Search results for: packet loss probability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4587

Search results for: packet loss probability

4047 Flow Behavior and Performances of Centrifugal Compressor Stage Vaneless Diffusers

Authors: Y.Galerkin, O. Solovieva

Abstract:

Flow parameters are calculated in vaneless diffusers with relative width 0,014 – 0,10 constant along radii. Inlet flow angles and similarity criteria were varied. Information about flow structure is presented – meridian streamlines configuration, information on flow full development, flow separation. Polytrophic efficiency, loss and recovery coefficient are used to compare diffusers’ effectiveness. The sample of narrow diffuser optimization by conical walls application is presented. Three tampered variants of a wide diffuser are compared too. The work is made in the R&D laboratory “Gas dynamics of turbo machines” of the TU SPb.

Keywords: vaneless diffuser, relative width, flow angle, flow separation, loss coefficient, similarity criteria

Procedia PDF Downloads 473
4046 ARCS Model for Enhancing Intrinsic Motivation in Learning Biodiversity Subjects: A Case Study of Tertiary Level Students in Malaysia

Authors: Nadia Nisha Musa, Nur Atirah Hasmi, Hasnun Nita Ismail, Zulfadli Mahfodz

Abstract:

In Malaysian Education System, subject related to biodiversity has started in the curriculum from Foundation Study until tertiary education. Biodiversity become the focus of attention due to awareness on global warming which potentially leads to a loss of biodiversity. A loss in biodiversity means a loss in medicinal discoveries and reduces food supply. It is of great important to ensure that young generations become aware of biodiversity conservation. The more interactive approaches are needed to build society with a high awareness for biodiversity conservation. To address this challenge, the goal of this study is to enhance intrinsic motivation of biological students via ARCS model of instruction. Self-access learning materials such as tutorial, module and fieldwork were designed with ARCS elements to a sample size of 70 university students from the beginning of the semester. Both paper and online surveys were used to collect data from the respondents. The results showed that elements of attention, relevance, confidence and satisfaction have a positive impact on intrinsic motivation of students and their academic performance.

Keywords: intrinsic motivation, ARCS model of instruction, biodiversity, self-access learning

Procedia PDF Downloads 201
4045 Self-Supervised Attributed Graph Clustering with Dual Contrastive Loss Constraints

Authors: Lijuan Zhou, Mengqi Wu, Changyong Niu

Abstract:

Attributed graph clustering can utilize the graph topology and node attributes to uncover hidden community structures and patterns in complex networks, aiding in the understanding and analysis of complex systems. Utilizing contrastive learning for attributed graph clustering can effectively exploit meaningful implicit relationships between data. However, existing attributed graph clustering methods based on contrastive learning suffer from the following drawbacks: 1) Complex data augmentation increases computational cost, and inappropriate data augmentation may lead to semantic drift. 2) The selection of positive and negative samples neglects the intrinsic cluster structure learned from graph topology and node attributes. Therefore, this paper proposes a method called self-supervised Attributed Graph Clustering with Dual Contrastive Loss constraints (AGC-DCL). Firstly, Siamese Multilayer Perceptron (MLP) encoders are employed to generate two views separately to avoid complex data augmentation. Secondly, the neighborhood contrastive loss is introduced to constrain node representation using local topological structure while effectively embedding attribute information through attribute reconstruction. Additionally, clustering-oriented contrastive loss is applied to fully utilize clustering information in global semantics for discriminative node representations, regarding the cluster centers from two views as negative samples to fully leverage effective clustering information from different views. Comparative clustering results with existing attributed graph clustering algorithms on six datasets demonstrate the superiority of the proposed method.

Keywords: attributed graph clustering, contrastive learning, clustering-oriented, self-supervised learning

Procedia PDF Downloads 21
4044 A Theoretical Approach on Electoral Competition, Lobby Formation and Equilibrium Policy Platforms

Authors: Deepti Kohli, Meeta Keswani Mehra

Abstract:

The paper develops a theoretical model of electoral competition with purely opportunistic candidates and a uni-dimensional policy using the probability voting approach while focusing on the aspect of lobby formation to analyze the inherent complex interactions between centripetal and centrifugal forces and their effects on equilibrium policy platforms. There exist three types of agents, namely, Left-wing, Moderate and Right-wing who comprise of the total voting population. Also, it is assumed that the Left and Right agents are free to initiate a lobby of their choice. If initiated, these lobbies generate donations which in turn can be contributed to one (or both) electoral candidates in order to influence them to implement the lobby’s preferred policy. Four different lobby formation scenarios have been considered: no lobby formation, only Left, only Right and both Left and Right. The equilibrium policy platforms, amount of individual donations by agents to their respective lobbies and the contributions offered to the electoral candidates have been solved for under each of the above four cases. Since it is assumed that the agents cannot coordinate each other’s actions during the lobby formation stage, there exists a probability with which a lobby would be formed, which is also solved for in the model. The results indicate that the policy platforms of the two electoral candidates converge completely under the cases of no lobby and both (extreme) formations but diverge under the cases of only one (Left or Right) lobby formation. This is because in the case of no lobby being formed, only the centripetal forces (emerging from the election-winning aspect) are present while in the case of both extreme (Left-wing and Right-wing) lobbies being formed, centrifugal forces (emerging from the lobby formation aspect) also arise but cancel each other out, again resulting in a pure policy convergence phenomenon. In contrast, in case of only one lobby being formed, both centripetal and centrifugal forces interact strategically, leading the two electoral candidates to choose completely different policy platforms in equilibrium. Additionally, it is found that in equilibrium, while the donation by a specific agent type increases with the formation of both lobbies in comparison to when only one lobby is formed, the probability of implementation of the policy being advocated by that lobby group falls.

Keywords: electoral competition, equilibrium policy platforms, lobby formation, opportunistic candidates

Procedia PDF Downloads 313
4043 Effects of Roof Materials on Onion Storage

Authors: Imoukhuede Oladunni Bimpe, Ale Monday Olatunbosun

Abstract:

Periodic scarcity of onion requires urgent solution in Nigerian agro-economy. The high percentage of onion losses incurred after harvesting period is due to non-availability of appropriate facility for its storage. Therefore, some storage structures were constructed with different roofing materials. The response of the materials to the weather parameters like temperature and relative humidity were evaluated to know their effects on the performance of the storage structures. The temperature and relative humidity were taken three times daily alongside with the weight of the onion in each of the structures; the losses as indicated by loss indices like shrinkage, rottenness, sprouting and colour were identified and percentage loss per week determined. The highest mean percentage loss (22%) was observed in the structure with iron roofing materials while structure with thatched materials had the lowest (9.4%); The highest temperature was observed in the structure with Asbestos roofing materials and no significant difference in the temperature value in the structure with thatched and Iron materials; highest relatively humidity was found in Asbestos roofing material while the lowest in the structure with Iron materials. It was conclusively found that the storage structure with thatched roof had the best performance in terms of losses.

Keywords: onion, storage structures, weather parameters, roof materials, losses

Procedia PDF Downloads 584
4042 Osmotic Dehydration of Fruit Slices in Concentrated Sugar Solution

Authors: Neda Amidi Fazli, Farid Amidi Fazli

Abstract:

Enriched fruits by minerals provide minerals which are needed to human body the minerals are used by body cells for daily activities. This paper indicates the result of mass transfer in fruit slices in 55% sucrose syrup in presence of calcium and phosphorus ions. Osmosis agent 55% (w/w) was prepared by solving sucrose in deionized water and adding calcium or phosphorus in 1 and 2% concentration. Dry matter, solid gain, water loss as well as weight reduction were calculated. Results showed that by increasing of calcium concentration in osmosis solution solid gain, water loss and weight reduction were increased in short experiment time in kiwi fruit but the parameters decreased in long experiment time by concentration increasing and rise of calcium concentration caused decrease of osmosis parameters in banana. In the case of phosphorus, increasing of ion concentration had adverse effect on all treatments, this may be due to different osmosis force that is created by two types of ions. The mentioned parameters decreased in all treatments by increasing of ion concentration. Highest mass transfer in kiwi fruit occurs when 1% calcium solution applied for 60 minutes, values obtained for solid gain, water loss and weight reduction were 42.60, 51.97, and 9.37 respectively. In the case of banana, when 2% phosphorus concentration was applied as osmosis agent for 60 minutes highest values for solid gain, water loss and weight reduction obtained as 21, 25.84, and 4.84 respectively.

Keywords: calcium, concentration, osmotic dehydration, phosphorus

Procedia PDF Downloads 254
4041 Reflection Performance of Truncated Pyramidal and Truncated Wedge Microwave Absorber Using Sugarcane Bagasse (SCB)

Authors: Liyana Zahid, Mohd Fareq Abd Malek, Ee Meng Cheng, Wei Wen Liu, Yeng Seng Lee, Muhammad Nadeem Iqbal, Fwen Hoon Wee

Abstract:

One of the parameters that affect the performance of microwave absorbers is the shape of the absorbers. This paper shows the performance (reflection loss) of truncated pyramidal and truncated wedge microwave absorbers in the range frequency between 8.2 to 12.4 GHz (X-Band) in simulation. The material used is sugarcane bagasse (SCB) which is one of the new materials that used to fabricate the microwave absorber. The complex permittivity was measured using Agilent dielectric probe technique. The designs were simulated using CST Microwave Studio Software. The reflection losses between these two shapes were compared.

Keywords: microwave absorber, reflection loss, sugarcane bagasse (SCB), X-Band

Procedia PDF Downloads 325
4040 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 254
4039 Predisposition of Small Scale Businesses in Fagge, Kano State, Nigeria, Towards Profit and Loss Sharing Mode of Finance

Authors: Farida, M. Shehu, Shehu U. R. Aliyu

Abstract:

Access to finance has been recognized in the literature as one of the major impediments confronting small scale businesses (SSBs). This largely arises due to high lending rate, religious inclinations, collateral, etc. Islamic mode finance operates under Profit and Loss Sharing (PLS) arrangement between a borrower (business owner) and a lender (Islamic bank). This paper empirically assesses the determinants of predisposition of small scale business operators in Fagge local government area, Kano State, Nigeria, towards the PLS. Cross-sectional data from a sample of 291 small scale business operators was analyzed using logit and probit regression models. Empirical results reveal that while awareness and religion inclination positively drive interest towards the PLS, lending rate and collateral work against it. The paper, therefore, strongly recommends more advocacy campaigns and setting up of more Islamic banks in the country to cater for the financing and religious needs of SSBs in the study area.

Keywords: Islamic finance, logit and probit models, profit and loss sharing small scale businesses, finance, commerce

Procedia PDF Downloads 350
4038 The Role of Bone Marrow Stem Cells Transplantation in the Repair of Damaged Inner Ear in Albino Rats

Authors: Ahmed Gaber Abdel Raheem, Nashwa Ahmed Mohamed

Abstract:

Introduction: Sensorineural hearing loss (SNHL) is largely caused by the degeneration of the cochlea. Therapeutic options for SNHL are limited to hearing aids and cochlear implants. The cell transplantation approach to the regeneration of hair cells has gained considerable attention because stem cells are believed to accumulate in the damaged sites and have the potential for the repair of damaged tissues. The aim of the work: was to assess the use of bone marrow transplantation in repair of damaged inner ear hair cells in rats after the damage had been inflicted by Amikacin injection. Material and Methods: Thirty albino rats were used in this study. They were divided into three groups. Each group ten rats. Group I: used as control. Group II: Were given Amikacin- intratympanic injection till complete loss of hearing function. This could be assessed by Distortion product Otoacoustic Emission (DPOAEs) and / or auditory brain stem evoked potential (ABR). GroupIII: were given intra-peritoneal injection of bone marrow stem cell after complete loss of hearing caused by Amikacin. Clinical assessment was done using DPOAEs and / or auditory brain stem evoked potential (ABR), before and after bone marrow injection. Histological assessment of the inner ear was done by light and electron microscope. Also, Detection of stem cells in the inner ear by immunohistochemistry. Results: Histological examination of the specimens showed promising improvement in the structure of cochlea that may be responsible for the improvement of hearing function in rats detected by DPOAEs and / or ABR. Conclusion: Bone marrow stem cells transplantation might be useful for the treatment of SNHL.

Keywords: amikacin, hair cells, sensorineural hearing loss, stem cells

Procedia PDF Downloads 432
4037 Forecasting 24-Hour Ahead Electricity Load Using Time Series Models

Authors: Ramin Vafadary, Maryam Khanbaghi

Abstract:

Forecasting electricity load is important for various purposes like planning, operation, and control. Forecasts can save operating and maintenance costs, increase the reliability of power supply and delivery systems, and correct decisions for future development. This paper compares various time series methods to forecast 24 hours ahead of electricity load. The methods considered are the Holt-Winters smoothing, SARIMA Modeling, LSTM Network, Fbprophet, and Tensorflow probability. The performance of each method is evaluated by using the forecasting accuracy criteria, namely, the mean absolute error and root mean square error. The National Renewable Energy Laboratory (NREL) residential energy consumption data is used to train the models. The results of this study show that the SARIMA model is superior to the others for 24 hours ahead forecasts. Furthermore, a Bagging technique is used to make the predictions more robust. The obtained results show that by Bagging multiple time-series forecasts, we can improve the robustness of the models for 24 hours ahead of electricity load forecasting.

Keywords: bagging, Fbprophet, Holt-Winters, LSTM, load forecast, SARIMA, TensorFlow probability, time series

Procedia PDF Downloads 76
4036 Investigation of Biocorrosion in Brass by Arthrobacter sulfureus in Neutral Medium

Authors: Ramachandran Manivannan, B. Sakthi Swaroop, Selvam Noyel Victoria

Abstract:

Microbial corrosion of brass gauze by the aerobic film forming bacteria Arthrobacter sulfurous in neutral media was investigated using gravimetric studies. Maximum weight loss of 166.98 mg was observed for a period of 28 days of exposure to the bacterial medium as against the weight loss of 13.69 mg for control. The optical density studies for the bacterial culture was found to show attainment of stationary phase in 48 h. Scanning electron microscopy analysis of the samples shows the presence of pitting corrosion. The energy dispersive X-ray analysis of the samples showed increased oxygen and phosphorus content in the sample due to bacterial activity.

Keywords: Arthrobacter sulfureus, biocorrosion, brass, neutral medium

Procedia PDF Downloads 152
4035 Tensile Force Estimation for Real-Size Pre-Stressed Concrete Girder using Embedded Elasto-Magnetic Sensor

Authors: Junkyeong Kim, Jooyoung Park, Aoqi Zhang, Seunghee Park

Abstract:

The tensile force of Pre-Stressed Concrete (PSC) girder is the most important factor for evaluating the performance of PSC girder bridges. To measure the tensile force of PSC girder, several NDT methods were studied. However, conventional NDT method cannot be applied to the real-size PSC girder because the PS tendons could not be approached. To measure the tensile force of real-size PSC girder, this study proposed embedded EM sensor based tensile force estimation method. The embedded EM sensor could be installed inside of PSC girder as a sheath joint before the concrete casting. After curing process, the PS tendons were installed, and the tensile force was induced step by step using hydraulic jacking machine. The B-H loop was measured using embedded EM sensor at each tensile force steps and to compare with actual tensile force, the load cell was installed at each end of girder. The magnetization energy loss, that is the closed area of B-H loop, was decreased according to the increase of tensile force with regular pattern. Thus, the tensile force could be estimated by the tracking the change of magnetization energy loss of PS tendons. Through the experimental result, the proposed method can be used to estimate the tensile force of the in-situ real-size PSC girder bridge.

Keywords: tensile force estimation, embedded EM sensor, magnetization energy loss, PSC girder

Procedia PDF Downloads 317
4034 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 120
4033 Sexual Health Experiences of Older Men: Health Care Professionals' Perspectives

Authors: Andriana E. Tran, Anna Chur-Hansen

Abstract:

Sexual health is an important aspect of overall wellbeing. This study aimed to explore the sexual health experiences of men aged 50 years and over from the perspective of health care professional participants who were specializing in sexual health care and who consulted with older men. A total of ten interviews were conducted. Eleven themes were identified regarding men’s experiences with sexual health care as reported by participants. 1) Biologically focused: older male clients focus largely on the biological aspect of their sexual health without consideration of other factors which might affect their functioning. 2) Psychological concerns: there is an interaction between mental and sexual health but older male clients do not necessarily see this. 3) Medicalization of sexual functioning: advances in medicine that aid with erectile difficulties which consequently mean that older men tend to favor a medical solution to their sexual concerns. 4) Masculine identity: sexual health concerns are linked to older male clients’ sense of masculinity. 5) Penile functionality: most concerns that older male clients have center on their penile functionality. 6) Relationships: many male clients seek sexual help as they believe it improves relationships. Conversely, having supportive partners may mean older male clients focus less on the physicality of sex. 7) Grief and loss: men experience grief and loss – the loss of their sexual functioning, grief from loss of a long-term partner, and loss of intimacy and privacy when moving from independent living to residential care. 8) Social stigma: older male clients experience stigma around aging sexuality and sex in general. 9) Help-seeking behavior: older male clients will usually seek mechanistic solution for biological sexual concerns, such as medication used for penile dysfunction. 10) Dismissed by health care professionals: many older male clients seek specialist sexual health care without the knowledge of their doctors as they feel dismissed due to lack of expertise, lack of time, and the doctor’s personal attitudes and characteristics. Finally, 11) Lack of resources: there is a distinct lack of resources and training to understand sexuality for healthy older men. These findings may inform future research, professional training, public health campaigns and policies for sexual health in older men.

Keywords: ageing, biopsychosocial model, men's health, sexual health

Procedia PDF Downloads 152
4032 Changing Geomorphosites in a Changing Lake: How Environmental Changes in Urmia Lake Have Been Driving Vanishing or Creating of Geomorphosites

Authors: D. Mokhtari

Abstract:

Any variation in environmental characteristics of geomorphosites would lead to destabilisation of their geotouristic values all around the planet. The Urmia lake, with an area of approximately 5,500 km2 and a catchment area of 51,876 km2, and to which various reasons over time, especially in the last fifty years have seen a sharp decline and have decreased by about 93 % in two recent decades. These variations are not only driving significant changes in the morphology and ecology of the present lake landscape, but at the same time are shaping newly formed morphologies, which vanished some valuable geomorphosites or develop into smaller geomorphosites with significant value from a scientific and cultural point of view. This paper analyses and discusses features and evolution in several representative coastal and island geomorphosites. For this purpose, a total of 23 geomorphosites were studied in two data series (1963 and 2015) and the respective data were compared and analysed. The results showed, The total loss in geomorphosites area in a half century amounted to a loss of more than 90% of the valuable geomorphosites. Moreover, the comparison between the mean yearly value of coastal area lost over the entire period and the yearly average calculated for the shorter period (1998-2014) clearly indicates a pattern of acceleration. This acceleration in the rate of reduction in lake area was seen in most of the southern half of the lake. In the region as well, the general water-level falling is not only causing the loss of a significant water resource, which is followed by major impact on regional ecosystems, but is also driving the most marked recent (last century) changes in the geotouristic landscapes. In fact, the disappearance of geomorphosites means the loss of tourism phenomenon. In this context attention must be paid to the question of conservation. The action needed to safeguard geomorphosites includes: 1) Preventive action, 2) Corrective action, and 3) Sharing knowledge.

Keywords: geomorphosite, environmental changes, changing lake, Urmia lake, northwest of Iran

Procedia PDF Downloads 359
4031 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 330
4030 Exploring the Activity Fabric of an Intelligent Environment with Hierarchical Hidden Markov Theory

Authors: Chiung-Hui Chen

Abstract:

The Internet of Things (IoT) was designed for widespread convenience. With the smart tag and the sensing network, a large quantity of dynamic information is immediately presented in the IoT. Through the internal communication and interaction, meaningful objects provide real-time services for users. Therefore, the service with appropriate decision-making has become an essential issue. Based on the science of human behavior, this study employed the environment model to record the time sequences and locations of different behaviors and adopted the probability module of the hierarchical Hidden Markov Model for the inference. The statistical analysis was conducted to achieve the following objectives: First, define user behaviors and predict the user behavior routes with the environment model to analyze user purposes. Second, construct the hierarchical Hidden Markov Model according to the logic framework, and establish the sequential intensity among behaviors to get acquainted with the use and activity fabric of the intelligent environment. Third, establish the intensity of the relation between the probability of objects’ being used and the objects. The indicator can describe the possible limitations of the mechanism. As the process is recorded in the information of the system created in this study, these data can be reused to adjust the procedure of intelligent design services.

Keywords: behavior, big data, hierarchical hidden Markov model, intelligent object

Procedia PDF Downloads 214
4029 Knowledge Decision of Food Waste and Loss Reduction in Supply Chain System: A Case Study of Kingdom of Saudi Arabia

Authors: Nadia Adnan, Muhammad Mohsin Raza, Latha Ravindran

Abstract:

Based on the principles above, the study presents an economic model of food waste for consumers, intermediaries, and producers. We discriminate between purchasing and selling, purchases versus customers consumption, and gross output versus sales for each intermediary. To compensate for waste at each level of the supply chain, agents must charge higher sales prices. The research model can produce more accurate predictions about how actions (public regulations or private efforts) to reduce food waste impact markets, including indirect (cascading) effects. With a formal model, researchers demonstrate the uniqueness of these interaction effects and simulate an empirical model calibrated to market characteristics and waste rates in Saudi Arabia. Researchers demonstrate that the effects of waste reduction differ per commodity, depending on supply and demand elasticities, degree of openness to international commerce, and the beginning rates of food loss and waste at each level of the value chain. Because of the consequential effects related to the supply chain, initiatives to minimize food waste will be strengthened in some circumstances and partially countered in others.

Keywords: food loss, food waste, supply chain management, Saudi Arabia, food supply

Procedia PDF Downloads 78
4028 Risk Assessment of Flood Defences by Utilising Condition Grade Based Probabilistic Approach

Authors: M. Bahari Mehrabani, Hua-Peng Chen

Abstract:

Management and maintenance of coastal defence structures during the expected life cycle have become a real challenge for decision makers and engineers. Accurate evaluation of the current condition and future performance of flood defence structures is essential for effective practical maintenance strategies on the basis of available field inspection data. Moreover, as coastal defence structures age, it becomes more challenging to implement maintenance and management plans to avoid structural failure. Therefore, condition inspection data are essential for assessing damage and forecasting deterioration of ageing flood defence structures in order to keep the structures in an acceptable condition. The inspection data for flood defence structures are often collected using discrete visual condition rating schemes. In order to evaluate future condition of the structure, a probabilistic deterioration model needs to be utilised. However, existing deterioration models may not provide a reliable prediction of performance deterioration for a long period due to uncertainties. To tackle the limitation, a time-dependent condition-based model associated with a transition probability needs to be developed on the basis of condition grade scheme for flood defences. This paper presents a probabilistic method for predicting future performance deterioration of coastal flood defence structures based on condition grading inspection data and deterioration curves estimated by expert judgement. In condition-based deterioration modelling, the main task is to estimate transition probability matrices. The deterioration process of the structure related to the transition states is modelled according to Markov chain process, and a reliability-based approach is used to estimate the probability of structural failure. Visual inspection data according to the United Kingdom Condition Assessment Manual are used to obtain the initial condition grade curve of the coastal flood defences. The initial curves then modified in order to develop transition probabilities through non-linear regression based optimisation algorithms. The Monte Carlo simulations are then used to evaluate the future performance of the structure on the basis of the estimated transition probabilities. Finally, a case study is given to demonstrate the applicability of the proposed method under no-maintenance and medium-maintenance scenarios. Results show that the proposed method can provide an effective predictive model for various situations in terms of available condition grading data. The proposed model also provides useful information on time-dependent probability of failure in coastal flood defences.

Keywords: condition grading, flood defense, performance assessment, stochastic deterioration modelling

Procedia PDF Downloads 213
4027 Implicit Transaction Costs and the Fundamental Theorems of Asset Pricing

Authors: Erindi Allaj

Abstract:

This paper studies arbitrage pricing theory in financial markets with transaction costs. We extend the existing theory to include the more realistic possibility that the price at which the investors trade is dependent on the traded volume. The investors in the market always buy at the ask and sell at the bid price. Transaction costs are composed of two terms, one is able to capture the implicit transaction costs and the other the price impact. Moreover, a new definition of a self-financing portfolio is obtained. The self-financing condition suggests that continuous trading is possible, but is restricted to predictable trading strategies which have left and right limit and finite quadratic variation. That is, predictable trading strategies of infinite variation and of finite quadratic variation are allowed in our setting. Within this framework, the existence of an equivalent probability measure is equivalent to the absence of arbitrage opportunities, so that the first fundamental theorem of asset pricing (FFTAP) holds. It is also proved that, when this probability measure is unique, any contingent claim in the market is hedgeable in an L2-sense. The price of any contingent claim is equal to the risk-neutral price. To better understand how to apply the theory proposed we provide an example with linear transaction costs.

Keywords: arbitrage pricing theory, transaction costs, fundamental theorems of arbitrage, financial markets

Procedia PDF Downloads 339
4026 Preservation and Packaging Techniques for Extending the Shelf Life of Cucumbers: A Review of Methods and Factors Affecting Quality

Authors: Abdul Umaro Tholley

Abstract:

The preservation and packaging of cucumbers are essential to maintain their shelf life and quality. Cucumbers are a perishable food item that is highly susceptible to spoilage due to their high-water content and delicate nature. Therefore, proper preservation and packaging techniques are crucial to extend their shelf life and prevent economic loss. There are several methods of preserving cucumbers, including refrigeration, canning, pickling, and dehydration. Refrigeration is the most used preservation method, as it slows down the rate of deterioration and maintains the freshness and quality of the cucumbers. Canning and pickling are also popular preservation methods that use heat treatment and acidic solutions, respectively, to prevent microbial growth and increase shelf life. Dehydration involves removing the water content from cucumbers to increase their shelf life, but it may affect their texture and taste. Packaging also plays a vital role in preserving cucumbers. The packaging materials should be selected based on their ability to maintain the quality and freshness of the cucumbers. The most used packaging materials for cucumbers are polyethylene bags, which prevent moisture loss and protect the cucumbers from physical damage. Other packaging materials, such as corrugated boxes and wooden crates, may also be used, but they offer less protection against moisture loss and damage. The quality of cucumbers is affected by several factors, including storage temperature, humidity, and exposure to light. Cucumbers should be stored at temperatures between 7 and 10 °C, with a relative humidity of 90-95%, to maintain their freshness and quality. Exposure to light should also be minimized to prevent the formation of yellowing and decay. In conclusion, the preservation and packaging of cucumbers are essential to maintain their quality and extend their shelf life. Refrigeration, canning, pickling, and dehydration are common preservation methods that can be used to preserve cucumbers. The packaging materials used should be carefully selected to prevent moisture loss and physical damage. Proper storage conditions, such as temperature, humidity, and light exposure, should also be maintained to ensure the quality and freshness of cucumbers. Overall, proper preservation and packaging techniques can help reduce economic loss and provide consumers with high-quality cucumbers.

Keywords: cucumbers, preservation, packaging, shelf life

Procedia PDF Downloads 66
4025 Examination of Relationship between Internet Addiction and Cyber Bullying in Adolescents

Authors: Adem Peker, Yüksel Eroğlu, İsmail Ay

Abstract:

As the information and communication technologies have become embedded in everyday life of adolescents, both their possible benefits and risks to adolescents are being identified. The information and communication technologies provide opportunities for adolescents to connect with peers and to access to information. However, as with other social connections, users of information and communication devices have the potential to meet and interact with in harmful ways. One emerging example of such interaction is cyber bullying. Cyber bullying occurs when someone uses the information and communication technologies to harass or embarrass another person. Cyber bullying can take the form of malicious text messages and e-mails, spreading rumours, and excluding people from online groups. Cyber bullying has been linked to psychological problems for cyber bullies and victims. Therefore, it is important to determine how internet addiction contributes to cyber bullying. Building on this question, this study takes a closer look at the relationship between internet addiction and cyber bullying. For this purpose, in this study, based on descriptive relational model, it was hypothesized that loss of control, excessive desire to stay online, and negativity in social relationships, which are dimensions of internet addiction, would be associated positively with cyber bullying and victimization. Participants were 383 high school students (176 girls and 207 boys; mean age, 15.7 years). Internet addiction was measured by using Internet Addiction Scale. The Cyber Victim and Bullying Scale was utilized to measure cyber bullying and victimization. The scales were administered to the students in groups in the classrooms. In this study, stepwise regression analyses were utilized to examine the relationships between dimensions of internet addiction and cyber bullying and victimization. Before applying stepwise regression analysis, assumptions of regression were verified. According to stepwise regression analysis, cyber bullying was predicted by loss of control (β=.26, p<.001) and negativity in social relationships (β=.13, p<.001). These variables accounted for 9 % of the total variance, with the loss of control explaining the higher percentage (8 %). On the other hand, cyber victimization was predicted by loss of control (β=.19, p<.001) and negativity in social relationships (β=.12, p<.001). These variables altogether accounted for 8 % of the variance in cyber victimization, with the best predictor loss of control (7 % of the total variance). The results of this study demonstrated that, as expected, loss of control and negativity in social relationships predicted cyber bullying and victimization positively. However, excessive desire to stay online did not emerge a significant predictor of both cyberbullying and victimization. Consequently, this study would enhance our understanding of the predictors of cyber bullying and victimization since the results proposed that internet addiction is related with cyber bullying and victimization.

Keywords: cyber bullying, internet addiction, adolescents, regression

Procedia PDF Downloads 294
4024 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 531
4023 Disaggregation the Daily Rainfall Dataset into Sub-Daily Resolution in the Temperate Oceanic Climate Region

Authors: Mohammad Bakhshi, Firas Al Janabi

Abstract:

High resolution rain data are very important to fulfill the input of hydrological models. Among models of high-resolution rainfall data generation, the temporal disaggregation was chosen for this study. The paper attempts to generate three different rainfall resolutions (4-hourly, hourly and 10-minutes) from daily for around 20-year record period. The process was done by DiMoN tool which is based on random cascade model and method of fragment. Differences between observed and simulated rain dataset are evaluated with variety of statistical and empirical methods: Kolmogorov-Smirnov test (K-S), usual statistics, and Exceedance probability. The tool worked well at preserving the daily rainfall values in wet days, however, the generated data are cumulated in a shorter time period and made stronger storms. It is demonstrated that the difference between generated and observed cumulative distribution function curve of 4-hourly datasets is passed the K-S test criteria while in hourly and 10-minutes datasets the P-value should be employed to prove that their differences were reasonable. The results are encouraging considering the overestimation of generated high-resolution rainfall data.

Keywords: DiMoN Tool, disaggregation, exceedance probability, Kolmogorov-Smirnov test, rainfall

Procedia PDF Downloads 186
4022 Efficacy Of Tranexamic Acid On Blood Loss After Primary Total Hip Replacement : A Case-control Study In 154 Patients

Authors: Fedili Benamar, Belloulou Mohamed Lamine, Ouahes Hassane, Ghattas Samir

Abstract:

Introduction: Perioperative blood loss is a frequent cause of complications in total hip replacement (THR). The present prospective study assessed the efficacy of tranexamic acid (Exacyl(®)) in reducing blood loss in primary THR. Hypothesis: Tranexamic acid reduces blood loss in THR. Material and method: -This is a prospective randomized study on the effectiveness of Exacyl (tranexamic acid) in total hip replacement surgery performed on a standardized technique between 2019 and September 2022. -It involved 154 patients, of which 84 received a single injection of Exacyl (group 1) at a dosage of 10 mg/kg over 20 minutes during the perioperative period. -All patients received postoperative thromboprophylaxis with enoxaparin 0.4 ml subcutaneously. -All patients were admitted to the post-interventional intensive care unit for a duration of 24 hours for monitoring and pain management as per the service protocol. Results: 154 patients, of which 84 received a single injection of Exacyl (group 1) and 70 patients patients who did not receive Exacyl perioperatively : (Group 2 ) The average age is 57 +/- 15 years The distribution by gender was nearly equal with 56% male and 44% female; "The distribution according to the ASA score was as follows: 20.2% ASA1, 82.3% ASA2, and 17.5% ASA3. "There was a significant difference in the average volume of intraoperative and postoperative bleeding during the 48 hours." The average bleeding volume for group 1 (received Exacyl) was 614 ml +/- 228, while the average bleeding volume for group 2 was 729 +/- 300, with a chi-square test of 6.35 and a p-value < 0.01, which is highly significant. The ANOVA test showed an F-statistic of 7.11 and a p-value of 0.008. A Bartlett test revealed a chi-square of 6.35 and a p-value < 0.01." "In Group 1 (patients who received Exacyl), 73% had bleeding less than 750 ml (Group A), and 26% had bleeding exceeding 750 ml (Group B). In Group 2 (patients who did not receive Exacyl perioperatively), 52% had bleeding less than 750 ml (Group A), and 47% had bleeding exceeding 750 ml (Group B). "Thus, the use of Exacyl reduced perioperative bleeding and specifically decreased the risk of severe bleeding exceeding 750 ml by 43% with a relative risk (RR) of 1.37 and a p-value < 0.01. The transfusion rate was 1.19% in the population of Group 1 (Exacyl), whereas it was 10% in the population of Group 2 (no Exacyl). It can be stated that the use of Exacyl resulted in a reduction in perioperative blood transfusion with an RR of 0.1 and a p-value of 0.02. Conclusions: The use of Exacyl significantly reduced perioperative bleeding in this type of surgery.

Keywords: acid tranexamic, blood loss, anesthesia, total hip replacement, surgery

Procedia PDF Downloads 57
4021 An Insite to the Probabilistic Assessment of Reserves in Conventional Reservoirs

Authors: Sai Sudarshan, Harsh Vyas, Riddhiman Sherlekar

Abstract:

The oil and gas industry has been unwilling to adopt stochastic definition of reserves. Nevertheless, Monte Carlo simulation methods have gained acceptance by engineers, geoscientists and other professionals who want to evaluate prospects or otherwise analyze problems that involve uncertainty. One of the common applications of Monte Carlo simulation is the estimation of recoverable hydrocarbon from a reservoir.Monte Carlo Simulation makes use of random samples of parameters or inputs to explore the behavior of a complex system or process. It finds application whenever one needs to make an estimate, forecast or decision where there is significant uncertainty. First, the project focuses on performing Monte-Carlo Simulation on a given data set using U. S Department of Energy’s MonteCarlo Software, which is a freeware e&p tool. Further, an algorithm for simulation has been developed for MATLAB and program performs simulation by prompting user for input distributions and parameters associated with each distribution (i.e. mean, st.dev, min., max., most likely, etc.). It also prompts user for desired probability for which reserves are to be calculated. The algorithm so developed and tested in MATLAB further finds implementation in Python where existing libraries on statistics and graph plotting have been imported to generate better outcome. With PyQt designer, codes for a simple graphical user interface have also been written. The graph so plotted is then validated with already available results from U.S DOE MonteCarlo Software.

Keywords: simulation, probability, confidence interval, sensitivity analysis

Procedia PDF Downloads 357
4020 Temperature Dependent Tribological Properties of Graphite

Authors: Pankaj Kumar Das, Niranjan Kumar, Prasun Chakraborti

Abstract:

Temperature dependent tribologiocal properties of nuclear grade turbostatic graphite were studied using 100Cr6 steel counterbody. High value of friction coefficient (0.25) and high wear loss was observed at room temperature and this value decreased to 0.1 at 150oC. Consequently, wear loss is also decreased. Such behavior is explained by oxidation/vaporization of graphite and water molecules. At room temperature, the adsorbed water in graphite does not decompose and effect of passivation mechanism does not work. However, at 150oC, the water decomposed into OH, atomic hydrogen and oxygen which efficiently passivates the carbon dangling bonds. This effect is known to decrease the energy of the contact and protect against abrasive wear.

Keywords: high temperature tribology, oxidation, turbostratic graphite, wear

Procedia PDF Downloads 486
4019 Assortative Education and Working Arrangement among Married Couples in Indonesia

Authors: Ratu Khabiba, Qisha Quarina

Abstract:

This study aims to analyse the effect of married couples’ assortative educational attainments on the division of economic activities among themselves in the household. This study contributes to the literature on women’s participation in employment, especially among married women, to see whether the traditional values about gender roles in the household still continue to shape the employment participation among married women in Indonesia, despite increasing women’s human capital through education. This study utilizes the Indonesian National Socioeconomic Survey (SUSENAS) 2016 and estimates the results using the multinomial logit model. Our results show that compared to high-educated educational homogamy couples, educational heterogamy couples, especially hypergamy, have a higher probability of being a single-worker type. Moreover, the high-educated educational homogamy couples have the highest probability of being a dual-worker type. Thus, we found evidence that the traditional values of gender role segregation seem to still play a significant role in married women’s employment decision in Indonesia, particularly for couples’ with educational heterogamy and low-educated educational homogamy couples.

Keywords: assortative education, dual-worker, hypergamy, homogamy, traditional values, women labor participation

Procedia PDF Downloads 100
4018 Slope Instability Study Using Kinematic Analysis and Lineament Density Mapping along a Part of National Highway 58, Uttarakhand, India

Authors: Kush Kumar, Varun Joshi

Abstract:

Slope instability is a major problem of the mountainous region, especially in parts of the Indian Himalayan Region (IHR). The on-going tectonic, rugged topography, steep slope, heavy precipitation, toe erosion, structural discontinuities, and deformation are the main triggering factors of landslides in this region. Besides the loss of life, property, and infrastructure caused by a landslide, it also results in various environmental problems, i.e., degradation of slopes, land use, river quality by increased sediments, and loss of well-established vegetation. The Indian state of Uttarakhand, being a part of the active Himalayas, also faces numerous cases of slope instability. Therefore, the vulnerable landslide zones need to be delineated to safeguard various losses. The study area is focused in Garhwal and Tehri -Garhwal district of Uttarakhand state along National Highway 58, which is a strategic road and also connects the four important sacred pilgrims (Char Dham) of India. The lithology of these areas mainly comprises of sandstone, quartzite of Chakrata formation, and phyllites of Chandpur formation. The greywacke and sandstone rock of Saknidhar formation dips northerly and is overlain by phyllite of Chandpur formation. The present research incorporates the lineament density mapping using remote sensing satellite data supplemented by a detailed field study via kinematic analysis. The DEM data of ALOS PALSAR (12.5 m resolution) is resampled to 10 m resolution and used for preparing various thematic maps such as slope, aspect, drainage, hill shade, lineament, and lineament density using ARCGIS 10.6 software. Furthermore, detailed field mapping, including structural mapping, geomorphological mapping, is integrated for kinematic analysis of the slope using Dips 6.0 software of Rockscience. The kinematic analysis of 40 locations was carried out, among which 15 show the planar type of failure, five-show wedge failure, and rest, 20 show no failures. The lineament density map is overlapped with the location of the unstable slope inferred from kinematic analysis to infer the association of the field information and remote sensing derived information, and significant compatibility was observed. With the help of the present study, location-specific mitigation measures could be suggested. The mitigation measures would be helping in minimizing the probability of slope instability, especially during the rainy season, and reducing the hampering of road traffic.

Keywords: Indian Himalayan Region, kinematic analysis, lineament density mapping, slope instability

Procedia PDF Downloads 111