addition, the seasonal-trend decomposition is adopted to identify periodic patterns. Experiments on six public datasets are conducted to verify model effectiveness against state-of-the-art (SOTA) methods. An extensive ablation study is carried out accordingly to evaluate architecture variants as well as the contributions of independent components in addition, paving the way for further potential exploitation. Besides complexity analysis, input sensitivity and safety challenges are also thoroughly discussed for comprehensiveness with novel methods.

Keywords: temporal knowledge graph completion, convolution, transformer, Hawkes process, periodicity

Procedia PDF Downloads 75
4491 Reinforced Concrete Slab under Static and Dynamic Loading

Authors: Aaron Aboshio, Jianqiao Ye

Abstract:

In this study, static and dynamic responses of a typical reinforced concrete flat slab, designed to British Standard (BS 8110, 1997) and under self and live loadings for dance halls are reported. Linear perturbation analysis using finite element method was employed for modal, impulse loading and frequency response analyses of the slab under the aforementioned loading condition. Results from the static and dynamic analyses, comprising of the slab fundamental frequencies and mode shapes, dynamic amplification factor, maximum deflection, stress distributions among other valuable outcomes are presented and discussed. These were gauged with the limiting provisions in the design code with a view to optimise the structure and ensure both adequate strength and economical section for large clear span slabs. This is necessary owing to the continued increase in cost of erecting building structures and the squeeze on public finance globally.

Keywords: economical design, finite element method, modal dynamics, reinforced concrete, slab

Procedia PDF Downloads 318
4490 Contactless Heart Rate Measurement System based on FMCW Radar and LSTM for Automotive Applications

Authors: Asma Omri, Iheb Sifaoui, Sofiane Sayahi, Hichem Besbes

Abstract:

Future vehicle systems demand advanced capabilities, notably in-cabin life detection and driver monitoring systems, with a particular emphasis on drowsiness detection. To meet these requirements, several techniques employ artificial intelligence methods based on real-time vital sign measurements. In parallel, Frequency-Modulated Continuous-Wave (FMCW) radar technology has garnered considerable attention in the domains of healthcare and biomedical engineering for non-invasive vital sign monitoring. FMCW radar offers a multitude of advantages, including its non-intrusive nature, continuous monitoring capacity, and its ability to penetrate through clothing. In this paper, we propose a system utilizing the AWR6843AOP radar from Texas Instruments (TI) to extract precise vital sign information. The radar allows us to estimate Ballistocardiogram (BCG) signals, which capture the mechanical movements of the body, particularly the ballistic forces generated by heartbeats and respiration. These signals are rich sources of information about the cardiac cycle, rendering them suitable for heart rate estimation. The process begins with real-time subject positioning, followed by clutter removal, computation of Doppler phase differences, and the use of various filtering methods to accurately capture subtle physiological movements. To address the challenges associated with FMCW radar-based vital sign monitoring, including motion artifacts due to subjects' movement or radar micro-vibrations, Long Short-Term Memory (LSTM) networks are implemented. LSTM's adaptability to different heart rate patterns and ability to handle real-time data make it suitable for continuous monitoring applications. Several crucial steps were taken, including feature extraction (involving amplitude, time intervals, and signal morphology), sequence modeling, heart rate estimation through the analysis of detected cardiac cycles and their temporal relationships, and performance evaluation using metrics such as Root Mean Square Error (RMSE) and correlation with reference heart rate measurements. For dataset construction and LSTM training, a comprehensive data collection system was established, integrating the AWR6843AOP radar, a Heart Rate Belt, and a smart watch for ground truth measurements. Rigorous synchronization of these devices ensured data accuracy. Twenty participants engaged in various scenarios, encompassing indoor and real-world conditions within a moving vehicle equipped with the radar system. Static and dynamic subject’s conditions were considered. The heart rate estimation through LSTM outperforms traditional signal processing techniques that rely on filtering, Fast Fourier Transform (FFT), and thresholding. It delivers an average accuracy of approximately 91% with an RMSE of 1.01 beat per minute (bpm). In conclusion, this paper underscores the promising potential of FMCW radar technology integrated with artificial intelligence algorithms in the context of automotive applications. This innovation not only enhances road safety but also paves the way for its integration into the automotive ecosystem to improve driver well-being and overall vehicular safety.

Keywords: ballistocardiogram, FMCW Radar, vital sign monitoring, LSTM

Procedia PDF Downloads 70
4489 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 136
4488 In-door Localization Algorithm and Appropriate Implementation Using Wireless Sensor Networks

Authors: Adeniran K. Ademuwagun, Alastair Allen

Abstract:

The relationship dependence between RSS and distance in an enclosed environment is an important consideration because it is a factor that can influence the reliability of any localization algorithm founded on RSS. Several algorithms effectively reduce the variance of RSS to improve localization or accuracy performance. Our proposed algorithm essentially avoids this pitfall and consequently, its high adaptability in the face of erratic radio signal. Using 3 anchors in close proximity of each other, we are able to establish that RSS can be used as reliable indicator for localization with an acceptable degree of accuracy. Inherent in this concept, is the ability for each prospective anchor to validate (guarantee) the position or the proximity of the other 2 anchors involved in the localization and vice versa. This procedure ensures that the uncertainties of radio signals due to multipath effects in enclosed environments are minimized. A major driver of this idea is the implicit topological relationship among sensors due to raw radio signal strength. The algorithm is an area based algorithm; however, it does not trade accuracy for precision (i.e the size of the returned area).

Keywords: anchor nodes, centroid algorithm, communication graph, radio signal strength

Procedia PDF Downloads 504
4487 Gender, Agency, and Health: An Exploratory Study Using an Ethnographic Material for Illustrative Reasons

Authors: S. Gustafsson

Abstract:

The aim of this paper is to explore the connection between gender, agency, and health on personal and social levels over time. The use of gender as an analytical tool for health research has been shown to be useful to explore thoughts and ideas that are taken for granted, which have relevance for health. The paper highlights the following three issues. There are multiple forms of femininity and masculinity. Agency and social structure are closely related and referred to in this paper as 'gender agency'. Gender is illuminated as a product of history but also treated as a social factor and a producer of history. As a prominent social factor in the process of shaping living conditions, gender is highlighted as being significant for understanding health. To make health explicit as a dynamic and complex concept and not merely the opposite of disease requires a broader alliance with feminist theory and a post-Bourdieusian framework. A personal story, included with other ethnographic material about women’s networking in rural Sweden, is used as an empirical illustration. Ethnographic material was chosen for its ability to illustrate historical, local, and cultural ways of doing gendered and capitalized health. New concepts characterize ethnography, exemplified in this study by 'processes of transformation'. The semi-structured interviews followed an interview guide drafted with reference to the background theory of gender. The interviews lasted about an hour and were recorded and transcribed verbatim. The transcribed interviews and the author’s field notes formed the basis for the writing up of this paper. Initially, the participants' interests in weaving, sewing, and various handicrafts became obvious foci for networking activities and seemed at first to shape compliance with patriarchy, which generally does the opposite of promoting health. However, a significant event disrupted the stability of this phenomenon. What was permissible for the women began to crack and new spaces opened up. By exploiting these new spaces, the participants found opportunities to try out alternatives to emphasized femininity. Over time, they began combining feminized activities with degrees of masculinity, as leadership became part of the activities. In response to this, masculine enactment was gradually transformed and became increasingly gender neutral. As the tasks became more gender neutral the activities assumed a more formal character and the women stretched the limits of their capacity by enacting gender agency, a process the participants referred to as 'personal growth' and described as health promotion. What was described in terms of 'personal growth' can be interpreted as the effects of a raised status. Participation in women’s networking strengthened the participants’ structural position. More specifically, it was the gender-neutral position that was rewarded. To clarify the connection between gender, agency, and health on personal and social levels over time the concept processes of transformation is used. This concept is suggested as a dynamic equivalent to habitus. Health is thus seen as resulting from situational access to social recognition, prestige, capital assets and not least, meanings of gender.

Keywords: a cross-gender bodily hexis, gender agency, gender as analytical tool, processes of transformation

Procedia PDF Downloads 151
4486 Corruption and the Entrenchment of the Rule of Law in Nigeria

Authors: Grace Titilayo, Kolawole-Amao

Abstract:

Influence and authority of law within society should be respected by all and sundry regardless of individual status. Rule of law implies that every citizen is subject to the law. In a society governed by the rule of law, government and its officials and agents are also held subject to and accountable under the law. Law should not be employed to suit individual tenets. Where the rule of law operates, the government is the government of law and not of men. Corruption is a factor that kills the growth of the rule of law. Where corruption flourishes, the rule of law fails, simply put, corruption is a threat to the rule of law. It bastardized and undermines the rule of law and good governance principles - where men rule at their discretion rather than the use of the rule of law which makes governance processes ineffective. Corruption is prevalent all over the world, and has extremely far reaching effects. Many of the world’s greatest challenges have been amplified by corruption, for example poverty, unequal distribution of wealth and resources, and world hunger and it weakens the application and the entrenchment of the rule of law. It saps citizens' trust in their governments and undercuts government credibility. This paper will discuss the rule of law in the present democratic system in Nigeria, the impact of corruption on the rule of law in Nigeria and how corruption undermines and subverts the entrenchment of the rule of law in the present day Nigeria.

Keywords: rule of law, corruption, Nigeria, influence, authority

Procedia PDF Downloads 554
4485 A Systematic Review for Promotion of Sustainable Fisheries and Aquaculture: A Global Perspective

Authors: Soma Gholamveisy, Vahid Mirghavameddin

Abstract:

Aquaculture activities face wide environmental, social, and economic problems today. To deal with these problems, the aquaculture business, which is already a highly significant agricultural activity, is influenced by sustainability, which can assure the rural community's safety and food health with minimal environmental damage. The objective of this study's systematic review of the literature (SLR) is to look into the use of global perspective Promotion of Sustainable Fisheries and Aquaculture. SLR aims to identify the goals of a promotional system, also one of its main components. This research seeks to empower, increase economic productivity, facilitate, pay more attention to the sustainability of the environment and inform the audience in this regard. A method used to assess hypotheses, condense the results of past studies or verify the consistency of studies. It presents a succinct analysis of original research using an unambiguous and verifiable approach. A thorough repository with a vast array of papers and effective exploration methods are frequently utilized in a systematic literature review, enabling the application of advanced logical statements. A comprehensive literature review was carried out to ensure that the most relevant studies were included. This type of review clarifies publication selection criteria and allows evaluation of the studies conducted and their repetition or extension.

Keywords: systematic review, sustainable, fisheries, aquaculture

Procedia PDF Downloads 90
4484 Development of Numerical Model to Compute Water Hammer Transients in Pipe Flow

Authors: Jae-Young Lee, Woo-Young Jung, Myeong-Jun Nam

Abstract:

Water hammer is a hydraulic transient problem which is commonly encountered in the penstocks of hydropower plants. The numerical model was developed to estimate the transient behavior of pressure waves in pipe systems. The computational algorithm was proposed to model the water hammer phenomenon in a pipe system with pump shutdown at midstream and sudden valve closure at downstream. To predict the pressure head and flow velocity as a function of time as a result of rapidly closing a valve and pump shutdown, two boundary conditions at the ends considering pump operation and valve control can be implemented as specified equations of the pressure head and flow velocity based on the characteristics method. It was shown that the effects of transient flow make it determine the needs for protection devices, such as surge tanks, surge relief valves, or air valves, at various points in the system against overpressure and low pressure. It produced reasonably good performance with the results of the proposed transient model for pipeline systems. The proposed numerical model can be used as an efficient tool for the safety assessment of hydropower plants due to water hammer.

Keywords: water hammer, hydraulic transient, pipe systems, characteristics method

Procedia PDF Downloads 131
4483 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 336
4482 A Brief Review of Urban Green Vegetation (Green Wall) in Reduction of Air Pollution

Authors: Masoumeh Pirhadi

Abstract:

Air pollution is becoming a major health problem affecting millions. In support of this observation, the world health organization estimates that many people feel unhealthy due to pollution. This is a coupled fact that one of the main global sources of air pollution in cities is greenhouse gas emissions due heavy traffic. Green walls are developed as a sustainable strategy to reduce pollution by increasing vegetation in developed areas without occupying space in the city. This concept an offer advantageous environmental benefits and they can also be proposed for aesthetic purposes, and today they are used to preserve the urban environment. Green walls can also create environments that can promote a healthy lifestyle. Findings of multiple studies also indicate that Green infrastructure in cities is a strategy for improving air quality and increasing the sustainability of cities. Since these green solutions (green walls) act as porous materials that affect the diffusion of air pollution they can also act as a removing air vents that clean the air. Therefore, implementation of this strategy can be considered as a prominent factor in achieving a cleaner environment.

Keywords: green vegetation, air pollution, green wall, urban area

Procedia PDF Downloads 150
4481 Development of an Instrument: The Contemporary Adolescent Well-Being Scale (CAWBS)

Authors: Camille Rault, Mark Bahr

Abstract:

The aim of the present study was to develop a contemporaneous instrument measuring adolescent’s subjective well-being (SWB). The instrument development underwent a three-phase pilot study. Phase one (N = 31) used a qualitative approach to generate domains of SWB relevant to adolescents. During the second phase (N = 22), items were tested targeting these domains. Finally, the third phase (N = 22) assisted in addition, deletion and refinement according to the first two phases of the pilot. A total of 49 items were retained for the final version of the instrument. The Contemporary Adolescent Well-Being Scale (CAWBS) was administered to 1071 school children (599 girls) aged between ten to 18 years old (M = 14,70; SD = 1.45) from Queensland, Australia. Results confirmed the seven-factor construct hypothesized and explained 45% of the variance. The questionnaire pertained to seven domains of adolescent’s SWB, namely; Overall life satisfaction; Bullying; Body image; Social connectedness; Activities; Control appraisal; and Negative feelings. Reliability was shown to be acceptable with Cronbach’s alpha ranging from .58 to .89. Future research should refine the CAWBS and investigate the psychometric properties of this instrument.

Keywords: adolescence, construct validity, instrument, subjective well-being

Procedia PDF Downloads 266
4480 Factor Analysis of Self-Efficacy among Traniees in the National Service for the Healthy Lifestyle Program

Authors: Nuzsep Almigo, Md Amin Md Taff, Yusop Ahmad, Norkhalid Salimin, Gunathevan Elumalai

Abstract:

This research aimed to determine the level of self-efficacy in obese trainees before and after the Healthy Lifestyle Program. Self-efficacy is defined as the feeling, belief, perception, belief in the ability to cope with a particular situation that will influence the way individuals cope with the situation. Research instrument used was self efficacy questionnaire consisting of four main factors: (i) cognitive (abilities in a positive and realistic attitudes to the potential of to perform the duties, restrictions, or social desire), (ii) effective (mental management ability, feeling and mood), (iii) motivation (determination and the level of ability to achieve the purpose or goal), and (iv) selective (ability to choose the social conditions confronting and adapting to situations). The study sample consisted of 118 trainees from Healthy Lifestyle Program. The analysis showed there was a significant difference in self-efficacy before and after the Healthy Lifestyle Program (p = 0.00) indicated by increasing self-efficacy in the program.

Keywords: self efficacy, self-confidence, affective, motivation, selective

Procedia PDF Downloads 426
4479 The Factors Influencing Consumer Intentions to Use Internet Banking and Apps: A Case of Banks in Cambodia

Authors: Tithdanin Chav, Phichhang Ou

Abstract:

The study is about the e-banking consumer behavior of five major banks in Cambodia. This work aims to examine the relationships among job relevance, trust, mobility, perceived ease of use, perceived usefulness, attitude toward using, and intention to use of internet banking and apps. Also, the research develops and tests a conceptual model of intention to use internet banking by integrating the Technology Acceptance Model (TAM) and job relevance, trust, and mobility which were supported by Theory of Reasoned Action (TRA) and Theory of Planned Behavior (TPB). The proposed model was tested using Structural Equation Modeling (SEM), which was processed by using SPSS and AMOS with a sample size of 250 e-banking users. The results showed that there is a significant positive relationship among variables and attitudes toward using internet banking, and apps are the most factor influencing consumers’ intention to use internet banking and apps with the importance level in SEM 0.82 accounted by 82%. Significantly, all six hypotheses were accepted.

Keywords: bank apps, consumer intention, internet banking, technology acceptance model, TAM

Procedia PDF Downloads 138
4478 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 388
4477 Inflammatory Markers in the Blood and Chronic Periodontitis

Authors: Saimir Heta, Ilma Robo, Nevila Alliu, Tea Meta

Abstract:

Background: Plasma levels of inflammatory markers are the expression of the infectious wastes of existing periodontitis, as well as of existing inflammation everywhere in the body. Materials and Methods: The study consists of the clinical part of the measurement of inflammatory markers of 23 patients diagnosed with chronic periodontitis and the recording of parental periodontal parameters of patient periodontal status: hemorrhage index and probe values, before and 7-10 days after non-surgical periodontal treatment. Results: The level of fibrinogen drops according to the categorization of disease progression, active and passive, with the biggest % (18%-30%) at the fluctuation 10-20 mg/d. Fluctuations in fibrinogen level according to the age of patients in the range 0-10 mg/dL under 40 years and over 40 years was 13%-26%, in the range 10-20 mg/dL was 26%-22%, in the 20-40 mg/dL was 9%-4%. Conclusions: Non-surgical periodontal treatment significantly reduces the level of non-inflammatory markers in the blood. Oral health significantly reduces the potential source for periodontal bacteria, with the potential of promoting thromboembolism, through interaction between thrombocytes.

Keywords: chronic periodontitis, atherosclerosis, risk factor, inflammatory markers

Procedia PDF Downloads 121
4476 Reservoir Properties Effect on Estimating Initial Gas in Place Using Flowing Material Balance Method

Authors: Yousef S. Kh. S. Hashem

Abstract:

Accurate estimation of initial gas in place (IGIP) plays an important factor in the decision to develop a gas field. One of the methods that are available in the industry to estimate the IGIP is material balance. This method required that the well has to be shut-in while pressure is measured as it builds to average reservoir pressure. Since gas demand is high and shut-in well surveys are very expensive, flowing gas material balance (FGMB) is sometimes used instead of material balance. This work investigated the effect of reservoir properties (pressure, permeability, and reservoir size) on the estimation of IGIP when using FGMB. A gas reservoir simulator that accounts for friction loss, wellbore storage, and the non-Darcy effect was used to simulate 165 different possible causes (3 pressures, 5 reservoir sizes, and 11 permeabilities). Both tubing pressure and bottom-hole pressure were analyzed using FGMB. The results showed that the FGMB method is very sensitive for tied reservoirs (k < 10). Also, it showed which method is best to be used for different reservoir properties. This study can be used as a guideline for the application of the FGMB method.

Keywords: flowing material balance, gas reservoir, reserves, gas simulator

Procedia PDF Downloads 147