Search results for: expected utility maximization
3211 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking
Authors: Faith G. Ehiemua, Chandra E. Ulinfun
Abstract:
This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach
Procedia PDF Downloads 2163210 Revitalization of the Chinese Residential at Lasem, Indonesia
Authors: Nurtati Soewarno, Dian Duhita
Abstract:
The existence of civilization from the past is recognized by the left objects such as monuments, buildings or even a town. The relics were designed and made well, using the good quality material so it could persist a long period of time. At this moment, those relics are cultural heritage that must be preserved and the authenticity maintained. Indonesia, a country consist of various tribes with many cultural heritages, one of them is the city of Lasem. Lasem city lies in the northern part of Central Java since the Majapahit kingdom era (13th century) poses as a busy harbor city and a trading center. Lasem is one of the residences of Chinese immigrants in Java, seen by the domination of Chinese architectural building styles. The residential was built since the 15th century and the building has the courtyard which is different from other China’s building in another part of Java. This city loses ground since the trade activity experience difficulties during the Japanese colonial era and continues after the Indonesian independence time. Many Chinese people left Lasem city and let the buildings empty not maintained. This paper will present the result of observation to Chinese architectural style buildings in Lasem city which still hold out until this moment. Using typo morphology method, the case study is chosen based on the transformation type. The occurring transformation is parallel with adaptive reuse concept as an effort to revitalize the existence of the buildings. With this concept, it is expected that the buildings could be re functioned and the glory of the foretime Lasem city could be experienced again. Intervention from the local government is expected, issuing regulations, hoping the new building functions won’t ruin the cultural heritage but instead beautifies it.Keywords: adaptive re-use, brown field area, building transformation, Lasem city
Procedia PDF Downloads 3643209 IOT Based Automated Production and Control System for Clean Water Filtration Through Solar Energy Operated by Submersible Water Pump
Authors: Musse Mohamud Ahmed, Tina Linda Achilles, Mohammad Kamrul Hasan
Abstract:
Deterioration of the mother nature is evident these day with clear danger of human catastrophe emanating from greenhouses (GHG) with increasing CO2 emissions to the environment. PV technology can help to reduce the dependency on fossil fuel, decreasing air pollution and slowing down the rate of global warming. The objective of this paper is to propose, develop and design the production of clean water supply to rural communities using an appropriate technology such as Internet of Things (IOT) that does not create any CO2 emissions. Additionally, maximization of solar energy power output and reciprocally minimizing the natural characteristics of solar sources intermittences during less presence of the sun itself is another goal to achieve in this work. The paper presents the development of critical automated control system for solar energy power output optimization using several new techniques. water pumping system is developed to supply clean water with the application of IOT-renewable energy. This system is effective to provide clean water supply to remote and off-grid areas using Photovoltaics (PV) technology that collects energy generated from the sunlight. The focus of this work is to design and develop a submersible solar water pumping system that applies an IOT implementation. Thus, this system has been executed and programmed using Arduino Software (IDE), proteus, Maltab and C++ programming language. The mechanism of this system is that it pumps water from water reservoir that is powered up by solar energy and clean water production was also incorporated using filtration system through the submersible solar water pumping system. The filtering system is an additional application platform which is intended to provide a clean water supply to any households in Sarawak State, Malaysia.Keywords: IOT, automated production and control system, water filtration, automated submersible water pump, solar energy
Procedia PDF Downloads 883208 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management
Authors: Arjmand Khaliq, Pemra Sohaib
Abstract:
There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.Keywords: cellular networks, energy management, renewable energy source, smart grid technology
Procedia PDF Downloads 4133207 Total Organic Carbon, Porosity and Permeability Correlation: A Tool for Carbon Dioxide Storage Potential Evaluation in Irati Formation of the Parana Basin, Brazil
Authors: Richardson M. Abraham-A., Colombo Celso Gaeta Tassinari
Abstract:
The correlation between Total Organic Carbon (TOC) and flow units have been carried out to predict and compare the carbon dioxide (CO2) storage potential of the shale and carbonate rocks in Irati Formation of the Parana Basin. The equations for permeability (K), reservoir quality index (RQI) and flow zone indicator (FZI) are redefined and engaged to evaluate the flow units in both potential reservoir rocks. Shales show higher values of TOC compared to carbonates, as such, porosity (Ф) is most likely to be higher in shales compared to carbonates. The increase in Ф corresponds to the increase in K (in both rocks). Nonetheless, at lower values of Ф, K is higher in carbonates compared to shales. This shows that at lower values of TOC in carbonates, Ф is low, yet, K is likely to be high compared to shale. In the same vein, at higher values of TOC in shales, Ф is high, yet, K is expected to be low compared to carbonates. Overall, the flow unit factors (RQI and FZI) are better in the carbonates compared to the shales. Moreso, within the study location, there are some portions where the thicknesses of the carbonate units are higher compared to the shale units. Most parts of the carbonate strata in the study location are fractured in situ, hence, this could provide easy access for the storage of CO2. Therefore, based on these points and the disparities between the flow units in the evaluated rock types, the carbonate units are expected to show better potentials for the storage of CO2. The shale units may be considered as potential cap rocks or seals.Keywords: total organic content, flow units, carbon dioxide storage, geologic structures
Procedia PDF Downloads 1643206 Reduced General Dispersion Model in Cylindrical Coordinates and Isotope Transient Kinetic Analysis in Laminar Flow
Authors: Masood Otarod, Ronald M. Supkowski
Abstract:
This abstract discusses a method that reduces the general dispersion model in cylindrical coordinates to a second order linear ordinary differential equation with constant coefficients so that it can be utilized to conduct kinetic studies in packed bed tubular catalytic reactors at a broad range of Reynolds numbers. The model was tested by 13CO isotope transient tracing of the CO adsorption of Boudouard reaction in a differential reactor at an average Reynolds number of 0.2 over Pd-Al2O3 catalyst. Detailed experimental results have provided evidence for the validity of the theoretical framing of the model and the estimated parameters are consistent with the literature. The solution of the general dispersion model requires the knowledge of the radial distribution of axial velocity. This is not always known. Hence, up until now, the implementation of the dispersion model has been largely restricted to the plug-flow regime. But, ideal plug-flow is impossible to achieve and flow regimes approximating plug-flow leave much room for debate as to the validity of the results. The reduction of the general dispersion model transpires as a result of the application of a factorization theorem. Factorization theorem is derived from the observation that a cross section of a catalytic bed consists of a solid phase across which the reaction takes place and a void or porous phase across which no significant measure of reaction occurs. The disparity in flow and the heterogeneity of the catalytic bed cause the concentration of reacting compounds to fluctuate radially. These variabilities signify the existence of radial positions at which the radial gradient of concentration is zero. Succinctly, factorization theorem states that a concentration function of axial and radial coordinates in a catalytic bed is factorable as the product of the mean radial cup-mixing function and a contingent dimensionless function. The concentration of adsorbed compounds are also factorable since they are piecewise continuous functions and suffer the same variability but in the reverse order of the concentration of mobile phase compounds. Factorability is a property of packed beds which transforms the general dispersion model to an equation in terms of the measurable mean radial cup-mixing concentration of the mobile phase compounds and mean cross-sectional concentration of adsorbed species. The reduced model does not require the knowledge of the radial distribution of the axial velocity. Instead, it is characterized by new transport parameters so denoted by Ωc, Ωa, Ωc, and which are respectively denominated convection coefficient cofactor, axial dispersion coefficient cofactor, and radial dispersion coefficient cofactor. These cofactors adjust the dispersion equation as compensation for the unavailability of the radial distribution of the axial velocity. Together with the rest of the kinetic parameters they can be determined from experimental data via an optimization procedure. Our data showed that the estimated parameters Ωc, Ωa Ωr, are monotonically correlated with the Reynolds number. This is expected to be the case based on the theoretical construct of the model. Computer generated simulations of methanation reaction on nickel provide additional support for the utility of the newly conceptualized dispersion model.Keywords: factorization, general dispersion model, isotope transient kinetic, partial differential equations
Procedia PDF Downloads 2693205 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm
Authors: Frodouard Minani
Abstract:
Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks
Procedia PDF Downloads 1443204 The Tourist Satisfaction on Logo Design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province
Authors: Panupong Chanplin, Wilailuk Mepracha, Sathapath Kilaso
Abstract:
The aims of this research were twofold: 1) to logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province and 2) to study the level of tourist satisfaction towards logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province. Tourist satisfaction was measured using four criteria: a unique product identity, ease of remembrance, product utility, and beauty/impressiveness. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Huay Kon Border Market. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all four criteria of the logo design that was designed to target them. This study proposes that specifically logo designed of Huay Kon Border Market could also be implemented with other real media already available on the market.Keywords: satisfaction, logo, design, Huay Kon border market
Procedia PDF Downloads 2233203 Continuous Land Cover Change Detection in Subtropical Thicket Ecosystems
Authors: Craig Mahlasi
Abstract:
The Subtropical Thicket Biome has been in peril of transformation. Estimates indicate that as much as 63% of the Subtropical Thicket Biome is severely degraded. Agricultural expansion is the main driver of transformation. While several studies have sought to document and map the long term transformations, there is a lack of information on disturbance events that allow for timely intervention by authorities. Furthermore, tools that seek to perform continuous land cover change detection are often developed for forests and thus tend to perform poorly in thicket ecosystems. This study investigates the utility of Earth Observation data for continuous land cover change detection in Subtropical Thicket ecosystems. Temporal Neural Networks are implemented on a time series of Sentinel-2 observations. The model obtained 0.93 accuracy, a recall score of 0.93, and a precision score of 0.91 in detecting Thicket disturbances. The study demonstrates the potential of continuous land cover change in Subtropical Thicket ecosystems.Keywords: remote sensing, land cover change detection, subtropical thickets, near-real time
Procedia PDF Downloads 1623202 The Impact of Socio-Economic and Type of Religion on the Behavior of Obedience among Arab-Israeli Teenagers
Authors: Sadhana Ghnayem
Abstract:
This article examines the relationship between several socio-economic and background variables of Arab-Israeli families and their effect on the conflict management style of forcing, where teenage children are expected to obey their parents without questioning. The article explores the inter-generational gap and the desire of Arab-Israeli parents to force their teenage children to obey without questioning. The independent variables include: the sex of the parent, religion (Christian or Muslim), income of the parent, years of education of the parent, and the sex of the teenage child. We use the dependent variable of “Obedience Without Questioning” that is reported twice: by each of the parents as well as by the children. We circulated a questionnaire and collected data from a sample of 180 parents and their adolescent child living in the Galilee area during 2018. In this questionnaire we asked each of the parent and his/her teenage child about whether the latter is expected to follow the instructions of the former without questioning. The outcome of this article indicates, first, that Christian-Arab families are less authoritarian than Muslims families in demanding sheer obedience from their children. Second, female parents indicate more than male parents that their teenage child indeed obeys without questioning. Third, there is a negative correlation between the variable “Income” and “Obedience without Questioning.” Yet, the regression coefficient of this variable is close zero. Fourth, there is a positive correlation between years of education and obedience reported by the children. In other words, more educated parents are more likely to demand obedience from their children. Finally, after running the regression, the study also found that the impact of the variables of religion as well as the sex of the child on the dependent variable of obedience is also significant at above 95 and 90%, respectively.Keywords: conflict, religion, conflict management style, obedience
Procedia PDF Downloads 1693201 Double Layer Security Model for Identification Friend or Foe
Authors: Buse T. Aydın, Enver Ozdemir
Abstract:
In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 1613200 Texture Characterization and Mineralogical Composition of the 1982-1983 Second Phase Galunggung Eruption, West Java Regency, Indonesia
Authors: M. Hanif Irsyada, Rifaldy, Arif Lutfi Namury, Syahreza S. Angkasa, Khalid Rizky, Ricky Aryanto, M. Alfiyan Bagus, Excobar Arman, Fahri Septianto, Firman Najib Wibisana
Abstract:
Galunggung Mountain is an active volcano in Indonesia, precisely on the island of Java. This area is included in the Sunda Sunda arc formed by the tendency of the Australian oceanic plate to Eurasian continental plate. This research was conducted to determine the characteristics and document the mineralogical composition of the Galunggung eruption of the second phase 1982-1983. In fragment samples, petrographic analysis is carried out under a qualitative and quantitative polarizing microscope. This sample was obtained from the second phase eruption in the Cibanjanj formation. Based on the analysis results obtained filter texture characteristics, olivine parallel growth, lamellar structure, glass inclusion, plagioclase zonation and obtained special texture in the gabbroic cummulate. The mineral composition consists of phenocryst plagioclase (41vol%), pyroxene (26vol%), olivin (4vol%) and mineral opaque (29vol%). Microlite minerals consist of plagioclase (31.95vol%), pyroxene (12.09vol%), opaque minerals (55.96vol%). This research is expected to be developed by further researchers to be able to explain in more detail related to Galunggung mountain with 3 phases of eruption that are so intense. Also, it is expected to explain the structural characteristics and mineralogical composition that can be used to determine the origin of all the results of the Galunggung eruption 1982-1983.Keywords: Galunggung eruption, mineralogical composition, texture characterization, gabbroic cumulate
Procedia PDF Downloads 1263199 Service Life Study of Polymers Used in Renovation of Heritage Buildings and Other Structures
Authors: Parastou Kharazmi
Abstract:
Degradation of building materials particularly pipelines causes environmental damage during renovation or replacement and is a time consuming and costly process. Rehabilitation by polymer composites is a solution for renovation of degraded pipeline in heritage buildings and other structures which are less costly, faster and causes less damage to the environment; however, it is still not clear for how long these materials can perform as expected in the field and working condition. To study their service life, two types of composites based on Epoxy and Polyester resins have been evaluated by accelerated exposure and field exposure. The primary degradation agent used in accelerated exposure has been cycling temperature with half of the tests performed in presence of water. Thin films of materials used in accelerated testing were prepared in laboratory by using the same amount of material as well as technique of multi-layers application used in majority of the field installations. Extreme intensity levels of degradation agents have been used only to evaluate materials properties and as also mentioned in ISO 15686, are not directly correlated with degradation mechanisms that would be experienced in service. In the field exposure study, the focus has been to identify possible failure modes, causes, and effects. In field exposure, it has been observed that there are other degradation agents present which can be investigated further such as presence of contaminants and rust before application which prevents formation of a uniform layer of polymer or incompatibility between dissimilar materials. This part of the study also highlighted the importance of application’s quality of the materials in the field for providing the expected performance and service life. Results from extended accelerated exposure and field exposure can help in choosing inspection techniques, establishing the primary degradation agents and can be used for ageing exposure programs with clarifying relationship between different exposure periods and sites.Keywords: building, renovation, service life, pipelines
Procedia PDF Downloads 1883198 A Segmentation Method for Grayscale Images Based on the Firefly Algorithm and the Gaussian Mixture Model
Authors: Donatella Giuliani
Abstract:
In this research, we propose an unsupervised grayscale image segmentation method based on a combination of the Firefly Algorithm and the Gaussian Mixture Model. Firstly, the Firefly Algorithm has been applied in a histogram-based research of cluster means. The Firefly Algorithm is a stochastic global optimization technique, centered on the flashing characteristics of fireflies. In this context it has been performed to determine the number of clusters and the related cluster means in a histogram-based segmentation approach. Successively these means are used in the initialization step for the parameter estimation of a Gaussian Mixture Model. The parametric probability density function of a Gaussian Mixture Model is represented as a weighted sum of Gaussian component densities, whose parameters are evaluated applying the iterative Expectation-Maximization technique. The coefficients of the linear super-position of Gaussians can be thought as prior probabilities of each component. Applying the Bayes rule, the posterior probabilities of the grayscale intensities have been evaluated, therefore their maxima are used to assign each pixel to the clusters, according to their gray-level values. The proposed approach appears fairly solid and reliable when applied even to complex grayscale images. The validation has been performed by using different standard measures, more precisely: the Root Mean Square Error (RMSE), the Structural Content (SC), the Normalized Correlation Coefficient (NK) and the Davies-Bouldin (DB) index. The achieved results have strongly confirmed the robustness of this gray scale segmentation method based on a metaheuristic algorithm. Another noteworthy advantage of this methodology is due to the use of maxima of responsibilities for the pixel assignment that implies a consistent reduction of the computational costs.Keywords: clustering images, firefly algorithm, Gaussian mixture model, meta heuristic algorithm, image segmentation
Procedia PDF Downloads 2173197 Improvement of Water Quality of Al Asfar Lake Using Constructed Wetland System
Authors: Jamal Radaideh
Abstract:
Al-Asfar Lake is located about 14 km east of Al-Ahsa and is one of the most important wetland lakes in the Al Ahsa/Eastern Province of Saudi Arabia. Al-Ahsa is may be the largest oasis in the world, having an area of 20,000 hectares, in addition, it is of the largest and oldest agricultural centers in the region. The surplus farm irrigation water beside additional water supplied by treated wastewater from Al-Hofuf sewage station is collected by a drainage network and discharged into Al-Asfar Lake. The lake has good wetlands, sand dunes as well as large expanses of open and shallow water. Salt tolerant vegetation is present in some of the shallow areas around the lake, and huge stands of Phragmites reeds occur around the lake. The lake presents an important habitat for wildlife and birds, something not expected to find in a large desert. Although high evaporation rates in the range of 3250 mm are common, the water remains in the evaporation lakes during all seasons of the year is used to supply cattle with drinking water and for aquifer recharge. Investigations showed that high concentrations of nitrogen (N), phosphorus (P), biological oxygen demand (BOD), chemical oxygen demand (COD) and salinity discharge to Al Asfar Lake from the D2 drain exist. It is expected that the majority of BOD, COD and N originates from wastewater discharge and leachate from surplus irrigation water which also contribute to the majority of P and salinity. The significant content of nutrients and biological oxygen demand reduces available oxygen in the water. The present project aimed to improve the water quality of the lake using constructed wetland trains which will be built around the lake. Phragmites reeds, which already occur around the lake, will be used.Keywords: Al Asfar lake, constructed wetland, water quality, water treatment
Procedia PDF Downloads 4493196 A Network-Theorical Perspective on Music Analysis
Authors: Alberto Alcalá-Alvarez, Pablo Padilla-Longoria
Abstract:
The present paper describes a framework for constructing mathematical networks encoding relevant musical information from a music score for structural analysis. These graphs englobe statistical information about music elements such as notes, chords, rhythms, intervals, etc., and the relations among them, and so become helpful in visualizing and understanding important stylistic features of a music fragment. In order to build such networks, musical data is parsed out of a digital symbolic music file. This data undergoes different analytical procedures from Graph Theory, such as measuring the centrality of nodes, community detection, and entropy calculation. The resulting networks reflect important structural characteristics of the fragment in question: predominant elements, connectivity between them, and complexity of the information contained in it. Music pieces in different styles are analyzed, and the results are contrasted with the traditional analysis outcome in order to show the consistency and potential utility of this method for music analysis.Keywords: computational musicology, mathematical music modelling, music analysis, style classification
Procedia PDF Downloads 1023195 Advantages and Disadvantages of Socioscientific Issue Based Instruction in Science Classrooms: Pre-Service Science Teachers' Views
Authors: Aysegul Evren Yapicioglu
Abstract:
The social roles and responsibilities expected from citizens are increasing due to changing global living conditions. Science education is expected to prepare conscious and sensitive students. Because today’s students are the adults of future. Precondition of this task is Teacher Education. In the past decade, one of the most important research field is socioscientific issues. This study deals with advantages and disadvantages of socioscientific issue based instruction in science classroom according to pre-service science teachers’ views. A case study approach that is one of the qualitative research design was used to explore their views. Fourteen pre-service science teachers participated to instruction process. Dolphinariums, Kyoto Protocol, genetically modified organisms, recyclable black bags’ benefits and damages, genetic tests, alternative energy sources and organ donation are examples of socioscientific issues, which were taught through activities in a special teaching course. Diaries and focus group interview were used as data collection tools. As a result of the study, the advantages of socioscientific issue based instruction in science classroom comprise of six sub-categories which are multi-skilling, social awareness development of thinking, meaningful learning, character and professional development, contribution of scientific literacy whereas disadvantages of this instruction process are challenges teachers and students, limitations of teaching and learning process in pre-service science teachers’ perspectives. Finally, this study contributes to science teachers and researchers to overcome disadvantages and benefit from the advantage of socioscientific issue based instruction in science classroom.Keywords: science education, socioscientific issues, socioscientific issue based instruction, pre-service science teacher
Procedia PDF Downloads 1813194 University of Bejaia, Algeria
Authors: Geoffrey Sinha
Abstract:
Today’s students are connected to the digital generation and technology is an integral part of their everyday lives. Clearly, this is one social revolution that is here to stay and the language classroom has been no exception. Furthermore, today’s teachers are also expected to connect with technology and online tools in their curriculum. However, it’s often difficult for teachers to know where to start, what resources and tools are available, what students should use, and most importantly, how to effectively use them in the classroom.Keywords: language learning, new media, social media, technology
Procedia PDF Downloads 4643193 The Design of Acoustic Horns for Ultrasonic Aided Tube Double Side Flange Making
Authors: Kuen-Ming Shu, Jyun-Wei Chen
Abstract:
Encapsulated O-rings are specifically designed to address the problem of sealing the most hostile chemicals and extreme temperature applications. Ultrasonic vibration hot embossing and ultrasonic welding techniques provide a fast and reliable method to fabricate encapsulated O-ring. This paper performs the design and analysis method of the acoustic horns with double extrusion to process tube double side flange simultaneously. The paper deals with study through Finite Element Method (FEM) of ultrasonic stepped horn used to process a capsulated O-ring, the theoretical dimensions of horns, and their natural frequencies and amplitudes are obtained through the simulations of COMOSOL software. Furthermore, real horns were fabricated, tested and verified to proof the practical utility of these horns.Keywords: encapsulated O-rings, ultrasonic vibration hot embossing, flange making, acoustic horn, finite element analysis
Procedia PDF Downloads 3183192 Land Use Planning Tool to Achieve Land Degradation Neutrality: Tunisia Case Study
Authors: Rafla Attia, Claudio Zucca, Bao Quang Le, Sana Dridi, Thouraya Sahli, Taoufik Hermassi
Abstract:
In Tunisia, landscape change and land degradation are critical issues for landscape conservation, management, and planning. Landscapes are undergoing crucial environmental problems made evident by soil degradation and desertification. Human improper uses of land resources (e.g., unsuitable land uses, unsustainable crop intensification, and poor rangeland management) and climate change are the main factors leading to the landscape transformation and desertification affecting high proportions of the Tunisian lands. Land use planning (LUP) to achieve Land Degradation Neutrality (LDN) must be supported by methodologies and technologies that help identify best solutions and practices and design context-specific sustainable land management (SLM) strategies. Such strategies must include restoration or rehabilitation efforts in areas with high land degradation, as well as prevention of degradation that could be caused by improper land use (LU) and land management (LM). The geoinformatics Land Use Planning for LDN (LUP4LDN) tool has been designed for this purpose. Its aim is to support national and sub-national planners in i) mapping geographic patterns of current land degradation; ii) anticipating further future land degradation expected in areas that are unsustainably managed; and iii) providing an interactive procedure for developing participatory LU-LM transitional scenarios over selected regions of interest and timeframes, visualizing the related expected levels of impacts on ecosystem services via maps and graphs. The tool has been co-developed and piloted with national stakeholders in Tunisia. The piloting implementation assessed how the LUP4LDN tool fits with existing LUP processes and the benefits achieved by using the tool to support land use planning for LDN.Keywords: land use system, land cover, sustainable land management, land use planning for land degradation neutrality
Procedia PDF Downloads 773191 A Fully-Automated Disturbance Analysis Vision for the Smart Grid Based on Smart Switch Data
Authors: Bernardo Cedano, Ahmed H. Eltom, Bob Hay, Jim Glass, Raga Ahmed
Abstract:
The deployment of smart grid devices such as smart meters and smart switches (SS) supported by a reliable and fast communications system makes automated distribution possible, and thus, provides great benefits to electric power consumers and providers alike. However, more research is needed before the full utility of smart switch data is realized. This paper presents new automated switching techniques using SS within the electric power grid. A concise background of the SS is provided, and operational examples are shown. Organization and presentation of data obtained from SS are shown in the context of the future goal of total automation of the distribution network. The description of application techniques, the examples of success with SS, and the vision outlined in this paper serve to motivate future research pertinent to disturbance analysis automation.Keywords: disturbance automation, electric power grid, smart grid, smart switches
Procedia PDF Downloads 3093190 Prediction of Rotating Machines with Rolling Element Bearings and Its Components Deterioration
Authors: Marimuthu Gurusamy
Abstract:
In vibration analysis (with accelerometers) of rotating machines with rolling element bearing, the customers are interested to know the failure of the machine well in advance to plan the spare inventory and maintenance. But in real world most of the machines fails before the prediction of vibration analyst or Expert analysis software. Presently the prediction of failure is based on ISO 10816 vibration limits only. But this is not enough to monitor the failure of machines well in advance. Because more than 50% of the machines will fail even the vibration readings are within acceptable zone as per ISO 10816.Hence it requires further detail analysis and different techniques to predict the failure well in advance. In vibration Analysis, the velocity spectrum is used to analyse the root cause of the mechanical problems like unbalance, misalignment and looseness etc. The envelope spectrum are used to analyse the bearing frequency components, hence the failure in inner race, outer race and rolling elements are identified. But so far there is no correlation made between these two concepts. The author used both velocity spectrum and Envelope spectrum to analyse the machine behaviour and bearing condition to correlated the changes in dynamic load (by unbalance, misalignment and looseness etc.) and effect of impact on the bearing. Hence we could able to predict the expected life of the machine and bearings in the rotating equipment (with rolling element bearings). Also we used process parameters like temperature, flow and pressure to correlate with flow induced vibration and load variations, when abnormal vibration occurs due to changes in process parameters. Hence by correlation of velocity spectrum, envelope spectrum and process data with 20 years of experience in vibration analysis, the author could able to predict the rotating Equipment and its component’s deterioration and expected duration for maintenance.Keywords: vibration analysis, velocity spectrum, envelope spectrum, prediction of deterioration
Procedia PDF Downloads 4513189 The Potential in the Use of Building Information Modelling and Life-Cycle Assessment for Retrofitting Buildings: A Study Based on Interviews with Experts in Both Fields
Authors: Alex Gonzalez Caceres, Jan Karlshøj, Tor Arvid Vik
Abstract:
Life cycle of residential buildings are expected to be several decades, 40% of European residential buildings have inefficient energy conservation measure. The existing building represents 20-40% of the energy use and the CO₂ emission. Since net zero energy buildings are a short-term goal, (should be achieved by EU countries after 2020), is necessary to plan the next logical step, which is to prepare the existing outdated stack of building to retrofit them into an energy efficiency buildings. In order to accomplish this, two specialize and widespread tool can be used Building Information Modelling (BIM) and life-cycle assessment (LCA). BIM and LCA are tools used by a variety of disciplines; both are able to represent and analyze the constructions in different stages. The combination of these technologies could improve greatly the retrofitting techniques. The incorporation of the carbon footprint, introducing a single database source for different material analysis. To this is added the possibility of considering different analysis approaches such as costs and energy saving. Is expected with these measures, enrich the decision-making. The methodology is based on two main activities; the first task involved the collection of data this is accomplished by literature review and interview with experts in the retrofitting field and BIM technologies. The results of this task are presented as an evaluation checklist of BIM ability to manage data and improve decision-making in retrofitting projects. The last activity involves an evaluation using the results of the previous tasks, to check how far the IFC format can support the requirements by each specialist, and its uses by third party software. The result indicates that BIM/LCA have a great potential to improve the retrofitting process in existing buildings, but some modification must be done in order to meet the requirements of the specialists for both, retrofitting and LCA evaluators.Keywords: retrofitting, BIM, LCA, energy efficiency
Procedia PDF Downloads 2203188 Landscape Management in the Emergency Hazard Planning Zone of the Nuclear Power Plant Temelin: Preventive Improvement of Landscape Functions
Authors: Ivana Kašparová, Emilie Pecharová
Abstract:
The experience of radiological contamination of land, especially after the Chernobyl and Fukushima disasters have shown the need to explore possibilities to the capture of radionuclides in the area affected and to adapt the landscape management to this purpose ex –ante the considered accident in terms of prevention. The project‚ Minimizing the impact of radiation contamination on land in the emergency zone of Temelin NPP‘ (2012-2015), dealt with the possibility of utilization of wetlands as retention sites for water carrying radionuclides in the case of a radiation accident. A model artificial wetland was designed and adopted as a utility model by the Ministry of Industry and Trade of the Czech Republic. The article shows the conditions of construction of designed wetlands in the landscape with regard to minimizing the negative effect on agricultural production and enhancing the hydrological functionality of the landscape.Keywords: artificial wetland, land use/ land cover, old maps, surface-to-water transport of radionuclides
Procedia PDF Downloads 3573187 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.Keywords: Linux system calls, web attack detection, interception, SQL
Procedia PDF Downloads 3593186 Characterizing the Geometry of Envy Human Behaviour Using Game Theory Model with Two Types of Homogeneous Players
Authors: A. S. Mousa, R. I. Rajab, A. A. Pinto
Abstract:
An envy behavioral game theoretical model with two types of homogeneous players is considered in this paper. The strategy space of each type of players is a discrete set with only two alternatives. The preferences of each type of players is given by a discrete utility function. All envy strategies that form Nash equilibria and the corresponding envy Nash domains for each type of players have been characterized. We use geometry to construct two dimensional envy tilings where the horizontal axis reflects the preference for players of type one, while the vertical axis reflects the preference for the players of type two. The influence of the envy behavior parameters on the Cartesian position of the equilibria has been studied, and in each envy tiling we determine the envy Nash equilibria. We observe that there are 1024 combinatorial classes of envy tilings generated from envy chromosomes: 256 of them are being structurally stable while 768 are with bifurcation. Finally, some conditions for the disparate envy Nash equilibria are stated.Keywords: game theory, Nash equilibrium, envy Nash behavior, geometric tilings, bifurcation thresholds
Procedia PDF Downloads 2293185 Intelligent Software Architecture and Automatic Re-Architecting Based on Machine Learning
Authors: Gebremeskel Hagos Gebremedhin, Feng Chong, Heyan Huang
Abstract:
Software system is the combination of architecture and organized components to accomplish a specific function or set of functions. A good software architecture facilitates application system development, promotes achievement of functional requirements, and supports system reconfiguration. We describe three studies demonstrating the utility of our architecture in the subdomain of mobile office robots and identify software engineering principles embodied in the architecture. The main aim of this paper is to analyze prove architecture design and automatic re-architecting using machine learning. Intelligence software architecture and automatic re-architecting process is reorganizing in to more suitable one of the software organizational structure system using the user access dataset for creating relationship among the components of the system. The 3-step approach of data mining was used to analyze effective recovery, transformation and implantation with the use of clustering algorithm. Therefore, automatic re-architecting without changing the source code is possible to solve the software complexity problem and system software reuse.Keywords: intelligence, software architecture, re-architecting, software reuse, High level design
Procedia PDF Downloads 1193184 Optimization of Process Parameters for Peroxidase Production by Ensifer Species
Authors: Ayodeji O. Falade, Leonard V. Mabinya, Uchechukwu U. Nwodo, Anthony I. Okoh
Abstract:
Given the high utility of peroxidase in several industrial processes, the search for novel microorganisms with enhanced peroxidase production capacity is of keen interest. This study investigated the process conditions for optimum peroxidase production by Ensifer sp, new ligninolytic proteobacteria with peroxidase production potential. Also, some agricultural residues were valorized for peroxidase production under solid state fermentation. Peroxidase production was optimum at an initial medium pH 7, incubation temperature of 30 °C and agitation speed of 100 rpm using alkali lignin fermentation medium supplemented with guaiacol as the most effective inducer and ammonium sulphate as the best inorganic nitrogen. Optimum peroxidase production by Ensifer sp. was attained at 48 h with specific productivity of 12.76 ± 1.09 U mg⁻¹. Interestingly, probable laccase production was observed with optimum specific productivity of 12.76 ± 0.45 U mg⁻¹ at 72 h. The highest peroxidase yield was observed with sawdust as solid substrate under solid state fermentation. In conclusion, Ensifer sp. possesses the capacity for enhanced peroxidase production that can be exploited for various biotechnological applications.Keywords: catalase-peroxidase, enzyme production, peroxidase, polymerase chain reaction, proteobacteria
Procedia PDF Downloads 3073183 Spectral Anomaly Detection and Clustering in Radiological Search
Authors: Thomas L. McCullough, John D. Hague, Marylesa M. Howard, Matthew K. Kiser, Michael A. Mazur, Lance K. McLean, Johanna L. Turk
Abstract:
Radiological search and mapping depends on the successful recognition of anomalies in large data sets which contain varied and dynamic backgrounds. We present a new algorithmic approach for real-time anomaly detection which is resistant to common detector imperfections, avoids the limitations of a source template library and provides immediate, and easily interpretable, user feedback. This algorithm is based on a continuous wavelet transform for variance reduction and evaluates the deviation between a foreground measurement and a local background expectation using methods from linear algebra. We also present a technique for recognizing and visualizing spectrally similar clusters of data. This technique uses Laplacian Eigenmap Manifold Learning to perform dimensional reduction which preserves the geometric "closeness" of the data while maintaining sensitivity to outlying data. We illustrate the utility of both techniques on real-world data sets.Keywords: radiological search, radiological mapping, radioactivity, radiation protection
Procedia PDF Downloads 6943182 Pharmacokinetic Modeling of Valsartan in Dog following a Single Oral Administration
Authors: In-Hwan Baek
Abstract:
Valsartan is a potent and highly selective antagonist of the angiotensin II type 1 receptor, and is widely used for the treatment of hypertension. The aim of this study was to investigate the pharmacokinetic properties of the valsartan in dogs following oral administration of a single dose using quantitative modeling approaches. Forty beagle dogs were randomly divided into two group. Group A (n=20) was administered a single oral dose of valsartan 80 mg (Diovan® 80 mg), and group B (n=20) was administered a single oral dose of valsartan 160 mg (Diovan® 160 mg) in the morning after an overnight fast. Blood samples were collected into heparinized tubes before and at 0.5, 1, 1.5, 2, 2.5, 3, 4, 6, 8, 12 and 24 h following oral administration. The plasma concentrations of the valsartan were determined using LC-MS/MS. Non-compartmental pharmacokinetic analyses were performed using WinNonlin Standard Edition software, and modeling approaches were performed using maximum-likelihood estimation via the expectation maximization (MLEM) algorithm with sampling using ADAPT 5 software. After a single dose of valsartan 80 mg, the mean value of maximum concentration (Cmax) was 2.68 ± 1.17 μg/mL at 1.83 ± 1.27 h. The area under the plasma concentration-versus-time curve from time zero to the last measurable concentration (AUC24h) value was 13.21 ± 6.88 μg·h/mL. After dosing with valsartan 160 mg, the mean Cmax was 4.13 ± 1.49 μg/mL at 1.80 ± 1.53 h, the AUC24h was 26.02 ± 12.07 μg·h/mL. The Cmax and AUC values increased in proportion to the increment in valsartan dose, while the pharmacokinetic parameters of elimination rate constant, half-life, apparent of total clearance, and apparent of volume of distribution were not significantly different between the doses. Valsartan pharmacokinetic analysis fits a one-compartment model with first-order absorption and elimination following a single dose of valsartan 80 mg and 160 mg. In addition, high inter-individual variability was identified in the absorption rate constant. In conclusion, valsartan displays the dose-dependent pharmacokinetics in dogs, and Subsequent quantitative modeling approaches provided detailed pharmacokinetic information of valsartan. The current findings provide useful information in dogs that will aid future development of improved formulations or fixed-dose combinations.Keywords: dose-dependent, modeling, pharmacokinetics, valsartan
Procedia PDF Downloads 297