Search results for: wound models
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7095

Search results for: wound models

2055 Comparison of Constitutional Systems in Religious and Secular States (Iran and Turkey as Role Models)

Authors: Eman Muhammad Rashwan

Abstract:

The identity of the state in many Middle East countries today, between secularity and religiousness, is an important and controversial question. Specially after the sweeping repels in number of countries that put Islamic parties in power. In this paper two role model states in this respect, are under examination to answer the question of how their identity that was expressed in their constitutions influenced the allocation of power between different state authorities. In the beginning both the criteria used to define the two concepts of secularity and religiousness, and the reason why these two states are particularly chosen for comparison, are explained. The situation in Turkey is firstly indicated. The constitutional system shows that power is divided between parliament, cabinet and the president. The first two authorities have the most significant powers, and generally, the system in Turkey is similar to many other secular states in the world. But when the research moves to the system in Iran, the importance of comparison starts to appear. In this section, the nature of Islamic Shi’a of Iran Republic is discussed, and also its influence on the main and unique authorities of this religious state, which don`t only include the president and council of ministers, but also The Supreme Leader and The Council of Guardians. This paper doesn`t aim to favor a one system over another, and doesn`t discuss the influences of the two systems on the social or economic situation in the two model states. The aim of this paper is to study the influence of excluding, and applying religion in respect to allocation of power in constitutions.

Keywords: comparative law, constitutional systems, secular states, religious states

Procedia PDF Downloads 427
2054 Impact of VARK Learning Model at Tertiary Level Education

Authors: Munazza A. Mirza, Khawar Khurshid

Abstract:

Individuals are generally associated with different learning styles, which have been explored extensively in recent past. The learning styles refer to the potential of an individual by which s/he can easily comprehend and retain information. Among various learning style models, VARK is the most accepted model which categorizes the learners with respect to their sensory characteristics. Based on the number of preferred learning modes, the learners can be categorized as uni-modal, bi-modal, tri-modal, or quad/multi-modal. Although there is a prevalent belief in the learning styles, however, the model is not being frequently and effectively utilized in the higher education. This research describes the identification model to validate teacher’s didactic practice and student’s performance linkage with the learning styles. The identification model is recommended to check the effective application and evaluation of the various learning styles. The proposed model is a guideline to effectively implement learning styles inventory in order to ensure that it will validate performance linkage with learning styles. If performance is linked with learning styles, this may help eradicate the distrust on learning style theory. For this purpose, a comprehensive study was conducted to compare and understand how VARK inventory model is being used to identify learning preferences and their correlation with learner’s performance. A comparative analysis of the findings of these studies is presented to understand the learning styles of tertiary students in various disciplines. It is concluded with confidence that the learning styles of students cannot be associated with any specific discipline. Furthermore, there is not enough empirical proof to link performance with learning styles.

Keywords: learning style, VARK, sensory preferences, identification model, didactic practices

Procedia PDF Downloads 275
2053 Design and in Slico Study of the Truncated Spike-M-N SARS-CoV-2 as a Novel Effective Vaccine Candidate

Authors: Aghasadeghi MR., Bahramali G., Sadat SM., Sadeghi SA., Yousefi M., Khodaei K., Ghorbani M., Sadat Larijani M.

Abstract:

Background:The emerging COVID-19 pandemic is a serious concernfor the public health worldwide. Despite the many mutations in the virus genome, it is important to find an effective vaccine against viral mutations. Therefore, in current study, we aimed at immunoinformatic evaluation of the virus proteins immunogenicity to design a preventive vaccine candidate, which could elicit humoral and cellular immune responses as well. Methods:Three antigenic regions are included;Spike, Membrane, and Nucleocapsid amino acid sequences were obtained, and possible fusion proteins were assessed andcompared by immunogenicity, structural features, and population coverage. The best fusion protein was also evaluated for MHC-I and MHC-II T-cell epitopes and the linear and conformational B-cell epitopes. Results: Among the four predicted models, the truncated Spike protein in fusion with M and N proteins is composed of 24 highly immunogenic human MHC class I and 29 MHC class II, along with 14 B-cell linear and 61 discontinues epitopes. Also, the selected protein has high antigenicity and acceptable population coverage of 82.95% in Iran and 92.51% in Europe. Conclusion: The data indicate that the truncated Spike-M-N SARS-CoV-2form which could be potential targets of neutralizing antibodies. The protein also has the ability to stimulate humoral and cellular immunity. The in silico study provided the fusion protein as a potential preventive vaccine candidate for further in vivo evaluation.

Keywords: SARS-CoV-2, immunoinformatic, protein, vaccine

Procedia PDF Downloads 222
2052 Fusion Neutron Generator Dosimetry and Applications for Medical, Security, and Industry

Authors: Kaouther Bergaui, Nafaa Reguigui, Charles Gary

Abstract:

Characterization and the applications of deuterium-deuterium (DD) neutron generator developed by Adelphie technology and acquired by the National Centre of Nuclear Science and Technology (NCNST) were presented in this work. We study the performance of the neutron generator in terms of neutron yield, production efficiency, and the ionic current as a function of the acceleration voltage at various RF powers. We provide the design and optimization of the PGNAA chamber and thus give insight into the capabilities of the planned PGNAA facility. Additional non-destructive techniques were studied employing the DD neutron generator, such as PGNAA and neutron radiography: The PGNAA is used for determining the concentration of 10B in Si and SiO2 matrices by using a germanium detector HPGe and the results obtained are compared with PGNAA system using a Sodium Iodide detector (NaI (Tl)); Neutron radiography facility was tested and simulated, using a camera device CCD and simulated by the Monte Carlo code; and the explosive detection system (EDS) also simulated using the Monte Carlo code. The study allows us to show that the new models of DD neutron generators are feasible and that superior-quality neutron beams could be produced and used for various applications. The feasibility of Boron neutron capture therapy (BNCT) for cancer treatment using a neutron generator was assessed by optimizing Beam Shaping Assembly (BSA) on a phantom using Monte-Carlo (MCNP6) simulations.

Keywords: neutron generator deuterium-deuterium, Monte Carlo method, radiation, neutron flux, neutron activation analysis, born, neutron radiography, explosive detection, BNCT

Procedia PDF Downloads 191
2051 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking

Authors: Jonas Colin

Abstract:

Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.

Keywords: chatbot, GPT 3.5, metacognition, symbiose

Procedia PDF Downloads 69
2050 Perceived Seriousness of Cybercrime Types: A Comparison across Gender

Authors: Suleman Ibrahim

Abstract:

Purpose: The research is seeking people's perceptions on cybercrime issues, rather than their knowledge of the facts. Unlike the Tripartite Cybercrime Framework (TCF), the binary models are ill-equipped to differentiate between cyber fraud (a socioeconomic crime) and cyber bullying or cyber stalking (psychosocial cybercrimes). Whilst the binary categories suggested that digital crimes are dichotomized: (i.e. cyber-enabled and cyber-dependent), the TCF, recently proposed, argued that cybercrimes can be conceptualized into three groups: socioeconomic, psychosocial and geopolitical. Concomitantly, as regards to the experience/perceptions of cybercrime, the TCF’s claim requires substantiation beyond its theoretical realm. Approach/Methodology: This scholar endeavor framed with the TCF, deploys a survey method to explore the experience of cybercrime across gender. Drawing from over 400 participants in the UK, this study aimed to contrast the differential perceptions/experiences of socioeconomic cybercrime (e.g. cyber fraud) and psychological cybercrime (e.g. cyber bullying and cyber stalking) across gender. Findings: The results revealed that cyber stalking was rated as least serious of the different digital crime categories. Further revealed that female participants judged all types of cybercrimes as more serious than male participants, with the exception of socioeconomic cybercrime – cyber fraud. This distinction helps to emphasize that gender cultures and nuances not only apply both online and offline, it emphasized the utilitarian value of the TCF. Originality: Unlike existing data, this study has contrasted the differential perceptions and experience of socioeconomic and psychosocial cybercrimes with more refined variables.

Keywords: gender variations, psychosocial cybercrime, socioeconomic cybercrime, tripartite cybercrime framework

Procedia PDF Downloads 386
2049 Robotic Logging Technology: The Future of Oil Well Logging

Authors: Nitin Lahkar, Rishiraj Goswami

Abstract:

“Oil Well Logging” or the practice of making a detailed record (a well log) of the geologic formations penetrated by a borehole is an important practice in the Oil and Gas industry. Although a lot of research has been undertaken in this field, some basic limitations still exist. One of the main arenas or venues where plethora of problems arises is in logistically challenged areas. Accessibility and availability of efficient manpower, resources and technology is very time consuming, restricted and often costly in these areas. So, in this regard, the main challenge is to decrease the Non Productive Time (NPT) involved in the conventional logging process. The thought for the solution to this problem has given rise to a revolutionary concept called the “Robotic Logging Technology”. Robotic logging technology promises the advent of successful logging in all kinds of wells and trajectories. It consists of a wireless logging tool controlled from the surface. This eliminates the need for the logging truck to be summoned which in turn saves precious rig time. The robotic logging tool here, is designed such that it can move inside the well by different proposed mechanisms and models listed in the full paper as TYPE A, TYPE B and TYPE C. These types are classified on the basis of their operational technology, movement and conditions/wells in which the tool is to be used. Thus, depending on subsurface conditions, energy sources available and convenience the TYPE of Robotic model will be selected. Advantages over Conventional Logging Techniques: Reduction in Non-Productive time, lesser energy requirements, very fast action as compared to all other forms of logging, can perform well in all kinds of well trajectories (vertical/horizontal/inclined).

Keywords: robotic logging technology, innovation, geology, geophysics

Procedia PDF Downloads 305
2048 Children Beliefs about Illness, Treatments and Vaccines after the Experience of Covid 19 Pandemic

Authors: Margarida Maria Cabugueira Csutódio dos Santos, Joana Filipa Pintéus Pereira

Abstract:

The way children understand the concept of health and illness influences their reaction in contexts where these concepts are present (e.g.,illness; vaccination). The recognition of the importance of children's beliefs/representations about health and disease has led to the development of models that seek to explain the development process of these concepts. In the construction of their representations, children are influenced not only by their cognitive competence but also by their life experiences. In the last 3 years, children have experienced a pandemic health crisis that has exposed them to anomalous and stressful situations. Objective: the aim of this study was (1) to identify children’s representations about disease (including symptoms, causes, control/treatment) and prevention (including health procedures and vaccines) and (2) whether COVID19 is mentioned and influences their representations. Methodology: a qualitative study in which 67 children with 7 to 10 years old (mean 8,8) participated. A semi-structured interview was used following the Bibace and Walsh model, focusing on the representation of the disease and its prevention. Results show a marked influence of the lived experience with regard to causes of the disease, disease control and treatment, and adherence to vaccination. Age-dependent differences were found with older children being able to talk about illness and contamination process and younger displaying more basic, concrete and rigid representations. Conclusions: The results of this study bring clues to the adequacy of communication with the child in the context of health and illness and discriminately in a future health pandemic crisis.

Keywords: childen, health beliefs, pediatrics, covid19, vaccines

Procedia PDF Downloads 87
2047 A Cohesive Zone Model with Parameters Determined by Uniaxial Stress-Strain Curve

Authors: Y.J. Wang, C. Q. Ru

Abstract:

A key issue of cohesive zone models is how to determine the cohesive zone model parameters based on real material test data. In this paper, uniaxial nominal stress-strain curve (SS curve) is used to determine two key parameters of a cohesive zone model (CZM): The maximum traction and the area under the curve of traction-separation law (TSL). To this end, the true SS curve is obtained based on the nominal SS curve, and the relationship between the nominal SS curve and TSL is derived based on an assumption that the stress for cracking should be the same in both CZM and the real material. In particular, the true SS curve after necking is derived from the nominal SS curve by taking the average of the power law extrapolation and the linear extrapolation, and a damage factor is introduced to offset the true stress reduction caused by the voids generated at the necking zone. The maximum traction of the TSL is equal to the maximum true stress calculated based on the damage factor at the end of hardening. In addition, a simple specimen is modeled by Abaqus/Standard to calculate the critical J-integral, and the fracture energy calculated by the critical J-integral represents the stored strain energy in the necking zone calculated by the true SS curve. Finally, the CZM parameters obtained by the present method are compared to those used in a previous related work for a simulation of the drop-weight tear test.

Keywords: dynamic fracture, cohesive zone model, traction-separation law, stress-strain curve, J-integral

Procedia PDF Downloads 471
2046 Application and Evaluation of 3D Printing Technology in Customized Fashion Industry

Authors: A. Ezza, B. M. Babar Ramzan, C. Hira

Abstract:

This study deliberates emerging design activates in 3D printing technology, the paper provides the insight into the broad opportunities in 3D printing applications in fashion world. 3D printing is becoming a reason for reduction of lead time. The process engenders the precise models and one of prototype components for design approbation; trail and testing significance through the production components to be utilized in true working environments. This emerging technology have given elevate to an emergent realm of digitally fabricated art and design. Bitonic Creations, CONTINUUM (3D printed shoes), Jiri Evenhuis, Michael Schmidt have be giving extensive amassments of haute couture dresses and accessories. Cosyflex TM, N12 undergarments are examples of an innovative process for 3D printing. Varied types of liquid polymers such as latex, silicon, polyurethane and Teflon as well as a variety of textile fibers such as cotton, viscose and polyamide enable tailor made fabrics for any need. Patterns, perforations, embossing and embellishments may be created by printing on 3D structure base plate. Computer solidifies material feedstock layer by layer with micro-millimeter detail. In lieu of producing textiles by meter, then cutting and sewing them into final product, 3D printing can become a reason to make sewing equipment obsolete. The findings positively corroborates the expected advantage of 3D printed sample that seem to facilitate the first steps for designer.

Keywords: 3D printing, customization, fashion industry, Haute couture

Procedia PDF Downloads 566
2045 Seismic Assessment of an Existing Dual System RC Buildings in Madinah City

Authors: Tarek M. Alguhane, Ayman H. Khalil, M. N. Fayed, Ayman M. Ismail

Abstract:

A 15-storey RC building, studied in this paper, is representative of modern building type constructed in Madina City in Saudi Arabia before 10 years ago. These buildings are almost consisting of reinforced concrete skeleton, i. e. columns, beams and flat slab as well as shear walls in the stairs and elevator areas arranged in the way to have a resistance system for lateral loads (wind–earthquake loads). In this study, the dynamic properties of the 15-storey RC building were identified using ambient motions recorded at several spatially-distributed locations within each building. After updating the mathematical models for this building with the experimental results, three dimensional pushover analysis (nonlinear static analysis) was carried out using SAP2000 software incorporating inelastic material properties for concrete, infill and steel. The effect of modeling the building with and without infill walls on the performance point as well as capacity and demand spectra due to EQ design spectrum function in Madina area has been investigated. The response modification factor (R) for the 15 storey RC building is evaluated from capacity and demand spectra (ATC-40). The purpose of this analysis is to evaluate the expected performance of structural systems by estimating, strength and deformation demands in design, and comparing these demands to available capacities at the performance levels of interest. The results are summarized and discussed.

Keywords: seismic assessment, pushover analysis, ambient vibration, modal update

Procedia PDF Downloads 389
2044 Mass Media Representation and the Status of Women in the 2015 General Elections in Nigeria

Authors: Grace Anweh, Patience Achakpa-ikyo

Abstract:

The issue of women unfavourable representation in the mass media is long standing. While it is a worldwide problem, developing countries in Africa especially Nigeria are considered peculiar. This paper, ‘mass media representation and the status of women in the 2015, general elections in Nigeria’ therefore aimed to assess the current trend of role playing in the mass media and how this has affected general status of women in Nigeria politics with particular reference to the 2015 general elections. The study employed a review of secondary literature and data regarding previous performances of Nigeria women in politics from 1999 to 2015 and the picture that has been paid by Nigerian mass media about women. Anchoring the paper on the agenda setting theory of the mass media, the paper analysed secondary literature and discovered that from 1999 to date, women have been participating in politics but rather than improve their status in elective offices, the percentage of women for such offices is rather declining. This trend the paper concluded is attributed to the way and manner women are represented in the mass media - as not good for policy making offices except as kitchen and home managers. The paper therefore recommends that, the country should adopt the quota allocation for all the political parties in order to give women a chance to compete with their male counterparts. While women should strive towards the managerial and ownership of media houses in order to represent the interest of women in politics thus offering the opportunity for the favourable representation of women and role models for those who may want to tour a similar part.

Keywords: mass media, media representation, Nigeria elections, women

Procedia PDF Downloads 332
2043 Introducing a Practical Model for Instructional System Design Based on Determining of the knowledge Level of the Organization: Case Study of Isfahan Public Transportation Co.

Authors: Mojtaba Aghajari, Alireza Aghasi

Abstract:

The first challenge which the current research faced has been the identification or determination of the level of knowledge in Isfahan public transportation corporation, and the second challenge has been the recognition and choice of a proper approach for the instructional system design. Responding these two challenges will present an appropriate model of instructional system design. In order to respond the first challenge or question, Nonaka and Takeuchi KM model has been utilized due to its universality among the 26 models proposed so far. The statistical population of this research included 2200 people, among which 200 persons were chosen as the sample of the research by the use of Morgan’s method. The data gathering has been carried out by the means of a questionnaire based on Nonaka and Takeuchi KM model, analysis of which has been done by SPSS program. The output of this questionnaire, yielding the point of 1.96 (out of 5 points), revealed that the general condition of Isfahan public transportation corporation is weak concerning its being knowledge-centered. After placing this output on Jonassen’s continuum, it was revealed that the appropriate approach for instructional system design is the system (or behavioral) approach. Accordingly, different steps of the general model of ADDIE, which covers all of the ISO10015 standards, were adopted in the act of designing. Such process in Isfahan public transportation corporation was designed and divided into three main steps, including: instructional designing and planning, instructional course planning, determination of the evaluation and the effectiveness of the instructional courses.

Keywords: instructional system design, system approach, knowledge management, employees

Procedia PDF Downloads 324
2042 Finite Element Simulation of RC Exterior Beam-Column Joints Using Damage Plasticity Model

Authors: A. M. Halahla, M. H. Baluch, M. K. Rahman, A. H. Al-Gadhib, M. N. Akhtar

Abstract:

In the present study, 3D simulation of a typical exterior (RC) beam–column joint (BCJ) strengthened with carbon fiber-reinforced plastic (CFRP) sheet are carried out. Numerical investigations are performed using a nonlinear finite element ( FE) analysis by incorporating damage plasticity model (CDP), for material behaviour the concrete response in compression, tension softening were used, linear plastic with isotropic hardening for reinforcing steel, and linear elastic lamina material model for CFRP sheets using the commercial FE software ABAQUS. The numerical models developed in the present study are validated with the results obtained from the experiment under monotonic loading using the hydraulic Jack in displacement control mode. The experimental program includes casting of deficient BCJ loaded to failure load for both un-strengthened and strengthened BCJ. The failure mode, and deformation response of CFRP strengthened and un-strengthened joints and propagation of damage in the components of BCJ are discussed. Finite element simulations are compared with the experimental result and are noted to yield reasonable comparisons. The damage plasticity model was able to capture with good accuracy of the ultimate load and the mode of failure in the beam column joint.

Keywords: reinforced concrete, exterior beam-column joints, concrete damage plasticity model, computational simulation, 3-D finite element model

Procedia PDF Downloads 381
2041 Experimental and Computational Investigations on the Mitigation of Air Pollutants Using Pulsed Radio Waves

Authors: Gangadhara Siva Naga Venkata Krishna Satya Narayana Swamy Undi

Abstract:

Particulate matter (PM) pollution in ambient air is a major environmental health risk factor contributing to disease and mortality worldwide. Current air pollution control methods have limitations in reducing real-world ambient PM levels. This study demonstrates the efficacy of using pulsed radio wave technology as a distinct approach to lower outdoor particulate pollution. Experimental data were compared with computational models to evaluate the efficiency of pulsed waves in coagulating and settling PM. Results showed 50%+ reductions in PM2.5 and PM10 concentrations at the city scale, with particle removal rates exceeding gravity settling by over 3X. Historical air quality data further validated the significant PM reductions achieved in test cases. Computational analyses revealed the underlying coagulation mechanisms induced by the pulsed waves, supporting the feasibility of this strategy for ambient particulate control. The pulsed electromagnetic technology displayed robustness in sustainably managing PM levels across diverse urban and industrial environments. Findings highlight the promise of this advanced approach as a next-generation solution to mitigate particulate air pollution and associated health burdens globally. The technology's scalability and energy efficiency can help address a key gap in current efforts to improve ambient air quality.

Keywords: particulate matter, mitigation technologies, clean air, ambient air pollution

Procedia PDF Downloads 47
2040 An Eulerian Method for Fluid-Structure Interaction Simulation Applied to Wave Damping by Elastic Structures

Authors: Julien Deborde, Thomas Milcent, Stéphane Glockner, Pierre Lubin

Abstract:

A fully Eulerian method is developed to solve the problem of fluid-elastic structure interactions based on a 1-fluid method. The interface between the fluid and the elastic structure is captured by a level set function, advected by the fluid velocity and solved with a WENO 5 scheme. The elastic deformations are computed in an Eulerian framework thanks to the backward characteristics. We use the Neo Hookean or Mooney Rivlin hyperelastic models and the elastic forces are incorporated as a source term in the incompressible Navier-Stokes equations. The velocity/pressure coupling is solved with a pressure-correction method and the equations are discretized by finite volume schemes on a Cartesian grid. The main difficulty resides in that large deformations in the fluid cause numerical instabilities. In order to avoid these problems, we use a re-initialization process for the level set and linear extrapolation of the backward characteristics. First, we verify and validate our approach on several test cases, including the benchmark of FSI proposed by Turek. Next, we apply this method to study the wave damping phenomenon which is a mean to reduce the waves impact on the coastline. So far, to our knowledge, only simulations with rigid or one dimensional elastic structure has been studied in the literature. We propose to place elastic structures on the seabed and we present results where 50 % of waves energy is absorbed.

Keywords: damping wave, Eulerian formulation, finite volume, fluid structure interaction, hyperelastic material

Procedia PDF Downloads 321
2039 Simultaneous versus Sequential Model in Foreign Entry

Authors: Patricia Heredia, Isabel Saz, Marta Fernández

Abstract:

This article proposes that the decision regarding exporting and the choice of export channel are nested and non-independent decisions. We assume that firms make two sequential decisions before arriving at their final choice: the decision to access foreign markets and the decision about the type of channel. This hierarchical perspective of the choices involved in the process is appealing for two reasons. First, it supports the idea that people have a limited analytical capacity. Managers often break down a complex decision into a hierarchical process because this makes it more manageable. Secondly, it recognizes that important differences exist between entry modes. In light of the above, the objective of this study is to test different entry mode choice processes: independent decisions and nested and non-independent decisions. To do this, the methodology estimates and compares the following two models: (i) a simultaneous single-stage model with three entry mode choices (using a multinomial logit model); ii) a two-stage model with the export decision preceding the channel decision using a sequential logit model. The study uses resource-based factors in determining these decision processes concerning internationalization and the study carries out empirical analysis using a DOC Rioja sample of 177 firms.Using the Akaike and Schwarz Information Criteria, the empirical evidence supports the existence of a nested structure, where the decision about exporting precedes the export mode decision. The implications and contributions of the findings are discussed.

Keywords: sequential logit model, two-stage choice process, export mode, wine industry

Procedia PDF Downloads 28
2038 Analyzing of Speed Disparity in Mixed Vehicle Technologies on Horizontal Curves

Authors: Tahmina Sultana, Yasser Hassan

Abstract:

Vehicle technologies rapidly evolving due to their multifaceted advantages. Adapted different vehicle technologies like connectivity and automation on the same roads with conventional vehicles controlled by human drivers may increase speed disparity in mixed vehicle technologies. Identifying relationships between speed distribution measures of different vehicles and road geometry can be an indicator of speed disparity in mixed technologies. Previous studies proved that speed disparity measures and traffic accidents are inextricably related. Horizontal curves from three geographic areas were selected based on relevant criteria, and speed data were collected at the midpoint of the preceding tangent and starting, ending, and middle point of the curve. Multiple linear mixed effect models (LME) were developed using the instantaneous speed measures representing the speed of vehicles at different points of horizontal curves to recognize relationships between speed variance (standard deviation) and road geometry. A simulation-based framework (Monte Carlo) was introduced to check the speed disparity on horizontal curves in mixed vehicle technologies when consideration is given to the interactions among connected vehicles (CVs), autonomous vehicles (AVs), and non-connected vehicles (NCVs) on horizontal curves. The Monte Carlo method was used in the simulation to randomly sample values for the various parameters from their respective distributions. Theresults show that NCVs had higher speed variation than CVs and AVs. In addition, AVs and CVs contributed to reduce speed disparity in the mixed vehicle technologies in any penetration rates.

Keywords: autonomous vehicles, connected vehicles, non-connected vehicles, speed variance

Procedia PDF Downloads 144
2037 Determinants of the Users Intention of Social-Local-Mobile Applications

Authors: Chia-Chen Chen, Mu-Yen Chen

Abstract:

In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.

Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality

Procedia PDF Downloads 528
2036 A Study in the Formation of a Term: Sahaba

Authors: Abdul Rahman Chamseddine

Abstract:

The Companions of the Prophet Muhammad, the Sahaba, are regarded as the first link between him and later believers who did not know him or learn from him directly. This makes the Sahaba a link in the chain between God and the ummah (community). Apart from their role in spreading the Prophet’s teachings, they came to be regarded as role models, representing the Islamic ideal of life as prescribed by the Prophet himself. According to Hadith, the Prophet had promised some Sahaba unqualified admission to paradise. It is commonly agreed that the Sahaba have the following attributes in common: God is well pleased with them; they will surely go to paradise; they are perfectly trustworthy; and they are the authorities from whom Muslims can learn all matters related to their religion. No other generation of Muslims has received the attention received by the Companions of the Prophet. In spite of the importance of the Sahaba in Islam, we still know comparatively little about them. There are at least two reasons for this. First, there is the overall scarcity of information surviving from the early period. At the death of the Prophet, it is said, there were more than 100,000 Companions. As we shall see, this is a complex issue, involving the definition of the term Sahaba. However, only few Companions of the Prophet are known to us. Ibn Hajar al-‘Asqalani, who wrote in the fifteenth century A.D., was only able to collect facts about 11,000 of them (including those whose status as Sahaba was disputed). Ibn Sa‘d, Ibn ‘Abd al-Barr and Ibn al-Athir, all of whom lived earlier than Ibn Hajar, included in their respective works fewer lives of Sahaba than he did. If we consider Ibn Hajar’s Isaba as the most complete biographical account of the Sahaba that remains available, we have information, presumably, on approximately one tenth of them. The remaining nine tenths are apparently lost from the historical record. Second, discussion of the Sahaba tends to focus on those considered the most important among them such as ‘Uthman, ‘Ali and Mu‘awiya, while others, who together number in the thousands, are less well-known. This paper will try to study the origins of the term Sahaba that became exclusive to the Companions of the Prophet and not a synonym of the word companions in general.

Keywords: companions, Hadith, Islamic history, Muhammad, Sahaba, transmission

Procedia PDF Downloads 414
2035 New-Born Children and Marriage Stability: An Evaluation of Divorce Risk Based on 2010-2018 China Family Panel Studies Data

Authors: Yuchao Yao

Abstract:

As two of the main characteristics of Chinese demographic trends, increasing divorce rates and decreasing fertility rates both shaped the population structure in the recent decade. Figuring out to what extent can be having a child make a difference in the divorce rate of a couple will not only draw a picture of Chinese families but also bring about a new perspective to evaluate the Chinese child-breeding policies. Based on China Family Panel Studies (CFPS) Data 2010-2018, this paper provides a systematic evaluation of how children influence a couple’s marital stability through a series of empirical models. Using survival analysis and propensity score matching (PSM) model, this paper finds that the number and age of children that a couple has mattered in consolidating marital relationship, and these effects vary little over time; during the last decade, newly having children can in fact decrease the possibility of divorce for Chinese couples; the such decreasing effect is largely due to the birth of a second child. As this is an inclusive attempt to study and compare not only the effects but also the causality of children on divorce risk in the last decade, the results of this research will do a good summary of the status quo of divorce in China. Furthermore, this paper provides implications for further reforming the current marriage and child-breeding policies.

Keywords: divorce risk, fertility, China, survival analysis, propensity score matching

Procedia PDF Downloads 72
2034 Hydrodynamic and Sediment Transport Analysis of Computational Fluid Dynamics Designed Flow Regulating Liner (Smart Ditch)

Authors: Saman Mostafazadeh-Fard, Zohrab Samani, Kenneth Suazo

Abstract:

Agricultural ditch liners are used to prevent soil erosion and reduce seepage losses. This paper introduced an approach to validate a computational fluid dynamics (CFD) platform FLOW-3D code and its use to design a flow-regulating corrugated agricultural ditch liner system (Smart Ditch (SM)). Hydrodynamic and sediment transport analyses were performed on the proposed liner flow using the CFD platform FLOW-3D code. The code's hydrodynamic and scour and sediment transport models were calibrated and validated using lab data with an accuracy of 94 % and 95%, respectively. The code was then used to measure hydrodynamic parameters of sublayer turbulent intensity, kinetic energy, dissipation, and packed sediment mass normalized with respect to sublayer flow velocity. Sublayer turbulent intensity, kinetic energy, and dissipation in the SM flow were significantly higher than CR flow. An alternative corrugated liner was also designed, and sediment transport was measured and compared to SM and CR flows. Normalized packed sediment mass with respect to average sublayer flow velocity was 27.8 % lower in alternative flow compared to SM flow. CFD platform FLOW-3D code could effectively be used to design corrugated ditch liner systems and perform hydrodynamic and sediment transport analysis under various corrugation designs.

Keywords: CFD, hydrodynamic, sediment transport, ditch, liner design

Procedia PDF Downloads 120
2033 Empowering the Citizens: The Potential of Zimbabwean Library and Information Science Schools in Contributing towards Socio-Economic Transformation

Authors: Collence Takaingenhamo Chisita, Munyaradzi Shoko

Abstract:

Library and Information Science Schools play significant roles in socio–economic transformation but in most cases they are downplayed or overshadowed by other institutions, and professions. Currently Zimbabwe boasts of high literacy rate in Africa and this success would have been impossible without the contributions of library schools and related institutions. Libraries and librarians are at the epicentre of socio-economic development and their role cannot be downplayed. It is out of this context that the writer will explore the extent to which library schools are contributing towards socio-economic transformation, for example, human capital development and facilitating access to information. The writer will seek to explain and clarify how LIS schools are engaged in socio-economic transformation through supporting education and culture through community engagement. The paper will examine the LIS education models, for example, general education and Technical Vocational Education and Training (TVET) or Competency Based Education and Training (CBET). It will also seek to find out how LIS Schools are contributing to the information/knowledge economy through education, training and research. The writer will also seek to find out how LIS Education is responding to socio-economic and political dynamics in Zimbabwe amidst forces of globalisation and cultural identities. Furthermore, the writer will explore the extent to which LIS education can help to reposition Zimbabwe in the global knowledge economy. The author will examine how LIS schools integrate culture and technology.

Keywords: development, information/knowledge economy, culture, empowerment, collaboration, globalisation

Procedia PDF Downloads 317
2032 Batch Adsorption Studies for the Removal of Textile Dyes from Aqueous Solution on Three Different Pine Bark

Authors: B. Cheknane, F. Zermane

Abstract:

The main objective of the present study is the valorization of natural raw materials of plant origin for the treatment of textile industry wastewater. Selected bark was: maritime (MP), pinyon (PP) and Aleppo pine (AP) bark. The efficiency of these barks were tested for the removal of three dye; rhodamine B (RhB), Green Malachite (GM) and X Methyl Orange (MO). At the first time we focus to study the different parameters which can influence the adsorption processes such as: nature of the adsorbents, nature of the pollutants (dyes) and the effect of pH. Obtained results reveals that the speed adsorption is strongly influencing by the pH medium and the comparative study show that adsorption is favorable in the acidic medium with amount adsorbed of (Q=40mg/g) for rhodamine B and (Q=46mg/g) for orange methyl. Results of adsorption kinetics reveals that the molecules of GM are adsorbed better (Q=48mg/g) than the molecules of RhB (Q=46mg/g) and methyl orange (Q=18mg/g), with equilibrium time of 6 hours. The results of adsorption isotherms show clearly that the maritime pine bark is the most effective adsorbents with adsorbed amount of (QRhB=200mg/g) and (QMO=88mg/g) followed by pinyon pine (PP) with (QRhB=184mg/g) and (QMO=56mg/g) and finally Aleppo pine (AP) bark with (QRhB=131mg/g) and (QMO= 46mg/g). The different obtained isotherms were modeled using the Langmuir and Freundlich models and according to the adjustment coefficient values R2, the obtained isotherms are well represented by Freundlich model.

Keywords: maritime pine bark (MP), pinyon pine bark (PP), Aleppo pine (AP) bark, adsorption, dyes

Procedia PDF Downloads 318
2031 Student Debt Loans and Labor Market Outcomes: A Lesson in Unintended Consequences

Authors: Sun-Ki Choi

Abstract:

The U.S. student loan policy was initiated to improve the equality of educational opportunity and help low-income families to provide higher education opportunities for their children. However, with the increase in the average student loan amount, college graduates with student loans experience problems and restrictions in their early-career choices. This study examines the early career labor market choices of college graduates who obtained student loans to finance their higher education. In this study, National Survey of College Graduates (NSCG) data for 2017 and 2019 was used to estimate the effects of student loans on the employment status and current job wages of graduates with student loans. In the analysis, two groups of workers, those with student loans and those without loans, were compared. Using basic models and Mahalanobis distance matching, it was found that graduates who rely on student loans to finance their education are more likely to participate in the labor market than those who do not. Moreover, in entry-level jobs, graduates with student loans receive lower salaries than those without student loans. College graduates make job-related decisions based on their current and future wages and fringe benefits. Graduates with student loans tend to demonstrate risk-averse behaviors due to their financial restrictions. Thus, student loan debt creates inequity in the early-career labor market for college graduates. Furthermore, this study has implications for policymakers and researchers in terms of the student loan policy.

Keywords: student loan, wage differential, unintended consequences, mahalanobis distance matching

Procedia PDF Downloads 117
2030 Using Risk Management Indicators in Decision Tree Analysis

Authors: Adel Ali Elshaibani

Abstract:

Risk management indicators augment the reporting infrastructure, particularly for the board and senior management, to identify, monitor, and manage risks. This enhancement facilitates improved decision-making throughout the banking organization. Decision tree analysis is a tool that visually outlines potential outcomes, costs, and consequences of complex decisions. It is particularly beneficial for analyzing quantitative data and making decisions based on numerical values. By calculating the expected value of each outcome, decision tree analysis can help assess the best course of action. In the context of banking, decision tree analysis can assist lenders in evaluating a customer’s creditworthiness, thereby preventing losses. However, applying these tools in developing countries may face several limitations, such as data availability, lack of technological infrastructure and resources, lack of skilled professionals, cultural factors, and cost. Moreover, decision trees can create overly complex models that do not generalize well to new data, known as overfitting. They can also be sensitive to small changes in the data, which can result in different tree structures and can become computationally expensive when dealing with large datasets. In conclusion, while risk management indicators and decision tree analysis are beneficial for decision-making in banks, their effectiveness is contingent upon how they are implemented and utilized by the board of directors, especially in the context of developing countries. It’s important to consider these limitations when planning to implement these tools in developing countries.

Keywords: risk management indicators, decision tree analysis, developing countries, board of directors, bank performance, risk management strategy, banking institutions

Procedia PDF Downloads 58
2029 A Study on the Waiting Time for the First Employment of Arts Graduates in Sri Lanka

Authors: Imali T. Jayamanne, K. P. Asoka Ramanayake

Abstract:

Transition from tertiary level education to employment is one of the challenges that many fresh university graduates face after graduation. The transition period or the waiting time to obtain the first employment varies with the socio-economic factors and the general characteristics of a graduate. Compared to other fields of study, Arts graduates in Sri Lanka, have to wait a long time to find their first employment. The objective of this study is to identify the determinants of the transition from higher education to employment of these graduates using survival models. The study is based on a survey that was conducted in the year 2016 on a stratified random sample of Arts graduates from Sri Lankan universities who had graduated in 2012. Among the 469 responses, 36 (8%) waiting times were interval censored and 13 (3%) were right censored. Waiting time for the first employment varied between zero to 51 months. Initially, the log-rank and the Gehan-Wilcoxon tests were performed to identify the significant factors. Gender, ethnicity, GCE Advanced level English grade, civil status, university, class received, degree type, sector of first employment, type of first employment and the educational qualifications required for the first employment were significant at 10%. The Cox proportional hazards model was fitted to model the waiting time for first employment with these significant factors. All factors, except ethnicity and type of employment were significant at 5%. However, since the proportional hazard assumption was violated, the lognormal Accelerated failure time (AFT) model was fitted to model the waiting time for the first employment. The same factors were significant in the AFT model as in Cox proportional model.

Keywords: AFT model, first employment, proportional hazard, survey design, waiting time

Procedia PDF Downloads 309
2028 Effect of Class V Cavity Configuration and Loading Situation on the Stress Concentration

Authors: Jia-Yu Wu, Chih-Han Chang, Shu-Fen Chuang, Rong-Yang Lai

Abstract:

Objective: This study was to examine the stress distribution of tooth with different class V restorations under different loading situations and geometry by 3D finite element (FE) analysis. `Methods: A series of FE models of mandibular premolars containing class V cavities were constructed using micro-CT. The class V cavities were assigned as the combinations of different cavity depths x occlusal -gingival heights: 1x2, 1x4, 2x2, and 2x4 mm. Three alveolar bone loss conditions were examined: 0, 1, and 2 mm. 200 N force was exerted on the buccal cusp tip under various directions (vertical, V; obliquely 30° angled, O; oblique and parallel the individual occlusal cavity wall, P). A 3-D FE analysis was performed and the von-Mises stress was used to summarize the data of stress distribution and maximum stress. Results: The maximal stress did not vary in different alveolar bone heights. For each geometry, the maximal stress was found at bilateral corners of the cavity. The peak stress of restorations was significantly higher under load P compared to those under loads V and O while the latter two were similar. 2x2mm cavity exhibited significantly increased (2.88 fold) stress under load P compared to that under load V, followed by 1x2mm (2.11 fold), 2x4mm (1.98 fold) and 1x4mm (1.1fold). Conclusion: Load direction causes the greatest impact on the results of stress, while the effect of alveolar bone loss is minor. Load direction parallel to the cavity wall may enhance the stress concentration especially in deep and narrow class cavities.

Keywords: class v restoration, finite element analysis, loading situation, stress

Procedia PDF Downloads 242
2027 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
2026 Approach for Updating a Digital Factory Model by Photogrammetry

Authors: R. Hellmuth, F. Wehner

Abstract:

Factory planning has the task of designing products, plants, processes, organization, areas, and the construction of a factory. The requirements for factory planning and the building of a factory have changed in recent years. Regular restructuring is becoming more important in order to maintain the competitiveness of a factory. Restrictions in new areas, shorter life cycles of product and production technology as well as a VUCA world (Volatility, Uncertainty, Complexity & Ambiguity) lead to more frequent restructuring measures within a factory. A digital factory model is the planning basis for rebuilding measures and becomes an indispensable tool. Short-term rescheduling can no longer be handled by on-site inspections and manual measurements. The tight time schedules require up-to-date planning models. Due to the high adaptation rate of factories described above, a methodology for rescheduling factories on the basis of a modern digital factory twin is conceived and designed for practical application in factory restructuring projects. The focus is on rebuild processes. The aim is to keep the planning basis (digital factory model) for conversions within a factory up to date. This requires the application of a methodology that reduces the deficits of existing approaches. The aim is to show how a digital factory model can be kept up to date during ongoing factory operation. A method based on photogrammetry technology is presented. The focus is on developing a simple and cost-effective solution to track the many changes that occur in a factory building during operation. The method is preceded by a hardware and software comparison to identify the most economical and fastest variant. 

Keywords: digital factory model, photogrammetry, factory planning, restructuring

Procedia PDF Downloads 115