Search results for: obligation scheme
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1503

Search results for: obligation scheme

963 The OQAM-OFDM System Using WPT/IWPT Replaced FFT/IFFT

Authors: Alaa H. Thabet, Ehab F. Badran, Moustafa H. Aly

Abstract:

With the rapid expand of wireless digital communications, demand for wireless systems that are reliable and have a high spectral efficiency have increased too. FBMC scheme based on the OFDM/OQAM has been recognized for its good performance to achieve high data rates. Fast Fourier Transforms (FFT) has been used to produce the orthogonal sub-carriers. Due to the drawbacks of OFDM -FFT based system which are the high peak-to-average ratio (PAR) and the synchronization. In this paper, Wavelet Packet Transform (WPT) is used in the place of FFT, and show better performance.

Keywords: OQAM-OFDM, wavelet packet transform, PAPR, FFT

Procedia PDF Downloads 460
962 Study and Simulation of a Sever Dust Storm over West and South West of Iran

Authors: Saeed Farhadypour, Majid Azadi, Habibolla Sayyari, Mahmood Mosavi, Shahram Irani, Aliakbar Bidokhti, Omid Alizadeh Choobari, Ziba Hamidi

Abstract:

In the recent decades, frequencies of dust events have increased significantly in west and south west of Iran. First, a survey on the dust events during the period (1990-2013) is investigated using historical dust data collected at 6 weather stations scattered over west and south-west of Iran. After statistical analysis of the observational data, one of the most severe dust storm event that occurred in the region from 3rd to 6th July 2009, is selected and analyzed. WRF-Chem model is used to simulate the amount of PM10 and how to transport it to the areas. The initial and lateral boundary conditions for model obtained from GFS data with 0.5°×0.5° spatial resolution. In the simulation, two aerosol schemas (GOCART and MADE/SORGAM) with 3 options (chem_opt=106,300 and 303) were evaluated. Results of the statistical analysis of the historical data showed that south west of Iran has high frequency of dust events, so that Bushehr station has the highest frequency between stations and Urmia station has the lowest frequency. Also in the period of 1990 to 2013, the years 2009 and 1998 with the amounts of 3221 and 100 respectively had the highest and lowest dust events and according to the monthly variation, June and July had the highest frequency of dust events and December had the lowest frequency. Besides, model results showed that the MADE / SORGAM scheme has predicted values and trends of PM10 better than the other schemes and has showed the better performance in comparison with the observations. Finally, distribution of PM10 and the wind surface maps obtained from numerical modeling showed that the formation of dust plums formed in Iraq and Syria and also transportation of them to the West and Southwest of Iran. In addition, comparing the MODIS satellite image acquired on 4th July 2009 with model output at the same time showed the good ability of WRF-Chem in simulating spatial distribution of dust.

Keywords: dust storm, MADE/SORGAM scheme, PM10, WRF-Chem

Procedia PDF Downloads 272
961 Study on Optimal Control Strategy of PM2.5 in Wuhan, China

Authors: Qiuling Xie, Shanliang Zhu, Zongdi Sun

Abstract:

In this paper, we analyzed the correlation relationship among PM2.5 from other five Air Quality Indices (AQIs) based on the grey relational degree, and built a multivariate nonlinear regression equation model of PM2.5 and the five monitoring indexes. For the optimal control problem of PM2.5, we took the partial large Cauchy distribution of membership equation as satisfaction function. We established a nonlinear programming model with the goal of maximum performance to price ratio. And the optimal control scheme is given.

Keywords: grey relational degree, multiple linear regression, membership function, nonlinear programming

Procedia PDF Downloads 300
960 Template-Assisted Synthesis of IrO2 Nanopores Membrane Electrode Assembly

Authors: Zhuo-Xin Lu, Yan Shi, Chang-Feng Yan, Ying Huang, Yuan Gan, Zhi-Da Wang

Abstract:

With TiO2 nanotube arrays (TNTA) as template, a IrO2 nanopores membrane electrode assembly (MEA) was synthesized by a novel depositi-assemble-etch strategy. By analysing the morphology of IrO2/TNTA and cyclic voltammetry (CV) curve at different deposition cycles, we proposed a reasonable scheme for the process of IrO2 electrodeposition on TNTA. The current density of IrO2/TNTA at 1.5V vs RHE reaches 5.12mA/cm2 after 55 cycles deposition, which shows promising performance for its high OER activity after template removal.

Keywords: electrodeposition, IrO2 nanopores, MEA, OER

Procedia PDF Downloads 446
959 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 475
958 An Evaluation of Rational Approach to Management by Objectives in Construction Contracting Organisation

Authors: Zakir H. Shaik, Punam L. Vartak

Abstract:

Management By Objectives (MBO) is a management technique in which objectives of an organisation are conveyed to the employees to establish the individual goals. These objectives and goals are then monitored and assessed jointly by management and the employee time to time. This tool can be used for planning, monitoring as well as for performance appraisal. The success of an organisation is largely dependent on its’s Vision. Thus, it is of paramount importance to achieve the realm of vision through a mission which is well crafted within the organisation to address the objectives. The success of the mission depends upon how realistic and action oriented philosophical approach, an organisation caters to; and how the individual goals are set to track and meet the objectives. Thus, focused and passionate efforts of the team, assigned for the mission, are an absolute obligation for achieving the vision of any organisation. Any construction site is generally a controlled disorder having huge investments, resources and logistics involved. The Construction progression is time-consuming with many isolated as well as interconnected activities. Traditional MBO approach can be unsuccessful if planning and control is non-realistic and inflexible. Moreover, the Construction Industry is far behind understanding these concepts. It is important to address the employee engagement in defining and creating awareness to achieve the targets. Besides, current economic environment and competitive world demands refined management tools to achieve profit, growth and survival of the business. Therefore, the necessity of rational MBO becomes vital part towards the success of an organisation. This paper details about the philosophical assumptions to develop the grounded theory in lieu of achieving objectives through RATIONAL MBO approach in Construction Contracting Organisations. The goals and objectives of the Construction Contracting Organisations can be achieved efficiently by adopting this RATIONAL MBO approach, as those are based on realistic, logical and balanced assumptions.

Keywords: growth, leadership, management by objectives, Management By Objectives (MBO), profit, rational

Procedia PDF Downloads 154
957 Contractual Risk Transfer in Islamic Home Financing: Analysis in Bank Malaysia

Authors: Ahmad Dahlan Salleh, Nik Abdul Rahim Nik Abdul Ghani, Muhamad Firdaus M. Hatta

Abstract:

Risk management has implications on pricing, governance arrangements, business practices and strategy. Nowadays, home financing contract offers more in the risk transfer form to increase bank profit. This is parallel with Islamic jurisprudence method al-Kharaj bi al-thaman (gain accompanies liability for loss) and al-ghurm bil ghunm (gain is justified with risk) that determine the matching between risk transfer and returns. Malaysian financing trend is to buy house. Besides, exists transparency lacking risk transfer issues to the clients because of not been informed clearly. Terms and conditions of each financing also do not reflect clearly that the risk has been transferred to the client, justifying a determination price been made. The assumption on risk occurrence is also inaccurate as each risk is different with the type of financing contract. This makes the Islamic Financial Services Act 2013 in providing standards that transparent and consistent can be used by Islamic financial institution less effective. This study examines how far the level of the risk and obligation incurred by bank and client under various Islamic home financing contract. This research is qualitative by using two methods, document analysis, and semi-structured interviews. Document analysis from literature review to identify profile, themes and risk transfer element in home financing from Islamic jurisprudence perspective. This study finds that need to create a risk transfer parameter by banks which are consistent with risk transfer theory according to Islamic jurisprudence. This study has potential to assist the authority in Islamic finance such as The Central Bank of Malaysia (Bank Negara Malaysia) in regulating Islamic banking industry so that the risk transfer valuation in home financing contract based on home financing good practice and determined risk limits.

Keywords: risk transfer, home financing contract, Sharia compliant, Malaysia

Procedia PDF Downloads 420
956 Differential Signaling Spread-Spectrum Modulation of the In-Door LED Visible Light Wireless Communications using Mobile-Phone Camera

Authors: Shih-Hao Chen, Chi-Wai Chow

Abstract:

Visible light communication combined with spread spectrum modulation is demonstrated in this study. Differential signaling method also ensures the proposed system that can support high immunity to ambient light interference. Experiment result shows the proposed system has 6 dB gain comparing with the original On-Off Keying modulation scheme.

Keywords: Visible Light Communication (VLC), Spread Spectrum Modulation (SSM), On-Off Keying, visible light communication

Procedia PDF Downloads 522
955 Circumstantial Loneliness and Existential Isolation in the Works of Flutura Açka

Authors: Elvira Lumi, Hans Jazxhi

Abstract:

In the works of the writer Flutura Açka, the play with these questions is acute, and in almost each of them, the act of loneliness and isolation builds in a completely involuntary way unique and frequent conceptual spaces. Because the object of study is too broad to grasp all the works, this study lays out a rapid paradox of our access to three of the novels in the line of numerous authorial works. The novel "Woman Loneliness" (2001), also marked as the first work in prose by the author, declares in the title the paradigm of what she has decided to confess. The gender segregation proclaimed in the title will be revealed step by step in the work as conventional human segregation without gender. In this novel, the analysis of the state of "loneliness" will require a contemplation beyond man, when the role of the environment and the distance from the center of the narrative base will be extremely visible in the work. The novel "Cross of Oblivion" (2004) has another form of perception of loneliness, which, unlike the one built by the characters themselves in the novel "Woman Loneliness," is imposed and obligatory to live by the circumstances. Its characters are trapped in loneliness, as loneliness that comes from impossibility, from the past, from dependence on fate, from fear of change, and from the obligation to accept it. At the heart of the novel, the plot of the novel game is dictated by the Kanun and its rules and the loneliness of the basis of life in unbroken waves towards the periphery of the event, a periphery that has very large geography and is played in today's Europe. The novel "Where are you?" (2009) has a completely different form of constructing the concept of loneliness and isolation that comes under conditions of repression and political pressure. The loneliness in this novel takes the form of the protective element from the circumstances that actually require a social inclusion; it is personal loneliness that ensures relative mental health of the characters, up to a new trap created by the circumstances, thus building life fragmentary “healthy” in the order of a mentally ill and socially ill society.

Keywords: loneliness, existential, isolation, woman, prose

Procedia PDF Downloads 148
954 Service Interactions Coordination Using a Declarative Approach: Focuses on Deontic Rule from Semantics of Business Vocabulary and Rules Models

Authors: Nurulhuda A. Manaf, Nor Najihah Zainal Abidin, Nur Amalina Jamaludin

Abstract:

Coordinating service interactions are a vital part of developing distributed applications that are built up as networks of autonomous participants, e.g., software components, web services, online resources, involve a collaboration between a diverse number of participant services on different providers. The complexity in coordinating service interactions reflects how important the techniques and approaches require for designing and coordinating the interaction between participant services to ensure the overall goal of a collaboration between participant services is achieved. The objective of this research is to develop capability of steering a complex service interaction towards a desired outcome. Therefore, an efficient technique for modelling, generating, and verifying the coordination of service interactions is developed. The developed model describes service interactions using service choreographies approach and focusing on a declarative approach, advocating an Object Management Group (OMG) standard, Semantics of Business Vocabulary and Rules (SBVR). This model, namely, SBVR model for service choreographies focuses on a declarative deontic rule expressing both obligation and prohibition, which can be more useful in working with coordinating service interactions. The generated SBVR model is then be formulated and be transformed into Alloy model using Alloy Analyzer for verifying the generated SBVR model. The transformation of SBVR into Alloy allows to automatically generate the corresponding coordination of service interactions (service choreography), hence producing an immediate instance of execution that satisfies the constraints of the specification and verifies whether a specific request can be realised in the given choreography in the generated choreography.

Keywords: service choreography, service coordination, behavioural modelling, complex interactions, declarative specification, verification, model transformation, semantics of business vocabulary and rules, SBVR

Procedia PDF Downloads 155
953 Educase–Intelligent System for Pedagogical Advising Using Case-Based Reasoning

Authors: Elionai Moura, José A. Cunha, César Analide

Abstract:

This work introduces a proposal scheme for an Intelligent System applied to Pedagogical Advising using Case-Based Reasoning, to find consolidated solutions before used for the new problems, making easier the task of advising students to the pedagogical staff. We do intend, through this work, introduce the motivation behind the choices for this system structure, justifying the development of an incremental and smart web system who learns bests solutions for new cases when it’s used, showing technics and technology.

Keywords: case-based reasoning, pedagogical advising, educational data-mining (EDM), machine learning

Procedia PDF Downloads 421
952 Digital Phase Shifting Holography in a Non-Linear Interferometer using Undetected Photons

Authors: Sebastian Töpfer, Marta Gilaberte Basset, Jorge Fuenzalida, Fabian Steinlechner, Juan P. Torres, Markus Gräfe

Abstract:

This work introduces a combination of digital phase-shifting holography with a non-linear interferometer using undetected photons. Non-linear interferometers can be used in combination with a measurement scheme called quantum imaging with undetected photons, which allows for the separation of the wavelengths used for sampling an object and detecting it in the imaging sensor. This method recently faced increasing attention, as it allows to use of exotic wavelengths (e.g., mid-infrared, ultraviolet) for object interaction while at the same time keeping the detection in spectral areas with highly developed, comparable low-cost imaging sensors. The object information, including its transmission and phase influence, is recorded in the form of an interferometric pattern. To collect these, this work combines the method of quantum imaging with undetected photons with digital phase-shifting holography with a minimal sampling of the interference. With this, the quantum imaging scheme gets extended in its measurement capabilities and brings it one step closer to application. Quantum imaging with undetected photons uses correlated photons generated by spontaneous parametric down-conversion in a non-linear interferometer to create indistinguishable photon pairs, which leads to an effect called induced coherence without induced emission. Placing an object inside changes the interferometric pattern depending on the object’s properties. Digital phase-shifting holography records multiple images of the interference with determined phase shifts to reconstruct the complete interference shape, which can afterward be used to analyze the changes introduced by the object and conclude its properties. An extensive characterization of this method was done using a proof-of-principle setup. The measured spatial resolution, phase accuracy, and transmission accuracy are compared for different combinations of camera exposure times and the number of interference sampling steps. The current limits of this method are shown to allow further improvements. To summarize, this work presents an alternative holographic measurement method using non-linear interferometers in combination with quantum imaging to enable new ways of measuring and motivating continuing research.

Keywords: digital holography, quantum imaging, quantum holography, quantum metrology

Procedia PDF Downloads 92
951 Diplomatic Assurances in International Law

Authors: William Thomas Worster

Abstract:

Diplomatic assurances issued by states declaring that they will not mistreat individuals returned to them occupy a strange middle ground between being legal and non-legal obligations. States assert that they are non-binding, yet at other times that they are binding. However, this assertion may not be the end of the discussion. The International Court of Justice and other tribunals have concluded that similar instruments were binding, states have disagreed that certain similar instruments were binding, and the Vienna Convention on the Law of Treaties and its travaux prépératoires do not appear to contemplate non-binding instruments. This paper is a case study of diplomatic assurances but, by necessity, touches on the delicate question of whether certain texts are treaties, promises, or non-binding political statements. International law, and law in general, requires a binary approach to obligation. All communications must be binding or not, even if the fit is not precise. Through this study, we will find that some of the obligations in certain assurances can be understood as legal and some not. We will attempt to state the current methodology for determining which obligations are legal under the law of treaties and law on binding unilateral promises. The paper begins with some background of the legal environment of diplomatic assurances and their use in cases of expulsion. The paper then turns to discuss the legal nature of diplomatic assurances, proceeding to address various possibilities for legal value as treaties and as binding unilateral statements. This paper will not examine the legal value of diplomatic assurances solely under customary international law other than the way in which customary international law might further refine the treaty definition. In order to identify whether any assurances are contained in legal acts, this study identifies a pool of relevant assurances and qualitatively analyzes whether any of those are contained in treaties or binding unilateral statements. To the author’s best knowledge, this study is the first large-scale, qualitative qualitative analysis of assurances as a group of instruments that accounts for their heterogenous nature. It is also the first study to identify the indicators of whether an instrument is a treaty or promise.

Keywords: diplomatic assurances, deportation, extradition, expulsion, non-refoulement, torture, persecution, death penalty, human rights, memorandum of understanding, promises, secret, monitoring, compliance, enforcement

Procedia PDF Downloads 89
950 On the Blocked-off Finite-Volume Radiation Solutions in a Two-Dimensional Enclosure

Authors: Gyo Woo Lee, Man Young Kim

Abstract:

The blocked-off formulations for the analysis of radiative heat transfer are formulated and examined in order to find the solutions in a two-dimensional complex enclosure. The final discretization equations using the step scheme for spatial differencing practice are proposed with the additional source term to incorporate the blocked-off procedure. After introducing the implementation for inactive region into the general discretization equation, three different problems are examined to find the performance of the solution methods.

Keywords: radiative heat transfer, Finite Volume Method (FVM), blocked-off solution procedure, body-fitted coordinate

Procedia PDF Downloads 295
949 The Permutation of Symmetric Triangular Equilateral Group in the Cryptography of Private and Public Key

Authors: Fola John Adeyeye

Abstract:

In this paper, we propose a cryptosystem private and public key base on symmetric group Pn and validates its theoretical formulation. This proposed system benefits from the algebraic properties of Pn such as noncommutative high logical, computational speed and high flexibility in selecting key which makes the discrete permutation multiplier logic (DPML) resist to attack by any algorithm such as Pohlig-Hellman. One of the advantages of this scheme is that it explore all the possible triangular symmetries. Against these properties, the only disadvantage is that the law of permutation multiplicity only allow an operation from left to right. Many other cryptosystems can be transformed into their symmetric group.

Keywords: cryptosystem, private and public key, DPML, symmetric group Pn

Procedia PDF Downloads 202
948 Constitutional Identity: The Connection between National Constitutions and EU Law

Authors: Norbert Tribl

Abstract:

European contemporary scientific public opinion considers the concept of constitutional identity as a highlighted issue. Some scholars interpret the matter as the manifestation of a conflict of Europe. Nevertheless, constitutional identity is a bridge between the Member States and the EU rather than a river that will wash away the achievements of the integration. In accordance with the opinion of the author, the main problem of constitutional identity in Europe is the undetermined nature: the exact concept of constitutional identity has not been defined until now. However, this should be the first step to understand and use identity as a legal institution. Having regard to this undetermined nature, the legal-theoretical examination of constitutional identity is the main purpose of this study. The concept of constitutional identity appears in the Anglo-Saxon legal systems by a different approach than in the supranational system of European Integration. While the interpretation of legal institutions in conformity with the constitution is understood under it, the European concept is applied when possible conflicts arise between the legal system of the European supranational space and certain provisions of the national constitutions of the member states. The European concept of constitutional identity intends to offer input in determining the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration. In the EU system of multilevel constitutionalism, a long-standing central debate on integration surrounds the conflict between EU legal acts and the constitutional provisions of the member states. In spite of the fact that the Court of Justice of the European Union stated in Costa v. E.N.E.L. that the member states cannot refer to the provisions of their respective national constitutions against the integration. Based on the experience of more than 50 years since the above decision, and also in light of the Treaty of Lisbon, we now can clearly see that EU law has itself identified an obligation for the EU to protect the fundamental constitutional features of the Member States under Article 4 (2) of Treaty on European Union, by respecting the national identities of member states. In other words, the European concept intends to offer input for the determination of the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration.

Keywords: constitutional identity, EU law, European Integration, supranationalism

Procedia PDF Downloads 147
947 Object-Scene: Deep Convolutional Representation for Scene Classification

Authors: Yanjun Chen, Chuanping Hu, Jie Shao, Lin Mei, Chongyang Zhang

Abstract:

Traditional image classification is based on encoding scheme (e.g. Fisher Vector, Vector of Locally Aggregated Descriptor) with low-level image features (e.g. SIFT, HoG). Compared to these low-level local features, deep convolutional features obtained at the mid-level layer of convolutional neural networks (CNN) have richer information but lack of geometric invariance. For scene classification, there are scattered objects with different size, category, layout, number and so on. It is crucial to find the distinctive objects in scene as well as their co-occurrence relationship. In this paper, we propose a method to take advantage of both deep convolutional features and the traditional encoding scheme while taking object-centric and scene-centric information into consideration. First, to exploit the object-centric and scene-centric information, two CNNs that trained on ImageNet and Places dataset separately are used as the pre-trained models to extract deep convolutional features at multiple scales. This produces dense local activations. By analyzing the performance of different CNNs at multiple scales, it is found that each CNN works better in different scale ranges. A scale-wise CNN adaption is reasonable since objects in scene are at its own specific scale. Second, a fisher kernel is applied to aggregate a global representation at each scale and then to merge into a single vector by using a post-processing method called scale-wise normalization. The essence of Fisher Vector lies on the accumulation of the first and second order differences. Hence, the scale-wise normalization followed by average pooling would balance the influence of each scale since different amount of features are extracted. Third, the Fisher vector representation based on the deep convolutional features is followed by a linear Supported Vector Machine, which is a simple yet efficient way to classify the scene categories. Experimental results show that the scale-specific feature extraction and normalization with CNNs trained on object-centric and scene-centric datasets can boost the results from 74.03% up to 79.43% on MIT Indoor67 when only two scales are used (compared to results at single scale). The result is comparable to state-of-art performance which proves that the representation can be applied to other visual recognition tasks.

Keywords: deep convolutional features, Fisher Vector, multiple scales, scale-specific normalization

Procedia PDF Downloads 331
946 Grid Connected Photovoltaic Micro Inverter

Authors: S. J. Bindhu, Edwina G. Rodrigues, Jijo Balakrishnan

Abstract:

A grid-connected photovoltaic (PV) micro inverter with good performance properties is proposed in this paper. The proposed inverter with a quadrupler, having more efficiency and less voltage stress across the diodes. The stress that come across the diodes that use in the inverter section is considerably low in the proposed converter, also the protection scheme that we provided can eliminate the chances of the error due to fault. The proposed converter is implemented using perturb and observe algorithm so that the fluctuation in the voltage can be reduce and can attain maximum power point. Finally, some simulation and experimental results are also presented to demonstrate the effectiveness of the proposed converter.

Keywords: DC-DC converter, MPPT, quadrupler, PV panel

Procedia PDF Downloads 842
945 Equipment Design for Lunar Lander Landing-Impact Test

Authors: Xiaohuan Li, Wangmin Yi, Xinghui Wu

Abstract:

In order to verify the performance of lunar lander structure, landing-impact test is urgently needed. Moreover, the test equipment is necessary for the test. The functions and the key points of the equipment is presented to satisfy the requirements of the test,and the design scheme is proposed. The composition, the major function and the critical parts’ design of the equipment are introduced. By the load test of releasing device and single-beam hoist, and the compatibility test of landing-impact testing system, the rationality and reliability of the equipment is proved.

Keywords: landing-impact test, lunar lander, releasing device, test equipment

Procedia PDF Downloads 622
944 Optimization of Robot Motion Planning Using Biogeography Based Optimization (Bbo)

Authors: Jaber Nikpouri, Arsalan Amralizadeh

Abstract:

In robotics manipulators, the trajectory should be optimum, thus the torque of the robot can be minimized in order to save power. This paper includes an optimal path planning scheme for a robotic manipulator. Recently, techniques based on metaheuristics of natural computing, mainly evolutionary algorithms (EA), have been successfully applied to a large number of robotic applications. In this paper, the improved BBO algorithm is used to minimize the objective function in the presence of different obstacles. The simulation represents that the proposed optimal path planning method has satisfactory performance.

Keywords: biogeography-based optimization, path planning, obstacle detection, robotic manipulator

Procedia PDF Downloads 302
943 Beyond Empathy: From Justice to Reconciliation

Authors: Nissim Avissar

Abstract:

This paper aims to question the practice of bringing together people belonging to groups in conflict with the aim of bridging differences through universal empathy and interpersonal connections. It is argued that in cases where one group has the power, and the other is in a struggle to change the balance assuming universal equality between the groups and encouraging emphatic understanding is a non-emphatic practice. Accordingly, a new concept is posited–justice-sensitive empathy, conditioning empathy in such situations on the acknowledgement of an imbalance of power/injustice. With this reframing in mind, educational practices promoting social justice are discussed. In order to create conditions for justice-seeking or politically sensitive empathy, we need to go beyond the conventional definitions of empathy and offer other means and possibilities. Three possibilities are discussed. The first focuses on intra-group (as opposed to inter-group) processes within each group. It means temporary and tactical separation that may allow each group to focus on its own needs and values and perhaps to return to the dialogue more confidently. The second option emphasizes the notion of "constructive conflict," which means that each side still aspires to promote his own interests but without demolishing the other side (which is a rival but also an unwanted and forced partner). Here, alongside the "obligation to resist" and to act to promote justice as we view and understand it, we have to take into account the other side. The third and last option relates to the practice of Restorative Justice. This practice originated in the Truth and Reconciliation committees in South Africa, but it is now widely used in other contexts. Those committees had the authority to punish (or pardon) people; however, their main purpose was to seek truth and, from there, nourish reconciliation. This is the main idea of restorative justice; it seeks justice for the sake of restoring relationships. All the above options involve action and are aware of power relations (i.e., politics). They all seek justice. They may create conditions for the more conventional empathic practice to evolve, but no less than that, they are examples of justice-seeking and politically sensitive empathetic practice.

Keywords: education, empathy, justice, reconciliation

Procedia PDF Downloads 98
942 Network Traffic Classification Scheme for Internet Network Based on Application Categorization for Ipv6

Authors: Yaser Miaji, Mohammed Aloryani

Abstract:

The rise of recent applications in everyday implementation like videoconferencing, online recreation and voice speech communication leads to pressing the need for novel mechanism and policy to serve this steep improvement within the application itself and users‟ wants. This diversity in web traffics needs some classification and prioritization of the traffics since some traffics merit abundant attention with less delay and loss, than others. This research is intended to reinforce the mechanism by analysing the performance in application according to the proposed mechanism implemented. The mechanism used is quite direct and analytical. The mechanism is implemented by modifying the queue limit in the algorithm.

Keywords: traffic classification, IPv6, internet, application categorization

Procedia PDF Downloads 565
941 Natural Convection between Two Parallel Wavy Plates

Authors: Si Abdallah Mayouf

Abstract:

In this work, the effects of the wavy surface on free convection heat transfer boundary layer flow between two parallel wavy plates have been studied numerically. The two plates are considered at a constant temperature. The equations and the boundary conditions are discretized by the finite difference scheme and solved numerically using the Gauss-Seidel algorithm. The important parameters in this problem are the amplitude of the wavy surfaces and the distance between the two wavy plates. Results are presented as velocity profiles, temperature profiles and local Nusselt number according to the important parameters.

Keywords: free convection, wavy surface, parallel plates, fluid dynamics

Procedia PDF Downloads 307
940 Advanced Technology for Natural Gas Liquids (NGL) Recovery Using Residue Gas Split

Authors: Riddhiman Sherlekar, Umang Paladia, Rachit Desai, Yash Patel

Abstract:

The competitive scenario of the oil and gas market is a challenge for today’s plant designers to achieve designs that meet client expectations with shrinking budgets, safety requirements, and operating flexibility. Natural Gas Liquids have three main industrial uses. They can be used as fuels, or as petrochemical feedstock or as refinery blends that can be further processed and sold as straight run cuts, such as naphtha, kerosene and gas oil. NGL extraction is not a chemical reaction. It involves the separation of heavier hydrocarbons from the main gas stream through pressure as temperature reduction, which depending upon the degree of NGL extraction may involve cryogenic process. Previous technologies i.e. short cycle dry desiccant absorption, Joule-Thompson or Low temperature refrigeration, lean oil absorption have been giving results of only 40 to 45% ethane recoveries, which were unsatisfying depending upon the current scenario of down turn market. Here new technology has been suggested for boosting up the recoveries of ethane+ up to 95% and up to 99% for propane+ components. Cryogenic plants provide reboiling to demethanizers by using part of inlet feed gas, or inlet feed split. If the two stream temperatures are not similar, there is lost work in the mixing operation unless the designer has access to some proprietary design. The concept introduced in this process consists of reboiling the demethanizer with the residue gas, or residue gas split. The innovation of this process is that it does not use the typical inlet gas feed split type of flow arrangement to reboil the demethanizer or deethanizer column, but instead uses an open heat pump scheme to that effect. The residue gas compressor provides the heat pump effect. The heat pump stream is then further cooled and entered in the top section of the column as a cold reflux. Because of the nature of this design, this process offers the opportunity to operate at full ethane rejection or recovery. The scheme is also very adaptable to revamp existing facilities. This advancement can be proven not only in enhancing the results but also provides operational flexibility, optimize heat exchange, introduces equipment cost reduction, opens a future for the innovative designs while keeping execution costs low.

Keywords: deethanizer, demethanizer, residue gas, NGL

Procedia PDF Downloads 265
939 Response of a Bridge Crane during an Earthquake

Authors: F. Fekak, A. Gravouil, M. Brun, B. Depale

Abstract:

During an earthquake, a bridge crane may be subjected to multiple impacts between crane wheels and rail. In order to model such phenomena, a time-history dynamic analysis with a multi-scale approach is performed. The high frequency aspect of the impacts between wheels and rails is taken into account by a Lagrange explicit event-capturing algorithm based on a velocity-impulse formulation to resolve contacts and impacts. An implicit temporal scheme is used for the rest of the structure. The numerical coupling between the implicit and the explicit schemes is achieved with a heterogeneous asynchronous time-integrator.

Keywords: bridge crane, earthquake, dynamic analysis, explicit, implicit, impact

Procedia PDF Downloads 304
938 Cluster-Based Multi-Path Routing Algorithm in Wireless Sensor Networks

Authors: Si-Gwan Kim

Abstract:

Small-size and low-power sensors with sensing, signal processing and wireless communication capabilities is suitable for the wireless sensor networks. Due to the limited resources and battery constraints, complex routing algorithms used for the ad-hoc networks cannot be employed in sensor networks. In this paper, we propose node-disjoint multi-path hexagon-based routing algorithms in wireless sensor networks. We suggest the details of the algorithm and compare it with other works. Simulation results show that the proposed scheme achieves better performance in terms of efficiency and message delivery ratio.

Keywords: clustering, multi-path, routing protocol, sensor network

Procedia PDF Downloads 404
937 An Empirical Study of Gender, Expectations and Actual Experiences from Industrial Work Experience of Undergraduate Accounting Students in Selected Nigerian Universities

Authors: Obiamaka Nwobu, Samuel Faboyede, O. Oluseyi

Abstract:

This study investigated the influence of gender on expectations and actual experiences from Industrial Work Experience, which is an aspect of the curriculum of undergraduate accounting students in selected Nigerian Universities. A survey research design was employed. Copies of a research questionnaire were made and administered to eighty (80) accounting students in selected Nigerian Universities who embarked on Students’ Industrial Work Experience Scheme (SIWES). Their expectations were juxtaposed with their actual experiences gleaned from the Industrial Work Experience. The data for the purpose of this study was analyzed using independent sample t-test. A total of fifteen (15) male and forty four (44) female students responded to the survey. This resulted in a response rate of 73.8 per cent. The results of this study indicated that there was no significant difference in the expectation of male and female undergraduate accounting students that the internship experience will be able to prepare them for an accounting career in the future, impart relevant knowledge, relate theories to work environment, enhance knowledge in financial accounting, cost accounting, accounting software, and general practice of accounting; prepare financial statements, interpret financial statements, develop problem solving skills, communication skills, and interpersonal skills; improve personal confidence and self-esteem, increase exposure to latest technology in the workplace, build rapport and networks, provide earnings, job experience, provide information and experience to choose career path. Furthermore, findings from the survey showed that there were differences in the expectations of students and their actual experiences with respect to their ability to relate theories to work environment, enhance knowledge in financial accounting, cost accounting, accounting software and exposure to latest technology in the workplace. The study only examined the perceptions of students from two Universities in South-West Nigeria. The research instrument used in this study can be administered to undergraduate accounting students in other universities in Nigeria. The Industrial Work Experience Scheme for undergraduate accounting students should be highly encouraged by tertiary institutions in Nigeria. This will ultimately make the students well prepared for a career in accounting.

Keywords: gender, expectations, actual experiences, industrial work experience

Procedia PDF Downloads 259
936 Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem

Authors: Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah

Abstract:

The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently.

Keywords: Rabin cryptosystem, 4-to-1 decryption failure, square root modulo problem, integer factorization problem

Procedia PDF Downloads 475
935 Understanding Team Member Autonomy and Team Collaboration: A Qualitative Study

Authors: Ayşen Bakioğlu, Gökçen Seyra Çakır

Abstract:

This study aims to explore how research assistants who work in project teams experience team member autonomy and how they reconcile team member autonomy with team collaboration. The study utilizes snowball sampling. 20 research assistants who work the faculties of education in Marmara University and Yıldız Technical University have been interviewed. The analysis of data involves a content analysis MAXQDAPlus 11 which is a qualitative data analysis software is used as the data analysis tool. According to the findings of this study, emerging themes include team norm formation, team coordination management, the role of individual tasks in team collaboration, leadership distribution. According to the findings, interviewees experience team norm formation process in terms of processes, which pertain to task fulfillment, and processes, which pertain to the regulation of team dynamics. Team norm formation process instills a sense of responsibility amongst individual team members. Apart from that, the interviewees’ responses indicate that the realization of the obligation to work in a team contributes to the team norm formation process. The participants indicate that individual expectations are taken into consideration during the coordination of the team. The supervisor of the project team also has a crucial role in maintaining team collaboration. Coordination problems arise when an individual team member does not relate his/her academic field with the research topic of the project team. The findings indicate that the leadership distribution in the project teams involves two leadership processes: leadership distribution which is based on the processes that focus on individual team members and leadership distribution which is based on the processes that focus on team interaction. Apart from that, individual tasks serve as a facilitator of collaboration amongst team members. Interviewees also indicate that individual tasks also facilitate the expression of individuality.

Keywords: project teams in higher education, research assistant teams, team collaboration, team member autonomy

Procedia PDF Downloads 363
934 Deep Injection Wells for Flood Prevention and Groundwater Management

Authors: Mohammad R. Jafari, Francois G. Bernardeau

Abstract:

With its arid climate, Qatar experiences low annual rainfall, intense storms, and high evaporation rates. However, the fast-paced rate of infrastructure development in the capital city of Doha has led to recurring instances of surface water flooding as well as rising groundwater levels. Public Work Authority (PWA/ASHGHAL) has implemented an approach to collect and discharge the flood water into a) positive gravity systems; b) Emergency Flooding Area (EFA) – Evaporation, Infiltration or Storage off-site using tankers; and c) Discharge to deep injection wells. As part of the flood prevention scheme, 21 deep injection wells have been constructed to discharge the collected surface and groundwater table in Doha city. These injection wells function as an alternative in localities that do not possess either positive gravity systems or downstream networks that can accommodate additional loads. These injection wells are 400-m deep and are constructed in a complex karstic subsurface condition with large cavities. The injection well system will discharge collected groundwater and storm surface runoff into the permeable Umm Er Radhuma Formation, which is an aquifer present throughout the Persian Gulf Region. The Umm Er Radhuma formation contains saline water that is not being used for water supply. The injection zone is separated by an impervious gypsum formation which acts as a barrier between upper and lower aquifer. State of the art drilling, grouting, and geophysical techniques have been implemented in construction of the wells to assure that the shallow aquifer would not be contaminated and impacted by injected water. Injection and pumping tests were performed to evaluate injection well functionality (injectability). The results of these tests indicated that majority of the wells can accept injection rate of 200 to 300 m3 /h (56 to 83 l/s) under gravity with average value of 250 m3 /h (70 l/s) compared to design value of 50 l/s. This paper presents design and construction process and issues associated with these injection wells, performing injection/pumping tests to determine capacity and effectiveness of the injection wells, the detailed design of collection system and conveying system into the injection wells, and the operation and maintenance process. This system is completed now and is under operation, and therefore, construction of injection wells is an effective option for flood control.

Keywords: deep injection well, flood prevention scheme, geophysical tests, pumping and injection tests, wellhead assembly

Procedia PDF Downloads 119