Search results for: existence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1472

Search results for: existence

872 A Robust Model Predictive Control for a Photovoltaic Pumping System Subject to Actuator Saturation Nonlinearity and Parameter Uncertainties: A Linear Matrix Inequality Approach

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In this paper, a robust model predictive controller (RMPC) for uncertain nonlinear system under actuator saturation is designed to control a DC-DC buck converter in PV pumping application, where this system is subject to actuator saturation and parameter uncertainties. The considered nonlinear system contains a linear constant part perturbed by an additive state-dependent nonlinear term. Based on the saturating actuator property, an appropriate linear feedback control law is constructed and used to minimize an infinite horizon cost function within the framework of linear matrix inequalities. The proposed approach has successfully provided a solution to the optimization problem that can stabilize the nonlinear plants. Furthermore, sufficient conditions for the existence of the proposed controller guarantee the robust stability of the system in the presence of polytypic uncertainties. In addition, the simulation results have demonstrated the efficiency of the proposed control scheme.

Keywords: PV pumping system, DC-DC buck converter, robust model predictive controller, nonlinear system, actuator saturation, linear matrix inequality

Procedia PDF Downloads 179
871 Lycopene and β-Carotene Variation among Genetically Diverse Momordica cochinchinensis

Authors: Dilani Wimalasiri, Robert Brkljaca, Sylvia Urban, Terrence Piva, Tien Huynh

Abstract:

Momordica cochinchinensis (Cucurbitaceae) is used as food and traditional medicine in South East Asia and is commonly known as Red Gac. The fruit aril consists 70 times higher lycopene and 10 times higher β-carotene than all known fruits and vegetables. Despite its nutritional value there is little information available on its genetic variation and its influence on nutritional value. In this study; genetic and nutritional variation (lycopene and β-carotene) was investigated among 47 M. cochinchinensis samples collected from Australia, Thailand and Vietnam using molecular markers (RAPD and ISSR) and HPLC, respectively. UPGMA based cluster analysis of genetic data grouped Northern and Central Vietnam samples together but were separated from Australia, Thailand and Southern Vietnam samples. The concentration of lycopene was significantly higher among the samples collected from Central Vietnam (p<0.05) and the concentration of β-carotene was significantly higher among the samples collected from Northern Vietnam (p<0.05) indicating the existence of best varieties. This study provides vital information in genetic diversity and facilitates the selection and breeding for nutritious M. cochinchinensis varieties.

Keywords: momordica cochinchinensis, lycopene, beta carotene, genetic diversity

Procedia PDF Downloads 499
870 Sexual Violence against Men in Conflicts: A Neglected Serious Issue

Authors: Olalekan Olaluwoye, Joanne Williams, Elizabeth Hoban, Sonia Brockington

Abstract:

Cases of sexual violence against men have been reported in at least twenty-five conflict situations in history. However, there is a paucity of academic literature and minimal media, policy and legal discussions on sexual violence against men. Most studies and discussions remain locked in the ‘male perpetrators, female victims’ paradigm. Male victims continue to suffer the consequences of sexual violence in conflict and post-conflict settings in silence. A rigorous narrative systematic review of the literature revealed few studies on the subject and those that exist have a narrow focus on rape as the only form of sexual violence despite the existence of other forms of sexual violence that have equally devastating effects. This paper argues that while research and discussions on sexual violence against women should continue, it is time to conduct rigorous mixed methods research to understand the experiences of men and boys survivors of sexual violence. There is a need to study sexual violence more broadly, without limiting it to rape, and to understand the determinants and health implications of sexual violence perpetrated on men. The paper concludes by proposing a research approach that gives voice to the experiences of male survivors of sexual violence in conflict and post-conflict settings.

Keywords: conflict, male survivors, post-conflict settings, sexual violence

Procedia PDF Downloads 149
869 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 146
868 True Religious Piety and Its Social Implications an Analysis of Calvin’s Thought

Authors: Philip Tachin

Abstract:

Despite the positive contributions that religion has impacted human society, religious discrimination and violence also have been growing globally with extreme negative effects on human life and social relationships. Believers in religious extremism are motivated by a sense of exhibiting true religious piety in which case they do not only withhold their practical benevolence from those who do not belong to their faith but they even seek the elimination of other adherents from human existence. This phenomenon has a very high magnitude in Nigeria over the years, which deserves more research for the purpose of finding sustainable solutions to the problem. Calvin believed that true religious piety must, among other things, be categorized in personal and corporate positive social actions that esteem human needs irrespective of ethnic, ideological and belief differences. It is therefore appropriate to pose the following questions: Should true religious piety be seen in terms of how the actions of adherents positively impact human society? Could Calvin’s idea on this issue be very significant and helpful in the context of the Nigerian situation? In answering these questions, this research will limit its investigation to Calvin’s Institutes and some of his Commentaries. The goal of this research is to offer an instructive orientation to the readers that will help in building a more tolerable, peaceful, and a free and virtuous society.

Keywords: Calvin, human good, religious piety, virtuous society

Procedia PDF Downloads 275
867 Application of Reception Theory to Analyze the Translation as a Continuous Reception

Authors: Mina Darabi Amin

Abstract:

In 1972, Hans Robert Jauss introduced the Reception Theory a version of Reader-response criticism, that suggests the literary critics to re-examine the relationship between the author, the work and the reader. The revealing of these relationships has shown that, besides the creation, the reception and the reading of the text have different levels which exempt it from a continuous reference to the meaning intended by the artist and could lead to multiplicity of possible interpretations according to the ‘Horizon of Expectations’. This theory could be associated with another intellectual process called ‘translation’, a process that is always confronted by different levels of readers in the target language and different levels of reception by these readers. By adopting the perspective of Reception theory in translation, we could ignore a particular kind of translation and consider the initiation to a literary text, its translation and its reception as a continuous process. Just like the creation of the text, the translation and its reception, are not made once and for all; they are confronted with different levels of reception and interpretation which are made and remade endlessly. After having known and crossing the first levels, the Horizons of Expectation could be extended and the reader could be initiated to the higher levels. On the other hand, we could say that the faithful and free translation are not opposed to each other, but depending on the type of reception by the readers and in a particular moment, the existence of both is necessary. In fact, it is the level of reception in readers and their Horizon of Expectations that determine the degree of fidelity and freedom of translation.

Keywords: reception theory, reading, literary translation, horizons of expectation, reader

Procedia PDF Downloads 178
866 A Futuristic Look at American Indian Nationhood: Zits in Sherman Alexie’s Flight

Authors: Shaimaa Alobaidi

Abstract:

The presentation examines how urbanization opens possibilities for American Indian characters like Zits in Alexie’s Flightto explore new definitionsoftheirtribal self-identification. Zits travels in time and views the world from different bodies, ages, and races; his journeys end with different perspectives on the idea of nationhood as an American Indian. He is an example of Vine Deloria’s statementthat “urban Indians have become the cutting edge of the new Indian nationalism” (248). Flight is chosen because the momentZits leaves the real world for time-traveling adventures is very critical; it is a moment of rage that ends in the mass murder of many Anglo-Americans. The paper focus on the turning point when he returns into his body with new opportunities towards his existence among the majority of anglo-Americans who cannot help but see him American Indian minority in need of help and assistance. Characters, such as Zits, attempt to outlive alienation, and Alexie gives new definitionsof their ethnic nationhood. Futuristicdoes not mean the very far unpredictable future; it is rather a nearpotential future for teenagers of American Indians, like Zits, Arnold, andCoyoteSprings- the band in ReservationBlues; all revolutionary personalitiesin Alexie’s works. They will be analyzed as Gerald Vizenor’s “postindianwarriors” who have the ability to identify Indigenous nationalism in a post-colonial context.

Keywords: alienation, self-identification, nationhood, urbanization, postindian

Procedia PDF Downloads 161
865 On the Cyclic Property of Groups of Prime Order

Authors: Ying Yi Wu

Abstract:

The study of finite groups is a central topic in algebraic structures, and one of the most fundamental questions in this field is the classification of finite groups up to isomorphism. In this paper, we investigate the cyclic property of groups of prime order, which is a crucial result in the classification of finite abelian groups. We prove the following statement: If p is a prime, then every group G of order p is cyclic. Our proof utilizes the properties of group actions and the class equation, which provide a powerful tool for studying the structure of finite groups. In particular, we first show that any non-identity element of G generates a cyclic subgroup of G. Then, we establish the existence of an element of order p, which implies that G is generated by a single element. Finally, we demonstrate that any two generators of G are conjugate, which shows that G is a cyclic group. Our result has significant implications in the classification of finite groups, as it implies that any group of prime order is isomorphic to the cyclic group of the same order. Moreover, it provides a useful tool for understanding the structure of more complicated finite groups, as any finite abelian group can be decomposed into a direct product of cyclic groups. Our proof technique can also be extended to other areas of group theory, such as the classification of finite p-groups, where p is a prime. Therefore, our work has implications beyond the specific result we prove and can contribute to further research in algebraic structures.

Keywords: group theory, finite groups, cyclic groups, prime order, classification.

Procedia PDF Downloads 81
864 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India

Authors: Sri Mahan Borah

Abstract:

The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.

Keywords: migration, displacement, North-East, India

Procedia PDF Downloads 400
863 A Chronological and Comparative Examination of Traditional American Post-Secondary Institutions of Higher Learning Delivery of Instruction for College Students with Autism Spectrum Disorders

Authors: Shannon Melideo

Abstract:

Post-secondary schools that provide specialized instruction for college students with special needs have been in existence for some time in the United States of America. Whether students experience learning disabilities, visual impairments, physical limitations, Autism Spectrum Disorders or any other issue that impacts their learning are able to attend universities that intentionally cater to their needs. While this selection of post-secondary education may be preferred by some students, other have sought a different experience. Over the last ten years, the number of students with Autism Spectrum Disorders (ASD) attending traditional universities in the United States of America has increased significantly. Students with ASD tend to select smaller, private institutions that appear to offer more personal attention and services. This paper will examine how traditional American universities are preparing for this relatively new group of students in their college classrooms. This paper will provide a brief historical timeline of access to university instruction for students with Autism Spectrum Disorders, and how and if students with ASD are received in colleges around the globe, and best research supported practices for success.

Keywords: autism spectrum disorders, access to learning, university instruction, accommodations

Procedia PDF Downloads 173
862 Optimization of Machine Learning Regression Results: An Application on Health Expenditures

Authors: Songul Cinaroglu

Abstract:

Machine learning regression methods are recommended as an alternative to classical regression methods in the existence of variables which are difficult to model. Data for health expenditure is typically non-normal and have a heavily skewed distribution. This study aims to compare machine learning regression methods by hyperparameter tuning to predict health expenditure per capita. A multiple regression model was conducted and performance results of Lasso Regression, Random Forest Regression and Support Vector Machine Regression recorded when different hyperparameters are assigned. Lambda (λ) value for Lasso Regression, number of trees for Random Forest Regression, epsilon (ε) value for Support Vector Regression was determined as hyperparameters. Study results performed by using 'k' fold cross validation changed from 5 to 50, indicate the difference between machine learning regression results in terms of R², RMSE and MAE values that are statistically significant (p < 0.001). Study results reveal that Random Forest Regression (R² ˃ 0.7500, RMSE ≤ 0.6000 ve MAE ≤ 0.4000) outperforms other machine learning regression methods. It is highly advisable to use machine learning regression methods for modelling health expenditures.

Keywords: machine learning, lasso regression, random forest regression, support vector regression, hyperparameter tuning, health expenditure

Procedia PDF Downloads 221
861 Artificial Intelligence Methods for Returns Expectations in Financial Markets

Authors: Yosra Mefteh Rekik, Younes Boujelbene

Abstract:

We introduce in this paper a new conceptual model representing the stock market dynamics. This model is essentially based on cognitive behavior of the intelligence investors. In order to validate our model, we build an artificial stock market simulation based on agent-oriented methodologies. The proposed simulator is composed of market supervisor agent essentially responsible for executing transactions via an order book and various kinds of investor agents depending to their profile. The purpose of this simulation is to understand the influence of psychological character of an investor and its neighborhood on its decision-making and their impact on the market in terms of price fluctuations. Therefore, the difficulty of the prediction is due to several features: the complexity, the non-linearity and the dynamism of the financial market system, as well as the investor psychology. The Artificial Neural Networks learning mechanism take on the role of traders, who from their futures return expectations and place orders based on their expectations. The results of intensive analysis indicate that the existence of agents having heterogeneous beliefs and preferences has provided a better understanding of price dynamics in the financial market.

Keywords: artificial intelligence methods, artificial stock market, behavioral modeling, multi-agent based simulation

Procedia PDF Downloads 441
860 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 381
859 The Battle Against Corruption in Indonesia’s Municipalities

Authors: Edy Wahyu Susilo

Abstract:

This research discusses a comparative analysis of various anti-corruption responses of three Indonesian City Governments (Jakarta, Surabaya, and Medan) and completes previous findings on the effectiveness of the city anti-corruption program. Some factors (transparency, accountability, leadership, law enforcement, and bureaucratic reform) have been chosen in this study to diagnose the main role in the success and the failure of anti-corruption programs in these cities. These factors diagnose the relationship between factors and their dominancy, which is then utilized to create the city’s strategic anti-corruption programs. Although this study found leadership had a dominant influence both in encouraging and discouraging the performance of city transformation drastically, however, it is not the only factor that determined the performance of the city in the fight against corruption. It needs other factors as an ideal balancing element to achieve an anti-corruption program, namely KPK’s intervention and public engagement. Based on the dominance factors found, this research then develops an appropriate strategy using a policy evaluation approach to create a real practical guide regardless of the existence of good or bad leadership in the city. This research is expected to be a useful reference for stakeholders, especially the government, as a blueprint to prevent corruption by considering several important steps and guidance in efforts to eradicate corruption in the city, especially in Indonesia.

Keywords: intervention, KPK (corruption eradication commission), law enforcements, leadership, policy evaluation

Procedia PDF Downloads 96
858 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War

Authors: Cangul Altundas Akcay

Abstract:

With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.

Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war

Procedia PDF Downloads 304
857 Performances Analysis and Optimization of an Adsorption Solar Cooling System

Authors: Nadia Allouache

Abstract:

The use of solar energy in cooling systems is an interesting alternative to the increasing demand of energy in the world and more specifically in southern countries where the needs of refrigeration and air conditioning are tremendous. This technique is even more attractive with regards to environmental issues. This study focuses on performances analysis and optimization of solar reactor of an adsorption cooling machine working with activated carbon-methanol pair. The modeling of the adsorption cooling machine requires the resolution of the equation describing the energy and mass transfer in the tubular adsorber that is the most important component of the machine. The results show the poor heat conduction inside the porous medium and the resistance between the metallic wall and the bed engender the important temperature gradient and a great difference between the metallic wall and the bed temperature; this is considered as the essential causes decreasing the performances of the machine. For fixed conditions of functioning, the total desorbed mass presents a maximum for an optimal value of the height of the adsorber; this implies the existence of an optimal dimensioning of the adsorber.

Keywords: solar cooling system, performances Analysis, optimization, heat and mass transfer, activated carbon-methanol pair, numerical modeling

Procedia PDF Downloads 436
856 Diethylsulfoxide versus Dimethylsulfoxide: Properties and Biomedical Applications

Authors: Shiraz A. Markarian

Abstract:

Our systematic studies of diethylsulfoxide (DESO), the nearest homologue of dimethylsulfoxide (DMSO), reveal new physicochemical features. DESO has already received worthy biomedical applications: in some cases even are more pronounced compare with DMSO. The several important physicochemical characteristics of DESO including aqueous solutions have been verified and first reported: melting point of pure substance, density, dielectric relaxation data, vapor pressure and volumetric properties. Analysis of the complete vibrational spectra also leads to the conclusion that very strong interactions take place between DESO and water, even stronger than those between DMSO and water. The simultaneous existence of strong DESO-H₂O and DESO-DESO interactions suggest the coexistence of many types of structural molecular aggregates, the presence of which plays a significant role also in diluted water solutions. Our recent investigations have shown that aqueous solution of DESO could provide amorphous, glassy systems, thus avoiding ice crystallization, in a wide range of concentrations and even at very low cooling rates. The ability of DESO to act as an effective cryoprotectant on E. coli survival was also studied and compared with other commonly used cryoprotective agents. The results also confirm that DESO, more than DMSO, is able to penetrate living tissues without causing significant damage.

Keywords: diethylsulfoxide, dimethylsulfoxide, cryoprotectant, properties

Procedia PDF Downloads 163
855 Evaluation of Settlement of Coastal Embankments Using Finite Elements Method

Authors: Sina Fadaie, Seyed Abolhassan Naeini

Abstract:

Coastal embankments play an important role in coastal structures by reducing the effect of the wave forces and controlling the movement of sediments. Many coastal areas are underlain by weak and compressible soils. Estimation of during construction settlement of coastal embankments is highly important in design and safety control of embankments and appurtenant structures. Accordingly, selecting and establishing of an appropriate model with a reasonable level of complication is one of the challenges for engineers. Although there are advanced models in the literature regarding design of embankments, there is not enough information on the prediction of their associated settlement, particularly in coastal areas having considerable soft soils. Marine engineering study in Iran is important due to the existence of two important coastal areas located in the northern and southern parts of the country. In the present study, the validity of Terzaghi’s consolidation theory has been investigated. In addition, the settlement of these coastal embankments during construction is predicted by using special methods in PLAXIS software by the help of appropriate boundary conditions and soil layers. The results indicate that, for the existing soil condition at the site, some parameters are important to be considered in analysis. Consequently, a model is introduced to estimate the settlement of the embankments in such geotechnical conditions.

Keywords: consolidation, settlement, coastal embankments, numerical methods, finite elements method

Procedia PDF Downloads 153
854 Promoting Teaching and Learning Structures Based on Innovation and Entrepreneurship in Valahia University of Targoviste

Authors: Gabriela Teodorescu, Ioana Daniela Dulama

Abstract:

In an ever-changing society, the education system needs to constantly evolve to meet market demands. During its 30 years of existence, Valahia University of Targoviste (VUT) tried to offer its students a series of teaching-learning schemes that would prepare them for a remarkable career. In VUT, the achievement of performance through innovation can be analyzed by reference to several key indicators (i.e., university climate, university resources, and innovative methods applied to classes), but it is possible to differentiate between activities in the classic format: participate to courses; interactive seminars and tutorials; laboratories, workshops, project-based learning; entrepreneurial activities, through simulated enterprises; mentoring activities. Thus, VUT has implemented over time a series of schemes and projects based on innovation and entrepreneurship, and in this paper, some of them will be briefly presented. All these schemes were implemented by facilitating an effective dialog with students and the opportunity to listen to their views at all levels of the University and in all fields of study, as well as by developing a partnership with students to set out priority areas. VUT demonstrates innovation and entrepreneurial capacity through its new activities for higher education, which will attract more partnerships and projects dedicated to students.

Keywords: Romania, project-based learning, entrepreneurial activities, simulated enterprises

Procedia PDF Downloads 158
853 Foreign Real Estate Investment and the Australian Residential Property Market: A Study on Chinese Investors

Authors: Peng Yew Wong

Abstract:

House prices in the Australian capital cities were at record levels subsequent to Global Financial Crisis (GFC) 2008 and many believed that foreign investors, especially the Chinese investors, were the main reason for the Australian capital cities’ house prices escalation. This research conducted an Australian cross border semi-structured interviews in Shanghai, China to uncover historical evidence and emerging trend supporting the existence of a significant relationship between overseas investors and residential housing markets performance in Australia subsequent to the GFC 2008. Some unique investment strategies of private investors from China which emphasised on non-capitalist factors such as early education were identified, alongside with some insights on the significant China government policies that have incentivised the cross border investments from China. It is believed that this understanding will assist policy makers to effectively manage the overheated Australian residential property market without compromising the steady flow of FREI.

Keywords: Australian housing market, residential property, foreign real estate investment, education, China investor

Procedia PDF Downloads 288
852 Efficiency Improvement of Ternary Nanofluid Within a Solar Photovoltaic Unit Combined with Thermoelectric Considering Environmental Analysis

Authors: Mohsen Sheikholeslami, Zahra Khalili, Ladan Momayez

Abstract:

Impacts of environmental parameters and dust deposition on the efficiency of solar panel have been scrutinized in this article. To gain thermal output, trapezoidal cooling channel has been attached in the bottom of the panel incorporating ternary nanofluid. To produce working fluid, water has been mixed with Fe₃O₄-TiO₂-GO nanoparticles. Also, the arrangement of fins has been considered to grow the cooling rate of the silicon layer. The existence of a thermoelectric layer above the cooling channel leads to higher electrical output. Efficacy of ambient temperature (Ta), speed of wind (V𝓌ᵢₙ𝒹) and inlet temperature (Tᵢₙ) and velocity (Vin) of ternary nanofluid on performance of PVT has been assessed. As Tin increases, electrical efficiency declines about 3.63%. Increase of ambient temperature makes thermal performance enhance about 33.46%. The PVT efficiency decreases about 13.14% and 16.6% with augment of wind speed and dust deposition. CO₂ mitigation has been reduced about 15.49% in presence of dust while it increases about 17.38% with growth of ambient temperature.

Keywords: photovoltaic system, CO₂ mitigation, ternary nanofluid, thermoelectric generator, environmental parameters, trapezoidal cooling channel

Procedia PDF Downloads 83
851 Filler Elastomers Abrasion at Steady State: Optimal Use Conditions

Authors: Djeridi Rachid, Ould Ouali Mohand

Abstract:

The search of a mechanism for the elastomer abrasive wear study is an open issue. The practice difficulties are complex due to the complexity of deformation mechanism, to the complex mechanism of the material tearing and to the marked interactions between the tribological parameters. In this work, we present an experimental technique to study the elastomers abrasive wear. The interaction 'elastomer/indenter' implicate dependant ant temporary of different tribological parameters. Consequently, the phenomenon that governs this interaction is not easy to explain. An optimal elastomers compounding and an adequate utilization conditions of these materials that define its resistance at the abrasion is discussed. The results are confronted to theoretical models: the weight loss variation in function of blade angle or in function of cycle number is in agreement with rupture models and with the mechanism of fissures propagation during the material tearing in abrasive wear of filler elastomers. The weight loss in function of the sliding velocity shows the existence of a critical velocity that corresponds to the maximal wear. The adding of silica or black carbon influences in a different manner on wear abrasive behavior of filler elastomers.

Keywords: abrasion wear, filler elastomer, tribology, hyperelastic

Procedia PDF Downloads 316
850 Identification of Paleogeomorphology at Kedulan Temple, Sleman, Yogyakarta

Authors: Virgina Claudia Latengke, Muhaammad Nur Arifin, Vanny Septia Sundari

Abstract:

Kedulan Temple is located in Dusun Kedulan, Sleman, Yogyakarta, Indonesia at coordinates S 07o 44’ 57’, E 110o 28’ 17’. Kedulan Temple is a trace of the relics of life in the 3 century AD. The Kedulan Temple including exhumed landforms, which the primordial landform is first surface topography, then buried under cover mass and exposed or re-inscribed. Recognized by the existence of ancient soil (paleosoil) and ancient objects. Seen from the type of soil that closes the temple, there are 13 layers of lava type, so it is estimated that the lava that buried the temple came from 13 times the eruption of Mount Merapi. The material that buries the base of this temple is the pyroclastic surge deposits in 3 layers, each of which is limited by a thin layer of paleosol, the sediments are 1445+/-50 yBP, 1175+/-50 yBP, and 1060+/-40 yBP. This temple is buried and dug again at 940+/-100 yBP. Furthermore, the temple affected by earthquake, so the floor and foundation becomes bumpy and most of the temple stone are thrown. The temple is left alone, until exposed to hot clouds at 1285 M (740+/-50yBP). Next, repeatedly buried lava in 4 periods, in 1587 M (360+/-50 yBP, 240+/-50 yBP, 200+/-50 yBP and unknown date). From studying this temple, can be known paleogeomorphology process that occurred in Yogyakarta, especially related to the volcanic activity of Mount Merapi. Until now, the water is still flowing around the temple so there is a fluvial process that began to take a role in the temple.

Keywords: Kedulan temple, paleogeomorphology, buried, mount Merapi, Yogyakarta

Procedia PDF Downloads 169
849 High-Resolution Computed Tomography Imaging Features during Pandemic 'COVID-19'

Authors: Sahar Heidary, Ramin Ghasemi Shayan

Abstract:

By the development of new coronavirus (2019-nCoV) pneumonia, chest high-resolution computed tomography (HRCT) has been one of the main investigative implements. To realize timely and truthful diagnostics, defining the radiological features of the infection is of excessive value. The purpose of this impression was to consider the imaging demonstrations of early-stage coronavirus disease 2019 (COVID-19) and to run an imaging base for a primary finding of supposed cases and stratified interference. The right prophetic rate of HRCT was 85%, sensitivity was 73% for all patients. Total accuracy was 68%. There was no important change in these values for symptomatic and asymptomatic persons. These consequences were besides free of the period of X-ray from the beginning of signs or interaction. Therefore, we suggest that HRCT is a brilliant attachment for early identification of COVID-19 pneumonia in both symptomatic and asymptomatic individuals in adding to the role of predictive gauge for COVID-19 pneumonia. Patients experienced non-contrast HRCT chest checkups and images were restored in a thin 1.25 mm lung window. Images were estimated for the existence of lung scratches & a CT severity notch was allocated separately for each patient based on the number of lung lobes convoluted.

Keywords: COVID-19, radiology, respiratory diseases, HRCT

Procedia PDF Downloads 139
848 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 174
847 Digital Preservation Policies in the Institutional Repositories of Brazilian Federal Universities

Authors: Laerte Pereira da Silva Júnior, Maria Manuel Borges

Abstract:

Institutional Repositories (IR) are complex constructs that depend on political, cultural and technological aspects. Because IRs are a mirror of the organization's intellectual production, their main function is to make that production available worldwide, and also to consider its long term preservation. To this end, there is a need to define clearly the digital preservation policies supported by political decisions. There are several guidelines about the definition of digital preservation policies focusing in different themes from preservation planning to rights and restriction management, sustainability planning, etc., but this work aims to verify the implementation of digital preservation policies on the Institutional Repositories of the Federal Universities of Brazil. The methodology used was to check the information available on the websites of the IRs selected against two fields of the OpenDOAR, policies and OpenDOAR ID, to verify the existence of digital preservation policies. For this purpose a sample of the 21 of the 25 IRs registered at the Directory of Open Access Repositories (DOAR) was used, which is about 1/3 rd of the total of the brazilian universities. The 4 IRs that presented no information by the OpenDOAR team were desconsidered. The main conclusion is that most of the IRs of these universities have no polices clearly stated or no policies at all, and that there is a need to include these concerns at the top level management of IRs. The number of initiatives in digital preservation policies around the world stress the need of awareness of its importance in Brazil and requires measures to raise this awareness.

Keywords: Brazil, digital preservation policies, institutional repositories, openDOAR

Procedia PDF Downloads 531
846 Financial Information and Collective Bargaining: Conflicting or Complementing

Authors: Humayun Murshed, Shibly Abdullah

Abstract:

The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision-making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organizations within which the case studies are conducted.

Keywords: collective bargaining, developing countries, disclosures, financial information

Procedia PDF Downloads 470
845 Analytic Solutions of Solitary Waves in Three-Level Unbalanced Dense Media

Authors: Sofiane Grira, Hichem Eleuch

Abstract:

We explore the analytical soliton-pair solutions for unbalanced coupling between the two coherent lights and the atomic transitions in a dissipative three-level system in lambda configuration. The two allowed atomic transitions are interacting resonantly with two laser fields. For unbalanced coupling, it is possible to derive an explicit solution for non-linear differential equations describing the soliton-pair propagation in this three-level system with the same velocity. We suppose that the spontaneous emission rates from the excited state to both ground states are the same. In this work, we focus on such case where we consider the coupling between the transitions and the optical fields are unbalanced. The existence conditions for the soliton-pair propagations are determined. We will show that there are four possible configurations of the soliton-pair pulses. Two of them can be interpreted as a couple of solitons with same directions of polarization and the other two as soliton-pair with opposite directions of polarization. Due to the fact that solitons have stable shapes while propagating in the considered media, they are insensitive to noise and dispersion. Our results have potential applications in data transfer with the soliton-pair pulses, where a dissipative three-level medium could be a realistic model for the optical communication media.

Keywords: non-linear differential equations, solitons, wave propagations, optical fiber

Procedia PDF Downloads 129
844 Military Use of Artificial Intelligence under International Humanitarian Law: Insights from Canada

Authors: Mahshid TalebianKiakalayeh

Abstract:

As AI technologies can be used by both civilians and soldiers, it is vital to consider the consequences emanating from AI military as well as civilian use. Indeed, many of the same technologies can have a dual-use. This paper will explore the military uses of AI and assess its compliance with international legal norms. AI developments not only have changed the capacity of the military to conduct complex operations but have also increased legal concerns. The existence of a potential legal vacuum in legal principles on the military use of AI indicates the necessity of more study on compliance with International Humanitarian Law (IHL), the branch of international law which governs the conduct of hostilities. While capabilities of new means of military AI continue to advance at incredible rates, this body of law is seeking to limit the methods of warfare protecting civilian persons who are not participating in an armed conflict. Implementing AI in the military realm would result in potential issues, including ethical and legal challenges. For instance, when intelligence can perform any warfare task without any human involvement, a range of humanitarian debates will be raised as to whether this technology might distinguish between military and civilian targets or not. This is mainly because AI in fully military systems would not seem to carry legal and ethical judgment, which can interfere with IHL principles. The paper will take, as a case study, Canada’s compliance with IHL in the area of AI and the related legal issues that are likely to arise as this country continues to develop military uses of AI.

Keywords: artificial intelligence, military use, international humanitarian law, the Canadian perspective

Procedia PDF Downloads 180
843 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 336