Search results for: military operations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2161

Search results for: military operations

1561 A Survey of Dynamic QoS Methods in Sofware Defined Networking

Authors: Vikram Kalekar

Abstract:

Modern Internet Protocol (IP) networks deploy traditional and modern Quality of Service (QoS) management methods to ensure the smooth flow of network packets during regular operations. SDN (Software-defined networking) networks have also made headway into better service delivery by means of novel QoS methodologies. While many of these techniques are experimental, some of them have been tested extensively in controlled environments, and few of them have the potential to be deployed widely in the industry. With this survey, we plan to analyze the approaches to QoS and resource allocation in SDN, and we will try to comment on the possible improvements to QoS management in the context of SDN.

Keywords: QoS, policy, congestion, flow management, latency, delay index terms-SDN, delay

Procedia PDF Downloads 185
1560 On the Zeros of the Degree Polynomial of a Graph

Authors: S. R. Nayaka, Putta Swamy

Abstract:

Graph polynomial is one of the algebraic representations of the Graph. The degree polynomial is one of the simple algebraic representations of graphs. The degree polynomial of a graph G of order n is the polynomial Deg(G, x) with the coefficients deg(G,i) where deg(G,i) denotes the number of vertices of degree i in G. In this article, we investigate the behavior of the roots of some families of Graphs in the complex field. We investigate for the graphs having only integral roots. Further, we characterize the graphs having single roots or having real roots and behavior of the polynomial at the particular value is also obtained.

Keywords: degree polynomial, regular graph, minimum and maximum degree, graph operations

Procedia PDF Downloads 234
1559 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 395
1558 Reducing Sexism Promotes Female Navy with Agreeableness Personality Traits to Increases Bystander Attitudes Towards Sexual Harassment

Authors: Chia-Chun Wu, Pei-Shan Lee

Abstract:

Gender equality is an important issue in the workplace today. This study aimed to explore whether female naval with agreeableness personality traits can increase bystander attitudes towards sexual harassment by reducing sexism. A total of 281 female navalin Taiwan participated in this study and completed the BFI-10 scale and questionnaires on sexism and bystander attitudes towards sexual harassment. Path analysis was performed using AMOS 23 version. The results demonstrated that female naval with an agreeableness personality predicted bystander attitudes towards sexual harassment, and when sexism was reduced, it was more helpful to increase bystander attitudes toward sexual harassment. These results informed the perspectives of female naval. It is suggested that when promoting gender equality in the military in the future, people with agreeableness personality can be selected to attend gender equality courses to improve bystander attitudes towards sexual harassment. This provided the Navy with strategies to reduce the probability of sexual harassment.

Keywords: semism, agreeableness, female, bystander attitude

Procedia PDF Downloads 85
1557 Operations Training Using Immersive Technologies: A Development Experience

Authors: A. Aman, S. M. Tang, F. H. Alharrassy

Abstract:

Omanisation was established to increase job opportunities for national employment in Sultanate of Oman. With half of the population below 25 years of age, the sultanate is striving to diversify the economy fast enough to meet the burgeoning number of jobseekers annually. On the other hand, training personnel to be competent oil and gas operators and technicians is a difficult task in a complex reservoir structures in Oman using highly advanced and sophisticated extracting processes. Coupled towards Omanisation which encourages nationals into the oil and gas sector so as to create sustainable employment for the local population, the challenge to churn out competent manpower became a daunting task. Immersive technologies provided the impetus to create a new digital media sector which provided job opportunities as well as the learning contents to enhance the competency-based training for the oil and gas sector in the Sultanate. This lead to a win-win-win collaboration amongst the government represented by the Information Technology Authority (ITA), private sector specialised company (represented by ASM Technologies), jobseekers and oil and gas organisations. This is also one of the first private-public partnership model in the Information Communication Technology (ICT) sector in Oman. A pilot phase was conducted for 8 months to develop four virtual applications for training in equipment and process engineering; oil rig familiarisation, Health Safety Environment (HSE) application, turbine application and the mechanical vapour compressor (MVC) water recycling plant in order to enhance the competency level of the trainees. The immersive applications were installed in operational settings which enabled new employees to practice and understand various processes and procedures regarding enhanced oil recovery. Existing employees used the application to review the working principles in order to carry out troubleshooting scenarios. Concurrently, these applications were also developed by local Omani resources within the country. This created job opportunities for job-seekers as well the establishment of a digital media sector. The purpose of this paper is to discuss how immersive technologies can enhance operational competencies, create job and establish a digital media sector in the Sultanate of Oman.

Keywords: immersive, virtual reality, operations training, Omanisation

Procedia PDF Downloads 217
1556 Building Information Modeling-Based Information Exchange to Support Facilities Management Systems

Authors: Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell

Abstract:

Today’s facilities are ever more sophisticated and the need for available and reliable information for operation and maintenance activities is vital. The key challenge for facilities managers is to have real-time accurate and complete information to perform their day-to-day activities and to provide their senior management with accurate information for decision-making process. Currently, there are various technology platforms, data repositories, or database systems such as Computer-Aided Facility Management (CAFM) that are used for these purposes in different facilities. In most current practices, the data is extracted from paper construction documents and is re-entered manually in one of these computerized information systems. Construction Operations Building information exchange (COBie), is a non-proprietary data format that contains the asset non-geometric data which was captured and collected during the design and construction phases for owners and facility managers use. Recently software vendors developed add-in applications to generate COBie spreadsheet automatically. However, most of these add-in applications are capable of generating a limited amount of COBie data, in which considerable time is still required to enter the remaining data manually to complete the COBie spreadsheet. Some of the data which cannot be generated by these COBie add-ins is essential for facilities manager’s day-to-day activities such as job sheet which includes preventive maintenance schedules. To facilitate a seamless data transfer between BIM models and facilities management systems, we developed a framework that enables automated data generation using the data extracted directly from BIM models to external web database, and then enabling different stakeholders to access to the external web database to enter the required asset data directly to generate a rich COBie spreadsheet that contains most of the required asset data for efficient facilities management operations. The proposed framework is a part of ongoing research and will be demonstrated and validated on a typical university building. Moreover, the proposed framework supplements the existing body of knowledge in facilities management domain by providing a novel framework that facilitates seamless data transfer between BIM models and facilities management systems.

Keywords: building information modeling, BIM, facilities management systems, interoperability, information management

Procedia PDF Downloads 102
1555 Rainwater Harvesting and Management of Ground Water (Case Study Weather Modification Project in Iran)

Authors: Samaneh Poormohammadi, Farid Golkar, Vahideh Khatibi Sarabi

Abstract:

Climate change and consecutive droughts have increased the importance of using rainwater harvesting methods. One of the methods of rainwater harvesting and, in other words, the management of atmospheric water resources is the use of weather modification technologies. Weather modification (also known as weather control) is the act of intentionally manipulating or altering the weather. The most common form of weather modification is cloud seeding, which increases rain or snow, usually for the purpose of increasing the local water supply. Cloud seeding operations in Iran have been married since 1999 in central Iran with the aim of harvesting rainwater and reducing the effects of drought. In this research, we analyze the results of cloud seeding operations in the Simindashtplain in northern Iran. Rainwater harvesting with the help of cloud seeding technology has been evaluated through its effects on surface water and underground water. For this purpose, two different methods have been used to estimate runoff. The first method is the US Soil Conservation Service (SCS) curve number method. Another method, known as the reasoning method, has also been used. In order to determine the infiltration rate of underground water, the balance reports of the comprehensive water plan of the country have been used. In this regard, the study areas located in the target area of each province have been extracted by drawing maps of the influence coefficients of each area in the GIS software. It should be mentioned that the infiltration coefficients were taken from the balance sheet reports of the country's comprehensive water plan. Then, based on the area of each study area, the weighted average of the infiltration coefficient of the study areas located in the target area of each province is considered as the infiltration coefficient of that province. Results show that the amount of water extracted from the rain with the help of cloud seeding projects in Simindasht is as follows: an increase in runoff 63.9 million cubic meters (with SCS equation) or 51.2 million cubic meters (with logical equation) and an increase in ground water resources: 40.5 million cubic meters.

Keywords: rainwater harvesting, ground water, atmospheric water resources, weather modification, cloud seeding

Procedia PDF Downloads 97
1554 Bioproduction of L(+)-Lactic Acid and Purification by Ion Exchange Mechanism

Authors: Zelal Polat, Şebnem Harsa, Semra Ülkü

Abstract:

Lactic acid exists in nature optically in two forms, L(+), D(-)-lactic acid, and has been used in food, leather, textile, pharmaceutical and cosmetic industries. Moreover, L(+)-lactic acid constitutes the raw material for the production of poly-L-lactic acid which is used in biomedical applications. Microbially produced lactic acid was aimed to be recovered from the fermentation media efficiently and economically. Among the various downstream operations, ion exchange chromatography is highly selective and yields a low cost product recovery within a short period of time. In this project, Lactobacillus casei NRRL B-441 was used for the production of L(+)-lactic acid from whey by fermentation at pH 5.5 and 37°C that took 12 hours. The product concentration was 50 g/l with 100% L(+)-lactic acid content. Next, the suitable resin was selected due to its high sorption capacity with rapid equilibrium behavior. Dowex marathon WBA, weakly basic anion exchanger in OH form reached the equilibrium in 15 minutes. The batch adsorption experiments were done approximately at pH 7.0 and 30°C and sampling was continued for 20 hours. Furthermore, the effect of temperature and pH was investigated and their influence was found to be unimportant. All the adsorption/desorption experiments were applied to both model lactic acid and biomass free fermentation broth. The ion exchange equilibria of lactic acid and L(+)-lactic acid in fermentation broth on Dowex marathon WBA was explained by Langmuir isotherm. The maximum exchange capacity (qm) for model lactic acid was 0.25 g La/g wet resin and for fermentation broth 0.04 g La/g wet resin. The equilibrium loading and exchange efficiency of L(+)-lactic acid in fermentation broth were reduced as a result of competition by other ionic species. The competing ions inhibit the binding of L(+)-lactic acid to the free sites of ion exchanger. Moreover, column operations were applied to recover adsorbed lactic acid from the ion exchanger. 2.0 M HCl was the suitable eluting agent to recover the bound L(+)-lactic acid with a flowrate of 1 ml/min at ambient temperature. About 95% of bound L(+)-lactic acid was recovered from Dowex marathon WBA. The equilibrium was reached within 15 minutes. The aim of this project was to investigate the purification of L(+)-lactic acid with ion exchange method from fermentation broth. The additional goals were to investigate the end product purity, to obtain new data on the adsorption/desorption behaviours of lactic acid and applicability of the system in industrial usage.

Keywords: fermentation, ion exchange, lactic acid, purification, whey

Procedia PDF Downloads 497
1553 Advancing Healthcare Excellence in China: Crafting a Strategic Operational Evaluation Index System for Chinese Hospital Departments amid Payment Reform Initiatives

Authors: Jing Jiang, Yuguang Gao, Yang Yu

Abstract:

Facing increasingly challenging insurance payment pressures, the Chinese healthcare system is undergoing significant transformations, akin to the implementation of DRG payment models by the United States' Medicare. Consequently, there is a pressing need for Chinese hospitals to establish optimizations in departmental operations tailored to the ongoing healthcare payment reforms. This abstract delineates the meticulous construction of a scientifically rigorous and comprehensive index system at the departmental level in China strategically aligned with the evolving landscape of healthcare payment reforms. Methodologically, it integrates key process areas and maturity assessment theories, synthesizing relevant literature and industry standards to construct a robust framework and indicator pool. Employing the Delphi method, consultations with 21 experts were conducted, revealing a collective demonstration of high enthusiasm, authority, and coordination in designing the index system. The resulting model comprises four primary indicators -technical capabilities, cost-effectiveness, operational efficiency, and disciplinary potential- supported by 14 secondary indicators and 23 tertiary indicators with varied coefficient adjustment for department types (platform or surgical). The application of this evaluation system in a Chinese hospital within the northeastern region yielded results aligning seamlessly with the actual operational scenario. In conclusion, the index system comprehensively considers the integrity and effectiveness of structural, process, and outcome indicators and stands as a comprehensive reflection of the collective expertise of the engaged experts, manifesting in a model designed to elevate the operational management of hospital departments. Its strategic alignment with healthcare payment reforms holds practical significance in guiding departmental development positioning, brand cultivation, and talent development.

Keywords: Chinese healthcare system, Delphi method, departmental management, evaluation indicators, hospital operations, weight coefficients

Procedia PDF Downloads 49
1552 A Survey on Types of Noises and De-Noising Techniques

Authors: Amandeep Kaur

Abstract:

Digital Image processing is a fundamental tool to perform various operations on the digital images for pattern recognition, noise removal and feature extraction. In this paper noise removal technique has been described for various types of noises. This paper comprises discussion about various noises available in the image due to different environmental, accidental factors. In this paper, various de-noising approaches have been discussed that utilize different wavelets and filters for de-noising. By analyzing various papers on image de-noising we extract that wavelet based de-noise approaches are much effective as compared to others.

Keywords: de-noising techniques, edges, image, image processing

Procedia PDF Downloads 321
1551 The Public Policy of Energy Subsidies Reform in Egypt

Authors: Doaa Nounou

Abstract:

This research examines the public policy energy subsidies reform efforts in Egypt since 2014. Egypt’s widely used energy subsidies have been controversial since they were first introduced, as they inadequately target the poorest part of the population. Also, their effect on economic development and democratic transition became very challenging in recent years. This research argues that although subsidy reform is a highly politicalized issue in democratizing countries, there are still a number of pragmatic public policies that can be applied to make the subsidy system function more efficiently and at the same time decrease inequality which could facilitate a more orderly and peaceful transition to democracy. Therefore, this research attempts to study the role of the executive branch in reforming the subsidy programmes to support the poor and bring about structural changes to achieve social justice and economic growth. This research also attempts to analyze the role of the military and civil society in reforming the subsidy system. Moreover, it attempts to discuss the role of the state media in social mobilization to rationalize consumption and its contribution to subsidies reform.

Keywords: subsidies, public policy, political economy, democratization, equality

Procedia PDF Downloads 200
1550 Study and Historical Rooting the Causes of the Decline of Islamic Civilization (Case Study: From the 11th Century to the Contemporary Era)

Authors: Sajjad Shalsouz, Hamid karamipour

Abstract:

Islamic civilization after a period of glory in the ninth and tenth centuries AD, known as the Islamic Renaissance, stagnated and declined from the eleventh century, despite the political and military power of Islamic governments, faced a scientific and cultural decline in later, foreign invaders such as the Mongol invasion, the Crusades, and Timur invasions also caused severe political, social, and economic instability, some of which were never remedied. Lack of growth of intellectual sciences in Islamic societies, which is necessary for the growth and development of any civilization, and lack of attention of the ruling class and the masses to this important factor, the tyranny of kings, social and economic turmoil from the thirteenth century onwards, absence of Islamic societies from global developments all intensified and stabilized the decline Islamic civilizations, the consequences of which are still evident. This article tries to deal with the historical factors of this decline and decadence from the 11th century to the contemporary era by examining historical events and issues and achieves a desirable and efficient result in this field.

Keywords: Islamic civilization, decline, historical factors, intellectual sciences

Procedia PDF Downloads 86
1549 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 60
1548 Red Dawn in the Desert: A World-Systems Analysis of the Maritime Silk Road Initiative

Authors: Toufic Sarieddine

Abstract:

The current debate on the hegemonic impact of China’s Belt and Road Initiative (BRI) is of two opposing strands: Resilient and absolute US hegemony on the one hand and various models of multipolar hegemony such as bifurcation on the other. Bifurcation theories illustrate an unprecedented division of hegemonic functions between China and the US, whereby Beijing becomes the world’s economic hegemon, leaving Washington the world’s military hegemon and security guarantor. While consensus points to China being the main driver of unipolarity’s rupturing, the debate among bifurcationists is on the location of the first rupture. In this regard, the Middle East and North Africa (MENA) region has seen increasing Chinese foreign direct investment in recent years while that to other regions has declined, ranking it second in 2018 as part of the financing for the Maritime Silk Road Initiative (MSRI). China has also become the top trade partner of 11 states in the MENA region, as well as its top source of machine imports, surpassing the US and achieving an overall trade surplus almost double that of Washington’s. These are among other features outlined in world-systems analysis (WSA) literature which correspond with the emergence of a new hegemon. WSA is further utilized to gauge other facets of China’s increasing involvement in MENA and assess whether bifurcation is unfolding therein. These features of hegemony include the adoption of China’s modi operandi, economic dominance in production, trade, and finance, military capacity, cultural hegemony in ideology, education, and language, and the promotion of a general interest around which to rally potential peripheries (MENA states in this case). China’s modi operandi has seen some adoption with regards to support against the United Nations Convention on the Law of the Sea, oil bonds denominated in the yuan, and financial institutions such as the Shanghai Gold Exchange enjoying increasing Arab patronage. However, recent elections in Qatar, as well as liberal reforms in Saudi Arabia, demonstrate Washington’s stronger normative influence. Meanwhile, Washington’s economic dominance is challenged by China’s sizable machine exports, increasing overall imports, and widening trade surplus, but retains some clout via dominant arms and transport exports, as well as free-trade deals across the region. Militarily, Washington bests Beijing’s arms exports, has a dominant and well-established presence in the region, and successfully blocked Beijing’s attempt to penetrate through the UAE. Culturally, Beijing enjoys higher favorability in Arab public opinion, and its broadcast networks have found some resonance with Arab audiences. In education, the West remains MENA students’ preferred destination. Further, while Mandarin has become increasingly available in schools across MENA, its usage and availability still lag far behind English. Finally, Beijing’s general interest in infrastructure provision and prioritizing economic development over social justice and democracy provides an avenue for increased incorporation between Beijing and the MENA region. The overall analysis shows solid progress towards bifurcation in MENA.

Keywords: belt and road initiative, hegemony, Middle East and North Africa, world-systems analysis

Procedia PDF Downloads 94
1547 A 'German Europe' Emerged from the Euro Crisis: A Study through the Portuguese Quality Press

Authors: Ana Luísa Mouro

Abstract:

When the financial crisis exploded in 2008 in the United States, unleashed by the collapse of Lehman Brothers, and contaminated the economies of the European periphery, Germany appeared as the anchor of the stability of all European institutions and countries in difficulty. The solutions provided by the German government have triggered a deep political debate about the key position Germany has conquered at the heart of Europe - a new “German question” has been created. Some say Germany has achieved by peaceful means what was not able to get through military conquest - the domination of Europe – and many fear Germany’s economic power. This debate about the new role of Germany in Europe has received special attention in the European media and Portugal has not been the exception. The present study has been based on the survey, selection and critical analysis of news reporting, opinion articles, interviews and editorials, published in the weekly Expresso and in the daily Público, between 2008 and 2015 (year of the 25th anniversary of Germany’s unification). The findings of this study will show the paradox of German power and its relevance for Europe’s future.

Keywords: Euro crises, German Europe, intercultural hermeneutics, Portuguese quality press

Procedia PDF Downloads 226
1546 Classification of Echo Signals Based on Deep Learning

Authors: Aisulu Tileukulova, Zhexebay Dauren

Abstract:

Radar plays an important role because it is widely used in civil and military fields. Target detection is one of the most important radar applications. The accuracy of detecting inconspicuous aerial objects in radar facilities is lower against the background of noise. Convolutional neural networks can be used to improve the recognition of this type of aerial object. The purpose of this work is to develop an algorithm for recognizing aerial objects using convolutional neural networks, as well as training a neural network. In this paper, the structure of a convolutional neural network (CNN) consists of different types of layers: 8 convolutional layers and 3 layers of a fully connected perceptron. ReLU is used as an activation function in convolutional layers, while the last layer uses softmax. It is necessary to form a data set for training a neural network in order to detect a target. We built a Confusion Matrix of the CNN model to measure the effectiveness of our model. The results showed that the accuracy when testing the model was 95.7%. Classification of echo signals using CNN shows high accuracy and significantly speeds up the process of predicting the target.

Keywords: radar, neural network, convolutional neural network, echo signals

Procedia PDF Downloads 336
1545 A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables

Authors: M. Hamdi, R. Rhouma, S. Belghith

Abstract:

Generating random numbers are mainly used to create secret keys or random sequences. It can be carried out by various techniques. In this paper we present a very simple and efficient pseudo-random number generator (PRNG) based on chaotic maps and S-Box tables. This technique adopted two main operations one to generate chaotic values using two logistic maps and the second to transform them into binary words using random S-Box tables. The simulation analysis indicates that our PRNG possessing excellent statistical and cryptographic properties.

Keywords: Random Numbers, Chaotic map, S-box, cryptography, statistical tests

Procedia PDF Downloads 353
1544 Experimental and FEA Study for Reduction of Damage in Sheet Metal Forming

Authors: Amitkumar R. Shelar, B. P. Ronge, Sridevi Seshabhattar, R. M. Wabale

Abstract:

This paper gives knowledge about the behavior of cold rolled steel IS 513_2008 CR2_D having grade D for the reduction of ductile damage. CR specifies Cold Rolled and D for Drawing grade. Problems encountered during sheet metal forming operations are dent, wrinkles, thinning, spring back, insufficient stretching etc. In this paper, wrinkle defect was studied experimentally and by using FE software on one of the auto components due to which its functionality was decreased. Experimental result and simulation result were found to be in agreement.

Keywords: deep drawing, FE software-LS DYNA, friction, wrinkling

Procedia PDF Downloads 479
1543 Endocrine Therapy-Induced Alopecia in Patients with Breast Cancer in Tunisia

Authors: Aref Zribi, Sonia Ben Nasr, Sana Fendri, Mahdi Balti, Abderazzek Haddaoui

Abstract:

Background: Despite their benefit, Endocrine therapies (ET) are known to have substantial adverse events (AEs) such as hot flashes, mood disorders and osteoarticular pain. ET induced alopecia(EIA) is less frequently noted by patients and is less reported in the literature. The aim of our study was to report ET alopecia characteristics and their influence on patient and treatment observance. Method: We conducted a retrospective study including luminal BC patients treated in the oncology department of the military hospital of Tunis between January 2015 and December 2020. Patients treated with previous chemotherapy-inducing alopecia were excluded. Results: 145 female patients were included. The median age was 59 years. EIA was reported in 44% of cases. Alopecia was attributed to aromatase inhibitors in 53% and tamoxifen in 21%. Severity was grade 1 in 80% and grade 2 in the remaining cases. ET discontinuation because of alopecia was noted in 6.5 % of patients. Moderate improvement of alopecia was observed with topical minoxidil and Thallium metallicum 9CH homeopathy during ET in 60% of patients. Conclusions: EIA is frequent in BC patients and should be considered to improve treatment observance and patients’ quality of life.

Keywords: endocrine therapy, alopecia, breast cancer, Tunisia

Procedia PDF Downloads 116
1542 Gas Flotation Unit in Kuwait Oil Company Operations

Authors: Homoud Bourisli, Haitham Safar

Abstract:

Oil is one of main resources of energy in the world. As conventional oil is drying out, oil recovery is crucial to maintain the same level of oil production. Since water injection is one of the commonly used methods to increase and maintain pressure in oil wells, oil-water separation processes of the water associated with oil production for water injection oil recovery is very essential. Therefore, Gas Flotation Units are used for oil-water separation to be able to re-inject the treated water back into the wells to increase pressure.

Keywords: Kuwait oil company, dissolved gas flotation unit, induced gas flotation unit, oil-water separation

Procedia PDF Downloads 564
1541 The Routine Use of a Negative Pressure Incision Management System in Vascular Surgery: A Case Series

Authors: Hansraj Bookun, Angela Tan, Rachel Xuan, Linheng Zhao, Kejia Wang, Animesh Singla, David Kim, Christopher Loupos

Abstract:

Introduction: Incisional wound complications in vascular surgery patients represent a significant clinical and econometric burden of morbidity and mortality. The objective of this study was to trial the feasibility of applying the Prevena negative pressure incision management system as a routine dressing in patients who had undergone arterial surgery. Conventionally, Prevena has been applied to groin incisions, but this study features applications on multiple wound sites such as the thigh or major amputation stumps. Method: This was a cross-sectional observational, single-centre case series of 12 patients who had undergone major vascular surgery. Their wounds were managed with the Prevena system being applied either intra-operatively or on the first post-operative day. Demographic and operative details were collated as well as the length of stay and complication rates. Results: There were 9 males (75%) with mean age of 66 years and the comorbid burden was as follows: ischaemic heart disease (92%), diabetes (42%), hypertension (100%), stage 4 or greater kidney impairment (17%) and current or ex-smoking (83%). The main indications were acute ischaemia (33%), claudication (25%), and gangrene (17%). There were single instances of an occluded popliteal artery aneurysm, diabetic foot infection, and rest pain. The majority of patients (50%) had hybrid operations with iliofemoral endarterectomies, patch arterioplasties, and further peripheral endovascular treatment. There were 4 complex arterial bypass operations and 2 major amputations. The mean length of stay was 17 ± 10 days, with a range of 4 to 35 days. A single complication, in the form of a lymphocoele, was encountered in the context of an iliofemoral endarterectomy and patch arterioplasty. This was managed conservatively. There were no deaths. Discussion: The Prevena wound management system shows that in conjunction with safe vascular surgery, absolute wound complication rates remain low and that it remains a valuable adjunct in the treatment of vasculopaths.

Keywords: wound care, negative pressure, vascular surgery, closed incision

Procedia PDF Downloads 118
1540 Exploring Non-Governmental Organizations’ Performance Management: Bahrain Athletics Association as a Case Study

Authors: Nooralhuda Aljlas

Abstract:

In the ever-growing field of non-governmental organizations, the enhancement of performance management and measurement systems has been increasingly acknowledged by political, economic, social, legal, technological and environmental factors. Within Bahrain Athletics Association, such enhancement results from the key factors leading performance management including collaboration, feedback, human resource management, leadership and participative management. The exploratory, qualitative research conducted reviewed performance management theory. As reviewed, the key factors leading performance management were identified. Drawing on a non-governmental organization case study, the key factors leading Bahrain Athletics Association’s performance management were explored. By exploring the key factors leading Bahrain Athletics Association’s performance management, the research study proposed a theoretical framework of the key factors leading performance management in non-governmental organizations in general. The research study recommended further investigation of the role of the two key factors of command and control and leadership, combining military and civilian approaches to enhancing non-governmental organizations’ performance management.

Keywords: Bahrain athletics association, exploratory, key factor, performance management

Procedia PDF Downloads 352
1539 On the Construction of Lightweight Circulant Maximum Distance Separable Matrices

Authors: Qinyi Mei, Li-Ping Wang

Abstract:

MDS matrices are of great significance in the design of block ciphers and hash functions. In the present paper, we investigate the problem of constructing MDS matrices which are both lightweight and low-latency. We propose a new method of constructing lightweight MDS matrices using circulant matrices which can be implemented efficiently in hardware. Furthermore, we provide circulant MDS matrices with as few bit XOR operations as possible for the classical dimensions 4 × 4, 8 × 8 over the space of linear transformations over finite field F42 . In contrast to previous constructions of MDS matrices, our constructions have achieved fewer XORs.

Keywords: linear diffusion layer, circulant matrix, lightweight, maximum distance separable (MDS) matrix

Procedia PDF Downloads 399
1538 Risk Assessment for Aerial Package Delivery

Authors: Haluk Eren, Ümit Çelik

Abstract:

Recent developments in unmanned aerial vehicles (UAVs) have begun to attract intense interest. UAVs started to use for many different applications from military to civilian use. Some online retailer and logistics companies are testing the UAV delivery. UAVs have great potentials to reduce cost and time of deliveries and responding to emergencies in a short time. Despite these great positive sides, just a few works have been done for routing of UAVs for package deliveries. As known, transportation of goods from one place to another may have many hazards on delivery route due to falling hazards that can be exemplified as ground objects or air obstacles. This situation refers to wide-range insurance concept. For this reason, deliveries that are made with drones get into the scope of shipping insurance. On the other hand, air traffic was taken into account in the absence of unmanned aerial vehicle. But now, it has been a reality for aerial fields. In this study, the main goal is to conduct risk analysis of package delivery services using drone, based on delivery routes.

Keywords: aerial package delivery, insurance estimation, territory risk map, unmanned aerial vehicle, route risk estimation, drone risk assessment, drone package delivery

Procedia PDF Downloads 324
1537 A Multi Cordic Architecture on FPGA Platform

Authors: Ahmed Madian, Muaz Aljarhi

Abstract:

Coordinate Rotation Digital Computer (CORDIC) is a unique digital computing unit intended for the computation of mathematical operations and functions. This paper presents a multi-CORDIC processor that integrates different CORDIC architectures on a single FPGA chip and allows the user to select the CORDIC architecture to proceed with based on what he wants to calculate and his/her needs. Synthesis show that radix 2 CORDIC has the lowest clock delay, radix 8 CORDIC has the highest LUT usage and lowest register usage while Hybrid Radix 4 CORDIC had the highest clock delay.

Keywords: multi, CORDIC, FPGA, processor

Procedia PDF Downloads 459
1536 Users’ Preferences for Map Navigation Gestures

Authors: Y. Y. Pang, N. A. Ismail

Abstract:

The map is a powerful and convenient tool in helping us to navigate to different places, but the use of indirect devices often makes its usage cumbersome. This study intends to propose a new map navigation dialogue that uses hand gesture. A set of dialogue was developed from users’ perspective to provide users complete freedom for panning, zooming, rotate, and find direction operations. A participatory design experiment was involved here where one hand gesture and two hand gesture dialogues had been analysed in the forms of hand gestures to develop a set of usable dialogues. The major finding was that users prefer one-hand gesture compared to two-hand gesture in map navigation.

Keywords: hand gesture, map navigation, participatory design, intuitive interaction

Procedia PDF Downloads 267
1535 The Role and Position of Chinese Modern Martial Art in the School Physical Education (1912-1945)

Authors: Hsien-Wei Kuo

Abstract:

The thoughts of the military citizens, pragmatism, naturalism and nationalism related to physical education were developed during the warring period of the Republic of China. Moreover, the development of martial art formed by nationalism and political party was to utilize to save the nation, the people and the world. The martial art was also promoted in the system of school physical education gradually at the same time. The aim of this study is to explore the role, duty and position of the martial art education with the political color and advocacy in the system of school physical education. This study focuses on the practice, course hours, selective materials and competitive rules of physical education in the school system in modern China. Therefore, the methods of the historical research and content analysis were used to collect the historical materials and documents for going into them. The results will give a detailed account of the developed model of institutionalization, unification and regularization of martial art, and its growing, golden and stagnant periods in the school physical education system under the impact of western sport and physical education. It may sum up the meaning relationships among the politics, education practice and sport for all.

Keywords: martial art education, national martial arts institution, sick man of East Asia, the may 4th movement

Procedia PDF Downloads 364
1534 Solution of Logistics Center Selection Problem Using the Axiomatic Design Method

Authors: Fulya Zaralı, Harun Resit Yazgan

Abstract:

Logistics centers represent areas that all national and international logistics and activities related to logistics can be implemented by the various businesses. Logistics centers have a key importance in joining the transport stream and the transport system operations. Therefore, it is important where these centers are positioned to be effective and efficient and to show the expected performance of the centers. In this study, the location selection problem to position the logistics center is discussed. Alternative centers are evaluated according certain criteria. The most appropriate center is identified using the axiomatic design method.

Keywords: axiomatic design, logistic center, facility location, information systems

Procedia PDF Downloads 339
1533 Method to Calculate the Added Value in Supply Chains of Electric Power Meters

Authors: Andrey Vinajera-Zamora, Norge Coello-Machado, Elke Glistau

Abstract:

The objective of this research is calculate the added value in operations of electric power meters (EPM) supply chains, specifically the EPM of 220v. The tool used is composed by six steps allowing at same time the identification of calibration of EPM as the bottleneck operation according the net added value being at same time the process of higher added value. On the other hand, this methodology allows calculate the amount of money to buy the raw material. The main conclusions are related to the analyze ‘s way and calculating of added value in supply chain integrated by the echelons procurement, production and distribution or any of these.

Keywords: economic value added, supply chain management, value chain, bottleneck detection

Procedia PDF Downloads 289
1532 Family Dynamics on Attitude Towards Peace: The Mediating Role of Emotional Regulation Strategies

Authors: Nicole Kaye A. Callanta, Shalimar B. Baruang, Anne Edelienne P. Tadena, Imelu G. Mordeno, Odessa May D. Escalona

Abstract:

Untold numbers of children and adolescents around the world are exposed increasingly to the war on a daily basis. These experiences shape how they will view themselves, others, and the world. A wealth of studies have shown the role of family dynamics in the development of children’s attitudes, particularly their social behaviors. This specific study, however, contends that family dynamics influence peace and conflict resolution attitude and further asserts that it is brought about by the degree of emotional regulation strategies they use. Utilising purposive sampling, adolescent participant-respondents were from different schools in Southern Philipines, specifically of the cities of Marawi and Iligan, where exposure to warring clans, internal struggle between the Philippine Military and insurgencies, and the recent Marawi Seige caused by Al-Qaeda and ISIS-spawned terrorism. Results showed emotional regulation strategies mediate the relationship between family dynamics, particularly on family cohesion, and attitude towards peace. Thus implying the association between family cohesion and attitude towards peace strengthens with the use of emotional regulation strategies.

Keywords: attitude towards peace, emotional regulation strategies, family cohesion, family dynamics

Procedia PDF Downloads 162