Search results for: mutual interference
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1016

Search results for: mutual interference

416 Risk Analysis in Off-Site Construction Manufacturing in Small to Medium-Sized Projects

Authors: Atousa Khodadadyan, Ali Rostami

Abstract:

The objective of off-site construction manufacturing is to utilise the workforce and machinery in a controlled environment without external interference for higher productivity and quality. The usage of prefabricated components can save up to 14% of the total energy consumption in comparison with the equivalent number of cast-in-place ones. Despite the benefits of prefabrication construction, its current project practices encompass technical and managerial issues. Building design, precast components’ production, logistics, and prefabrication installation processes are still mostly discontinued and fragmented. Furthermore, collaboration among prefabrication manufacturers, transportation parties, and on-site assemblers rely on real-time information such as the status of precast components, delivery progress, and the location of components. From the technical point of view, in this industry, geometric variability is still prevalent, which can be caused during the transportation or production of components. These issues indicate that there are still many aspects of prefabricated construction that can be developed using disruptive technologies. Practical real-time risk analysis can be used to address these issues as well as the management of safety, quality, and construction environment issues. On the other hand, the lack of research about risk assessment and the absence of standards and tools hinder risk management modeling in prefabricated construction. It is essential to note that no risk management standard has been established explicitly for prefabricated construction projects, and most software packages do not provide tailor-made functions for this type of projects.

Keywords: project risk management, risk analysis, risk modelling, prefabricated construction projects

Procedia PDF Downloads 169
415 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 389
414 Compact LWIR Borescope Sensor for Surface Temperature of Engine Components

Authors: Andy Zhang, Awnik Roy, Trevor B. Chen, Bibik Oleksandr, Subodh Adhikari, Paul S. Hsu

Abstract:

The durability of a combustor in gas-turbine enginesrequiresa good control of its component temperatures. Since the temperature of combustion gases frequently exceeds the melting point of the combustion liner walls, an efficient air-cooling system is significantly important to elongatethe lifetime of liner walls. To determine the effectiveness of the air-cooling system, accurate 2D surface temperature measurement of combustor liner walls is crucial for advanced engine development. Traditional diagnostic techniques for temperature measurement, such as thermocouples, thermal wall paints, pyrometry, and phosphors, have shown disadvantages, including being intrusive and affecting local flame/flow dynamics, potential flame quenching, and physical damages to instrumentation due to harsh environments inside the combustor and strong optical interference from strong combustion emission in UV-Mid IR wavelength. To overcome these drawbacks, a compact and small borescope long-wave-infrared (LWIR) sensor is developed to achieve two-dimensional high-spatial resolution, high-fidelity thermal imaging of 2D surface temperature in gas-turbine engines, providing the desired engine component temperature distribution. The compactLWIRborescope sensor makes it feasible to promote the durability of combustor in gas-turbine engines.

Keywords: borescope, engine, long-wave-infrared, sensor

Procedia PDF Downloads 126
413 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 343
412 A Fast Community Detection Algorithm

Authors: Chung-Yuan Huang, Yu-Hsiang Fu, Chuen-Tsai Sun

Abstract:

Community detection represents an important data-mining tool for analyzing and understanding real-world complex network structures and functions. We believe that at least four criteria determine the appropriateness of a community detection algorithm: (a) it produces useable normalized mutual information (NMI) and modularity results for social networks, (b) it overcomes resolution limitation problems associated with synthetic networks, (c) it produces good NMI results and performance efficiency for Lancichinetti-Fortunato-Radicchi (LFR) benchmark networks, and (d) it produces good modularity and performance efficiency for large-scale real-world complex networks. To our knowledge, no existing community detection algorithm meets all four criteria. In this paper, we describe a simple hierarchical arc-merging (HAM) algorithm that uses network topologies and rule-based arc-merging strategies to identify community structures that satisfy the criteria. We used five well-studied social network datasets and eight sets of LFR benchmark networks to validate the ground-truth community correctness of HAM, eight large-scale real-world complex networks to measure its performance efficiency, and two synthetic networks to determine its susceptibility to resolution limitation problems. Our results indicate that the proposed HAM algorithm is capable of providing satisfactory performance efficiency and that HAM-identified communities were close to ground-truth communities in social and LFR benchmark networks while overcoming resolution limitation problems.

Keywords: complex network, social network, community detection, network hierarchy

Procedia PDF Downloads 223
411 Development of Stability Indicating Method and Characterization of Degradation Impurity of Nirmaltrelvir in Its Self-Emulsifying Drug Delivery System

Authors: Ravi Patel, Ravisinh Solanki, Dignesh Khunt

Abstract:

A stability-indicating reverse phase high performance liquid chromatography (RP-HPLC) method was developed and validated for estimating Nirmatrelvir in its self-emulsifying drug delivery system (SEDDS). The separation of Nirmatrelvir and its degradation products was accomplished by employing an Agilent Zorbax Eclipse plus C18 (250 mm x 4.6 mm, 5 µm) column, through which the mobile phase 5 mM phosphate buffer (pH 4.0) as mobile phase A and Acetonitrile as mobile phase B in a ratio of (40:60 % v/v) was pumped at a flow rate of 1.0 mL/min, through the HPLC system. Chromatographic separation and elution were monitored by a photo-diode array detector at 210 nm. Stress studies have been employed to evaluate this method's ability to indicate stability. Nirmatrelvir was exposed to several stress conditions, such as acid, alkali, oxidative, photolytic, and thermal degradations. Significant degradation was observed during acid and alkali hydrolysis, and the resulting degradation product was successfully separated from the Nirmatrelvir peak, preventing any interference. Furthermore, the primary degradant produced under alkali degradation conditions was identified using UPLC-ESI-TQ-MS/MS. The method was validated in accordance with the International Council on Harmonization (ICH) and found to be selective, precise, accurate, linear, and robust. The apparent permeability of Nirmatrelvir SEDDS was 4.20 ± 0.21×10-6 cm/sec, and the average proportion of free drug recovered was 0.5%. The method developed in this study was feasible and accurate for routine quality control evaluation of Nirmatrelvir SEDDS.

Keywords: Nirmatrelvir, SEDDS, degradation study, HPLC, LC-MS/MS

Procedia PDF Downloads 10
410 Nigeria's Distressed Economy and Achievement of Child-Friendly School Model

Authors: Onyeke Paul Chuks

Abstract:

Nigeria is ranked among the developing nations and a country with a low income per capita. The consequences of this economic situation have led to the low achievement records below UN benchmark especially in the area of basic education for her citizens. The country is, however, making relentless efforts at arresting the situation by making budgetary allocations to ensure the realization of Millennium Development Goal No. 2 which is achieving universal basic education, her distressed economy notwithstanding. Basic education which comprises primary and lower secondary education as well as pre-primary and/or adult literacy programs have suffered serious setbacks orchestrated by the dwindling of the nation’s economy. This category of education being the bedrock of all other levels of education is regarded as a priority by developing countries and also the focus of the Education for All Movement led by UNESCO. The introduction of child-friendly school model is one of the strategies designed by UNESCO to achieving this all important MDGs goal No. 2. Child-friendly education model is aimed at replacing the out-dated, mundane, regimented and officious school administrative model where the basic rights of school children are trampled upon with impunity and community participation in school activities is viewed as unnecessary interference by school managers. This paper ex-rayed the potential obstacles likely to impinge on the implementation of child-friendly school model in Nigeria especially from the angle of her distressed economy and the colossal effects of the corrupt practices bedeviling the nation. The paper as well outlines prospects for the successful implementation of the child-friendly school model in Nigeria.

Keywords: child-friendly school, distressed economy, model, Nigeria

Procedia PDF Downloads 279
409 Effect of Scrotal Circumference on Freezability of Bangladeshi Crossbred Bulls

Authors: Ajeet K. Jha, Pankaj K. Jha, Pravin Mishra

Abstract:

The study was conducted to evaluate the freezability of crossbred bulls’ semen at early age. Semen of three consecutive collections at 7 days interval from 12 crossbred bulls 17 was evaluated. The age at first collection was 15 to 20 months. Evaluation of semen was done soon after collection. Triladyl, Minitub, Germany was used as extender and was frozen using standard semen freezing protocol. Post-thaw sperm motility was evaluated. Morphology of paraformaldehyde fixed spermatozoa was evaluated under differential interference phase contrast microscopy and the viability of spermatozoa was evaluated by using stain SYBR-14 (1 mM/ml) and propidium iodide (2.41 mM/ml) under an epifluorescent microscopy. Scrotal circumference was correlated with all possible measures in all groups of crossbred bulls. Volume of semen, sperm concentration, total number of spermatozoa, initial sperm motility, post-thaw sperm motility, proportion of normal spermatozoa and proportion of live spermatozoa were compared among individual bull within and between two groups of crossbred bulls. A significant positive correlation was observed between scrotal circumference and volume of semen and between scrotal circumference and the total number of sperm production per ejaculate (r = 0.72, p < 0.04). Significant variation was observed in different semen parameters among individual bulls within the same group (p < 0.05) but no significant variation was found between two groups of crossbred bulls. Out of 12 bulls, semen freezability of 10 bulls was found satisfactory while semen of 2 bulls (Local × Friesian) was unsatisfactory. In conclusion, crossbred bulls aged 18 months having scrotal circumference > 30 cm produce freezable quality semen.

Keywords: Bangladesh, crossbred bull, scrotal circumference, semen freezability

Procedia PDF Downloads 176
408 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang

Abstract:

The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).

Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.

Procedia PDF Downloads 92
407 Self Help Groups among the Ao Nagas : A Case Study of Alongkima of Nagaland, NorthEast India

Authors: Imkongtenla Pongen

Abstract:

Self Help Groups (SGHs) are socio-commercial instruments in addressing urban poverty and strengthening livelihoods. Being a member of Self Help Group helped in mutual exchanges of ideas, develop risk taking behaviour, learns flexibility in planning of a programme, and interpersonal communication within the group. In the present study, an attempt has been made to examine the functions, characteristics and practices of Self Help Groups and its impact on sustainable development among the Ao Nagas of Alongkima, Nagaland, NorthEast India. They are a tribal group and racially belong to the Mongoloid stock and linguistically to the Tibeto-Burman group. They follow endogamous, patriarchal, and patrilineal system. Major characteristics of Self Help groups in this study are found to be team spirit and group cohesiveness. Such groups are found to be geared towards a number of self-sufficiency based business ventures. The problems faced in normal functioning of the groups are unpunctuality and the inability to attend a meeting by all the members .Participation in such groups has increased women’s influence over the economic resources and decision making in the household, improved self-confidence and living standard, capacity building, self- dependent and self-reliant with no educational and entrepreneurial background, generate savings and hone their skills as motivators and leaders. All these has enhanced her status in every sphere of life in par with the opposite gender. In a nutshell, we can say that what she cannot achieve as an individual, she can achieve as a member of a Self Help Group. Hence, we should try to develop mechanisms to guarantee the sustainability of Self Help Groups which depends on the way they can deal with both internal and external conflicts like globalization and competition from new markets.

Keywords: Ao nagas, microfinance, self help group, women empowerment

Procedia PDF Downloads 336
406 GA3C for Anomalous Radiation Source Detection

Authors: Chia-Yi Liu, Bo-Bin Xiao, Wen-Bin Lin, Hsiang-Ning Wu, Liang-Hsun Huang

Abstract:

In order to reduce the risk of radiation damage that personnel may suffer during operations in the radiation environment, the use of automated guided vehicles to assist or replace on-site personnel in the radiation environment has become a key technology and has become an important trend. In this paper, we demonstrate our proof of concept for autonomous self-learning radiation source searcher in an unknown environment without a map. The research uses GPU version of Asynchronous Advantage Actor-Critic network (GA3C) of deep reinforcement learning to search for radiation sources. The searcher network, based on GA3C architecture, has self-directed learned and improved how search the anomalous radiation source by training 1 million episodes under three simulation environments. In each episode of training, the radiation source position, the radiation source intensity, starting position, are all set randomly in one simulation environment. The input for searcher network is the fused data from a 2D laser scanner and a RGB-D camera as well as the value of the radiation detector. The output actions are the linear and angular velocities. The searcher network is trained in a simulation environment to accelerate the learning process. The well-performance searcher network is deployed to the real unmanned vehicle, Dashgo E2, which mounts LIDAR of YDLIDAR G4, RGB-D camera of Intel D455, and radiation detector made by Institute of Nuclear Energy Research. In the field experiment, the unmanned vehicle is enable to search out the radiation source of the 18.5MBq Na-22 by itself and avoid obstacles simultaneously without human interference.

Keywords: deep reinforcement learning, GA3C, source searching, source detection

Procedia PDF Downloads 110
405 Electromagnetic Interface Shielding of Graphene Oxide–Carbon Nanotube Hybrid ABS Composites

Authors: Jeevan Jyoti, Bhanu Pratap Singh, S. R. Dhakate

Abstract:

In the present study, multiwalled carbon nanotubes (MWCNTs) and reduced graphene oxide (RGO) were synthesized by chemical vapor deposition and Improved Hummer’s method, respectively and their composite with acrylonitrile butadiene styrene (ABS) were prepared by twin screw co rotating extrusion technique. The electromagnetic interference (EMI) shielding effectiveness of graphene oxide carbon nanotube (GCNTs) hybrid composites was investigated and the results were compared with EMI shielding of carbon nanotube (CNTs) and reduced graphene oxide (RGO) in the frequency range of 12.4-18 GHz (Ku-band). The experimental results indicate that the EMI shielding effectiveness of these composites is achieved up to –21 dB for 10 wt. % loading of GCNT loading. The mechanism of improvement in EMI shielding effectiveness is discussed by resolving their contribution in absorption and reflection loss. The main reason for such a high improved shielding effectiveness has been attributed to the significant improvement in the electrical conductivity of the composites. The electrical conductivity of these GCNT/ABS composites was increased from 10-13 S/cm to 10-7 S/cm showing the improvement of the 6 order of the magnitude. Scanning electron microscopic (SEM) and high resolution transmission electron microscopic (HRTEM) studies showed that the GCNTs were uniformly dispersed in the ABS polymer matrix. GCNTs form a network throughout the polymer matrix and promote the reinforcement.

Keywords: ABS, EMI shielding, multiwalled carbon nanotubes, reduced graphene oxide, graphene, oxide-carbon nanotube (GCNTs), twin screw extruder, multiwall carbon nanotube, electrical conductivity

Procedia PDF Downloads 353
404 A Follow up Study on Indoor 222Rn, 220Rn and Their Decay Product Concentrations in a Mineralized Zone of Himachal Pradesh, India

Authors: B. S. Bajwa, Parminder Singh, Prabhjot Singh, Surinder Singh, B. K. Sahoo, B. K. Sapra

Abstract:

A follow up study was taken up in a mineralized zone situated in Hamirpur district, Himachal Pradesh, India to investigate high values of radon concentration reported in past studies as well to update the old radon data based on bare SSNTD technique. In the present investigation, indoor radon, thoron and their decay products concentrations have been measured using the newly developed Radon-Thoron discriminating diffusion chamber with single entry face, direct radon and thoron progeny sensors (DRPS/DTPS) respectively. The measurements have been carried out in seventy five dwellings of fourteen different villages. Houses were selected taking into consideration of the past data as well as the type of houses such as mud, concrete, brick etc. It was observed that high values of earlier reported radon concentrations were mainly because of thoron interference in the Solid State Nuclear Track Detector (LR-115 type II) exposed in bare mode. Now, the average concentration values and the estimated annual inhalation dose in these villages have been found to be within the reference level as recommended by the ICRP. The annual average indoor radon and thoron concentrations observed in these dwellings have been found to vary from 44±12-157±73 Bq m-3 and 44±11-240±125 Bq m-3 respectively. The equilibrium equivalent concentrations of radon and thoron decay products have been observed to be in the range of 10-63 Bq m-3 and 1-5 Bq m-3 respectively.

Keywords: radon, thoron, progeny concentration, dosimeter

Procedia PDF Downloads 451
403 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 255
402 Integrating Cost-Benefit Assessment and Contract Design to Support Industrial Symbiosis Deployment

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) is the realization of Industrial Ecology (I.E) principles in production systems in function. I.S consists in the use of waste materials, fatal energy, recirculated utilities and infrastructure/service sharing as resources for production. Environmental benefits can be achieved from resource conservation but economic profitability is required by the participating actors. I.S indeed involves several actors with their own objectives and resources so that each one must be satisfied by ex-ante arrangements to commit toward I.S execution (investments and transactions). Following the Resource-Based View of transactions we build a modular framework to assess global I.S profitability and to specify each actor’s contributions to costs and benefits in line with their resource endowments and performance requirements formulations. I.S projects specificities implied by the need for customization (asset specificity, non-homogeneity) induce the use of long-term contracts for transactions following Transaction costs economics arguments. Thus we propose first a taxonomy of costs and value drivers for I.S and an assignment to each actor of I.S specific risks that we identified as load profiles mismatch, quality problems and value fluctuations. Then appropriate contractual guidelines (pricing, cost sharing and warranties) that support mutual profitability are derived from the detailed identification of contributions by the cost-benefits model. This analytical framework helps identifying what points to focus on when bargaining over contracting for transactions and investments. Our methodology is applied to I.S archetypes raised from a literature survey on eco-industrial parks initiatives and practitioners interviews.

Keywords: contracts, cost-benefit analysis, industrial symbiosis, risks

Procedia PDF Downloads 336
401 Service Delivery Disparity Conundrum at Winnie Madikizela Mandela Local Municipality: Exploration of the Enhanced Future

Authors: Mandisi Matyana

Abstract:

Although the South African local government is doing all the best in ensuring improved service delivery for the citizens, service delivery disparity still remains the real challenge for other municipalities. The unequal distribution of services within municipal wards is causing unequal happiness among the citizens; hence others do enjoy different provided municipal services, while others do not. It is acknowledged that less access to municipal services infringes one’s rights, such as the right to human dignity and the right to life. Some of the municipal services are basic services and they are the mainstay of human survival, such as water, housing, etc. It is quite evident that the service delivery disparity could be caused by the various factors within the local municipality affairs, including both administrative and political factors. Therefore, this study is undertaken to check and evaluate the main foundations of service delivery disparity in ensuring equal development of the state, particularly for local communities. The study used the qualitative method to collect the data from the citizens of Winnie Madikizela Mandela Local Municipality. An extensive literature was also conducted in understanding the causes of service delivery disparity. Study findings prove that the service delivery disparity could be caused by factors such as political interference in administration, corruption and fraud, elevated unemployment levels, inadequate institutional capacity, etc. Therefore, the study recommends strong community participation and constant external supervision in the local government so as to encourage openness in local government to ensure fair administration towards services to be provided.

Keywords: administration, development, municipal services, service delivery disparity, Winnie Madikizela Mandela local municipality

Procedia PDF Downloads 106
400 Low Complexity Carrier Frequency Offset Estimation for Cooperative Orthogonal Frequency Division Multiplexing Communication Systems without Cyclic Prefix

Authors: Tsui-Tsai Lin

Abstract:

Cooperative orthogonal frequency division multiplexing (OFDM) transmission, which possesses the advantages of better connectivity, expanded coverage, and resistance to frequency selective fading, has been a more powerful solution for the physical layer in wireless communications. However, such a hybrid scheme suffers from the carrier frequency offset (CFO) effects inherited from the OFDM-based systems, which lead to a significant degradation in performance. In addition, insertion of a cyclic prefix (CP) at each symbol block head for combating inter-symbol interference will lead to a reduction in spectral efficiency. The design on the CFO estimation for the cooperative OFDM system without CP is a suspended problem. This motivates us to develop a low complexity CFO estimator for the cooperative OFDM decode-and-forward (DF) communication system without CP over the multipath fading channel. Especially, using a block-type pilot, the CFO estimation is first derived in accordance with the least square criterion. A reliable performance can be obtained through an exhaustive two-dimensional (2D) search with a penalty of heavy computational complexity. As a remedy, an alternative solution realized with an iteration approach is proposed for the CFO estimation. In contrast to the 2D-search estimator, the iterative method enjoys the advantage of the substantially reduced implementation complexity without sacrificing the estimate performance. Computer simulations have been presented to demonstrate the efficacy of the proposed CFO estimation.

Keywords: cooperative transmission, orthogonal frequency division multiplexing (OFDM), carrier frequency offset, iteration

Procedia PDF Downloads 263
399 A Novel Machining Method and Tool-Path Generation for Bent Mandrel

Authors: Hong Lu, Yongquan Zhang, Wei Fan, Xiangang Su

Abstract:

Bent mandrel has been widely used as precise mould in automobile industry, shipping industry and aviation industry. To improve the versatility and efficiency of turning method of bent mandrel with fixed rotational center, an instantaneous machining model based on cutting parameters and machine dimension is prospered in this paper. The spiral-like tool path generation approach in non-axisymmetric turning process of bent mandrel is developed as well to deal with the error of part-to-part repeatability in existed turning model. The actual cutter-location points are calculated by cutter-contact points, which are obtained from the approach of spiral sweep process using equal-arc-length segment principle in polar coordinate system. The tool offset is set to avoid the interference between tool and work piece is also considered in the machining model. Depend on the spindle rotational angle, synchronization control of X-axis, Z-axis and C-axis is adopted to generate the tool-path of the turning process. The simulation method is developed to generate NC program according to the presented model, which includes calculation of cutter-location points and generation of tool-path of cutting process. With the approach of a bent mandrel taken as an example, the maximum offset of center axis is 4mm in the 3D space. Experiment results verify that the machining model and turning method are appropriate for the characteristics of bent mandrel.

Keywords: bent mandrel, instantaneous machining model, simulation method, tool-path generation

Procedia PDF Downloads 333
398 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 524
397 The Effect of Gender Differences on Mate Selection in Private University

Authors: Hui Min Kong, Rajalakshmi A/P Ganesan

Abstract:

The present study was conducted to investigate the effect of gender differences in mate selection in a private university. Mate selection is an important process and decision to the people around the world, especially for single people. The future partner we have chosen could be our lifetime friend, supporter, and lover. Mate selection is important to us, but we have never fully understood the evolution of gender differences in mate selection. Besides, there was an insufficient empirical finding of gender differences in mate selection in Malaysia. Hence, the research would allow us to understand our feelings and thoughts about our future partners. The research null hypotheses have stated that there was no significant difference on 18 mate selections characteristics between males and females. A quantitative method was performed to test the hypotheses through independent t-test. There was a total of 373 heterosexual participants with the age range of 18 to 35 in the study. The instrument used was Factors in choosing a mate developed by Buss and Barnes (1986). Results indicated that females (M= 26.69) were found to be highly valued on refinement and neatness, good financial prospect, dependable character, emotional stability and maturity, desire for home and children, favorable social status or rating, similar religious background, ambition and industriousness, mutual attraction, good health and education and intelligence than males (M= 23.25). These results demonstrated that there were 61.11% significant gender differences in mate selections characteristics. Findings of this research have highlighted the importance of human mate selections in Malaysia. Further research is needed to identify the factors that could have a possible moderating effect of gender differences in mate selection.

Keywords: gender differences, mate selections, evolution, future partner

Procedia PDF Downloads 105
396 Military Orchestrated Leadership Change in Zimbabwe and the Quest for Political Transition

Authors: Patrick Dzimiri

Abstract:

This chapter discusses the military-orchestrated leadership change in Zimbabwe that transpired in November 2017. Fundamentally, the chapter provides a critical examination of military interference in the country's politics and its implications for a political transition in the post-Mugabe dispensation. This chapter offers insight into Zimbabwe's political crises propelled by the lack of a succession plan. It emerged that the succession battle within ZANU-PF got complicated by the militarisation of factionalism. The chapter builds from an extensive review of primary and secondary data sources on political developments before and post-Mugabe era. Vilfredo Pareto's (1848-18923) theory on elite circulation is deployed herein to explain the absence of a succession mechanism within ZANU-PF and the militarisation of socio-politics life Zimbabwe. The chapter argues that what transpired in Zimbabwe’s power wrangle within the ZANU-PF political elites was triggered by a lack of a clear succession policy. Building from insights offered by Pareto's theory of elite circulation, it is averred that the removal of Mugabe by the military did not herald any form of political transition but rather a mere power play of one elite replacing another. In addition, it is argued that the lack of political reform by the Mnangagwa government affirms the position that political elites seek power for personal self-actualisation and not the public good. The chapter concludes that Mnangagwa's rise to power is nothing but a new elite displacing the old elite structure and does not herald a positive transition and transformation in the politics of Zimbabwe.

Keywords: military, politics, zimbabwe, governance, political transition

Procedia PDF Downloads 92
395 The Hallmarks of War Propaganda: The Case of Russia-Ukraine Conflict

Authors: Veronika Solopova, Oana-Iuliana Popescu, Tim Landgraf, Christoph Benzmüller

Abstract:

Beginning in 2014, slowly building geopolitical tensions in Eastern Europe led to a full-blown conflict between the Russian Federation and Ukraine that generated an unprecedented amount of news articles and data from social media data, reflecting the opposing ideologies and narratives as a background and the essence of the ongoing war. These polarized informational campaigns have led to countless mutual accusations of misinformation and fake news, shaping an atmosphere of confusion and mistrust for many readers all over the world. In this study, we analyzed scraped news articles from Ukrainian, Russian, Romanian and English-speaking news outlets, on the eve of 24th of February 2022, compared to day five of the conflict (28th of February), to see how the media influenced and mirrored the changes in public opinion. We also contrast the sources opposing and supporting the stands of the Russian government in Ukrainian, Russian and Romanian media spaces. In a data-driven way, we describe how the narratives are spread throughout Eastern and Central Europe. We present predictive linguistic features surrounding war propaganda. Our results indicate that there are strong similarities in terms of rhetoric strategies in the pro-Kremlin media in both Ukraine and Russia, which, while being relatively neutral according to surface structure, use aggressive vocabulary. This suggests that automatic propaganda identification systems have to be tailored for each new case, as they have to rely on situationally specific words. Both Ukrainian and Russian outlets lean towards strongly opinionated news, pointing towards the use of war propaganda in order to achieve strategic goals.

Keywords: linguistic, news, propaganda, Russia, ukraine

Procedia PDF Downloads 115
394 Using LTE-Sim in New Hanover Decision Algorithm for 2-Tier Macrocell-Femtocell LTE Network

Authors: Umar D. M., Aminu A. M., Izaddeen K. Y.

Abstract:

Deployments of mini macrocell base stations also referred to as femtocells, improve the quality of service of indoor and outdoor users. Nevertheless, mobility management remains a key issue with regards to their deployment. This paper is leaned towards this issue, with an in-depth focus on the most important aspect of mobility management -handover. In handover management, making a handover decision in the LTE two-tier macrocell femtocell network is a crucial research area. Decision algorithms in this research are classified and comparatively analyzed according to received signal strength, user equipment speed, cost function, and interference. However, it was observed that most of the discussed decision algorithms fail to consider cell selection with hybrid access policy in a single macrocell multiple femtocell scenario, another observation was a majority of these algorithms lack the incorporation of user equipment residence parameter. Not including this parameter boosts the number of unnecessary handover occurrence. To deal with these issues, a sophisticated handover decision algorithm is proposed. The proposed algorithm considers the user’s velocity, received signal strength, residence time, as well as the femtocell base station’s access policy. Simulation results have shown that the proposed algorithm reduces the number of unnecessary handovers when compared to conventional received signal strength-based handover decision algorithm.

Keywords: user-equipment, radio signal service, long term evolution, mobility management, handoff

Procedia PDF Downloads 120
393 Knowledge Transfer among Cross-Functional Teams as a Continual Improvement Process

Authors: Sergio Mauricio Pérez López, Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander

Abstract:

The culture of continuous improvement in organizations is very important as it represents a source of competitive advantage. This article discusses the transfer of knowledge between companies which formed cross-functional teams and used a dynamic model for knowledge creation as a framework. In addition, the article discusses the structure of cognitive assets in companies and the concept of "stickiness" (which is defined as an obstacle to the transfer of knowledge). The purpose of this analysis is to show that an improvement in the attitude of individual members of an organization creates opportunities, and that an exchange of information and knowledge leads to generating continuous improvements in the company as a whole. This article also discusses the importance of creating the proper conditions for sharing tacit knowledge. By narrowing gaps between people, mutual trust can be created and thus contribute to an increase in sharing. The concept of adapting knowledge to new environments will be highlighted, as it is essential for companies to translate and modify information so that such information can fit the context of receiving organizations. Adaptation will ensure that the transfer process is carried out smoothly by preventing "stickiness". When developing the transfer process on cross-functional teams (as opposed to working groups), the team acquires the flexibility and responsiveness necessary to meet objectives. These types of cross-functional teams also generate synergy due to the array of different work backgrounds of their individuals. When synergy is established, a culture of continuous improvement is created.

Keywords: knowledge transfer, continuous improvement, teamwork, cognitive assets

Procedia PDF Downloads 320
392 The Mashishing Marking Memories Project: A Culture-Centered Approach to Participation

Authors: Nongcebo Ngcobo

Abstract:

This research explores the importance of including a multitude of voices in the cultural heritage narrative, particularly in South Africa. The Mashishing project is an extension of and builds on the existing ‘Biesje Poort project’ which is a rock art project that was funded by the National Heritage Council in 2010 - 2013. Hence, the Mashishing marking memories project applies comparable Biesje Poort project objectives, though in a different geographical area. The wider project objectives are to transfer skills, promote social cohesion and empowerment, and lastly to add to the knowledge base of the Mashishing region and the repository of the local museum in the Lydenburg museum. This study is located in the Mashishing area, in Mpumalanga, South Africa. In this area, there were no present multi-vocal heritage projects. This research assesses the Mashishing marking memories project through the culture-centered approach for communication for social change, which examines the impact that the diverse participants have on the operations of the Mashishing project and also investigates whether the culturally diverse participants facilitates or hinders effective participation within the project. Key findings of this research uncovered the significance of participation and diverse voices in the cultural heritage field. Furthermore, this study highlights how unequal power relations affect effective participation. As a result, this study encourages the importance of bringing the researcher and the participant in a safe space to facilitate mutual learning. It also encourages an exchange of roles, where the researcher shifts from being an authoritarian figure to being in the role of a listener.

Keywords: culture, heritage, participation, social change

Procedia PDF Downloads 118
391 Cost of Governance in Nigeria: In Whose Interest

Authors: Francis O. Iyoha, Daniel E. Gberevbie, Charles T. Iruonagbe, Matthew E. Egharevba

Abstract:

Cost of governance in Nigeria has become a challenge to development and concern to practitioners and scholars alike in the field of business and social science research. It has been observed that it takes 70 percent of the nation’s revenue to maintain less than 20 percent of the Nigerian population that are public servants. Furthermore, it has been observed that on a consistent yearly basis, the recurrent expenditure of government from the national budget keeps rising, while capital expenditure meant for development keeps falling. The implication is that development is stagnated in the country. For instance, in the 2010 national budget of NGN4.60tn or USD28.75b, only NGN1.80tn or USD11.15b was set aside for capital expenditure. Also, in the 2013 national budget of NGN4.92tn or USD30.75b, only NGN1.50tn or USD9.38b was set aside for capital expenditure. Therefore, with the analysis of secondary data, this study examined the reasons for the high cost of governance in Nigeria. It observed that the high cost of governance in the country is in the interest of the ruling class, arising from their unethical behaviour – corrupt practices and the poor management of public resources. As a result, the study recommends the need to intensify the war against corruption and mismanagement of public resources by government officials as possible solution to overcome the high cost of governance in Nigeria. This could be achieved by strengthening the constitutional powers of the various anti-corruption agencies in the area of arrest, investigation and prosecution of offenders without the interference of the executive arm of government either at the local, state or federal level.

Keywords: cost of governance, capital expenditure, recurrent expenditure, unethical behavior, Nigeria

Procedia PDF Downloads 336
390 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 100
389 YHV-Responsive Gene Expression under the Influence of PmRelish Regulation

Authors: Suwattana Visetnan, Premruethai Supungul, Sureerat Tang, Ikuo Hirono, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

In animals, infection by Gram-negative bacteria and certain viruses activates the Imd signaling pathway wherein the a NF-κB transcription factor, Relish, is a key regulatory protein for the synthesis of antimicrobial proteins. Infection by yellow head virus (YHV) activates the Imd pathway. To investigate the expression of genes involved in YHV infection and under the influence of PmRelish regulation, RNA interference and suppression subtractive hybridization (SSH) are employed. The genes in forward library expressed in shrimp after YHV infection and under the activity of PmRelish were obtained by subtracting the cDNAs from YHV-infected and PmRelish-knockdown shrimp with cDNAs from YHV-infected shrimp. Opposite subtraction gave a reverse library whereby an alternative set of genes under YHV infection and no PmRelish expression was obtained. Sequencing of 252 and 99 cDNA clones from the respective forward and reverse libraries were done and annotated through blast search against the GenBank sequences. Genes involved in defense and homeostasis were abundant in both libraries, 31% and 23% in the forward and reverse libraries, respectively. They were predominantly antimicrobial proteins, proteinases and proteinase inhibitors. The expression of antimicrobial protein genes, ALFPm3, crustinPm1, penaeidin3 and penaeidin5 were tested under PmRelish silencing and Gram-negative bacterium V. harveyi infection. Together with the results previously reported, the expression of penaeidin5 and also penaeidin3 but not ALFPm3 and crustinPm1 were under the regulation of PmRelish in the Imd pathway.

Keywords: relish, yellow head virus, penaeus monodon, antimicrobial proteins

Procedia PDF Downloads 210
388 Design Study on a Contactless Material Feeding Device for Electro Conductive Workpieces

Authors: Oliver Commichau, Richard Krimm, Bernd-Arno Behrens

Abstract:

A growing demand on the production rate of modern presses leads to higher stroke rates. Commonly used material feeding devices for presses like grippers and roll-feeding systems can only achieve high stroke rates along with high gripper forces, to avoid stick-slip. These forces are limited by the sensibility of the surfaces of the workpieces. Stick-slip leads to scratches on the surface and false positioning of the workpiece. In this paper, a new contactless feeding device is presented, which develops higher feeding force without damaging the surface of the workpiece through gripping forces. It is based on the principle of the linear induction motor. A primary part creates a magnetic field and induces eddy currents in the electrically conductive material. A Lorentz-Force applies to the workpiece in feeding direction as a mutual reaction between the eddy-currents and the magnetic induction. In this study, the FEA model of this approach is shown. The calculation of this model was used to identify the influence of various design parameters on the performance of the feeder and thus showing the promising capabilities and limits of this technology. In order to validate the study, a prototype of the feeding device has been built. An experimental setup was used to measure pulling forces and placement accuracy of the experimental feeder in order to give an outlook of a potential industrial application of this approach.

Keywords: conductive material, contactless feeding, linear induction, Lorentz-Force

Procedia PDF Downloads 176
387 The Association Between Objectively Measured Physical Activity and Health-related Quality of Life, Life-space Mobility and Successful Aging in Older Indian Adults

Authors: Jeanne Grace, Jacqueline Naiker

Abstract:

Background: Longevity is increasing, accompanied by a rise in disability and chronic diseases with physical activity (PA) delaying disability, ensuring successful aging (SA) and independent living in older adults. Aim: This study aimed to determine objectively measured PA levels, health-related quality of life (HRQoL), life-space mobility, and successful aging (SA) of older adults in KwaZulu-Natal province, South Africa, as well as their mutual associations. Methods: A total of 210 older adults aged 65–92 years were purposively sampled and completed the Medical Outcomes Study 36-Item Short-Form Health Survey, the Life-Space Mobility, and Successful Aging questionnaires. PA levels were measured using an Omron Pedometer, which the participants wore for seven consecutive days. Results: The average number of steps taken per day for the seven days was 2025, with 98.6% of the entire study population classified as sedentary. The Vitality domain (one of 8 categorized) reflected the best health status (M = 59.9, SD ± 18.8), with a significant 93% of the participants indicating that they had not visited places outside their immediate neighborhood (P < 0.0005). A significant, negative association between the average number of steps taken in 7 days and all three SA variables – namely, the physical (r = –0.152, P = 0.027), sociological (r = –0.148, P = 0.032) and psychological (r = –0.176, P = 0.010), and a significant, positive association with life-space mobility (r = 0.224, P = 0.001) was noted. Conclusion: The majority of the elderly were sedentary, affecting their HRQoL, life-space mobility, and SA negatively.

Keywords: active life expectancy, geriatrics, nursing homes, well-being

Procedia PDF Downloads 166