Search results for: military operations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2161

Search results for: military operations

1501 A Unified Approach for Naval Telecommunication Architectures

Authors: Y. Lacroix, J.-F. Malbranque

Abstract:

We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.

Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion

Procedia PDF Downloads 283
1500 Implementation of Iterative Algorithm for Earthquake Location

Authors: Hussain K. Chaiel

Abstract:

The development in the field of the digital signal processing (DSP) and the microelectronics technology reduces the complexity of the iterative algorithms that need large number of arithmetic operations. Virtex-Field Programmable Gate Arrays (FPGAs) are programmable silicon foundations which offer an important solution for addressing the needs of high performance DSP designer. In this work, Virtex-7 FPGA technology is used to implement an iterative algorithm to estimate the earthquake location. Simulation results show that an implementation based on block RAMB36E1 and DSP48E1 slices of Virtex-7 type reduces the number of cycles of the clock frequency. This enables the algorithm to be used for earthquake prediction.

Keywords: DSP, earthquake, FPGA, iterative algorithm

Procedia PDF Downloads 375
1499 Volume Estimation of Trees: An Exploratory Study on Pterocarpus erinaceus Logging Operations within Forest Transition and Savannah Ecological Zones of Ghana

Authors: Albert Kwabena Osei Konadu

Abstract:

Pterocarpus erinaceus, also known as Rosewood, is tropical wood, endemic in forest savannah transition zones within the middle and northern portion of Ghana. Its economic viability has made it increasingly popular and in high demand, leading to widespread conservation concerns. Ghana’s forest resource management regime for these ecozones is mainly on conservation and very little on resource utilization. Consequently, commercial logging management standards are at teething stage and not fully developed, leading to a deficiency in the monitoring of logging operations and quantification of harvested trees volumes. Tree information form (TIF); a volume estimation and tracking regime, has proven to be an effective, sustainable management tool for regulating timber resource extraction in the high forest zones of the country. This work aims to generate TIF that can track and capture requisite parameters to accurately estimate the volume of harvested rosewood within forest savannah transition zones. Tree information forms were created on three scenarios of individual billets, stacked billets and conveying vessel basis. These TIFs were field-tested to deduce the most viable option for the tracking and estimation of harvested volumes of rosewood using the smallian and cubic volume estimation formula. Overall, four districts were covered with individual billets, stacked billets and conveying vessel scenarios registering mean volumes of 25.83m3,45.08m3 and 32.6m3, respectively. These adduced volumes were validated by benchmarking to assigned volumes of the Forestry Commission of Ghana and known standard volumes of conveying vessels. The results did indicate an underestimation of extracted volumes under the quotas regime, a situation that could lead to unintended overexploitation of the species. The research revealed conveying vessels route is the most viable volume estimation and tracking regime for the sustainable management of the Pterocarpous erinaceus species as it provided a more practical volume estimate and data extraction protocol.

Keywords: convention on international trade in endangered species, cubic volume formula, forest transition savannah zones, pterocarpus erinaceus, smallian’s volume formula, tree information form

Procedia PDF Downloads 83
1498 An Android Geofencing App for Autonomous Remote Switch Control

Authors: Jamie Wong, Daisy Sang, Chang-Shyh Peng

Abstract:

Geofence is a virtual fence defined by a preset physical radius around a target location. Geofencing App provides location-based services which define the actionable operations upon the crossing of a geofence. Geofencing requires continual location tracking, which can consume noticeable amount of battery power. Additionally, location updates need to be frequent and accurate or order so that actions can be triggered within an expected time window after the mobile user navigate through the geofence. In this paper, we build an Android mobile geofencing Application to remotely and autonomously control a power switch.

Keywords: location based service, geofence, autonomous, remote switch

Procedia PDF Downloads 306
1497 Relay Node Placement for Connectivity Restoration in Wireless Sensor Networks Using Genetic Algorithms

Authors: Hanieh Tarbiat Khosrowshahi, Mojtaba Shakeri

Abstract:

Wireless Sensor Networks (WSNs) consist of a set of sensor nodes with limited capability. WSNs may suffer from multiple node failures when they are exposed to harsh environments such as military zones or disaster locations and lose connectivity by getting partitioned into disjoint segments. Relay nodes (RNs) are alternatively introduced to restore connectivity. They cost more than sensors as they benefit from mobility, more power and more transmission range, enforcing a minimum number of them to be used. This paper addresses the problem of RN placement in a multiple disjoint network by developing a genetic algorithm (GA). The problem is reintroduced as the Steiner tree problem (which is known to be an NP-hard problem) by the aim of finding the minimum number of Steiner points where RNs are to be placed for restoring connectivity. An upper bound to the number of RNs is first computed to set up the length of initial chromosomes. The GA algorithm then iteratively reduces the number of RNs and determines their location at the same time. Experimental results indicate that the proposed GA is capable of establishing network connectivity using a reasonable number of RNs compared to the best existing work.

Keywords: connectivity restoration, genetic algorithms, multiple-node failure, relay nodes, wireless sensor networks

Procedia PDF Downloads 225
1496 Improving Taint Analysis of Android Applications Using Finite State Machines

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We present a taint analysis that can automatically detect when string operations result in a string that is free of taints, where all the tainted patterns have been removed. This is an improvement on the conservative behavior of previous taint analyzers, where a string operation on a tainted string always leads to a tainted string unless the operation is manually marked as a sanitizer. The taint analysis is built on top of a string analysis that uses finite state automata to approximate the sets of values that string variables can take during the execution of a program. The proposed approach has been implemented as an extension of FlowDroid and experimental results show that the resulting taint analyzer is much more precise than the original FlowDroid.

Keywords: android, static analysis, string analysis, taint analysis

Procedia PDF Downloads 164
1495 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 446
1494 Adaptation of Climate Change and Building Resilience for Seaports: Empirical Study on Egyptian Mediterranean Seaports

Authors: Alsnosy Balbaa, Mohamed Nabil Elnabawi, Yasmin El Meladi

Abstract:

With the ever-growing concerns of climate change, Mediterranean ports, as vital economic and transport hubs face unique challenges in maintaining operations and infrastructure. This empirical study seeks to understand the current adaptations and preparedness levels of Egyptian Mediterranean ports against climate-induced disruptions. Drawing from a structured questionnaire, the research gathers insights on observed climate impacts, infrastructure adaptations, operational changes, and stakeholder engagement, aiming to shed light on the resilience of these ports in the face of a changing climate.

Keywords: climate, infrastructures, port, mediterranean

Procedia PDF Downloads 53
1493 Reducing Weight and Fuel Consumption of Civil Aircraft by EML

Authors: Luca Bertola, Tom Cox, Pat Wheeler, Seamus Garvey, Herve Morvan

Abstract:

Electromagnetic launch systems have been proposed for military applications to accelerate jet planes on aircraft carriers. This paper proposes the implementation of similar technology to aid civil aircraft take-off, which can provide significant economic, environmental and technical benefits. Assisted launch has the potential of reducing ground noise and emissions near airports and improving overall aircraft efficiency through reducing engine thrust requirements. This paper presents a take-off performance analysis for an Airbus A320-200 taking off with and without the assistance of the electromagnetic catapult. Assisted take-off allows for a significant reduction in take-off field length, giving more capacity with existing airport footprints and reducing the necessary footprint of new airports, which will both reduce costs and increase the number of suitable sites. The electromagnetic catapult may allow the installation of smaller engines with lower rated thrust. The consequent fuel consumption and operational cost reduction are estimated. The potential of reducing the aircraft operational costs and the runway length required making electromagnetic launch system an attractive solution to the air traffic growth in busy airports.

Keywords: electromagnetic launch, fuel consumption, take-off analysis, weight reduction

Procedia PDF Downloads 324
1492 Intellectual Property Rights as a Tool to Enhance and Sustain Museums

Authors: Nayira Ahmed Galal Elden Hassan

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help generate additional revenue and promote cultural heritage while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums into two kinds: collection IP and museum-generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German State Museum in Berlin when the museum made 100 replicas from the Nefertiti bust and wrote under the replicas all rights reserved to the Berlin Museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: intellectual property, museum, cultural assets, sustainability, IP management

Procedia PDF Downloads 27
1491 The Risk of Ground Movements After Digging Two Parallel Vertical Tunnel in Urban

Authors: Djelloul Chafia, Demagh Rafik, Kareche Toufik

Abstract:

Human activities, made without precautions, accelerate the degradation of the soil structure and reduces its resistance. Operations, such as tunnel construction may exercise an influence more or less permanent on the grounds which surrounded them, these structures alter soil it is necessary to predict their impacts by suitable measures. This research is a numerical analysis that deals the risks and effects due to the weakening of the soil after digging two parallel vertical circular tunnels in urban areas, and suggests forecasting techniques based essentially on the organization of underground space. The simulations are performed using the finite-difference code FLAC in a two-dimensional case and with an elasto-plastic behavior of the soil.

Keywords: sol, weakening, degradation, prevention, tunnel

Procedia PDF Downloads 549
1490 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students

Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar

Abstract:

The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.

Keywords: development, software, application, portable, fitness norms, cardiovascular endurance

Procedia PDF Downloads 533
1489 Construction of Graph Signal Modulations via Graph Fourier Transform and Its Applications

Authors: Xianwei Zheng, Yuan Yan Tang

Abstract:

Classical window Fourier transform has been widely used in signal processing, image processing, machine learning and pattern recognition. The related Gabor transform is powerful enough to capture the texture information of any given dataset. Recently, in the emerging field of graph signal processing, researchers devoting themselves to develop a graph signal processing theory to handle the so-called graph signals. Among the new developing theory, windowed graph Fourier transform has been constructed to establish a time-frequency analysis framework of graph signals. The windowed graph Fourier transform is defined by using the translation and modulation operators of graph signals, following the similar calculations in classical windowed Fourier transform. Specifically, the translation and modulation operators of graph signals are defined by using the Laplacian eigenvectors as follows. For a given graph signal, its translation is defined by a similar manner as its definition in classical signal processing. Specifically, the translation operator can be defined by using the Fourier atoms; the graph signal translation is defined similarly by using the Laplacian eigenvectors. The modulation of the graph can also be established by using the Laplacian eigenvectors. The windowed graph Fourier transform based on these two operators has been applied to obtain time-frequency representations of graph signals. Fundamentally, the modulation operator is defined similarly to the classical modulation by multiplying a graph signal with the entries in each Fourier atom. However, a single Laplacian eigenvector entry cannot play a similar role as the Fourier atom. This definition ignored the relationship between the translation and modulation operators. In this paper, a new definition of the modulation operator is proposed and thus another time-frequency framework for graph signal is constructed. Specifically, the relationship between the translation and modulation operations can be established by the Fourier transform. Specifically, for any signal, the Fourier transform of its translation is the modulation of its Fourier transform. Thus, the modulation of any signal can be defined as the inverse Fourier transform of the translation of its Fourier transform. Therefore, similarly, the graph modulation of any graph signal can be defined as the inverse graph Fourier transform of the translation of its graph Fourier. The novel definition of the graph modulation operator established a relationship of the translation and modulation operations. The new modulation operation and the original translation operation are applied to construct a new framework of graph signal time-frequency analysis. Furthermore, a windowed graph Fourier frame theory is developed. Necessary and sufficient conditions for constructing windowed graph Fourier frames, tight frames and dual frames are presented in this paper. The novel graph signal time-frequency analysis framework is applied to signals defined on well-known graphs, e.g. Minnesota road graph and random graphs. Experimental results show that the novel framework captures new features of graph signals.

Keywords: graph signals, windowed graph Fourier transform, windowed graph Fourier frames, vertex frequency analysis

Procedia PDF Downloads 328
1488 Recovery of Cd (II) and Pb (II) under the Effect of Temperature with the Synthetic Zeolite NaA

Authors: Karima Menad, Ahmed Feddag

Abstract:

In this study, large crystals of the zeolite NaA were synthesized by hydrothermal way. By following this zeolite was used to recover two heavy metals that are allowing the most dangerous toxic, lead and cadmium. The synthesized zeolite was analyzed by XRD and SEM aims to verify its purity and its good morphology; after it was undergoing ion exchange operations by aqueous solution with lead and cadmium in two salts Pb(CH3COOH)2 and CdCl2 at different concentrations. The exchange was carried out under the effect of two temperatures (25 °C and 60 °C). The contents of Pb++, Cd++ and Na+ were analyzed by atomic absorption and the results are given in the form of exchange rates. At the end the samples are analyzed by XRD exchanged to confirm their conservation of their zeolite framework. It is found that the exchange rate increases with the increase of initial concentration and the best results are found for the temperature of 60 °C.

Keywords: exchange rate, ion exchange, LTA zeolite, zeolite NaA

Procedia PDF Downloads 401
1487 About the Case Portfolio Management Algorithms and Their Applications

Authors: M. Chumburidze, N. Salia, T. Namchevadze

Abstract:

This work deal with case processing problems in business. The task of strategic credit requirements management of cases portfolio is discussed. The information model of credit requirements in a binary tree diagram is considered. The algorithms to solve issues of prioritizing clusters of cases in business have been investigated. An implementation of priority queues to support case management operations has been presented. The corresponding pseudo codes for the programming application have been constructed. The tools applied in this development are based on binary tree ordering algorithms, optimization theory, and business management methods.

Keywords: credit network, case portfolio, binary tree, priority queue, stack

Procedia PDF Downloads 128
1486 Modelling of Structures by Advanced Finites Elements Based on the Strain Approach

Authors: Sifeddine Abderrahmani, Sonia Bouafia

Abstract:

The finite element method is the most practical tool for the analysis of structures, whatever the geometrical shape and behavior. It is extensively used in many high-tech industries, such as civil or military engineering, for the modeling of bridges, motor bodies, fuselages, and airplane wings. Additionally, experience demonstrates that engineers like modeling their structures using the most basic finite elements. Numerous models of finite elements may be utilized in the numerical analysis depending on the interpolation field that is selected, and it is generally known that convergence to the proper value will occur considerably more quickly with a good displacement pattern than with a poor pattern, saving computation time. The method for creating finite elements using the strain approach (S.B.A.) is presented in this presentation. When the results are compared with those provided by equivalent displacement-based elements, having the same total number of degrees of freedom, an excellent convergence can be obtained through some application and validation tests using recently developed membrane elements, plate bending elements, and flat shell elements. The effectiveness and performance of the strain-based finite elements in modeling structures are proven by the findings for deflections and stresses.

Keywords: finite elements, plate bending, strain approach, displacement formulation, shell element

Procedia PDF Downloads 90
1485 The Role of State Practices and Custom in Outer Space Law

Authors: Biswanath Gupta, Raju Kd

Abstract:

Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.

Keywords: customary international law, state practice, space law, treaty

Procedia PDF Downloads 333
1484 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 340
1483 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 304
1482 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 328
1481 Global Health Access to Reproductive Care: Vesicovaginal Fistulas and Obstetrics in Pakistan

Authors: Aena Iqbal

Abstract:

The lack of access to maternal and reproductive health in Pakistan poses a great threat to global public health. Obstetric issues, including vesicovaginal fistulas (VVF), are the most common in South Asian countries, leaving women in a more vulnerable state. Koohi Goth Women’s Hospital offers free VVF operations, which draws in women from all over Pakistan. Although reproductive health is being handled, mental health is often neglected in these scenarios. Using a series of questions inspired by the Warwick Edinburgh Model, this paper builds on the results from interviewing women who have received vesicovaginal fistula repair surgery on their mental health, a taboo topic in Pakistan.

Keywords: obstetrics, VVF, Pakistan, reproductive health

Procedia PDF Downloads 88
1480 Reverse Logistics Network Optimization for E-Commerce

Authors: Albert W. K. Tan

Abstract:

This research consolidates a comprehensive array of publications from peer-reviewed journals, case studies, and seminar reports focused on reverse logistics and network design. By synthesizing this secondary knowledge, our objective is to identify and articulate key decision factors crucial to reverse logistics network design for e-commerce. Through this exploration, we aim to present a refined mathematical model that offers valuable insights for companies seeking to optimize their reverse logistics operations. The primary goal of this research endeavor is to develop a comprehensive framework tailored to advising organizations and companies on crafting effective networks for their reverse logistics operations, thereby facilitating the achievement of their organizational goals. This involves a thorough examination of various network configurations, weighing their advantages and disadvantages to ensure alignment with specific business objectives. The key objectives of this research include: (i) Identifying pivotal factors pertinent to network design decisions within the realm of reverse logistics across diverse supply chains. (ii) Formulating a structured framework designed to offer informed recommendations for sound network design decisions applicable to relevant industries and scenarios. (iii) Propose a mathematical model to optimize its reverse logistics network. A conceptual framework for designing a reverse logistics network has been developed through a combination of insights from the literature review and information gathered from company websites. This framework encompasses four key stages in the selection of reverse logistics operations modes: (1) Collection, (2) Sorting and testing, (3) Processing, and (4) Storage. Key factors to consider in reverse logistics network design: I) Centralized vs. decentralized processing: Centralized processing, a long-standing practice in reverse logistics, has recently gained greater attention from manufacturing companies. In this system, all products within the reverse logistics pipeline are brought to a central facility for sorting, processing, and subsequent shipment to their next destinations. Centralization offers the advantage of efficiently managing the reverse logistics flow, potentially leading to increased revenues from returned items. Moreover, it aids in determining the most appropriate reverse channel for handling returns. On the contrary, a decentralized system is more suitable when products are returned directly from consumers to retailers. In this scenario, individual sales outlets serve as gatekeepers for processing returns. Considerations encompass the product lifecycle, product value and cost, return volume, and the geographic distribution of returns. II) In-house vs. third-party logistics providers: The decision between insourcing and outsourcing in reverse logistics network design is pivotal. In insourcing, a company handles the entire reverse logistics process, including material reuse. In contrast, outsourcing involves third-party providers taking on various aspects of reverse logistics. Companies may choose outsourcing due to resource constraints or lack of expertise, with the extent of outsourcing varying based on factors such as personnel skills and cost considerations. Based on the conceptual framework, the authors have constructed a mathematical model that optimizes reverse logistics network design decisions. The model will consider key factors identified in the framework, such as transportation costs, facility capacities, and lead times. The authors have employed mixed LP to find the optimal solutions that minimize costs while meeting organizational objectives.

Keywords: reverse logistics, supply chain management, optimization, e-commerce

Procedia PDF Downloads 24
1479 Identification and Selection of a Supply Chain Target Process for Re-Design

Authors: Jaime A. Palma-Mendoza

Abstract:

A supply chain consists of different processes and when conducting supply chain re-design is necessary to identify the relevant processes and select a target for re-design. A solution was developed which consists to identify first the relevant processes using the Supply Chain Operations Reference (SCOR) model, then to use Analytical Hierarchy Process (AHP) for target process selection. An application was conducted in an Airline MRO supply chain re-design project which shows this combination can clearly aid the identification of relevant supply chain processes and the selection of a target process for re-design.

Keywords: decision support systems, multiple criteria analysis, supply chain management

Procedia PDF Downloads 480
1478 Application of Production Planning to Improve Operation in Local Factory

Authors: Bashayer Al-Enezi, Budoor Al-Sabti, Eman Al-Durai, Fatmah Kalban, Meshael Ahmed

Abstract:

Production planning and control principles are concerned with planning, controlling and balancing all aspects of manufacturing including raw materials, finished goods, production schedules, and equipment requirements. Hence, an effective production planning and control system is very critical to the success of any factory. This project will focus on the application of production planning and control principles on “The National Canned Food Production and Trading Company (NCFP)” factory to find problems or areas for improvement.

Keywords: production planning, operations improvement, inventory management, National Canned Food Production and Trading Company (NCFP)

Procedia PDF Downloads 490
1477 Development and Validation of the 'Short Form BASIC Scale' Psychotic Tendencies Subscale

Authors: Chia-Chun Wu, Ying-Yao Cheng

Abstract:

The purpose of this study was developing the 'short-form BASIC scale' psychotic tendencies subscale so as to provide a more efficient, economical and effective way to assess the mental health of recruits. 1749 students from Naval Recruit Training Center participated in this study. The multidimensional constructs of psychotic tendencies subscale include four dimensions: schizophrenic tendencies, manic tendencies, depression tendencies, and suicidal ideation. We cut down the 36-item psychotic tendencies subscale to 25 items by using multidimension Rasch techniques. They were applied to assess model-data fit and to provide the validity evidence of the short form BASIC scale of psychotic tendencies subscale. The person separation reliabilities of the measures from four dimensions were .70, .67, .74 and .57, respectively. In addition, there is a notable correlation between the length version and short version of schizophrenic tendencies (scaled .89), manic tendencies (.96), depression tendencies (.97) and suicidal ideation (.97). The results have indicated that the development of the study of short-form scale sufficient to replace the original scale. Therefore, it is suggested that short-form basic scale is used to assess the mental health with participants being more willing to answer questions to ensure the validation of assessments.

Keywords: BASIC scale, military, Rasch analysis, short-form scale

Procedia PDF Downloads 350
1476 Historical Analysis of Nigeria Politics, 1960–2010

Authors: Abdulsalami Muyideen Deji

Abstract:

Nigeria as nation got independence in 1960 from British government which allowed indigenous people to form self-government and rule themselves base on the acceptable laws and orders provided by indigenes. All citizens saw it as a welcome development that gave them opportunity to develop at their own pace. Certainly, this occurred at the first instance up to the first republic of 1963. But things became worse for the country when the first military coup of January 15, 1966 sowed apple of discord between the three major tribes in Nigeria Hausa, Yoruba and Igbo as a result of miscarriage of well-conceived plan of master-minder of that coup Major Chukwuma Kaduna Nzeogwu. Although, the argument had emanated from different quarters that if Nigeria was given opportunity to develop at the pace it was going at that time probably the Nigeria would have been among developed nation today, but that ill-fated coup was a clog in the wheel of nation’s progress. The base of this argument is that Nigeria achievements after independence still depend on the work of leaders who secure independence and also directed the affairs of nation within that short period of time up till today. Since then Nigeria has been grasping with different system of government, yet, the nation is still far from the solution. This paper will analyze Nigeria politics from independence, offer suggestion on the way forward. The source is strictly base on secondary source from textbook, newspapers, internet and journals.

Keywords: politics, government, independence, development

Procedia PDF Downloads 315
1475 Purification of Bacillus Lipopeptides for Diverse Applications

Authors: Vivek Rangarajan, Kim G. Clarke

Abstract:

Bacillus lipopeptides are biosurfactants with wide ranging applications in the medical, food, agricultural, environmental and cosmetic industries. They are produced as a mix of three families, surfactin, iturin and fengycin, each comprising a large number of homologues of varying functionalities. Consequently, the method and degree of purification of the lipopeptide cocktail becomes particularly important if the functionality of the lipopeptide end-product is to be maximized for the specific application. However, downstream processing of Bacillus lipopeptides is particularly challenging due to the subtle variations observed in the different lipopeptide homologues and isoforms. To date, the most frequently used lipopeptide purification operations have been acid precipitation, solvent extraction, membrane ultrafiltration, adsorption and size exclusion. RP-HPLC (reverse phase high pressure liquid chromatography) also has potential for fractionation of the lipopeptide homologues. In the studies presented here, membrane ultrafiltration and RP-HPLC were evaluated for lipopeptide purification to different degrees of purities for maximum functionality. Batch membrane ultrafiltration using 50 kDa polyether sulphone (PES) membranes resulted in lipopeptide recovery of about 68% for surfactin and 82 % for fengycin. The recovery was further improved to 95% by using size-conditioned lipopeptide micelles. The conditioning of lipopeptides with Ca2+ ions resulted in uniformly sized micelles with average size of 96.4 nm and a polydispersity index of 0.18. The size conditioning also facilitated removal of impurities (molecular weight ranging between 2335-3500 Da) through operation of the system under dia-filtration mode, in a way similar to salt removal from protein by dialysis. The resultant purified lipopeptide was devoid of macromolecular impurities and could ideally suit applications in the cosmetic and food industries. Enhanced purification using RP-HPLC was carried out in an analytical C18 column, with the aim to fractionate lipopeptides into their constituent homologues. The column was eluted with mobile phase comprising acetonitrile and water over an acetonitrile gradient, 35% - 80%, over 70 minutes. The gradient elution program resulted in as many as 41 fractions of individual lipopeptide homologues. The efficacy test of these fractions against fungal phytopathogens showed that first 21 fractions, identified to be homologues of iturins and fengycins, displayed maximum antifungal activities, suitable for biocontrol in the agricultural industry. Thus, in the current study, the downstream processing of lipopeptides leading to tailor-made products for selective applications was demonstrated using two major downstream unit operations.

Keywords: bacillus lipopeptides, membrane ultrafiltration, purification, RP-HPLC

Procedia PDF Downloads 195
1474 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 109
1473 Metaphors Investigation between President Xi Jinping of China and Trump of Us on the Corpus-Based Approach

Authors: Jie Zheng, Ruifeng Luo

Abstract:

The United States is the world’s most developed economy with the strongest military power. China is the fastest growing country with growing comprehensive strength and its economic strength is second only to the US. However, the conflict between them is getting serious in recent years. President’s address is the representative of a nation’s ideology. The paper has built up a small sized corpus of President Xi Jinping and Trump’s speech in Davos to investigate their respective use and types of metaphors and calculate the respective percentage of each type of metaphor. The result shows President Xi Jinping employs more metaphors than Trump. The metaphors of Xi includes “building” metaphor, “plant” metaphor, “journey” metaphor, “ship” metaphor, “traffic” metaphor, “nation is a person” metaphor, “show” metaphor, etc while Trump’s comprises “war” metaphor, “building” metaphor, “journey” metaphor, “traffic” metaphor, “tax” metaphor, “book” metaphor, etc. After investigating metaphor use differences, the paper makes an analysis of the underlying ideology between the two nations. China is willing to strengthen ties with all the countries all over the world and has built a platform of development for them and itself to go to the destination of social well being while the US pays much concern to itself, emphasizing its first leading position and is also willing to help its alliances to development. The paper’s comparison of the ideology difference between the two countries will help them get a better understanding and reduce the conflict to some extent.

Keywords: metaphor; corpus; ideology; conflict

Procedia PDF Downloads 137
1472 Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment

Authors: Dongjae Kang, Sokho Son, Jinmee Kim

Abstract:

Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area.

Keywords: cloud service brokerage, multiple Clouds, Integrated service provisioning, SLA, network service

Procedia PDF Downloads 475