Search results for: calculation of risk factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11298

Search results for: calculation of risk factor

5808 The Factors to Determine the Content About Gender and Sexuality Education Among Adolescents in China

Authors: Yixiao Tang

Abstract:

The risks of adolescents being exposed to sexually transmitted diseases (STDs) and participating in unsafe sexual practices are increasing. There is the necessity and significance of providing adolescents with appropriate sex education, considering they are at the stage of life exploration and risk-taking. However, in delivering sex education, the contents and instruction methods are usually discussed with contextual differences. In the Chinese context, the socially prejudiced perceptions of homosexuality can be attributed to the traditional Chinese Confucian philosophy, which has been dominating Chinese education for thousands of years. In China, students rarely receive adequate information about HIV, STDs, the use of contraceptives, pregnancies, and other sexually related topics in their formal education. Underlying the Confucian cultural background, this essay will analyze the variables that determine the subject matter of sex education for adolescents and then discuss how this cultural form affects social views and policy on sex education.

Keywords: homosexuality education, adolescent, China, education policy

Procedia PDF Downloads 65
5807 Self-Esteem and Emotional Intelligence’s Association to Nutritional Status in Adolescent Schoolchildren in Chile

Authors: Peter Mc Coll, Alberto Caro, Chiara Gandolfo, Montserrat Labbe, Francisca Schnaidt, Michela Palazzi

Abstract:

Self-esteem and emotional intelligence are variables that are related to people's nutritional status. Self-esteem may be at low levels in people living with obesity, while emotional intelligence can play an important role in the way people living with obesity cope. The objective of the study was to measure the association between self-esteem and emotional intelligence to nutritional status in adolescent population. Methodology: A cross-sectional study was carried out with 179 adolescent schoolchildren between 13 and 19 years old from a public school. The objective was to evaluate nutritional status; weight and height were measured by calculating the body mass index and Z score. Self-esteem was evaluated using the Coopersmith Self-esteem Inventory adapted by Brinkmann and Segure. Emotional intelligence was measured using the Emotional Quotient Inventory: short, by Bar On, adapted questionnaire, translated into Spanish by López Zafra. For statistical analysis: Pearson's Chi-square test, Pearson's correlation, and odd ratio calculation were used, with a p value at a significance level < 5%. Results: The study group was composed of 71% female and 29% male. The nutritional status was distributed as eutrophic 41.9%, overweight 20.1%, and obesity 21.1%. In relation to self-esteem, 44.1% presented low and very low levels, without differences by gender. Emotional intelligence was distributed: low 3.4%, medium 81%, and high 13.4% -no differences according to gender. The association between nutritional status (overweight and obesity) with low and very low self-esteem, an odds ratio of 2.5 (95% CI 1.12 – 5.59) was obtained with a p-value = 0.02. The correlation analysis between the intrapersonal sub-dimension emotional intelligence scores and the Z score of nutritional status presented a negative correlation of r = - 0.209 with a p-value < 0.005. The correlation between emotional intelligence subdimension stress management with Z score presented a positive correlation of r = 0.0161 with a p-value < 0.05. In conclusion, the group of adolescents studied had a high prevalence of overweight and obesity, a high prevalence of low self-esteem, and a high prevalence of average emotional intelligence. Overweight and obese adolescents were 2.5 times more likely to have low self-esteem. As overweight and obesity increase, self-esteem decreases, and the ability to manage stress increases.

Keywords: self-esteem, emotional intelligence, obesity, adolescent, nutritional status

Procedia PDF Downloads 47
5806 A Strategy for the Application of Second-Order Monte Carlo Algorithms to Petroleum Exploration and Production Projects

Authors: Obioma Uche

Abstract:

Due to the recent volatility in oil & gas prices as well as increased development of non-conventional resources, it has become even more essential to critically evaluate the profitability of petroleum prospects prior to making any investment decisions. Traditionally, simple Monte Carlo (MC) algorithms have been used to randomly sample probability distributions of economic and geological factors (e.g. price, OPEX, CAPEX, reserves, productive life, etc.) in order to obtain probability distributions for profitability metrics such as Net Present Value (NPV). In recent years, second-order MC algorithms have been shown to offer an advantage over simple MC techniques due to the added consideration of uncertainties associated with the probability distributions of the relevant variables. Here, a strategy for the application of the second-order MC technique to a case study is demonstrated to analyze its effectiveness as a tool for portfolio management.

Keywords: Monte Carlo algorithms, portfolio management, profitability, risk analysis

Procedia PDF Downloads 315
5805 Assessing the Ways of Improving the Power Saving Modes in the Ore-Grinding Technological Process

Authors: Baghdasaryan Marinka

Abstract:

Monitoring the distribution of electric power consumption in the technological process of ore grinding is conducted. As a result, the impacts of the mill filling rate, the productivity of the ore supply, the volumetric density of the grinding balls, the specific density of the ground ore, and the relative speed of the mill rotation on the specific consumption of electric power have been studied. The power and technological factors affecting the reactive power generated by the synchronous motors, operating within the technological scheme are studied. A block diagram for evaluating the power consumption modes of the technological process is presented, which includes the analysis of the technological scheme, the determination of the place and volumetric density of the ore-grinding mill, the evaluation of the technological and power factors affecting the energy saving process, as well as the assessment of the electric power standards.

Keywords: electric power standard, factor, ore grinding, power consumption, reactive power, technological

Procedia PDF Downloads 540
5804 System of Innovation: Comparing Savings of Brazil and South Africa

Authors: Glessiane de O. Almeida, Sérgio Murilo C. Messias, Iracema Machado de Aragão Gomes

Abstract:

This article discusses issues related to the System of Innovation: Comparing economies of Brazil and South Africa. Having as this study aimed at comparing the Innovation System of the countries mentioned. Then briefly describe the process of Venture Capital/Risk Capital and present the industry innovation in Brazil and South Africa. The methodological approach described in this article is descriptive and the approach is qualitative, taking as a basis secondary data relating to research articles. The main results are related to the different forms of financing of Venture Capital used by countries compared, in addition to the training and economic policy. And finally, it was highlighted the importance of implementation of policy reforms for the Brazil and Africa in the innovation process.

Keywords: innovation, Venture Capital, Economy, National Innovation System (NIS), BRICS

Procedia PDF Downloads 424
5803 A Theoretical Overview of Thermoluminescence

Authors: Sadhana Agrawal, Tarkeshwari Verma, Shmbhavi Katyayan

Abstract:

The magnificently accentuating phenomenon of luminescence has gathered a lot of attentions from last few decades. Probably defined as the one involving emission of light from certain kinds of substances on absorbing various energies in the form of external stimulus, the phenomenon claims a versatile pertinence. First observed and reported in an extract of Ligrium Nephriticum by Monards, the phenomenon involves turning of crystal clear water into colorful fluid when comes in contact with the special wood. In words of Sir G.G. Stokes, the phenomenon actually involves three different techniques – absorption, excitation and emission. With variance in external stimulus, the corresponding luminescence phenomenon is obtained. Here, this paper gives a concise discussion of thermoluminescence which is one of the types of luminescence obtained when the external stimulus is given in form of heat energy. A deep insight of thermoluminescence put forward a qualitative analysis of various parameters such as glow curves peaks, trap depth, frequency factors and order of kinetics.

Keywords: frequency factor, glow curve peaks, thermoluminescence, trap depth

Procedia PDF Downloads 378
5802 Bullying Rates Among Students with Special Needs in the United States

Authors: Kaycee Bills

Abstract:

Past studies have indicated students who have disabilities are at a higher risk of experiencing bullying victimization in comparison to other student groups. Extracurricular activity participation has been shown to establish better social outcomes for students. These positive social outcomes indirectly decrease the number of times a student is bullied. The following study uses the National Crime Victimization Survey – School Crime Supplement (NCVS/SCS) to analyze the bullying concurrences experienced among students, with disabilities being a focal variable. To explore the relationship between extracurricular involvement and bullying occurrence rates, this study employs a binary logistic regression to determine if athletic and non-athletic extracurricular activities have an impact on the number of times a student with disabilities experiences bullying. Implications for future social welfare practice and research are discussed.

Keywords: disability, bullying, extracurricular activities, athletics

Procedia PDF Downloads 151
5801 Media and Women Empowerment: An Exploration of TV Popular Shows in India

Authors: Mamita Panda

Abstract:

Popular shows are considered to be powerful medium for bringing social change and development. It has the responsibility for not only entertaining, but spreading awareness among common mass which it results social intervention in the major social institutions. Gender construction in one of these social institutions where one can build their capacity to construct a better human society. Mass media in general, TV in particular has an important intervening factor in responding to these processes. The obligatory role of media not only through news but popular shows (serials) becomes compulsion for social formation including construction through gender. This paper attempts to map and examine the gendered contents from serials including viewer’s response to understand the level of influence. The regression analysis shows that socio-economic factors have wider influence on understanding of gender equality including TV popular contents. The social construction of gender through serials remains a serious debatable issue and concern thereafter.

Keywords: construction, empowerment, gender, media and women

Procedia PDF Downloads 490
5800 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 323
5799 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 329
5798 Children of Syria: Using Drawings for Diagnosing and Treating Trauma

Authors: Fatten F. Elkomy

Abstract:

The Syrian refugees are the largest refugee population since World War II. Mostly, children, these individuals were exposed to intense traumatic events in their homeland, throughout their journey, and during settlement in foreign lands. Art is a universal language to express feelings and tough human experiences. It is also a medium for healing and promoting creativity and resilience. Literature review was conducted to examine the use of art to facilitate psychiatric interviews, diagnosis, and therapy with traumatized children. Results show a severe impact of childhood trauma on the increased risk for abuse, neglect, and psychiatric disorders. Clinicians must recognize, evaluated and provide help for these children. In conclusion, drawings are used to tell a story, reflect deep emotions, and create a meaningful self-recognition and determination. Participants will understand art therapy using the expressive therapies continuum framework to evaluate drawings and to promote healing for refugee children.

Keywords: art therapy, children drawings, Syrian refugees, trauma in childhood

Procedia PDF Downloads 149
5797 Monte Carlo Neutronic Calculations on Laser Inertial Fusion Energy (LIFE)

Authors: Adem Acır

Abstract:

In this study, time dependent neutronic analysis of incineration of minor actinides of a Laser Fusion Inertial Confinement Fusion Fission Energy (LIFE) engine was performed. The calculations were carried out by using MCNP codes with ENDF/B.VI neutron data library. In the neutronic calculations, TRISO particles fueled with minor actinides with natural lithium coolant were performed. The natural lithium cooled LIFE engine used 10 % TRISO fuel minor actinides composition. Tritium breeding ratios (TBR) and energy multiplication factor (M) burnup values were computed as 1.46 and 3.75, respectively. The reactor operation time was calculated as ~ 21 years. The burnup values were obtained as ~1060 GWD/MT, respectively. As a result, the very higher burnup were achieved of LIFE engine.

Keywords: Monte Carlo, minor actinides, nuclear waste, LIFE engine

Procedia PDF Downloads 281
5796 Design of Bayesian MDS Sampling Plan Based on the Process Capability Index

Authors: Davood Shishebori, Mohammad Saber Fallah Nezhad, Sina Seifi

Abstract:

In this paper, a variable multiple dependent state (MDS) sampling plan is developed based on the process capability index using Bayesian approach. The optimal parameters of the developed sampling plan with respect to constraints related to the risk of consumer and producer are presented. Two comparison studies have been done. First, the methods of double sampling model, sampling plan for resubmitted lots and repetitive group sampling (RGS) plan are elaborated and average sample numbers of the developed MDS plan and other classical methods are compared. A comparison study between the developed MDS plan based on Bayesian approach and the exact probability distribution is carried out.

Keywords: MDS sampling plan, RGS plan, sampling plan for resubmitted lots, process capability index (PCI), average sample number (ASN), Bayesian approach

Procedia PDF Downloads 283
5795 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 286
5794 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 242
5793 Clean Technology: Hype or Need to Have

Authors: Dirk V. H. K. Franco

Abstract:

For many of us a lot of phenomena are considered a risk. Examples are: climate change, decrease of biodiversity, amount of available, clean water and the decreasing variety of living organism in the oceans. On the other hand a lot of people perceive the following trends as catastrophic: the sea level, the melting of the pole ice, the numbers of tornado’s, floods and forest fires, the national security and the potential of 192 million climate migrants in 2060. The interest for climate, health and the possible solutions is large and common. The 5th IPCC states that the last decades especially human activities (and in second order natural emissions) have caused large, mainly negative impacts on our ecological environments. Chris Stringer stated that we represent, nowadays after evolution, the only one version of the possible humanity. At this very moment we are faced with an (over) crowded planet together with global climate changes and a strong demand for energy and material resources. Let us hope that we can counter these difficulties either with better application of existing technologies or by inventing new (applications of) clean technologies together with new business models.

Keywords: clean technologies, catastrophic, climate, possible solutions

Procedia PDF Downloads 477
5792 Effect of Environmental Stress Factors on the Degradation of Display Glass

Authors: Jinyoung Choi, Hyun-A Kim, Sunmook Lee

Abstract:

The effects of environmental stress factors such as storage conditions on the deterioration phenomenon and the characteristic of the display glass were studied. In order to investigate the effect of chemical stress on the glass during the period of storage, the respective components of commercial glass were first identified by XRF (X-ray fluorescence). The glass was exposed in the acid, alkali, neutral environment for about one month. Thin film formed on the glass surface was analyzed by XRD (X-ray diffraction) and FT-IR (Fourier transform infrared). The degree of corrosion and the rate of deterioration of each sample were confirmed by measuring the concentrations of silicon, calcium and chromium with ICP-OES (Inductively coupled plasma-optical emission spectrometry). The optical properties of the glass surface were confirmed by SEM (Scanning electron microscope) before and after the treatment. Acknowledgement—The authors gratefully acknowledge the financial support from the Ministry of Trade, Industry and Energy (Grant Number: 10076817)

Keywords: corrosion, degradation test, display glass, environmental stress factor

Procedia PDF Downloads 438
5791 Building Knowledge Society: The Imperative Role of Library and Information Centres (LICs) in Developing Countries

Authors: Desmond Chinedu Oparaku, Oyemike Victor Benson, Ifeyinwa A. Ariole

Abstract:

A critical examination of the emerging knowledge society reveals that library and information centres have a significant role to play in the building of knowledge society. The major highlights of this paper include: the conceptual analysis of knowledge society, overview of library and information centres in developing countries, role of libraries and information centre in building up of knowledge society, library and information professionals as factor in building knowledge, challenges faced by Library and Information Centres (LICs) in building knowledge society, strategies for building knowledge society. The position of this paper is that in spite of the influx of varied information and communication technologies in the information industry which is the driving force of knowledge society, there is a dire need for Libraries and Information Centres (LIC) to contribute positively to the migration and transition processes from the information society to knowledge-based society.

Keywords: information and communication technology (ICT), information centres, information industry, information society

Procedia PDF Downloads 359
5790 Computation of Radiotherapy Treatment Plans Based on CT to ED Conversion Curves

Authors: B. Petrović, L. Rutonjski, M. Baucal, M. Teodorović, O. Čudić, B. Basarić

Abstract:

Radiotherapy treatment planning computers use CT data of the patient. For the computation of a treatment plan, treatment planning system must have an information on electron densities of tissues scanned by CT. This information is given by the conversion curve CT (CT number) to ED (electron density), or simply calibration curve. Every treatment planning system (TPS) has built in default CT to ED conversion curves, for the CTs of different manufacturers. However, it is always recommended to verify the CT to ED conversion curve before actual clinical use. Objective of this study was to check how the default curve already provided matches the curve actually measured on a specific CT, and how much it influences the calculation of a treatment planning computer. The examined CT scanners were from the same manufacturer, but four different scanners from three generations. The measurements of all calibration curves were done with the dedicated phantom CIRS 062M Electron Density Phantom. The phantom was scanned, and according to real HU values read at the CT console computer, CT to ED conversion curves were generated for different materials, for same tube voltage 140 kV. Another phantom, CIRS Thorax 002 LFC which represents an average human torso in proportion, density and two-dimensional structure, was used for verification. The treatment planning was done on CT slices of scanned CIRS LFC 002 phantom, for selected cases. Interest points were set in the lungs, and in the spinal cord, and doses recorded in TPS. The overall calculated treatment times for four scanners and default scanner did not differ more than 0.8%. Overall interest point dose in bone differed max 0.6% while for single fields was maximum 2.7% (lateral field). Overall interest point dose in lungs differed max 1.1% while for single fields was maximum 2.6% (lateral field). It is known that user should verify the CT to ED conversion curve, but often, developing countries are facing lack of QA equipment, and often use default data provided. We have concluded that the CT to ED curves obtained differ in certain points of a curve, generally in the region of higher densities. This influences the treatment planning result which is not significant, but definitely does make difference in the calculated dose.

Keywords: Computation of treatment plan, conversion curve, radiotherapy, electron density

Procedia PDF Downloads 462
5789 Modelling and Simulation of Aero-Elastic Vibrations Using System Dynamic Approach

Authors: Cosmas Pandit Pagwiwoko, Ammar Khaled Abdelaziz Abdelsamia

Abstract:

Flutter as a phenomenon of flow-induced and self-excited vibration has to be recognized considering its harmful effect on the structure especially in a stage of aircraft design. This phenomenon is also important for a wind energy harvester based on the fluttering surface due to its effective operational velocity range. This multi-physics occurrence can be presented by two governing equations in both fluid and structure simultaneously in respecting certain boundary conditions on the surface of the body. In this work, the equations are resolved separately by two distinct solvers, one-time step of each domain. The modelling and simulation of this flow-structure interaction in ANSYS show the effectiveness of this loosely coupled method in representing flutter phenomenon however the process is time-consuming for design purposes. Therefore, another technique using the same weak coupled aero-structure is proposed by using system dynamics approach. In this technique, the aerodynamic forces were calculated using singularity function for a range of frequencies and certain natural mode shapes are transformed into time domain by employing an approximation model of fraction rational function in Laplace variable. The representation of structure in a multi-degree-of-freedom coupled with a transfer function of aerodynamic forces can then be simulated in time domain on a block-diagram platform such as Simulink MATLAB. The dynamic response of flutter at certain velocity can be evaluated with another established flutter calculation in frequency domain k-method. In this method, a parameter of artificial structural damping is inserted in the equation of motion to assure the energy balance of flow and vibrating structure. The simulation in time domain is particularly interested as it enables to apply the structural non-linear factors accurately. Experimental tests on a fluttering airfoil in the wind tunnel are also conducted to validate the method.

Keywords: flutter, flow-induced vibration, flow-structure interaction, non-linear structure

Procedia PDF Downloads 295
5788 Behaviour of Reinforced Concrete Infilled Frames under Seismic Loads

Authors: W. Badla

Abstract:

A significant portion of the buildings constructed in Algeria is structural frames with infill panels which are usually considered as non structural components and are neglected in the analysis. However, these masonry panels tend to influence the structural response. Thus, these structures can be regarded as seismic risk buildings, although in the Algerian seismic code there is little guidance on the seismic evaluation of infilled frame buildings. In this study, three RC frames with 2, 4, and 8 story and subjected to three recorded Algerian accelerograms are studied. The diagonal strut approach is adopted for modeling the infill panels and a fiber model is used to model RC members. This paper reports on the seismic evaluation of RC frames with brick infill panels. The results obtained show that the masonry panels enhance the load lateral capacity of the buildings and the infill panel configuration influences the response of the structures.

Keywords: seismic design, RC frames, infill panels, non linear dynamic analysis

Procedia PDF Downloads 537
5787 Normal and Peaberry Coffee Beans Classification from Green Coffee Bean Images Using Convolutional Neural Networks and Support Vector Machine

Authors: Hira Lal Gope, Hidekazu Fukai

Abstract:

The aim of this study is to develop a system which can identify and sort peaberries automatically at low cost for coffee producers in developing countries. In this paper, the focus is on the classification of peaberries and normal coffee beans using image processing and machine learning techniques. The peaberry is not bad and not a normal bean. The peaberry is born in an only single seed, relatively round seed from a coffee cherry instead of the usual flat-sided pair of beans. It has another value and flavor. To make the taste of the coffee better, it is necessary to separate the peaberry and normal bean before green coffee beans roasting. Otherwise, the taste of total beans will be mixed, and it will be bad. In roaster procedure time, all the beans shape, size, and weight must be unique; otherwise, the larger bean will take more time for roasting inside. The peaberry has a different size and different shape even though they have the same weight as normal beans. The peaberry roasts slower than other normal beans. Therefore, neither technique provides a good option to select the peaberries. Defect beans, e.g., sour, broken, black, and fade bean, are easy to check and pick up manually by hand. On the other hand, the peaberry pick up is very difficult even for trained specialists because the shape and color of the peaberry are similar to normal beans. In this study, we use image processing and machine learning techniques to discriminate the normal and peaberry bean as a part of the sorting system. As the first step, we applied Deep Convolutional Neural Networks (CNN) and Support Vector Machine (SVM) as machine learning techniques to discriminate the peaberry and normal bean. As a result, better performance was obtained with CNN than with SVM for the discrimination of the peaberry. The trained artificial neural network with high performance CPU and GPU in this work will be simply installed into the inexpensive and low in calculation Raspberry Pi system. We assume that this system will be used in under developed countries. The study evaluates and compares the feasibility of the methods in terms of accuracy of classification and processing speed.

Keywords: convolutional neural networks, coffee bean, peaberry, sorting, support vector machine

Procedia PDF Downloads 131
5786 Scattered Places in Stories Singularity and Pattern in Geographic Information

Authors: I. Pina, M. Painho

Abstract:

Increased knowledge about the nature of place and the conditions under which space becomes place is a key factor for better urban planning and place-making. Although there is a broad consensus on the relevance of this knowledge, difficulties remain in relating the theoretical framework about place and urban management. Issues related to representation of places are among the greatest obstacles to overcome this gap. With this critical discussion, based on literature review, we intended to explore, in a common framework for geographical analysis, the potential of stories to spell out place meanings, bringing together qualitative text analysis and text mining in order to capture and represent the singularity contained in each person's life history, and the patterns of social processes that shape places. The development of this reasoning is based on the extensive geographical thought about place, and in the theoretical advances in the field of Geographic Information Science (GISc).

Keywords: discourse analysis, geographic information science place, place-making, stories

Procedia PDF Downloads 177
5785 The Role of Anti-corruption Clauses in the Fight Against Corruption in Petroleum Sector

Authors: Azar Mahmoudi

Abstract:

Despite the rise of global anti-corruption movements and the strong emergence of international and national anti-corruption laws, corrupt practices are still prevalent in most places, and countries still struggle to translate these laws into practice. On the other hand, in most countries, political and economic elites oppose anti-corruption reforms. In such a situation, the role of external actors, like the other States, international organizations, and transnational actors, becomes essential. Among them, Transnational Corporations [TNCs] can develop their own regime-like framework to govern their internal activities, and through this, they can contribute to the regimes established by State actors to solve transnational issues. Among various regimes, TNCs may choose to comply with the transnational anti-corruption legal regime to avoid the cost of non-compliance with anti-corruption laws. As a result, they decide to strenghen their anti-corruption compliance as they expand into new overseas markets. Such a decision extends anti-corruption standards among their employees and third-party agents and within their projects across countries. To better address the challenges posed by corruption, TNCs have adopted a comprehensive anti-corruption toolkit. Among the various instruments, anti-corruption clauses have become one of the most anti-corruption means in international commercial agreements. Anti-corruption clauses, acting as a due diligence tool, can protect TNCs against the engagement of third-party agents in corrupt practices and further promote anti-corruption standards among businesses operating across countries. An anti-corruption clause allows parties to create a contractual commitment to exclude corrupt practices during the term of their agreement, including all levels of negotiation and implementation. Such a clause offers companies a mechanism to reduce the risk of potential corruption in their dealings with third parties while avoiding civil and administrative penalties. There have been few attempts to examine the role of anti-corruption clauses in the fight against corruption; therefore, this paper aims to fill this gap and examine anti-corruption clauses in a specific sector where corrupt practices are widespread and endemic, i.e., the petroleum industry. This paper argues that anti-corruption clauses are a positive step in ensuring that the petroleum industry operates in an ethical and transparent manner, helping to reducing the risk of corruption and promote integrity in this sector. Contractual anti-corruption clauses vary in terms of the types commitment, so parties have a wide range of options to choose from for their preferred clauses incorporated within their contracts. This paper intends to propose a categorization of anti-corruption clauses in the petroleum sector. It examines particularly the anti-corruption clauses incorporated in transnational hydrocarbon contracts published by the Resource Contract Portal, an online repository of extractive contracts. Then, this paper offers a quantitative assessment of anti-corruption clauses according to the types of contract, the date of conclusion, and the geographical distribution.

Keywords: anti-corruption, oil and gas, transnational corporations, due diligence, contractual clauses, hydrocarbon, petroleum sector

Procedia PDF Downloads 109
5784 Urban Design as a Tool in Disaster Resilience and Urban Hazard Mitigation: Case of Cochin, Kerala, India

Authors: Vinu Elias Jacob, Manoj Kumar Kini

Abstract:

Disasters of all types are occurring more frequently and are becoming more costly than ever due to various manmade factors including climate change. A better utilisation of the concept of governance and management within disaster risk reduction is inevitable and of utmost importance. There is a need to explore the role of pre- and post-disaster public policies. The role of urban planning/design in shaping the opportunities of households, individuals and collectively the settlements for achieving recovery has to be explored. Governance strategies that can better support the integration of disaster risk reduction and management has to be examined. The main aim is to thereby build the resilience of individuals and communities and thus, the states too. Resilience is a term that is usually linked to the fields of disaster management and mitigation, but today has become an integral part of planning and design of cities. Disaster resilience broadly describes the ability of an individual or community to 'bounce back' from disaster impacts, through improved mitigation, preparedness, response, and recovery. The growing population of the world has resulted in the inflow and use of resources, creating a pressure on the various natural systems and inequity in the distribution of resources. This makes cities vulnerable to multiple attacks by both natural and man-made disasters. Each urban area needs elaborate studies and study based strategies to proceed in the discussed direction. Cochin in Kerala is the fastest and largest growing city with a population of more than 26 lakhs. The main concern that has been looked into in this paper is making cities resilient by designing a framework of strategies based on urban design principles for an immediate response system especially focussing on the city of Cochin, Kerala, India. The paper discusses, understanding the spatial transformations due to disasters and the role of spatial planning in the context of significant disasters. The paper also aims in developing a model taking into consideration of various factors such as land use, open spaces, transportation networks, physical and social infrastructure, building design, and density and ecology that can be implemented in any city of any context. Guidelines are made for the smooth evacuation of people through hassle-free transport networks, protecting vulnerable areas in the city, providing adequate open spaces for shelters and gatherings, making available basic amenities to affected population within reachable distance, etc. by using the tool of urban design. Strategies at the city level and neighbourhood level have been developed with inferences from vulnerability analysis and case studies.

Keywords: disaster management, resilience, spatial planning, spatial transformations

Procedia PDF Downloads 280
5783 Sensorless Controller of Induction Motor Using Backstepping Approach and Fuzzy MRAS

Authors: Ahmed Abbou

Abstract:

This paper present a sensorless controller designed by the backstepping approach for the speed control of induction motor. In this strategy of control, we also combined the method Fuzzy MRAS to estimate the rotor speed and the observer type Luenburger to observe Rotor flux. The control model involves a division by the flux variable that may lead to unbounded solutions. Such a risk is avoided by basing the controller design on Lyapunov function that accounts for the model singularity. On the other hand, this mixed method gives better results in Sensorless operation and especially at low speed. The response time at 5% of the flux is 20ms while the error between the speed with sensor and the estimated speed remains in the range of ±0.8 rad/s for the rated functioning and ±1.5 rad/s for low speed.

Keywords: backstepping approach, fuzzy logic, induction motor, luenburger observer, sensorless MRAS

Procedia PDF Downloads 359
5782 High Efficiency Perovskite Solar Cells Fabricated under Ambient Conditions with Mesoporous TiO2/In2O3 Scaffold

Authors: A. Apostolopoulou, D. Sygkridou, A. N. Kalarakis, E. Stathatos

Abstract:

Mesoscopic perovskite solar cells (mp-PSCs) with mesoporous bilayer were fabricated under ambient conditions. The bilayer was formed by capping the mesoporous TiO2 layer with a layer of In2O3. CH3NH3I3-xClx mixed halide perovskite was prepared through the one-step method and was used as the light absorber. The mp-PSCs with the composite TiO2/In2O3 mesoporous layer exhibited optimized electrical parameters, compared with the PSCs that employed only a TiO2 mesoporous layer, with a current density of 23.86 mA/cm2, open circuit voltage of 0.863 V, fill factor of 0.6 and a power conversion efficiency of 11.2%. These results indicate that the formation of a proper semiconductor capping layer over the basic TiO2 mesoporous layer can facilitate the electron transfer, suppress the recombination and subsequently lead to higher charge collection efficiency.

Keywords: ambient conditions, high efficiency solar cells, mesoscopic perovskite solar cells, TiO₂ / In₂O₃ bilayer

Procedia PDF Downloads 254
5781 Analysis of Injection-Lock in Oscillators versus Phase Variation of Injected Signal

Authors: M. Yousefi, N. Nasirzadeh

Abstract:

In this paper, behavior of an oscillator under injection of another signal has been investigated. Also, variation of output signal amplitude versus injected signal phase variation, the effect of varying the amplitude of injected signal and quality factor of the oscillator has been investigated. The results show that the locking time depends on phase and the best locking time happens at 180-degrees phase. Also, the effect of injected lock has been discussed. Simulations show that the locking time decreases with signal injection to bulk. Locking time has been investigated versus various phase differences. The effect of phase and amplitude changes on locking time of a typical LC oscillator in 180 nm technology has been investigated.

Keywords: analysis, oscillator, injection-lock oscillator, phase modulation

Procedia PDF Downloads 335
5780 3D Codes for Unsteady Interaction Problems of Continuous Mechanics in Euler Variables

Authors: M. Abuziarov

Abstract:

The designed complex is intended for the numerical simulation of fast dynamic processes of interaction of heterogeneous environments susceptible to the significant formability. The main challenges in solving such problems are associated with the construction of the numerical meshes. Currently, there are two basic approaches to solve this problem. One is using of Lagrangian or Lagrangian Eulerian grid associated with the boundaries of media and the second is associated with the fixed Eulerian mesh, boundary cells of which cut boundaries of the environment medium and requires the calculation of these cut volumes. Both approaches require the complex grid generators and significant time for preparing the code’s data for simulation. In this codes these problems are solved using two grids, regular fixed and mobile local Euler Lagrange - Eulerian (ALE approach) accompanying the contact and free boundaries, the surfaces of shock waves and phase transitions, and other possible features of solutions, with mutual interpolation of integrated parameters. For modeling of both liquids and gases, and deformable solids the Godunov scheme of increased accuracy is used in Lagrangian - Eulerian variables, the same for the Euler equations and for the Euler- Cauchy, describing the deformation of the solid. The increased accuracy of the scheme is achieved by using 3D spatial time dependent solution of the discontinuity problem (3D space time dependent Riemann's Problem solver). The same solution is used to calculate the interaction at the liquid-solid surface (Fluid Structure Interaction problem). The codes does not require complex 3D mesh generators, only the surfaces of the calculating objects as the STL files created by means of engineering graphics are given by the user, which greatly simplifies the preparing the task and makes it convenient to use directly by the designer at the design stage. The results of the test solutions and applications related to the generation and extension of the detonation and shock waves, loading the constructions are presented.

Keywords: fluid structure interaction, Riemann's solver, Euler variables, 3D codes

Procedia PDF Downloads 423
5779 The Impact of Artificial Intelligence on the Behavior of Children and Autism

Authors: Sara Fayez Fawzy Mikhael

Abstract:

Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behavior was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.

Keywords: attitude, autism, teachers, thailandsports activates, movement skills, motor skills

Procedia PDF Downloads 69