Search results for: military pilots
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 615

Search results for: military pilots

165 Potassium-Phosphorus-Nitrogen Detection and Spectral Segmentation Analysis Using Polarized Hyperspectral Imagery and Machine Learning

Authors: Nicholas V. Scott, Jack McCarthy

Abstract:

Military, law enforcement, and counter terrorism organizations are often tasked with target detection and image characterization of scenes containing explosive materials in various types of environments where light scattering intensity is high. Mitigation of this photonic noise using classical digital filtration and signal processing can be difficult. This is partially due to the lack of robust image processing methods for photonic noise removal, which strongly influence high resolution target detection and machine learning-based pattern recognition. Such analysis is crucial to the delivery of reliable intelligence. Polarization filters are a possible method for ambient glare reduction by allowing only certain modes of the electromagnetic field to be captured, providing strong scene contrast. An experiment was carried out utilizing a polarization lens attached to a hyperspectral imagery camera for the purpose of exploring the degree to which an imaged polarized scene of potassium, phosphorus, and nitrogen mixture allows for improved target detection and image segmentation. Preliminary imagery results based on the application of machine learning algorithms, including competitive leaky learning and distance metric analysis, to polarized hyperspectral imagery, suggest that polarization filters provide a slight advantage in image segmentation. The results of this work have implications for understanding the presence of explosive material in dry, desert areas where reflective glare is a significant impediment to scene characterization.

Keywords: explosive material, hyperspectral imagery, image segmentation, machine learning, polarization

Procedia PDF Downloads 118
164 Mechanical Properties and Microstructural Analyzes of Epoxy Resins Reinforced with Satin Tissue

Authors: Băilă Diana Irinel, Păcurar Răzvan, Păcurar Ancuța

Abstract:

Although the volumes of fibre reinforced polymer composites (FRPs) used for aircraft applications is a relatively small percentage of total use, the materials often find their most sophisticated applications in this industry. In aerospace, the performance criteria placed upon materials can be far greater than in other areas – key aspects are light-weight, high-strength, high-stiffness, and good fatigue resistance. Composites were first used by the military before the technology was applied to commercial planes. Nowadays, composites are widely used, and this has been the result of a gradual direct substitution of metal components followed by the development of integrated composite designs as confidence in FRPs has increased. The airplane uses a range of components made from composites, including the fin and tailplane. In the last years, composite materials are increasingly used in automotive applications due to the improvement of material properties. In the aerospace and automotive sector, the fuel consumption is proportional to the weight of the body of the vehicle. A minimum of 20% of the cost can be saved if it used polymer composites in place of the metal structures and the operating and maintenance costs are alco very low. Glass fiber-epoxy composites are widely used in the making of aircraft and automobile body parts and are not only limited to these fields but also used in ship building, structural applications in civil engineering, pipes for the transport of liquids, electrical insulators in reactors. This article was establish the high-performance of composite material, a type glass-epoxy used in automotive and aeronautic domains, concerning the tensile and flexural tests and SEM analyzes.

Keywords: glass-epoxy composite, traction and flexion tests, SEM analysis, acoustic emission (AE) signals

Procedia PDF Downloads 84
163 The Role of Cornulaca aucheri in Stabilization of Degraded Sandy Soil in Kuwait

Authors: Modi M. Ahmed, Noor Al-Dousari, Ali M. Al-Dousari

Abstract:

Cornulaca aucheri is an annual herb consider as disturbance indicator currently visible and widely distributed in disturbed lands in Liyah area. Such area is suffered from severe land degradation due to multiple interacting factors such as, overgrazing, gravel and sand quarrying, military activities and natural process. The restoration program is applied after refilled quarries sites and levelled the surface irregularities in order to rehabilitate the natural vegetation and wildlife to its original shape. During the past 10 years of rehabilitation, noticeable greenery healthy cover of Cornulaca sp. are shown specially around artificial lake and playas. The existence of such species in high density it means that restoration program has succeeded and transit from bare ground state to Cornulaca and annual forb state. This state is lower state of Range State Transition Succession model, but it is better than bare soil. Cornulaca spp is native desert plant grows in arid conditions on sandy, stony ground, near oasis, on sand dunes and in sandy depressions. The sheep and goats are repulsive of it. Despite its spiny leaves, it provides good grazing for camels and is said to increase the milk supply produced by lactating females. It is about 80 cm tall and has stems that branched from the base with new faster greenery growth in the summer. It shows good environmental potential to be managed as natural types used for the restoration of degraded lands in desert areas.

Keywords: land degradation, range state transition succession model, rehabilitation, restoration program

Procedia PDF Downloads 337
162 Body Farming in India and Asia

Authors: Yogesh Kumar, Adarsh Kumar

Abstract:

A body farm is a research facility where research is done on forensic investigation and medico-legal disciplines like forensic entomology, forensic pathology, forensic anthropology, forensic archaeology, and related areas of forensic veterinary. All the research is done to collect data on the rate of decomposition (animal and human) and forensically important insects to assist in crime detection. The data collected is used by forensic pathologists, forensic experts, and other experts for the investigation of crime cases and further research. The research work includes different conditions of a dead body like fresh, bloating, decay, dry, and skeleton, and data on local insects which depends on the climatic conditions of the local areas of that country. Therefore, it is the need of time to collect appropriate data in managed conditions with a proper set-up in every country. Hence, it is the duty of the scientific community of every country to establish/propose such facilities for justice and social management. The body farms are also used for training of police, military, investigative dogs, and other agencies. At present, only four countries viz. U.S., Australia, Canada, and Netherlands have body farms and related facilities in organised manner. There is no body farm in Asia also. In India, we have been trying to establish a body farm in A&N Islands that is near Singapore, Malaysia, and some other Asian countries. In view of the above, it becomes imperative to discuss the matter with Asian countries to collect the data on decomposition in a proper manner by establishing a body farm. We can also share the data, knowledge, and expertise to collaborate with one another to make such facilities better and have good scientific relations to promote science and explore ways of investigation at the world level.

Keywords: body farm, rate of decomposition, forensically important flies, time since death

Procedia PDF Downloads 61
161 Structural Evolution of Electrodeposited Ni Coating on Ti-6Al-4V Alloy during Heat Treatment

Authors: M. Abdoos, A. Amadeh, M. Adabi

Abstract:

In recent decades, the use of titanium and its alloys due to their high mechanical properties, light weight and their corrosion resistance has increased in military and industry applications. However, the poor surface properties can limit their widely usage. Many researches were carried out to improve their surface properties. The most effective technique is based on solid-state diffusion of elements that can form intermetallic compounds with the substrate. In the present work, inter-diffusion of nickel and titanium and formation of Ni-Ti intermetallic compounds in nickel-coated Ti-6Al-4V alloy have been studied. Initially, nickel was electrodeposited on the alloy using Watts bath at a current density of 20 mA/cm2 for 1 hour. The coated specimens were then heat treated in a tubular furnace under argon atmosphere at different temperatures near Ti β-transus to maximize the diffusion rate for various durations in order to improve the surface properties of the Ti-6Al-4V alloy. The effect of temperature and time on the thickness of diffusion layer and characteristics of intermetallic phases was studied by means of scanning electron microscope (SEM) equipped with energy dispersive X-ray spectrometer (EDS) and microhardness test. The results showed that a multilayer structure was formed after heat treatment: an outer layer of remaining nickel, an area of intermetallic layers with different compositions and solid solution of Ni-Ti. Three intermetallic layers was detected by EDS analysis, namely an outer layer with about 75 at.% Ni (Ni3Ti), an intermediate layer with 50 at.% Ni (NiTi) and finally an inner layer with 36 at.% Ni (NiTi2). It was also observed that the increase in time or temperature led to the formation of thicker intermetallic layers. Meanwhile, the microhardness of heat treated samples increased with formation of Ni-Ti intermetallics; however, its value depended on heat treatment parameters.

Keywords: heat treatment, microhardness, Ni coating, Ti-6Al-4V

Procedia PDF Downloads 422
160 Value of Unilateral Spinal Anaesthesia For Hip Fracture Surgery In The Elderly (75 Cases)

Authors: Fedili Benamar, Beloulou Mohamed Lamine, Ouahes Hassane, Ghattas Samir

Abstract:

Background and aims: While in Western countries, unilateral spinal anesthesia has been widely practiced for a long time, it remains little known in the local anesthesia community, and has not been the object of many studies. However, it is a simple, practical and effective technique. Our objective was to evaluate this practice in emergency anesthesia management in frail patients and to compare it with conventional spinal anesthesia. Methods: This is a prospective, observational, comparative study between hypobaric unilateral and conventional spinal anaesthesia for hip fracture surgery carried out in the operating room of the university military hospital of Staoueli. The work was spread over of 12-month period from 2019 to 2020. The parameters analyzed were hemodynamic variations, vasopressor use, block efficiency, postoperative adverse events, and postoperative morphine consumption. Results: -75 cases (mean age 72±14 years) -Group1= 41 patients (54.6%) divided into (ASA1=14.6% ASA2=60.98% ASA3=24.39%) single shoot spinal anaesthesia -Group2= 34 patients (45.3%) divided into (ASA1=2.9%, ASA2=26.4% ASA3=61.7%, ASA4=8.8%) unilateral hypobaric spinal anesthesia. -Hemodynamic variations were more severe in group 1 (51% hypotension) compared to 30% in group 2 RR=1.69 and odds ratio=2.4 -these variations were more marked in the ASA3 subgroup (group 1=70% hypotension versus group 2=30%) with an RR=2.33 and an odds ratio=5.44 -39% of group 1 required vasoactive drugs (15mg +/- 11) versus 32% of group 2 (8mg+/- 6.49) - no difference in the use of morphine in post-op. Conclusions: Within the limits of the population studied, this work demonstrates the clinical value of unilateral spinal anesthesia in ortho-trauma surgery in the frail patient.

Keywords: spinal anaesthesia, vasopressor, morphine, hypobaric unilateral spinal anesthesia, ropivacaine, hip surgery, eldery, hemodynamic

Procedia PDF Downloads 49
159 Caped Intervention: A Single Country Comparative Study of the Role of Russia in Its Involvement in the Crimean Crisis 2014

Authors: Katrina Angeline Santos, Francis Mark Fernandez, Francheska Esmao

Abstract:

Intervention is defined as a forcible interference by a state or states with power in the affairs of another state using force or the threat of force. On the other hand, a military intervention is an intervention, specifically used to define an intervention which uses force. With these, the authors realized a lack in the concept of intervention wherein it is an invited one.The authors wrote this paper to introduce a concept of intervention wherein the intervening state is offering assistance to the state in crisis which asked for one. The authors decided to make a contextual description of this phenomenon because of the lack of concepts regarding intervention between the idea of a single state performing a ‘heroic’ role of intervening in the crisis of another state. The problem that the authors would like to address is regarding the lack of availability in the concept of intervention wherein the state in crisis is seeking the assistance of another state. The authors utilized a contextual description approach to the study through the descriptive presentation of the series of events, by utilizing the news articles and news reports published, which happened in Ukraine and Crimea. This concept is further demonstrated through the utilization of a conceptual framework which shows the mutual relationship between the states. From the analysis of the behavior of Russia and its role in the Crimean Crisis 2014, the authors are able to coin the term, 'Caped Intervention' to describe an intervention of a state as a response to the invitation of assistance of a state in crisis in order for them to achieve their goals. This concept entails a mutual relationship between an intervening state and a sate in crisis. The concept of Caped Intervention describes the role of Russia as a Caped State or an intervening state observed through its action towards Crimea. This concept will help in the observation of the behavior of actors or states in events such as this. It will further help in analyzing the actors’ role in intervention by making it possible to classify the intervening acts into another concept.

Keywords: assistance, caped intervention, crisis, heroic

Procedia PDF Downloads 291
158 Decoding the Natural Hazards: The Data Paradox, Juggling Data Flows, Transparency and Secrets, Analysis of Khuzestan and Lorestan Floods of Iran

Authors: Kiyanoush Ghalavand

Abstract:

We have a complex paradox in the agriculture and environment sectors in the age of technology. In the one side, the achievements of the science and information ages are shaping to come that is very dangerous than ever last decades. The progress of the past decades is historic, connecting people, empowering individuals, groups, and states, and lifting a thousand people out of land and poverty in the process. Floods are the most frequent natural hazards damaging and recurring of all disasters in Iran. Additionally, floods are morphing into new and even more devastating forms in recent years. Khuzestan and Lorestan Provinces experienced heavy rains that began on March 28, 2019, and led to unprecedented widespread flooding and landslides across the provinces. The study was based on both secondary and primary data. For the present study, a questionnaire-based primary survey was conducted. Data were collected by using a specially designed questionnaire and other instruments, such as focus groups, interview schedules, inception workshops, and roundtable discussions with stakeholders at different levels. Farmers in Khuzestan and Lorestan provinces were the statistical population for this study. Data were analyzed with several software such as ATLASti, NVivo SPSS Win, ،E-Views. According to a factorial analysis conducted for the present study, 10 groups of factors were categorized climatic, economic, cultural, supportive, instructive, planning, military, policymaking, geographical, and human factors. They estimated 71.6 percent of explanatory factors of flood management obstacles in the agricultural sector in Lorestan and Khuzestan provinces. Several recommendations were finally made based on the study findings.

Keywords: chaos theory, natural hazards, risks, environmental risks, paradox

Procedia PDF Downloads 119
157 The Role and Significance of Mobile Gerdarmarie Battalions in the Canakkale Battles

Authors: Muzaffer Topgül, Ersi̇n Yilmaz

Abstract:

One of the unknown aspects of Çanakkale Battles is that the importance and contributions of Mobile Gendarmarie Battalion have not been fully understood. It was because the battles of the troops which were deployed more in interior parts of Gallipoli Peninsula, and the contributions of battle on level tactical troops were not considered as much as the studies on strategical or operative level troops. When the operation field and battle plans are examined, instead of deploying along the coast to put the forces with a power at zero level landing on the coast out of action, the main battle components are seen to have deployed as strong reserves in the more inner areas. The negative effect of the field on the great trop operation reveals the need for time in order to use the intervention forces. ‘Time’ emerged as the main factor in victory as a result of giving intervention opportunity to the troops. While ordering his soldiers in Conkbayırı to die rather than fight, Liutenant Colonel Mustafa Kemal, the Commander of the 19th division, also emphasized the significance of time. In this respect, the contribution of Mobile Gendarmarie Battalion which saved time for the troops to intervene can be clearly seen. During the study, the memoirs and the works written by military institutions based on the record sources under the light of the notes taken during the trips to the region were used. By preventing the enemies from capturing the area, Mobile Gendarmerie Battalions had an important role in Battles of Kerevizdere, Kireçtepe and Alçıtepe which were of great importance among the battles. The success of these battalions was expressed with compliment by both Turkish and foreign commanders that participated in the war. During the battles the losses of armed forces commissioned to keep the security and order brought about the formation of the regions deficient in state authority.

Keywords: Canakkale battles, mustafa kemal, mobile gerdarmarie, Ottoman empire, time

Procedia PDF Downloads 423
156 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 245
155 Empirical Study of Correlation between the Cost Performance Index Stability and the Project Cost Forecast Accuracy in Construction Projects

Authors: Amin AminiKhafri, James M. Dawson-Edwards, Ryan M. Simpson, Simaan M. AbouRizk

Abstract:

Earned value management (EVM) has been introduced as an integrated method to combine schedule, budget, and work breakdown structure (WBS). EVM provides various indices to demonstrate project performance including the cost performance index (CPI). CPI is also used to forecast final project cost at completion based on the cost performance during the project execution. Knowing the final project cost during execution can initiate corrective actions, which can enhance project outputs. CPI, however, is not constant during the project, and calculating the final project cost using a variable index is an inaccurate and challenging task for practitioners. Since CPI is based on the cumulative progress values and because of the learning curve effect, CPI variation dampens and stabilizes as project progress. Although various definitions for the CPI stability have been proposed in literature, many scholars have agreed upon the definition that considers a project as stable if the CPI at 20% completion varies less than 0.1 from the final CPI. While 20% completion point is recognized as the stability point for military development projects, construction projects stability have not been studied. In the current study, an empirical study was first conducted using construction project data to determine the stability point for construction projects. Early findings have demonstrated that a majority of construction projects stabilize towards completion (i.e., after 70% completion point). To investigate the effect of CPI stability on cost forecast accuracy, the correlation between CPI stability and project cost at completion forecast accuracy was also investigated. It was determined that as projects progress closer towards completion, variation of the CPI decreases and final project cost forecast accuracy increases. Most projects were found to have 90% accuracy in the final cost forecast at 70% completion point, which is inlined with findings from the CPI stability findings. It can be concluded that early stabilization of the project CPI results in more accurate cost at completion forecasts.

Keywords: cost performance index, earned value management, empirical study, final project cost

Procedia PDF Downloads 139
154 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks

Authors: Hyunsun Lee, Yi Zhu

Abstract:

Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.

Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles

Procedia PDF Downloads 98
153 Accuracy of Peak Demand Estimates for Office Buildings Using Quick Energy Simulation Tool

Authors: Mahdiyeh Zafaranchi, Ethan S. Cantor, William T. Riddell, Jess W. Everett

Abstract:

The New Jersey Department of Military and Veteran’s Affairs (NJ DMAVA) operates over 50 facilities throughout the state of New Jersey, U.S. NJDMAVA is under a mandate to move toward decarbonization, which will eventually include eliminating the use of natural gas and other fossil fuels for heating. At the same time, the organization requires increased resiliency regarding electric grid disruption. These competing goals necessitate adopting the use of on-site renewables such as photovoltaic and geothermal power, as well as implementing power control strategies through microgrids. Planning for these changes requires a detailed understanding of current and future electricity use on yearly, monthly, and shorter time scales, as well as a breakdown of consumption by heating, ventilation, and air conditioning (HVAC) equipment. This paper discusses case studies of two buildings that were simulated using the QUick Energy Simulation Tool (eQUEST). Both buildings use electricity from the grid and photovoltaics. One building also uses natural gas. While electricity use data are available in hourly intervals and natural gas data are available in monthly intervals, the simulations were developed using monthly and yearly totals. This approach was chosen to reflect the information available for most NJ DMAVA facilities. Once completed, simulation results are compared to metrics recommended by several organizations to validate energy use simulations. In addition to yearly and monthly totals, the simulated peak demands are compared to actual monthly peak demand values. The simulations resulted in monthly peak demand values that were within 30% of the measured values. These benchmarks will help to assess future energy planning efforts for NJ DMAVA.

Keywords: building energy modeling, eQUEST, peak demand, smart meters

Procedia PDF Downloads 48
152 From Sympathizers to Perpetrators: Examining the Involvement of Rural Women in Bangladesh in Violent Extremism

Authors: Shantanu Majumder

Abstract:

This paper attempts to explain the factors contribute in attracting and engaging rural women in Bangladesh toward political Islam that in many cases manifests itself in the form of violent extremism (VE). Bangladesh, the fourth largest Muslim majority country in the world, has been confronting the problem of VE in the name of Islam since a long. The political Islamists, explaining the events like military operations in Afghanistan and Iraq, anti-Muslim politics in neighboring India and Myanmar, Islamophobia in the West, and several other issues in their own way, have become to a vast extent successful in creating a high level of emotion, anger and a feeling of being oppressed worldwide among the ordinary Muslims masses. Half-hearted role of public intellectuals and political expediency of liberal political forces in explaining these events in a secular democratic way also facilitate the extremists to earn political dividend. VE was perceived as an all-male activism of the political Islamists’ in the past in Bangladesh. However, evidence in the recent times shows that there are sympathizers, recruiters, and perpetrators as well among the womenfolk in favor of VE-based political Islam. The first section in this paper sheds light on the way the political Islamists build rapport with and win over the heart of target women in countryside under the camouflage of preaching authentic Islam. This section also describes the role of family in involvement of women in VE. The second section discusses wide-ranging use of websites, facebook, laptop, mobile phones and several other means in the way to motivate and radicalize women. How the involvement with political Islamists brings changes in thinking process, lifestyle and family life of motivated women has been focused in the third section. The final section deals briefly with the way out relying on the argument that law and order forces alone cannot tackle this problem.

Keywords: Bangladesh, political Islam, violent extremism, women

Procedia PDF Downloads 177
151 The Effect of Carbon Nanotubes in Copolyamide Nonwovens on the Properties of CFRP Laminates

Authors: Kamil Dydek, Anna Boczkowska, Paulina Latko-Duralek, Rafal Kozera, Michal Salacinski

Abstract:

In recent years there has been increasing interest in many industries, such as the aviation, automotive, and military industries, in Carbon Fibre Reinforced Polymers (CFRP). This is because of the excellent properties of CFRP, which are characterized by very high strength and stiffness in relation to their mass, low density (almost twice as low as aluminum and more than five times as low as steel), and corrosion resistance. However, they do not have sufficient electrical conductivity, which is required in some applications. Therefore, work is underway to improve their electrical conductivity, for example, by incorporating carbon nanotubes (CNTs) into the CFRP structure. CNTs possess excellent properties, such as high electrical conductivity, high aspect ratio, high Young’s modulus, and high tensile strength. An idea developed by our team is a modification of CFRP by the use of thermoplastic nonwovens containing CNTs. Nanocomposite fibers were made from three different masterbatches differing in the content of multi-wall carbon nanotubes, and then nonwovens that differed in areal weight were produced using a thermo-press. The out of autoclave method was used to fabricate the laminates from commercial carbon-epoxy prepreg dedicated to aviation applications - one without the nonwovens (reference) and five containing nonwovens placed between each prepreg layer. The volume of electrical conductivity of the manufactured laminates was measured in three directions. In order to investigate the adhesion between carbon fibers and nonwovens, the microstructure of the produced laminates was observed. The mechanical properties of the CFRP composites were measured in a short-beam shear test. In addition, the influence of thermoplastic nonwovens on the thermos-mechanical properties of laminates was analyzed by Dynamic Mechanical Analysis. The studies were carried out within grant no. DOB-1-3/1/PS/2014 financed by the National Centre for Research and Development in Poland.

Keywords: CFRP, thermoplastic nonwovens, carbon nanotubes, electrical conductivity

Procedia PDF Downloads 106
150 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm

Authors: Frodouard Minani

Abstract:

Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.

Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks

Procedia PDF Downloads 119
149 The Role of Businesses in Peacebuilding in Nigeria: A Stakeholder Approach

Authors: Jamila Mohammed Makarfi, Yontem Sonmez

Abstract:

Developing countries like Nigeria have recently been affected by conflicts characterized by violence, high levels of risk and insecurity, resulting in loss of lives, livelihoods, displacement of communities, degradation of health, educational and social infrastructure as well as economic underdevelopment. The Nigerian government’s response to most of these conflicts has mainly been reactionary in the form of military deployments, as against precautionary to prevent or address the root causes of the conflicts. Several studies have shown that at various points of a conflict, conflict regions can benefit from the resources and expertise available outside the government, mainly from the private sector through mechanisms such as corporate social responsibility (CSR) by businesses. The main aim of this study is to examine the role of businesses in peacebuilding in Northern Nigeria through CSR in the last decade. The expected contributions from this will answer research questions, such as the key business motivations to engage in peacebuilding, as well as the degree of influence exerted from various stakeholder groups on the business decision to engage. The methodology of the study adopts a multiple case study of over 120 businesses of various sizes, ranging from small, medium and large-scale. A mixed method enabled the collection of quantitative and qualitative primary data to augment the secondary data. The results indicated that the most important business motivations to engage in peacebuilding were the negative effects of the conflict on economic stability, as well as stakeholder-driven motives. On the other hand, out of the 12 identified stakeholders, micro-, small- and medium-scale enterprises (MSMEs) considered the chief executive officer’s interest to be the most important factor, while large companies rated the government and community pressure as the highest. Overall, the foreign stakeholders scored low on the influence chart for all business types.

Keywords: conflict, corporate social responsibility, peacebuilding, stakeholder

Procedia PDF Downloads 194
148 Role of Pulsed-Dye Laser in the Treatment of Inflammatory Acne Vulgaris

Authors: Shirajul Islam Khan, Muhammad Ashraful Alam Bhuiyan, Syeda Tania Begum

Abstract:

Introduction: Acne vulgaris is one of the most common dermatologic conditions and affects the vast majority of people at some point during their lifetime, so effective treatment is of major importance. The failure of usual treatment modalities, teratogenic effects with some severe side effects, and resistance to P.Acne by Retinoides have been focusing on new therapeutic options for the treatment of acne. More recently, pulsed dye laser therapy has been reported to reduce acne lesion counts. The negligible morbidity of these treatment modalities and some other benefits of subsequent acne scar management lead this therapy more attractive. Objective: The objective of this study is to assess the efficacy and safety of pulsed dye laser therapy in the treatment of inflammatory acne vulgaris. Materials and Methods: A prospective clinical trial was done in the Department of Dermatology and Venereology, Combined Military Hospital (CMH), Dhaka, to find out the role of pulse dye laser in the treatment of inflammatory acne vulgaris. The study was carried out with 60 patients with mild to moderate acne vulgaris, and those were treated with pulsed dye laser therapy at baseline and after 4, 8, and 12 weeks. Results: Among 60 patients with inflammatory acne, 42(70%) were in the age group of less than 20 years, and 36(60%) were female. Regarding the number of inflammatory lesions, the baseline mean number (± SD) was 12.77 ± 4.01; after 4 weeks of treatment of inflammatory acne by pulsed dye laser was 7.80 ± 4.11; after 8 weeks of treatment, 6.10 ± 4.03 and after 12 weeks of treatment was 4.17 ± 4.02. After 4 weeks of treatment by pulse dye laser, the level of improvement was excellent at 3.3%, good at 10%, fair at 60%, and poor at 26.7%; after 8 weeks of treatment, excellent was 13.3%, good was 46.7%, the fair was 30% and poor 10% and after 12 weeks of treatment, excellent was 56.7%, good 13.3%, fair 23.3% and poor 6.7%. Regarding safety level, out of 60 patients of inflammatory acne vulgaris treated by pulsed dye laser, about 52(86.7%) patients did not observe any side effects. Conclusions: On the basis of the study results, it can be concluded that pulsed-dye laser is highly effective and well tolerated by patients in the treatment of inflammatory acne.

Keywords: pulsed-dye laser, inflammatory acne, acne vulgaris, retinoids

Procedia PDF Downloads 68
147 Exploring the Aesthetics of Sexual Violence in Therese Park’s ‘A Gift of the Emperor’: A Brief Study on Korean Comfort Women

Authors: Khushboo Verma

Abstract:

The use of rape as a weapon of war has been in existence for as early as the middle ages. Women, during the conflict, have been treated as the spoils of war, a reward for the conquering soldiers granted to them by their superiors which is, arguably, most often overlooked as part of the collateral damage that is unavoidable in conflict zones. Korean-born Therese Park’s first novel, A Gift of the Emperor (1997), describes one such atrocious incidence wherein she highlights the active role the Japanese military played in procuring and condoning trafficking of women, who were euphemistically referred to as ‘comfort women’, for prostitution during World War II. This paper thus aims to look at the remembering and reckonings of these women, which fueled a range of creative gestures in the artistic representations and knowledge production by Korean American artists and writers. The essay divides into three parts wherein first it tries to highlight the relationship of the state and the self in relation to the ‘comfort women’ as to who bears the onus of the exploitation of these women, or the responsibility for the redressal with the present-day notions of human rights as studied through Ueno Chizuko’s ‘The Politics of Memory: Nation, Individual and Self’ (1999). There are several narratological elements of the text that are of interest here which shall be viewed and analysed throughout the paper as well. The second part of the paper talks about the aesthetics of rape and sexual violence as represented or (mis)represented by Park in her novel as she attempts to give voice to the victim and retain her and her suffering as the central focus of the narrative. Finally, the third part of the novel explores as well as places the novel in the context of debates over the highly contested issue of ‘comfort women’ and the actual ‘comfort women’ survivors’ testimonies. For this purpose, the present study focuses on Dori Laub’s ‘Truth and Testimony: The Process and the Struggle’ (1991).

Keywords: Korean comfort women, survivors’ testimonies, sexual slavery, aesthetics of sexual violence, horrible memories

Procedia PDF Downloads 133
146 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 480
145 The Embodiment of Violence and Liminal Space in Illegality: Rohingya Refugees

Authors: E. Xavier, B. Nandita

Abstract:

Rohingyas are an ethnic and religious minority that resides in the Rakhine State of Myanmar. Post the military coup in 1962, Rohingyas have not been recognized as one of the ethnic tribes of Burma under the legislation. They have lost citizenship, education, health care rights, and instantly became illegal immigrants. While the historicization of this conflict is crucial, this paper wants to humanize the Rohingya population’s embodiment of violence on three different levels – individual, social, and political. In addition, the study focuses on their liminal existence in refugee camps in Bangladesh and in other parts of the world, such as Malaysia and the United States of America. A multi-medium study, it includes first-hand interviews with the Rohingya community in Wisconsin and Chicago, second-hand interviews from documentaries and past ethnographies from scholars to draw meaningful conclusions about their experience as a community. In the end, it focuses on the group of Rohingyas who have managed to resettle in another country and their transitioning experience. Rohingyas embody violence on their individual, social, and political bodies in different ways. Along with rape, murder, and physical harm, the community also encounters sexually transmitted infections, post-traumatic stress disorder symptoms, and poor mental health. On a social level, they encounter heightened gender discrimination, work industry shifting, and immense, shared emotional pain. As for their political body, the news media and journalism industry uses their bodies for purposes that benefit both parties and flirts with a tone of sensationalism in their reporting. In addition, the Rohingya community fluctuates with the concept of nationality, patriotism, citizenship, and refugee when they think about the future. This study provides a framework that future aid or health programs can use to determine the type of community need and its significance in the Rohingya community.

Keywords: embodiment, liminal, refugee, Rohingya

Procedia PDF Downloads 113
144 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 85
143 Evaluation of Adequacy of Caspofungin Prescription in a Tunisian Hospital Cohort

Authors: Mariem Meddeb Sidhom, Souhayel Hedfi, Rjaibia Houda, Mehdi Dridi, Mohamed Ali Yousfi, Sâadia Gargouri

Abstract:

Considering the important increase in costs of caspofungin treatments and ahead the evolution of its indication, pharmacy department was prompted to realize a review of the adequacy of prescriptions in the medical intensive care units (ICU). A retrospective observational study was conducted in Tunis military hospital concerning ICU prescriptions of caspofungin from 2008 until 2013. A pharmacist had returned to the patient’s medical records to collect data and to the microbiology department for parasitological results. The adequacy of prescriptions was evaluated by a pharmacist and an infectiologist parasitologist, referring to predefined scale of criteria resuming the indications of the marketing authorization (MA) and grade AI-AII of the guidelines of the Infectious Diseases Society of America (IDSA). Sixty two ICU patients have been treated with caspofungin during the period of study; however, 8 files were lost. Thus, 54 patients were included in the study having received 55 prescriptions of caspofungin. Males were a majority with 64.8% of the population. Mean age was 51 years. Caspofungin was indicated in accordance with the IDSA recommendations in 43.6% of the cases. The most case of non respect to the guidelines was the indication of caspofungin as empirical treatment in non neutropenic patients. Caspofungin was utilized as a first line treatment in 9 cases where it was possible to give fluconazole first, as germs were fluconazole- sensitive. Caspofungin was indicated in 2 patients with good renal function and in which nor amphotericin B, liposomal ampho B neither itraconazole had been previously used, as indicates the MA. The posology of caspofungin was respected in all prescriptions with a loading dose of 70 mg in the first day and a maintenance dose of 50 mg daily. Seven patients had received a daily dose of 70 mg, the recommended dose for people weighing more than 80 Kg. Caspofungin prescriptions are far to be adequately done. There is a clear need of optimization in indicating this molecule and that must be done in collaboration between the pharmacy department, the ICUs and parasitology department.

Keywords: caspofungin, prescription, intensive care units, marketing authorization, Tunisian hospital cohort

Procedia PDF Downloads 318
142 Motivation in Online Instruction

Authors: David Whitehouse

Abstract:

Some of the strengths of online teaching include flexibility, creativity, and comprehensiveness. A challenge can be motivation. How can an instructor repeating the same lessons over and over, day in and day out, year after year, maintain motivation? Enthusiasm? Does motivating the student and creating enthusiasm in class build the same things inside the instructor? The answers lie in the adoption of what I label EUQ—The Empathy and Understanding Quotient. In the online environment, students who are adults have many demands on their time: civilian careers, families (spouse, children, older parents), and sometimes even military service. Empathetic responses on the part of the instructor will lead to open and honest communication on the part of the student, which will lead to understanding on the part of the instructor and a rise in motivation in both parties. Understanding the demands can inform an instructor’s relationship with the student throughout the temporal parameters of classwork. In practicing EUQ, instructors can build motivation in their students and find internal motivation in an enhanced classroom dynamic. The presentation will look at what motivates a student to accomplish more than the minimum required and how that can lead to excellent results for an instructor’s own motivation. Through direct experience of having students give high marks on post-class surveys and via direct messaging, the presentation will focus on how applying EUQ in granting extra time, searching for intent while grading, communicating with students via Quick Notes, responses in Forums, comments in Assignments, and comments in grading areas - - - how applying these things infuses enthusiasm and energy in the instructor which drive creativity in teaching. Three primary ways of communicating with students will be given as examples. The positive response and negative response each for a Forum, an Assignment, and a Message will be explored. If there is time, participants will be invited to craft their own EUQ responses in a role playing exercise involving two common classroom scenarios—late work and plagiarism.

Keywords: education, instruction, motivation, online, teaching

Procedia PDF Downloads 153
141 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 272
140 Low-Cost Aviation Solutions to Strengthen Counter-Poaching Efforts in Kenya

Authors: Kuldeep Rawat, Michael O'Shea, Maureen McGough

Abstract:

The paper will discuss a National Institute of Justice (NIJ) funded project to provide cost-effective aviation technologies and research to support counter-poaching operations related to endangered, protected, and/or regulated wildlife. The goal of this project is to provide cost-effective aviation technology and research support to Kenya Wildlife Service (KWS) in their counter-poaching efforts. In pursuit of this goal, Elizabeth City State University (ECSU) is assisting the National Institute of Justice (NIJ) in enhancing the Kenya Wildlife Service’s aviation technology and related capacity to meet its counter-poaching mission. Poaching, at its core, is systemic as poachers go to the most extreme lengths to kill high target species such as elephant and rhino. These high target wildlife species live in underdeveloped or impoverished nations, where poachers find fewer barriers to their operations. In Kenya, with fifty-nine (59) parks and reserves, spread over an area of 225,830 square miles (584,897 square kilometers) adequate surveillance on the ground is next to impossible. Cost-effective aviation surveillance technologies, based on a comprehensive needs assessment and operational evaluation, are needed to curb poaching and effectively prevent wildlife trafficking. As one of the premier law enforcement Air Wings in East Africa, KWS plays a crucial role in Kenya, not only in counter-poaching and wildlife conservation efforts, but in aerial surveillance, counterterrorism and national security efforts as well. While the Air Wing has done, a remarkable job conducting aerial patrols with limited resources, additional aircraft and upgraded technology should significantly advance the Air Wing’s ability to achieve its wildlife protection mission. The project includes: (i) Needs Assessment of the KWS Air Wing, to include the identification of resources, current and prospective capacity, operational challenges and priority goals for expansion, (ii) Acquisition of Low-Cost Aviation Technology to meet priority needs, and (iii) Operational Evaluation of technology performance, with a focus on implementation and effectiveness. The Needs Assessment reflects the priorities identified through two site visits to the KWS Air Wing in Nairobi, Kenya, as well as field visits to multiple national parks receiving aerial support and interviewing/surveying KWS Air wing pilots and leadership. Needs Assessment identified some immediate technology needs that includes, GPS with upgrades, including weather application, Night flying capabilities, to include runway lights and night vision technology, Cameras and surveillance equipment, Flight tracking system and/or Emergency Position Indicating Radio Beacon, Lightweight ballistic-resistant body armor, and medical equipment, to include a customized stretcher and standard medical evacuation equipment. Results of this assessment, along with significant input from the KWS Air Wing, will guide the second phase of this project: technology acquisition. Acquired technology will then be evaluated in the field, with a focus on implementation and effectiveness. Results will ultimately be translated for any rural or tribal law enforcement agencies with comparable aerial surveillance missions and operational environments, and jurisdictional challenges, seeking to implement low-cost aviation technology. Results from Needs Assessment phase, including survey results and our ongoing technology acquisition and baseline operational evaluation will be discussed in the paper.

Keywords: aerial surveillance mission, aviation technology, counter-poaching, wildlife protection

Procedia PDF Downloads 255
139 Geometric Nonlinear Dynamic Analysis of Cylindrical Composite Sandwich Shells Subjected to Underwater Blast Load

Authors: Mustafa Taskin, Ozgur Demir, M. Mert Serveren

Abstract:

The precise study of the impact of underwater explosions on structures is of great importance in the design and engineering calculations of floating structures, especially those used for military purposes, as well as power generation facilities such as offshore platforms that can become a target in case of war. Considering that ship and submarine structures are mostly curved surfaces, it is extremely important and interesting to examine the destructive effects of underwater explosions on curvilinear surfaces. In this study, geometric nonlinear dynamic analysis of cylindrical composite sandwich shells subjected to instantaneous pressure load is performed. The instantaneous pressure load is defined as an underwater explosion and the effects of the liquid medium are taken into account. There are equations in the literature for pressure due to underwater explosions, but these equations have been obtained for flat plates. For this reason, the instantaneous pressure load equations are arranged to be suitable for curvilinear structures before proceeding with the analyses. Fluid-solid interaction is defined by using Taylor's Plate Theory. The lower and upper layers of the cylindrical composite sandwich shell are modeled as composite laminate and the middle layer consists of soft core. The geometric nonlinear dynamic equations of the shell are obtained by Hamilton's principle, taken into account the von Kàrmàn theory of large displacements. Then, time dependent geometric nonlinear equations of motion are solved with the help of generalized differential quadrature method (GDQM) and dynamic behavior of cylindrical composite sandwich shells exposed to underwater explosion is investigated. An algorithm that can work parametrically for the solution has been developed within the scope of the study.

Keywords: cylindrical composite sandwich shells, generalized differential quadrature method, geometric nonlinear dynamic analysis, underwater explosion

Procedia PDF Downloads 168
138 U Slot Loaded Wearable Textile Antenna

Authors: Varsha Kheradiya, Ganga Prasad Pandey

Abstract:

The use of wearable antennas is rising because wireless devices become small. The wearable antenna is part of clothes used in communication applications, including energy harvesting, medical application, navigation, and tracking. In current years, Antennas embroidered on clothes, conducting antennas based on fabric, polymer embedded antennas, and inkjet-printed antennas are all attractive ways. Also shows the analysis required for wearable antennas, such as wearable antennae interacting with the human body. The primary requirements for the antenna are small size, low profile minimizing radiation absorption by the human body, high efficiency, structural integrity to survive worst situations, and good gain. Therefore, research in energy harvesting, biomedicine, and military application design is increasingly favoring flexible wearable antennas. Textile materials that are effectively used for designing and developing wearable antennas for body area networks. The wireless body area network is primarily concerned with creating effective antenna systems. The antenna should reduce their size, be lightweight, and be adaptable when integrated into clothes. When antennas integrate into clothes, it provides a convenient alternative to those fabricated using rigid substrates. This paper presents a study of U slot loaded wearable textile antenna. U slot patch antenna design is illustrated for wideband from 1GHz to 6 GHz using textile material jeans as substrate and pure copper polyester taffeta fabric as conducting material. This antenna design exhibits dual band results for WLAN at 2.4 GHz and 3.6 GHz frequencies. Also, study U slot position horizontal and vertical shifting. Shifting the horizontal positive X-axis position of the U slot produces the third band at 5.8 GHz.

Keywords: microstrip patch antenna, textile material, U slot wearable antenna, wireless body area network

Procedia PDF Downloads 65
137 Multi-Sensor Image Fusion for Visible and Infrared Thermal Images

Authors: Amit Kumar Happy

Abstract:

This paper is motivated by the importance of multi-sensor image fusion with a specific focus on infrared (IR) and visual image (VI) fusion for various applications, including military reconnaissance. Image fusion can be defined as the process of combining two or more source images into a single composite image with extended information content that improves visual perception or feature extraction. These images can be from different modalities like visible camera & IR thermal imager. While visible images are captured by reflected radiations in the visible spectrum, the thermal images are formed from thermal radiation (infrared) that may be reflected or self-emitted. A digital color camera captures the visible source image, and a thermal infrared camera acquires the thermal source image. In this paper, some image fusion algorithms based upon multi-scale transform (MST) and region-based selection rule with consistency verification have been proposed and presented. This research includes the implementation of the proposed image fusion algorithm in MATLAB along with a comparative analysis to decide the optimum number of levels for MST and the coefficient fusion rule. The results are presented, and several commonly used evaluation metrics are used to assess the suggested method's validity. Experiments show that the proposed approach is capable of producing good fusion results. While deploying our image fusion algorithm approaches, we observe several challenges from the popular image fusion methods. While high computational cost and complex processing steps of image fusion algorithms provide accurate fused results, they also make it hard to become deployed in systems and applications that require a real-time operation, high flexibility, and low computation ability. So, the methods presented in this paper offer good results with minimum time complexity.

Keywords: image fusion, IR thermal imager, multi-sensor, multi-scale transform

Procedia PDF Downloads 89
136 A Comparison of Sulfur Mustard Cytotoxic Effects on the Two Human Lung Origin Cell Lines

Authors: P. Jost, L. Muckova, M. Matula, J. Pejchal, D. Jun, R. Stetina

Abstract:

Sulfur mustard (bis(2-chlorethyl) sulfide) is highly toxic, chemical warfare agent that has been used in the past in several armed conflicts. Except for the skin, respiratory tract is one of the important routes of exposure. The elucidation and understanding of the mechanism of toxicity of SM have been effort intensive research. The multiple targets character of SM caused cellular damage resulted in activation of many different mechanisms which contribute to cellular response and participate in the final cytopathology effect. In our present work, we compared time-dependent changes in sulfur mustard exposed adult human lung fibroblasts NHLF and lung epithelial alveolar cell line A-549. Cell viability (MTT assay, Calcein-AM assay, and xCELLigence - real-time cell analysis), apoptosis (flow cytometry), mitochondrial membrane potential (Δψm, flow cytometry), reactive oxygen species induction (DC and cell cycle distribution (flow cytometry) were studied. We observed significantly decreased mitochondrial membrane potential and subsequent induction of apoptosis correlating with decreased cellular viability in the sulfur mustard exposed cells. In low concentrations, sulfur mustard-induced S-phase cell cycle arrest, on the other hand, high concentrations, cell cycle phase distribution of sulfur mustard exposed cells resembled cell cycle phase distribution of control group, which implies nonspecific cell cycle inhibition. Epithelial cells A-549 was found as more sensible to sulfur mustard toxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.

Keywords: apoptosis, cell cycle, cytotoxicity, sulfur mustard

Procedia PDF Downloads 172