Search results for: Yen’s k-shortest path
588 Enablers of Total Quality Management for Social Enterprises: A Study of UAE Social Organizations
Authors: Farhat Sultana
Abstract:
Originality: TQM principles are considered the tools to enhance organizational performance for most organizations. The paper contributes to the literature on the social enterprise because social organizations are still far behind in implementing TQM as compared to other private, public, and nonprofit organizations. Study design: The study is based on the data and information provided by two case studies and one focus group of social enterprises. Purpose: The purpose of the study is to get a deep understating of TQM implementation and to recognize the enablers of TQM in social enterprises that enhance the organizational performance of social enterprises located in UAE. Findings: As per the findings of the study, key enablers of Total Quality management in the case enterprises are leadership support, strategic approach for quality, continuous improvement, process improvement, employee empowerment and customer focus practices, though some inhibitors for TQM implementation such as managerial structure for quality assurance and performance appraisal mechanism are also pointed out by the study. Research limitations: The study findings are only based on two case studies and one focus group, which is not enough to generalize the findings to all social organizations. Practical Implications: Identified TQM enablers can help management to implement TQM successfully in social enterprises. Social implications: The study provides enabling path for Social enterprises to implement TQM to seek quality output to build a better society.Keywords: TQM, social enterprise, enablers of TQM, UAE
Procedia PDF Downloads 111587 Recovery from Relational Trauma through the Practice of the Four Noble Truths in Buddhism
Authors: Yi-You Hung
Abstract:
Relational trauma has garnered significant attention recently, as it can create barriers in the personal, interpersonal, and professional realms. Without proper intervention, its psychological impact can be profound. In psychotherapy, the demand for culturally adaptive intervention models is growing. This article compares two therapeutic approaches focused on ‘self’ and ‘non-self’. It then incorporates Buddhist concepts of ‘dukkha’ (suffering), ‘samudaya’ (origin), ‘nirodha’ (cessation), and ‘magga’ (path) to develop culturally sensitive psychological interventions. Unlike Western psychotherapy, which often focuses on self, symptom relief, and restoring self-functioning, the ‘non-self’ approach encourages therapists to embody the principles of the Four Noble Truths. This perspective aims to help individuals reconstruct their internal relational state through shared suffering, compassion, wisdom, mindfulness, and righteous conduct. By understanding these concepts, therapists can guide individuals to ‘return to their inherent emptiness and non-self,’ resonating with the Buddhist belief that realizing this emptiness is a fundamental human goal. However, the model's limitations include individuals' need to embrace this cultural discourse and for therapists to learn Buddhist concepts deeply. Further research is essential to validate the effectiveness of this model in treating relational trauma cases.Keywords: buddhism, buddhist principles, culturally adaptive interventions, relational trauma
Procedia PDF Downloads 23586 Process Safety Evaluation of a Nuclear Power Plant through Virtual Process Hazard Analysis (PHA) using the What-If Technique
Authors: Lormaine Anne Branzuela, Elysa Largo, Julie Marisol Pagalilauan, Neil Concibido, Monet Concepcion Detras
Abstract:
Energy is a necessity both for the people and the country. The demand for energy is continually increasing, but the supply is not doing the same. The reopening of the Bataan Nuclear Power Plant (BNPP) in the Philippines has been circulating in the media for the current time. The general public has been hesitant in accepting the inclusion of nuclear energy in the Philippine energy mix due to perceived unsafe conditions of the plant. This study evaluated the possible operations of a nuclear power plant, which is of the same type as the BNPP, considering the safety of the workers, the public, and the environment using a Process Hazard Analysis (PHA) method. What-If Technique was utilized to identify the hazards and consequences on the operations of the plant, together with the level of risk it entails. Through the brainstorming sessions of the PHA team, it was found that the most critical system on the plant is the primary system. Possible leakages on pipes and equipment due to weakened seals and welds and blockages on coolant path due to fouling were the most common scenarios identified, which further caused the most critical scenario – radioactive leak through sump contamination, nuclear meltdown, and equipment damage and explosion which could result to multiple injuries and fatalities, and environmental impacts.Keywords: process safety management, process hazard analysis, what-If technique, nuclear power plant
Procedia PDF Downloads 223585 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol
Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani
Abstract:
Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.Keywords: heuristics routing, intelligent routing, VANET, route optimization
Procedia PDF Downloads 178584 The Symbiotic Relation of Mythical Stories in Transforming Human Lives
Authors: Gayatri Kanwar
Abstract:
The purpose of this research paper is to explore the power of myth in changing human lives; it establishes patterns in the human psyche, affects the way of thinking, as myths unveil various subjects, ideas, and challenges. Through mythological stories one comes to understand the images behind the emotions and feelings, they influence him as it changes his thought patterns, their therapeutic sets the individual on the path of healing and transforms human lives. Every civilization in the olden times had a vast source of myths which they lived by. They were not ordinary stories of everyday life, but exemplary cases narrated through oral traditions in a sacred manner revealed the 'way to live life'. The mythical stories have a spiritual touch which brought him to the acceptance of suffering or finding a solution to his life problems. In modern times, the significance of the age old myth has lost their touch. Each one of us bears countless stories inside ourselves of our own lives and all its happenings. Therefore, each being is a natural narrator. Everybody tells stories about their lives; hence, one tends to know oneself as well as seeks understanding of others through them. When one remembers their stories they speak in narratives. As stated by Jung, these narratives grow into a personal mythology one lives by. Nonetheless, there are times when one becomes stuck in their own stories or myths. Hence, mythology can change one’s perception and can open pathways to other ways of discovering, feeling and experiencing one’s lives.Keywords: Power of Myths, Significance of myths in modern times, Transforming human lives, Benefits to Society
Procedia PDF Downloads 402583 Capacity Loss at Midblock Sections of Urban Arterials Due to Pedestrian Crossings
Authors: Ashish Dhamaniya, Satish Chandra
Abstract:
Pedestrian crossings at grade in India are very common and pedestrian cross the carriageway at undesignated locations where they found the path to access the residential and commercial areas. Present paper aims to determine capacity loss on 4-lane urban arterials due to such crossings. Base capacity which is defined as the capacity without any influencing factor is determined on 4-lane roads by collecting speed-flow data in the field. It is observed that base capacity is varying from 1636 pcu/hr/lane to 2043 pcu/hr/lane which is attributed to the different operating conditions at different sections. The variation in base capacity is related with the operating speed on the road sections. Free flow speed of standard car is measured in the field and 85th percentile of this speed is reported as operating speed. Capacity of the 4-lane road sections with different pedestrian cross-flow is also determined and compared with the capacity of base section. The difference in capacity values is reported as capacity loss due to the average number of pedestrian crossings in one hour. It has been observed that capacity of 4-lane road section reduces from 18 to 30 percent with pedestrian cross-flow of 800 to 1550 peds/hr. A model is proposed between capacity loss and pedestrian cross-flow from the observed data.Keywords: capacity, free flow speed, pedestrian, urban arterial, transport
Procedia PDF Downloads 449582 Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip
Authors: Mahdiar Hosseinghadiry, Razali Ismail, F. Fotovati
Abstract:
One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC.Keywords: on chip, interconnection testing, horizontal-vertical testing, enhanced unicast
Procedia PDF Downloads 553581 General Time-Dependent Sequenced Route Queries in Road Networks
Authors: Mohammad Hossein Ahmadi, Vahid Haghighatdoost
Abstract:
Spatial databases have been an active area of research over years. In this paper, we study how to answer the General Time-Dependent Sequenced Route queries. Given the origin and destination of a user over a time-dependent road network graph, an ordered list of categories of interests and a departure time interval, our goal is to find the minimum travel time path along with the best departure time that minimizes the total travel time from the source location to the given destination passing through a sequence of points of interests belonging to each of the specified categories of interest. The challenge of this problem is the added complexity to the optimal sequenced route queries, where we assume that first the road network is time dependent, and secondly the user defines a departure time interval instead of one single departure time instance. For processing general time-dependent sequenced route queries, we propose two solutions as Discrete-Time and Continuous-Time Sequenced Route approaches, finding approximate and exact solutions, respectively. Our proposed approaches traverse the road network based on A*-search paradigm equipped with an efficient heuristic function, for shrinking the search space. Extensive experiments are conducted to verify the efficiency of our proposed approaches.Keywords: trip planning, time dependent, sequenced route query, road networks
Procedia PDF Downloads 321580 Boundary Alert System for Powered Wheelchair in Confined Area Training
Authors: Tsoi Kim Ming, Yu King Pong
Abstract:
Background: With powered wheelchair, patients can travel more easily and conveniently. However, some patients suffer from other difficulties, such as visual impairment, cognitive disorder, or psychological issues, which make them unable to control powered wheelchair safely. Purpose: Therefore, those patients are required to complete a comprehensive driving training by therapists on confined area, which simulates narrow paths in daily live. During the training, therapists will give series of driving instruction to patients, which may be unaware of patients crossing out the boundary of area. To facilitate the training, it is needed to develop a device to provide warning to patients during training Method: We adopt LIDAR for distance sensing started from center of confined area. Then, we program the LIDAR with linear geometry to remember each side of the area. The LIDAR will sense the location of wheelchair continuously. Once the wheelchair is driven out of the boundary, audio alert will be given to patient. Result: Patients can pay their attention to the particular driving situation followed by audio alert during driving training, which can learn how to avoid out of boundary in similar situation next time. Conclusion: Instead of only instructed by therapist, the LIDAR can facilitate the powered wheelchair training by patients actively pay their attention to driving situation. After training, they are able to control the powered wheelchair safely when facing difficult and narrow path in real life.Keywords: PWC, training, rehab, AT
Procedia PDF Downloads 105579 Applications for Additive Manufacturing Technology for Reducing the Weight of Body Parts of Gas Turbine Engines
Authors: Liubov Magerramova, Mikhail Petrov, Vladimir Isakov, Liana Shcherbinina, Suren Gukasyan, Daniil Povalyukhin, Olga Klimova-Korsmik, Darya Volosevich
Abstract:
Aircraft engines are developing along the path of increasing resource, strength, reliability, and safety. The building of gas turbine engine body parts is a complex design and technological task. Particularly complex in the design and manufacturing are the casings of the input stages of helicopter gearboxes and central drives of aircraft engines. Traditional technologies, such as precision casting or isothermal forging, are characterized by significant limitations in parts production. For parts like housing, additive technologies guarantee spatial freedom and limitless or flexible design. This article presents the results of computational and experimental studies. These investigations justify the applicability of additive technologies (AT) to reduce the weight of aircraft housing gearbox parts by up to 32%. This is possible due to geometrical optimization compared to the classical, less flexible manufacturing methods and as-casted aircraft parts with over-insured values of safety factors. Using an example of the body of the input stage of an aircraft gearbox, visualization of the layer-by-layer manufacturing of a part based on thermal deformation was demonstrated.Keywords: additive technologies, gas turbine engines, topological optimization, synthesis process
Procedia PDF Downloads 116578 On the Path of Radicalization: Policing of Muslim Americans Post 9/11
Authors: Hagar Elsayed
Abstract:
This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.Keywords: American-Muslims, Arabs, militarization, policing
Procedia PDF Downloads 136577 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast
Authors: Buse T. Aydin, Enver Ozdemir
Abstract:
An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 179576 Development of 3D Laser Scanner for Robot Navigation
Authors: Ali Emre Öztürk, Ergun Ercelebi
Abstract:
Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model
Procedia PDF Downloads 275575 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications
Authors: Assem M. F. Sallam, Ah. El-S. Makled
Abstract:
This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink
Procedia PDF Downloads 277574 Deep Routing Strategy: Deep Learning based Intelligent Routing in Software Defined Internet of Things.
Authors: Zabeehullah, Fahim Arif, Yawar Abbas
Abstract:
Software Defined Network (SDN) is a next genera-tion networking model which simplifies the traditional network complexities and improve the utilization of constrained resources. Currently, most of the SDN based Internet of Things(IoT) environments use traditional network routing strategies which work on the basis of max or min metric value. However, IoT network heterogeneity, dynamic traffic flow and complexity demands intelligent and self-adaptive routing algorithms because traditional routing algorithms lack the self-adaptions, intelligence and efficient utilization of resources. To some extent, SDN, due its flexibility, and centralized control has managed the IoT complexity and heterogeneity but still Software Defined IoT (SDIoT) lacks intelligence. To address this challenge, we proposed a model called Deep Routing Strategy (DRS) which uses Deep Learning algorithm to perform routing in SDIoT intelligently and efficiently. Our model uses real-time traffic for training and learning. Results demonstrate that proposed model has achieved high accuracy and low packet loss rate during path selection. Proposed model has also outperformed benchmark routing algorithm (OSPF). Moreover, proposed model provided encouraging results during high dynamic traffic flow.Keywords: SDN, IoT, DL, ML, DRS
Procedia PDF Downloads 110573 Comparative Study on Manet Using Soft Computing Techniques
Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri
Abstract:
Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network
Procedia PDF Downloads 349572 Socio Economic Impact and Status of the Islamic Perspective of Veil
Authors: Shagufta Jahangir, Nadeemullah, Yaqoob, Raisa Jahangir
Abstract:
The Persian language word ‘Purdah’ and in Arabic ‘Hajab’ is used for veil. Veil has been used by women for being escaped from men. In one way or the other veil has been continuously used in ancient as well as modern civilizations by women. Developed nations have blamed the use of veil an obstacle in the process of development. Therefore, modern nations have struggled to get rid of the use of veil. They argue that it is a sign of slavery for women and it is an obstacle in the path of development. The modern secular Muslims considered veil as the biggest obstacle for social and economic development. It makes a woman helpless, as being zanjir in her feet. It has become an obstacle in the process of development for women. It is also considered as a tool for segregation among men and women. The so called Muslims of the modern era are trying to introduce changes in religion by imitation the modern nations of the world. In particular ways for Muslim woman use of veil in Islam is must. It is a right provided her by religion. It provides her strength. In the Holy Quran word ‘Hajab’ is used 5 times. Islam is against domination and forceful practice of veil, as a part of teaching of Islam it is being adopted by women as a protection. This article aims at: (1) historical background of veil (2) Its existence in civilizations, (3) Meaning and interpretation of veil in Islamic context, (4) Economic impact of it on women (5) Discussion on its practice in Islamic (eastern) and other (European) circles and conclusions followed by concerted bibliography.Keywords: veil, economic development, civilizations, obstacle, secular Muslims, segregation
Procedia PDF Downloads 328571 Energy Deposited by Secondary Electrons Generated by Swift Proton Beams through Polymethylmethacrylate
Authors: Maurizio Dapor, Isabel Abril, Pablo de Vera, Rafael Garcia-Molina
Abstract:
The ionization yield of ion tracks in polymers and bio-molecular systems reaches a maximum, known as the Bragg peak, close to the end of the ion trajectories. Along the path of the ions through the materials, many electrons are generated, which produce a cascade of further ionizations and, consequently, a shower of secondary electrons. Among these, very low energy secondary electrons can produce damage in the biomolecules by dissociative electron attachment. This work deals with the calculation of the energy distribution of electrons produced by protons in a sample of polymethylmethacrylate (PMMA), a material that is used as a phantom for living tissues in hadron therapy. PMMA is also of relevance for microelectronics in CMOS technologies and as a photoresist mask in electron beam lithography. We present a Monte Carlo code that, starting from a realistic description of the energy distribution of the electrons ejected by protons moving through PMMA, simulates the entire cascade of generated secondary electrons. By following in detail the motion of all these electrons, we find the radial distribution of the energy that they deposit in PMMA for several initial proton energies characteristic of the Bragg peak.Keywords: Monte Carlo method, secondary electrons, energetic ions, ion-beam cancer therapy, ionization cross section, polymethylmethacrylate, proton beams, secondary electrons, radial energy distribution
Procedia PDF Downloads 286570 Estimation of Lungs Physiological Motion for Patient Undergoing External Lung Irradiation
Authors: Yousif Mohamed Y. Abdallah
Abstract:
This is an experimental study deals with detection, measurement and analysis of the periodic physiological organ motion during external beam radiotherapy; to improve the accuracy of the radiation field placement, and to reduce the exposure of healthy tissue during radiation treatments. The importance of this study is to detect the maximum path of the mobile structures during radiotherapy delivery, to define the planning target volume (PTV) and irradiated volume during both inspiration and expiration period and to verify the target volume. In addition to its role to highlight the importance of the application of Intense Guided Radiotherapy (IGRT) methods in the field of radiotherapy. The results showed (body contour was equally (3.17 + 0.23 mm), for left lung displacement reading (2.56 + 0.99 mm) and right lung is (2.42 + 0.77 mm) which the radiation oncologist to take suitable countermeasures in case of significant errors. In addition, the use of the image registration technique for automatic position control is predicted potential motion. The motion ranged between 2.13 mm and 12.2 mm (low and high). In conclusion, individualized assessment of tumor mobility can improve the accuracy of target areas definition in patients undergo Sterostatic RT for stage I, II and III lung cancer (NSCLC). Definition of the target volume based on a single CT scan with a margin of 10 mm is clearly inappropriate.Keywords: respiratory motion, external beam radiotherapy, image processing, lung
Procedia PDF Downloads 536569 MMP-2 Gene Polymorphism and Its Influence on Serum MMP-2 Levels in Pre-Eclampsia in Indian Population
Authors: Ankush Kalra, Mirza Masroor, Usha Manaktala, B. C. Koner, T. K. Mishra
Abstract:
Introduction: Pre-eclampsia affects 3-5% of pregnancies worldwide and increases maternal-fetal morbidity and mortality. Reduced placental perfusion induces the release of biomolecules by the placenta into maternal circulation causing endothelial dysfunction. Zinc dependent matrix metalloproteinase-2 (MMP-2) may be up-regulated and interact with circulating factors of oxidative stress and inflammation to produce endothelial dysfunction in pre-eclampsia. Aim: To study the functional genetic polymorphism of MMP-2 gene (g-1306 C>T) in pre-eclampsia and its effect on serum MMP-2 levels in these patients. Method: Hundred pre-eclampsia patients and hundred age and gestation period matched healthy pregnant women with their consent were recruited in the study. Serum MMP-2 levels in all subjects were estimated using standard ELISA kits. MMP-2 gene (g.- 1306 C>T) SNPs were genotyped using whole blood by ASO-PCR. Result: The pre-eclampsia patients had higher serum levels of MMP-2 compared to the healthy pregnant (p < 0.05). Also the MMP-2 genotype was associated with significant alteration in the serum MMP-2 concentration in these patients (p < 0.05). Conclusion: This study results suggest an association of MMP-2 genetic polymorphism and serum levels of MMP-2 to the path physiology of hypertensive disorder of pregnancy.Keywords: allele specific oligonucleotide polymerase chain reaction (ASO-PCR), enzyme linked immunosorbent assay (ELISA), matrix metalloproteinase-2 (MMP-2), pre-eclampsia
Procedia PDF Downloads 329568 A Group Setting of IED in Microgrid Protection Management System
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu
Abstract:
There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.Keywords: IEC 61850, IED, group Setting, microgrid
Procedia PDF Downloads 463567 Organizational Management and Leadership
Authors: Osman Yildiz
Abstract:
As it is predicted 2559 years before there is nothing permanent except change. In our turbulent World, Organizations will always be faced with the challenge of determining the path that will always keep them on balance en route that will bring success. That means from top to bottom, every organisation is exposed to fight to stay afloat and compete while they face the continuous prospect of change in an increasingly competitive and globalized World. Otherwise, they would fail to realize their goals and targets, and ultimately would disappear. But the organizations that will celebrate success five or ten years from now will be the winners of the fight by having recognizing that planning the change was only the first step in the journey and put sufficient efforts into the task of leading change. Increasingly unpredictable and competitive organizational environments have put pressure on leaders across all industries to better manage the change. The key of establishing effective change and transformation in organisations lies on the steps taken before the change happens depending to the quality of the human sources; readiness for change, acknowledgement by management, prepared leaders, motivated employees, overcoming the resistance to change and ultimately adapting change into the organization. Due to these factors, leaders managing the organisational development can ensure organizations and employees to meet new performance targets, motivation and skills rapidly and effectively. Finally, this article will provide some tools for leaders, and discuss how to catch organisational development and manage the innovations in effective ways.Keywords: managing the change, organizational change, human factor, leaders, globalization, organisational development
Procedia PDF Downloads 275566 A Study of Social Media Users’ Switching Behavior
Authors: Chiao-Chen Chang, Yang-Chieh Chin
Abstract:
Social media has created a change in the way the network community is clustered, especially from the location of the community, from the original virtual space to the intertwined network, and thus the communication between people will change from face to face communication to social media-based communication model. However, social media users who have had a fixed engagement may have an intention to switch to another service provider because of the emergence of new forms of social media. For example, some of Facebook or Twitter users switched to Instagram in 2014 because of social media messages or image overloads, and users may seek simpler and instant social media to become their main social networking tool. This study explores the impact of system features overload, information overload, social monitoring concerns, problematic use and privacy concerns as the antecedents on social media fatigue, dissatisfaction, and alternative attractiveness; further influence social media switching. This study also uses the online questionnaire survey method to recover the sample data, and then confirm the factor analysis, path analysis, model fit analysis and mediating analysis with the structural equation model (SEM). Research findings demonstrated that there were significant effects on multiple paths. Based on the research findings, this study puts forward the implications of theory and practice.Keywords: social media, switching, social media fatigue, alternative attractiveness
Procedia PDF Downloads 140565 Configuration Design and Optimization of the Movable Leg-Foot Lunar Soft-Landing Device
Authors: Shan Jia, Jinbao Chen, Jinhua Zhou, Jiacheng Qian
Abstract:
Lunar exploration is a necessary foundation for deep-space exploration. For the functional limitations of the fixed landers which are widely used currently and are to expand the detection range by the use of wheeled rovers with unavoidable path-repeatability, a movable lunar soft-landing device based on cantilever type buffer mechanism and leg-foot type walking mechanism is presented. Firstly, a 20 DoFs quadruped configuration based on pushrod is proposed. The configuration is of the bionic characteristics such as hip, knee and ankle joints, and can make the kinematics of the whole mechanism unchanged before and after buffering. Secondly, the multi-function main/auxiliary buffers based on crumple-energy absorption and screw-nut mechanism, as well as the telescopic device which could be used to protect the plantar force sensors during the buffer process are designed. Finally, the kinematic model of the whole mechanism is established, and the configuration optimization of the whole mechanism is completed based on the performance requirements of slope adaptation and obstacle crossing. This research can provide a technical solution integrating soft-landing, large-scale inspection and material-transfer for future lunar exploration and even mars exploration, and can also serve as the technical basis for developing the reusable landers.Keywords: configuration design, lunar soft-landing device, movable, optimization
Procedia PDF Downloads 159564 Numerical Analysis of Crack's Effects in a Dissimilar Welded Joint
Authors: Daniel N. L. Alves, Marcelo C. Rodrigues, Jose G. de Almeida
Abstract:
The search for structural efficiency in mechanical systems has been strongly exerted with aim of economic optimization and structural safety. As soon, to understand the response of materials when submitted to adverse conditions is essential to design a safety project. This work investigates the presence of cracks in dissimilar welded joints (DWJ). Its fracture toughness responses depend upon the heterogeneity present in these joints. Thus, this work aim analyzing the behavior of the crack tip zone located in a buttery dissimilar welded joint (ASTM A-36, Inconel, and AISI 8630 M) used in the union of pipes present in the offshore oil production lines. The crack was placed 1 mm from fusion line (FL) Inconel-AISI 8630 M toward the AISI 8630 M. Finite Element Method (FEM) was used to analyze stress and strain fields generated during the loading imposed on the specimen. It was possible observing critical stress area by the numerical tool as well as a preferential plastic flow was also observed in the sample of dissimilar welded joint, which can be considered a harbinger of the crack growth path. The results obtained through numerical analysis showed a convergent behavior in relation to the plastic flow, qualitatively and quantitatively, in agreement with previous performed.Keywords: crack, dissimilar welded joint, numerical analysis, strain field, the stress field
Procedia PDF Downloads 171563 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware
Authors: Azita Ramezani, Atousa Ramezani
Abstract:
In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection
Procedia PDF Downloads 71562 Coupled Analysis for Hazard Modelling of Debris Flow Due to Extreme Rainfall
Authors: N. V. Nikhil, S. R. Lee, Do Won Park
Abstract:
Korean peninsula receives about two third of the annual rainfall during summer season. The extreme rainfall pattern due to typhoon and heavy rainfall results in severe mountain disasters among which 55% of them are debris flows, a major natural hazard especially when occurring around major settlement areas. The basic mechanism underlined for this kind of failure is the unsaturated shallow slope failure by reduction of matric suction due to infiltration of water and liquefaction of the failed mass due to generation of positive pore water pressure leading to abrupt loss of strength and commencement of flow. However only an empirical model cannot simulate this complex mechanism. Hence, we have employed an empirical-physical based approach for hazard analysis of debris flow using TRIGRS, a debris flow initiation criteria and DAN3D in mountain Woonmyun, South Korea. Debris flow initiation criteria is required to discern the potential landslides which can transform into debris flow. DAN-3D, being a new model, does not have the calibrated values of rheology parameters for Korean conditions. Thus, in our analysis we have used the recent 2011 debris flow event in mountain Woonmyun san for calibration of both TRIGRS model and DAN-3D, thereafter identifying and predicting the debris flow initiation points, path, run out velocity, and area of spreading for future extreme rainfall based scenarios.Keywords: debris flow, DAN-3D, extreme rainfall, hazard analysis
Procedia PDF Downloads 247561 Motion Performance Analyses and Trajectory Planning of the Movable Leg-Foot Lander
Authors: Shan Jia, Jinbao Chen, Jinhua Zhou, Jiacheng Qian
Abstract:
In response to the functional limitations of the fixed landers, those are to expand the detection range by the use of wheeled rovers with unavoidable path-repeatability in deep space exploration currently, a movable lander based on the leg-foot walking mechanism is presented. Firstly, a quadruped landing mechanism based on pushrod-damping is proposed. The configuration is of the bionic characteristics such as hip, knee and ankle joints, and the multi-function main/auxiliary buffers based on the crumple-energy absorption and screw-nut mechanism. Secondly, the workspace of the end of the leg-foot mechanism is solved by Monte Carlo method, and the key points on the desired trajectory of the end of the leg-foot mechanism are fitted by cubic spline curve. Finally, an optimal time-jerk trajectory based on weight coefficient is planned and analyzed by an adaptive genetic algorithm (AGA). The simulation results prove the rationality and stability of walking motion of the movable leg-foot lander in the star catalogue. In addition, this research can also provide a technical solution integrating of soft-landing, large-scale inspection and material transfer for future star catalogue exploration, and can even serve as the technical basis for developing the reusable landers.Keywords: motion performance, trajectory planning, movable, leg-foot lander
Procedia PDF Downloads 139560 Efficient Principal Components Estimation of Large Factor Models
Authors: Rachida Ouysse
Abstract:
This paper proposes a constrained principal components (CnPC) estimator for efficient estimation of large-dimensional factor models when errors are cross sectionally correlated and the number of cross-sections (N) may be larger than the number of observations (T). Although principal components (PC) method is consistent for any path of the panel dimensions, it is inefficient as the errors are treated to be homoskedastic and uncorrelated. The new CnPC exploits the assumption of bounded cross-sectional dependence, which defines Chamberlain and Rothschild’s (1983) approximate factor structure, as an explicit constraint and solves a constrained PC problem. The CnPC method is computationally equivalent to the PC method applied to a regularized form of the data covariance matrix. Unlike maximum likelihood type methods, the CnPC method does not require inverting a large covariance matrix and thus is valid for panels with N ≥ T. The paper derives a convergence rate and an asymptotic normality result for the CnPC estimators of the common factors. We provide feasible estimators and show in a simulation study that they are more accurate than the PC estimator, especially for panels with N larger than T, and the generalized PC type estimators, especially for panels with N almost as large as T.Keywords: high dimensionality, unknown factors, principal components, cross-sectional correlation, shrinkage regression, regularization, pseudo-out-of-sample forecasting
Procedia PDF Downloads 150559 A Case Study to Observe How Students’ Perception of the Possibility of Success Impacts Their Performance in Summative Exams
Authors: Rochelle Elva
Abstract:
Faculty in Higher Education today are faced with the challenge of convincing their students of the importance of learning and mastery of skills. This is because most students often have a single motivation -to get high grades. If it appears that this goal will not be met, they lose their motivation, and their academic efforts wane. This is true even for students in the competitive fields of STEM, including Computer Science majors. As educators, we have to understand our students and leverage what motivates them to achieve our learning outcomes. This paper presents a case study that utilizes cognitive psychology’s Expectancy Value Theory and Motivation Theory to investigate the effect of sustained expectancy for success on students’ learning outcomes. In our case study, we explore how students’ motivation and persistence in their academic efforts are impacted by providing them with an unexpected possible path to success that continues to the end of the semester. The approach was tested in an undergraduate computer science course with n = 56. The results of the study indicate that when presented with the real possibility of success, despite existing low grades, both low and high-scoring students persisted in their efforts to improve their performance. Their final grades were, on average, one place higher on the +/-letter grade scale, with some students scoring as high as three places above their predicted grade.Keywords: expectancy for success and persistence, motivation and performance, computer science education, motivation and performance in computer science
Procedia PDF Downloads 81