Search results for: military athletes
183 Beneficial Effects of Whey Protein Concentrate in Venous Thrombosis
Authors: Anna Tokajuk, Agnieszka Zakrzeska, Ewa Chabielska, Halina Car
Abstract:
Whey is a by-product generated mainly in the production of cheese and casein. Powder forms of whey are used widely in the food industry as well as a high-protein food for infants, for convalescents, by athletes and especially by bodybuilders to increase muscle mass during exercise. Whey protein concentrate-80 (WPC-80) is a source of bioactive peptides with beneficial effects on the cardiovascular system. It is known that whey proteins health beneficial properties include antidiabetic, blood pressure lowering, improving cardiovascular system function, antibacterial, antiviral and other effects. To study its influence on the development of thrombosis, venous thrombosis model was performed according to the protocol featured by Reyers with modification by Chabielska and Gromotowicz. Male Wistar-Crl: WI (Han) rats from researched groups were supplemented with two doses of WPC-80 (0.3 or 0.5 g/kg) for 7, 14 or 21 days and after these periods, one-hour venous thrombosis model was performed. Control group received 0.9 % NaCl solution and was sham operated. The statistical significance of results was computed by Mann – Whitney’s test. We observed that thrombus weight was decreased in animals obtaining WPC-8080 and that was statistically significant in 14 and 21-day supplemented groups. Blood count parameters did not differ significantly in rats with and without thrombosis induction whether they were fed with WPC-80 or not. Moreover, the number of platelets (PLT) was within the normal range in each group. The examined coagulation parameters in rats of the control groups were within normal limits. After WPC-80 supplementation there was the tendency to prolonged activated partial thromboplastin time (aPTT), but in comparison, the results did not turn out significant. In animals that received WPC-80 0.3 g·kg-1 for 21 days with and without induced thrombosis, prothrombin time (PT) and an international normalized ratio (INR) was somewhat decreased, remaining within the normal range, but the nature and significance of this observation are beyond the framework of the current study. Additionally, fibrinogen and thrombin time (TT) did not differ significantly between groups. Therefore the exact effect of WPC-80 on coagulation system is still elusive and requires further thorough research including mechanisms of action. Determining the potential clinical application of WPC-80 requires the selection of the optimal dose and duration of supplementation.Keywords: antithrombotic, rats, venous thrombosis, WPC-80
Procedia PDF Downloads 119182 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks
Authors: Hyunsun Lee, Yi Zhu
Abstract:
Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles
Procedia PDF Downloads 125181 Accuracy of Peak Demand Estimates for Office Buildings Using Quick Energy Simulation Tool
Authors: Mahdiyeh Zafaranchi, Ethan S. Cantor, William T. Riddell, Jess W. Everett
Abstract:
The New Jersey Department of Military and Veteran’s Affairs (NJ DMAVA) operates over 50 facilities throughout the state of New Jersey, U.S. NJDMAVA is under a mandate to move toward decarbonization, which will eventually include eliminating the use of natural gas and other fossil fuels for heating. At the same time, the organization requires increased resiliency regarding electric grid disruption. These competing goals necessitate adopting the use of on-site renewables such as photovoltaic and geothermal power, as well as implementing power control strategies through microgrids. Planning for these changes requires a detailed understanding of current and future electricity use on yearly, monthly, and shorter time scales, as well as a breakdown of consumption by heating, ventilation, and air conditioning (HVAC) equipment. This paper discusses case studies of two buildings that were simulated using the QUick Energy Simulation Tool (eQUEST). Both buildings use electricity from the grid and photovoltaics. One building also uses natural gas. While electricity use data are available in hourly intervals and natural gas data are available in monthly intervals, the simulations were developed using monthly and yearly totals. This approach was chosen to reflect the information available for most NJ DMAVA facilities. Once completed, simulation results are compared to metrics recommended by several organizations to validate energy use simulations. In addition to yearly and monthly totals, the simulated peak demands are compared to actual monthly peak demand values. The simulations resulted in monthly peak demand values that were within 30% of the measured values. These benchmarks will help to assess future energy planning efforts for NJ DMAVA.Keywords: building energy modeling, eQUEST, peak demand, smart meters
Procedia PDF Downloads 68180 From Sympathizers to Perpetrators: Examining the Involvement of Rural Women in Bangladesh in Violent Extremism
Authors: Shantanu Majumder
Abstract:
This paper attempts to explain the factors contribute in attracting and engaging rural women in Bangladesh toward political Islam that in many cases manifests itself in the form of violent extremism (VE). Bangladesh, the fourth largest Muslim majority country in the world, has been confronting the problem of VE in the name of Islam since a long. The political Islamists, explaining the events like military operations in Afghanistan and Iraq, anti-Muslim politics in neighboring India and Myanmar, Islamophobia in the West, and several other issues in their own way, have become to a vast extent successful in creating a high level of emotion, anger and a feeling of being oppressed worldwide among the ordinary Muslims masses. Half-hearted role of public intellectuals and political expediency of liberal political forces in explaining these events in a secular democratic way also facilitate the extremists to earn political dividend. VE was perceived as an all-male activism of the political Islamists’ in the past in Bangladesh. However, evidence in the recent times shows that there are sympathizers, recruiters, and perpetrators as well among the womenfolk in favor of VE-based political Islam. The first section in this paper sheds light on the way the political Islamists build rapport with and win over the heart of target women in countryside under the camouflage of preaching authentic Islam. This section also describes the role of family in involvement of women in VE. The second section discusses wide-ranging use of websites, facebook, laptop, mobile phones and several other means in the way to motivate and radicalize women. How the involvement with political Islamists brings changes in thinking process, lifestyle and family life of motivated women has been focused in the third section. The final section deals briefly with the way out relying on the argument that law and order forces alone cannot tackle this problem.Keywords: Bangladesh, political Islam, violent extremism, women
Procedia PDF Downloads 196179 Modelling the Dynamics and Optimal Control Strategies of Terrorism within the Southern Borno State Nigeria
Authors: Lubem Matthew Kwaghkor
Abstract:
Terrorism, which remains one of the largest threats faced by various nations and communities around the world, including Nigeria, is the calculated use of violence to create a general climate of fear in a population to attain particular goals that might be political, religious, or economical. Several terrorist groups are currently active in Nigeria, leading to attacks on both civil and military targets. Among these groups, Boko Haram is the deadliest terrorist group operating majorly in Borno State. The southern part of Borno State in North-Eastern Nigeria has been plagued by terrorism, insurgency, and conflict for several years. Understanding the dynamics of terrorism is crucial for developing effective strategies to mitigate its impact on communities and to facilitate peace-building efforts. This research aims to develop a mathematical model that captures the dynamics of terrorism within the southern part of Borno State, Nigeria, capturing both government and local community intervention strategies as control measures in combating terrorism. A compartmental model of five nonlinear differential equations is formulated. The model analyses show that a feasible solution set of the model exists and is bounded. Stability analyses show that both the terrorism free equilibrium and the terrorism endermic equilibrium are asymptotically stable, making the model to have biological meaning. Optimal control theory will be employed to identify the most effective strategy to prevent or minimize acts of terrorism. The research outcomes are expected to contribute towards enhancing security and stability in Southern Borno State while providing valuable insights for policymakers, security agencies, and researchers. This is an ongoing research.Keywords: modelling, terrorism, optimal control, susceptible, non-susceptible, community intervention
Procedia PDF Downloads 26178 The Effect of Carbon Nanotubes in Copolyamide Nonwovens on the Properties of CFRP Laminates
Authors: Kamil Dydek, Anna Boczkowska, Paulina Latko-Duralek, Rafal Kozera, Michal Salacinski
Abstract:
In recent years there has been increasing interest in many industries, such as the aviation, automotive, and military industries, in Carbon Fibre Reinforced Polymers (CFRP). This is because of the excellent properties of CFRP, which are characterized by very high strength and stiffness in relation to their mass, low density (almost twice as low as aluminum and more than five times as low as steel), and corrosion resistance. However, they do not have sufficient electrical conductivity, which is required in some applications. Therefore, work is underway to improve their electrical conductivity, for example, by incorporating carbon nanotubes (CNTs) into the CFRP structure. CNTs possess excellent properties, such as high electrical conductivity, high aspect ratio, high Young’s modulus, and high tensile strength. An idea developed by our team is a modification of CFRP by the use of thermoplastic nonwovens containing CNTs. Nanocomposite fibers were made from three different masterbatches differing in the content of multi-wall carbon nanotubes, and then nonwovens that differed in areal weight were produced using a thermo-press. The out of autoclave method was used to fabricate the laminates from commercial carbon-epoxy prepreg dedicated to aviation applications - one without the nonwovens (reference) and five containing nonwovens placed between each prepreg layer. The volume of electrical conductivity of the manufactured laminates was measured in three directions. In order to investigate the adhesion between carbon fibers and nonwovens, the microstructure of the produced laminates was observed. The mechanical properties of the CFRP composites were measured in a short-beam shear test. In addition, the influence of thermoplastic nonwovens on the thermos-mechanical properties of laminates was analyzed by Dynamic Mechanical Analysis. The studies were carried out within grant no. DOB-1-3/1/PS/2014 financed by the National Centre for Research and Development in Poland.Keywords: CFRP, thermoplastic nonwovens, carbon nanotubes, electrical conductivity
Procedia PDF Downloads 134177 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm
Authors: Frodouard Minani
Abstract:
Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks
Procedia PDF Downloads 146176 The Role of Businesses in Peacebuilding in Nigeria: A Stakeholder Approach
Authors: Jamila Mohammed Makarfi, Yontem Sonmez
Abstract:
Developing countries like Nigeria have recently been affected by conflicts characterized by violence, high levels of risk and insecurity, resulting in loss of lives, livelihoods, displacement of communities, degradation of health, educational and social infrastructure as well as economic underdevelopment. The Nigerian government’s response to most of these conflicts has mainly been reactionary in the form of military deployments, as against precautionary to prevent or address the root causes of the conflicts. Several studies have shown that at various points of a conflict, conflict regions can benefit from the resources and expertise available outside the government, mainly from the private sector through mechanisms such as corporate social responsibility (CSR) by businesses. The main aim of this study is to examine the role of businesses in peacebuilding in Northern Nigeria through CSR in the last decade. The expected contributions from this will answer research questions, such as the key business motivations to engage in peacebuilding, as well as the degree of influence exerted from various stakeholder groups on the business decision to engage. The methodology of the study adopts a multiple case study of over 120 businesses of various sizes, ranging from small, medium and large-scale. A mixed method enabled the collection of quantitative and qualitative primary data to augment the secondary data. The results indicated that the most important business motivations to engage in peacebuilding were the negative effects of the conflict on economic stability, as well as stakeholder-driven motives. On the other hand, out of the 12 identified stakeholders, micro-, small- and medium-scale enterprises (MSMEs) considered the chief executive officer’s interest to be the most important factor, while large companies rated the government and community pressure as the highest. Overall, the foreign stakeholders scored low on the influence chart for all business types.Keywords: conflict, corporate social responsibility, peacebuilding, stakeholder
Procedia PDF Downloads 223175 Role of Pulsed-Dye Laser in the Treatment of Inflammatory Acne Vulgaris
Authors: Shirajul Islam Khan, Muhammad Ashraful Alam Bhuiyan, Syeda Tania Begum
Abstract:
Introduction: Acne vulgaris is one of the most common dermatologic conditions and affects the vast majority of people at some point during their lifetime, so effective treatment is of major importance. The failure of usual treatment modalities, teratogenic effects with some severe side effects, and resistance to P.Acne by Retinoides have been focusing on new therapeutic options for the treatment of acne. More recently, pulsed dye laser therapy has been reported to reduce acne lesion counts. The negligible morbidity of these treatment modalities and some other benefits of subsequent acne scar management lead this therapy more attractive. Objective: The objective of this study is to assess the efficacy and safety of pulsed dye laser therapy in the treatment of inflammatory acne vulgaris. Materials and Methods: A prospective clinical trial was done in the Department of Dermatology and Venereology, Combined Military Hospital (CMH), Dhaka, to find out the role of pulse dye laser in the treatment of inflammatory acne vulgaris. The study was carried out with 60 patients with mild to moderate acne vulgaris, and those were treated with pulsed dye laser therapy at baseline and after 4, 8, and 12 weeks. Results: Among 60 patients with inflammatory acne, 42(70%) were in the age group of less than 20 years, and 36(60%) were female. Regarding the number of inflammatory lesions, the baseline mean number (± SD) was 12.77 ± 4.01; after 4 weeks of treatment of inflammatory acne by pulsed dye laser was 7.80 ± 4.11; after 8 weeks of treatment, 6.10 ± 4.03 and after 12 weeks of treatment was 4.17 ± 4.02. After 4 weeks of treatment by pulse dye laser, the level of improvement was excellent at 3.3%, good at 10%, fair at 60%, and poor at 26.7%; after 8 weeks of treatment, excellent was 13.3%, good was 46.7%, the fair was 30% and poor 10% and after 12 weeks of treatment, excellent was 56.7%, good 13.3%, fair 23.3% and poor 6.7%. Regarding safety level, out of 60 patients of inflammatory acne vulgaris treated by pulsed dye laser, about 52(86.7%) patients did not observe any side effects. Conclusions: On the basis of the study results, it can be concluded that pulsed-dye laser is highly effective and well tolerated by patients in the treatment of inflammatory acne.Keywords: pulsed-dye laser, inflammatory acne, acne vulgaris, retinoids
Procedia PDF Downloads 92174 Exploring the Aesthetics of Sexual Violence in Therese Park’s ‘A Gift of the Emperor’: A Brief Study on Korean Comfort Women
Authors: Khushboo Verma
Abstract:
The use of rape as a weapon of war has been in existence for as early as the middle ages. Women, during the conflict, have been treated as the spoils of war, a reward for the conquering soldiers granted to them by their superiors which is, arguably, most often overlooked as part of the collateral damage that is unavoidable in conflict zones. Korean-born Therese Park’s first novel, A Gift of the Emperor (1997), describes one such atrocious incidence wherein she highlights the active role the Japanese military played in procuring and condoning trafficking of women, who were euphemistically referred to as ‘comfort women’, for prostitution during World War II. This paper thus aims to look at the remembering and reckonings of these women, which fueled a range of creative gestures in the artistic representations and knowledge production by Korean American artists and writers. The essay divides into three parts wherein first it tries to highlight the relationship of the state and the self in relation to the ‘comfort women’ as to who bears the onus of the exploitation of these women, or the responsibility for the redressal with the present-day notions of human rights as studied through Ueno Chizuko’s ‘The Politics of Memory: Nation, Individual and Self’ (1999). There are several narratological elements of the text that are of interest here which shall be viewed and analysed throughout the paper as well. The second part of the paper talks about the aesthetics of rape and sexual violence as represented or (mis)represented by Park in her novel as she attempts to give voice to the victim and retain her and her suffering as the central focus of the narrative. Finally, the third part of the novel explores as well as places the novel in the context of debates over the highly contested issue of ‘comfort women’ and the actual ‘comfort women’ survivors’ testimonies. For this purpose, the present study focuses on Dori Laub’s ‘Truth and Testimony: The Process and the Struggle’ (1991).Keywords: Korean comfort women, survivors’ testimonies, sexual slavery, aesthetics of sexual violence, horrible memories
Procedia PDF Downloads 161173 The Effectiveness of an Injury Prevention Workshop in Increasing Knowledge and Understanding in Grass-Root Youth Coaches
Authors: Mark De Ste Croix, Jonathan Hughes, Francisco Ayala, Michal Lehnert
Abstract:
There are well-known challenges to implementing injury prevention training for youth players but no data are available on the knowledge and understanding of deliverers of such programmes at grass root level. To increase adoption and adherence to such programmes coach knowledge and understanding of injury risk and prevention is essential. Therefore, the purpose of this study was to examine grass-root coaches knowledge and understanding of injury risk and prevention in youth players. 68 grass root coaches (18 females and 50 males) who were attending a one-day injury prevention workshop completed a modified validated questionnaire exploring knowledge and understanding of injury risk and prevention in youth players. Only 59% of coaches agreed that youth players are at a high risk of suffering an injury. There were high levels of agreement that injuries can have negative impacts on team performance (75%) and can cause physical problems in later life (85%), however only around half of coaches felt that injuries affect youth players current quality of life (59%). There was strong agreement that it is possible to prevent injuries in youth players (84%), but coaches were generally unaware of programs to help prevent injuries (84%), and only 9% used some form of injury prevention program. Despite this, nearly all coaches felt that their coaching could benefit from a greater understanding of growth and maturation (91%), injury prevention programmes (91%) and specific exercises (93%) for youth athletes. 17% of coaches rated their knowledge of injury prevention as good/very good at the start of the workshop and this increased to 94% at the end of the workshop. 62% of coaches identified their attitude towards injury prevention as indifferent at the start of the workshop compared with only 1% at the end. Only 14% of coaches at the start of the workshop were confident to deliver an injury prevention session but 83% stated they were confident by the end of the workshop. Finally, 98% of coaches felt that the workshop provided them with the confidence and the knowledge to deliver an injury prevention session and 98% suggested that they would implement injury prevention into their coaching. These data suggest that there is a lack of understanding of grass root coaches that children are a high-risk group for injuries, and that such injuries impact on current quality of life. Despite understanding that injuries can be prevented most grass root coaches do not have the knowledge to implement injury prevention into their coaching and very few do. There is a common consensus amongst these coaches that a greater understanding of such programmes will enhance their coaching. The injury prevention workshop appears to have increased the knowledge and changed the attitude of coaches towards injury prevention. All coaches felt that the workshop provided them with the tools to adopt, implement and deliver injury prevention in their coaching. These data highlight that there is a clear need for education regarding injury risk and prevention to be embedded within the coach education pathway, especially at grass root level.Keywords: coach education, injury prevention, knowledge, and understanding, youth
Procedia PDF Downloads 171172 Adhesive Bonded Joints Characterization and Crack Propagation in Composite Materials under Cyclic Impact Fatigue and Constant Amplitude Fatigue Loadings
Authors: Andres Bautista, Alicia Porras, Juan P. Casas, Maribel Silva
Abstract:
The Colombian aeronautical industry has stimulated research in the mechanical behavior of materials under different loading conditions aircrafts are generally exposed during its operation. The Calima T-90 is the first military aircraft built in the country, used for primary flight training of Colombian Air Force Pilots, therefore, it may be exposed to adverse operating situations such as hard landings which cause impact loads on the aircraft that might produce the impact fatigue phenomenon. The Calima T-90 structure is mainly manufactured by composites materials generating assemblies and subassemblies of different components of it. The main method of bonding these components is by using adhesive joints. Each type of adhesive bond must be studied on its own since its performance depends on the conditions of the manufacturing process and operating characteristics. This study aims to characterize the typical adhesive joints of the aircraft under usual loads. To this purpose, the evaluation of the effect of adhesive thickness on the mechanical performance of the joint under quasi-static loading conditions, constant amplitude fatigue and cyclic impact fatigue using single lap-joint specimens will be performed. Additionally, using a double cantilever beam specimen, the influence of the thickness of the adhesive on the crack growth rate for mode I delamination failure, as a function of the critical energy release rate will be determined. Finally, an analysis of the fracture surface of the test specimens considering the mechanical interaction between the substrate (composite) and the adhesive, provide insights into the magnitude of the damage, the type of failure mechanism that occurs and its correlation with the way crack propagates under the proposed loading conditions.Keywords: adhesive, composites, crack propagation, fatigue
Procedia PDF Downloads 204171 Computational Fluid Dynamics Analysis of Sit-Ski Aerodynamics in Crosswind Conditions
Authors: Lev Chernyshev, Ekaterina Lieshout, Natalia Kabaliuk
Abstract:
Sit-skis enable individuals with limited lower limb or core movement to ski unassisted confidently. The rise in popularity of the Winter Paralympics has seen an influx of engineering innovation, especially for the Downhill and Super-Giant Slalom events, where the athletes achieve speeds as high as 160km/h. The growth in the sport has inspired recent research into sit-ski aerodynamics. Crosswinds are expected in mountain climates and, therefore, can greatly impact a skier's maneuverability and aerodynamics. This research investigates the impact of crosswinds on the drag force of a Paralympic sit-ski using Computational Fluid Dynamics (CFD). A Paralympic sit-ski with a model of a skier, a leg cover, a bucket seat, and a simplified suspension system was used for CFD analysis in ANSYS Fluent. The hybrid initialisation tool and the SST k–ω turbulence model were used with two tetrahedral mesh bodies of influence. The crosswinds (10, 30, and 50 km/h) acting perpendicular to the sit-ski's direction of travel were simulated, corresponding to the straight-line skiing speeds of 60, 80, and 100km/h. Following the initialisation, 150 iterations for both first and second order steady-state solvers were used, before switching to a transient solver with a computational time of 1.5s and a time step of 0.02s, to allow the solution to converge. CFD results were validated against wind tunnel data. The results suggested that for all crosswind and sit-ski speeds, on average, 64% of the total drag on the ski was due to the athlete's torso. The suspension was associated with the second largest overall sit-ski drag force contribution, averaging at 27%, followed by the leg cover at 10%. While the seat contributed a negligible 0.5% of the total drag force, averaging at 1.2N across the conditions studied. The effect of the crosswind increased the total drag force across all skiing speed studies, with the drag on the athlete's torso and suspension being the most sensitive to the changes in the crosswind magnitude. The effect of the crosswind on the ski drag reduced as the simulated skiing speed increased: for skiing at 60km/h, the drag force on the torso increased by 154% with the increase of the crosswind from 10km/h to 50km/h; whereas, at 100km/h the corresponding drag force increase was halved (75%). The analysis of the flow and pressure field characteristics for a sit-ski in crosswind conditions indicated the flow separation localisation and wake size correlated with the magnitude and directionality of the crosswind relative to straight-line skiing. The findings can inform aerodynamic improvements in sit-ski design and increase skiers' medalling chances.Keywords: sit-ski, aerodynamics, CFD, crosswind effects
Procedia PDF Downloads 66170 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward
Authors: Ahmad Almaududy Amri
Abstract:
Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.Keywords: piracy, Southeast Asia, maritime security, legal frameworks
Procedia PDF Downloads 504169 The Embodiment of Violence and Liminal Space in Illegality: Rohingya Refugees
Authors: E. Xavier, B. Nandita
Abstract:
Rohingyas are an ethnic and religious minority that resides in the Rakhine State of Myanmar. Post the military coup in 1962, Rohingyas have not been recognized as one of the ethnic tribes of Burma under the legislation. They have lost citizenship, education, health care rights, and instantly became illegal immigrants. While the historicization of this conflict is crucial, this paper wants to humanize the Rohingya population’s embodiment of violence on three different levels – individual, social, and political. In addition, the study focuses on their liminal existence in refugee camps in Bangladesh and in other parts of the world, such as Malaysia and the United States of America. A multi-medium study, it includes first-hand interviews with the Rohingya community in Wisconsin and Chicago, second-hand interviews from documentaries and past ethnographies from scholars to draw meaningful conclusions about their experience as a community. In the end, it focuses on the group of Rohingyas who have managed to resettle in another country and their transitioning experience. Rohingyas embody violence on their individual, social, and political bodies in different ways. Along with rape, murder, and physical harm, the community also encounters sexually transmitted infections, post-traumatic stress disorder symptoms, and poor mental health. On a social level, they encounter heightened gender discrimination, work industry shifting, and immense, shared emotional pain. As for their political body, the news media and journalism industry uses their bodies for purposes that benefit both parties and flirts with a tone of sensationalism in their reporting. In addition, the Rohingya community fluctuates with the concept of nationality, patriotism, citizenship, and refugee when they think about the future. This study provides a framework that future aid or health programs can use to determine the type of community need and its significance in the Rohingya community.Keywords: embodiment, liminal, refugee, Rohingya
Procedia PDF Downloads 133168 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan
Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain
Abstract:
Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism
Procedia PDF Downloads 111167 Evaluation of Adequacy of Caspofungin Prescription in a Tunisian Hospital Cohort
Authors: Mariem Meddeb Sidhom, Souhayel Hedfi, Rjaibia Houda, Mehdi Dridi, Mohamed Ali Yousfi, Sâadia Gargouri
Abstract:
Considering the important increase in costs of caspofungin treatments and ahead the evolution of its indication, pharmacy department was prompted to realize a review of the adequacy of prescriptions in the medical intensive care units (ICU). A retrospective observational study was conducted in Tunis military hospital concerning ICU prescriptions of caspofungin from 2008 until 2013. A pharmacist had returned to the patient’s medical records to collect data and to the microbiology department for parasitological results. The adequacy of prescriptions was evaluated by a pharmacist and an infectiologist parasitologist, referring to predefined scale of criteria resuming the indications of the marketing authorization (MA) and grade AI-AII of the guidelines of the Infectious Diseases Society of America (IDSA). Sixty two ICU patients have been treated with caspofungin during the period of study; however, 8 files were lost. Thus, 54 patients were included in the study having received 55 prescriptions of caspofungin. Males were a majority with 64.8% of the population. Mean age was 51 years. Caspofungin was indicated in accordance with the IDSA recommendations in 43.6% of the cases. The most case of non respect to the guidelines was the indication of caspofungin as empirical treatment in non neutropenic patients. Caspofungin was utilized as a first line treatment in 9 cases where it was possible to give fluconazole first, as germs were fluconazole- sensitive. Caspofungin was indicated in 2 patients with good renal function and in which nor amphotericin B, liposomal ampho B neither itraconazole had been previously used, as indicates the MA. The posology of caspofungin was respected in all prescriptions with a loading dose of 70 mg in the first day and a maintenance dose of 50 mg daily. Seven patients had received a daily dose of 70 mg, the recommended dose for people weighing more than 80 Kg. Caspofungin prescriptions are far to be adequately done. There is a clear need of optimization in indicating this molecule and that must be done in collaboration between the pharmacy department, the ICUs and parasitology department.Keywords: caspofungin, prescription, intensive care units, marketing authorization, Tunisian hospital cohort
Procedia PDF Downloads 339166 Motivation in Online Instruction
Authors: David Whitehouse
Abstract:
Some of the strengths of online teaching include flexibility, creativity, and comprehensiveness. A challenge can be motivation. How can an instructor repeating the same lessons over and over, day in and day out, year after year, maintain motivation? Enthusiasm? Does motivating the student and creating enthusiasm in class build the same things inside the instructor? The answers lie in the adoption of what I label EUQ—The Empathy and Understanding Quotient. In the online environment, students who are adults have many demands on their time: civilian careers, families (spouse, children, older parents), and sometimes even military service. Empathetic responses on the part of the instructor will lead to open and honest communication on the part of the student, which will lead to understanding on the part of the instructor and a rise in motivation in both parties. Understanding the demands can inform an instructor’s relationship with the student throughout the temporal parameters of classwork. In practicing EUQ, instructors can build motivation in their students and find internal motivation in an enhanced classroom dynamic. The presentation will look at what motivates a student to accomplish more than the minimum required and how that can lead to excellent results for an instructor’s own motivation. Through direct experience of having students give high marks on post-class surveys and via direct messaging, the presentation will focus on how applying EUQ in granting extra time, searching for intent while grading, communicating with students via Quick Notes, responses in Forums, comments in Assignments, and comments in grading areas - - - how applying these things infuses enthusiasm and energy in the instructor which drive creativity in teaching. Three primary ways of communicating with students will be given as examples. The positive response and negative response each for a Forum, an Assignment, and a Message will be explored. If there is time, participants will be invited to craft their own EUQ responses in a role playing exercise involving two common classroom scenarios—late work and plagiarism.Keywords: education, instruction, motivation, online, teaching
Procedia PDF Downloads 171165 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 297164 Geometric Nonlinear Dynamic Analysis of Cylindrical Composite Sandwich Shells Subjected to Underwater Blast Load
Authors: Mustafa Taskin, Ozgur Demir, M. Mert Serveren
Abstract:
The precise study of the impact of underwater explosions on structures is of great importance in the design and engineering calculations of floating structures, especially those used for military purposes, as well as power generation facilities such as offshore platforms that can become a target in case of war. Considering that ship and submarine structures are mostly curved surfaces, it is extremely important and interesting to examine the destructive effects of underwater explosions on curvilinear surfaces. In this study, geometric nonlinear dynamic analysis of cylindrical composite sandwich shells subjected to instantaneous pressure load is performed. The instantaneous pressure load is defined as an underwater explosion and the effects of the liquid medium are taken into account. There are equations in the literature for pressure due to underwater explosions, but these equations have been obtained for flat plates. For this reason, the instantaneous pressure load equations are arranged to be suitable for curvilinear structures before proceeding with the analyses. Fluid-solid interaction is defined by using Taylor's Plate Theory. The lower and upper layers of the cylindrical composite sandwich shell are modeled as composite laminate and the middle layer consists of soft core. The geometric nonlinear dynamic equations of the shell are obtained by Hamilton's principle, taken into account the von Kàrmàn theory of large displacements. Then, time dependent geometric nonlinear equations of motion are solved with the help of generalized differential quadrature method (GDQM) and dynamic behavior of cylindrical composite sandwich shells exposed to underwater explosion is investigated. An algorithm that can work parametrically for the solution has been developed within the scope of the study.Keywords: cylindrical composite sandwich shells, generalized differential quadrature method, geometric nonlinear dynamic analysis, underwater explosion
Procedia PDF Downloads 195163 U Slot Loaded Wearable Textile Antenna
Authors: Varsha Kheradiya, Ganga Prasad Pandey
Abstract:
The use of wearable antennas is rising because wireless devices become small. The wearable antenna is part of clothes used in communication applications, including energy harvesting, medical application, navigation, and tracking. In current years, Antennas embroidered on clothes, conducting antennas based on fabric, polymer embedded antennas, and inkjet-printed antennas are all attractive ways. Also shows the analysis required for wearable antennas, such as wearable antennae interacting with the human body. The primary requirements for the antenna are small size, low profile minimizing radiation absorption by the human body, high efficiency, structural integrity to survive worst situations, and good gain. Therefore, research in energy harvesting, biomedicine, and military application design is increasingly favoring flexible wearable antennas. Textile materials that are effectively used for designing and developing wearable antennas for body area networks. The wireless body area network is primarily concerned with creating effective antenna systems. The antenna should reduce their size, be lightweight, and be adaptable when integrated into clothes. When antennas integrate into clothes, it provides a convenient alternative to those fabricated using rigid substrates. This paper presents a study of U slot loaded wearable textile antenna. U slot patch antenna design is illustrated for wideband from 1GHz to 6 GHz using textile material jeans as substrate and pure copper polyester taffeta fabric as conducting material. This antenna design exhibits dual band results for WLAN at 2.4 GHz and 3.6 GHz frequencies. Also, study U slot position horizontal and vertical shifting. Shifting the horizontal positive X-axis position of the U slot produces the third band at 5.8 GHz.Keywords: microstrip patch antenna, textile material, U slot wearable antenna, wireless body area network
Procedia PDF Downloads 92162 The Crisis of Displacement and Resettlement of Bakassi People of the Nigeria-Cameroon Borderlands
Authors: Geoffrey Nwaka
Abstract:
After many years of a border dispute between Nigeria and Cameroon over the ownership of the Bakassi Peninsula, the International Court of Justice ruled in 2002 that, based on the 1913 colonial boundary agreement between Britain and Germany, the oil-rich Peninsula, inhabited for generations by Nigerians, and hitherto administered as one of Nigeria’s 774 Local Government Areas, belongs to Cameroon, and not to Nigeria. Under pressure from the international community, Nigeria and Cameroon signed the Greentree Accord in 2006 to comply peacefully with the ICJ ruling and to protect the fundamental rights and freedoms of the Bakassi people, whether they opted to remain in the Peninsula under the authority of Cameroon or relocate to Nigeria. Sadly, the Nigerian government and the international community underestimated the scale of displacement that would follow the withdrawal of the Nigerian administration and military forces from the area and did not prepare adequately for the massive influx of tens of thousands of Bakassi people hurriedly dislodged by the reported hostility of the Cameroon authorities and their security services. The paper discusses the historical context and contemporary significance of the crisis, the chaotic resettlement schemes and appalling humanitarian relief camps in ‘New Bakassi’, and the prolonged hardship and disillusionment of the disaffected refugees/returnees. The lesson for African and Asian governments and peoples is to avoid needless conflicts over the 'imported' colonial boundaries, to remove unnecessary border restrictions, and take fully into account the development needs and well-being of borderland communities that sometimes rightly feel that distant central governments negotiate their political and international interests at the expense of the borderlands; and finally, to begin to see the boundaries more as links and bridges for the cooperation and integration of African and Asian states and peoples, rather than as barriers and static lines of demarcation on the map.Keywords: Africa, forced displacement, resettlement, border conflict, Bakassi
Procedia PDF Downloads 19161 Multi-Sensor Image Fusion for Visible and Infrared Thermal Images
Authors: Amit Kumar Happy
Abstract:
This paper is motivated by the importance of multi-sensor image fusion with a specific focus on infrared (IR) and visual image (VI) fusion for various applications, including military reconnaissance. Image fusion can be defined as the process of combining two or more source images into a single composite image with extended information content that improves visual perception or feature extraction. These images can be from different modalities like visible camera & IR thermal imager. While visible images are captured by reflected radiations in the visible spectrum, the thermal images are formed from thermal radiation (infrared) that may be reflected or self-emitted. A digital color camera captures the visible source image, and a thermal infrared camera acquires the thermal source image. In this paper, some image fusion algorithms based upon multi-scale transform (MST) and region-based selection rule with consistency verification have been proposed and presented. This research includes the implementation of the proposed image fusion algorithm in MATLAB along with a comparative analysis to decide the optimum number of levels for MST and the coefficient fusion rule. The results are presented, and several commonly used evaluation metrics are used to assess the suggested method's validity. Experiments show that the proposed approach is capable of producing good fusion results. While deploying our image fusion algorithm approaches, we observe several challenges from the popular image fusion methods. While high computational cost and complex processing steps of image fusion algorithms provide accurate fused results, they also make it hard to become deployed in systems and applications that require a real-time operation, high flexibility, and low computation ability. So, the methods presented in this paper offer good results with minimum time complexity.Keywords: image fusion, IR thermal imager, multi-sensor, multi-scale transform
Procedia PDF Downloads 115160 A Comparison of Sulfur Mustard Cytotoxic Effects on the Two Human Lung Origin Cell Lines
Authors: P. Jost, L. Muckova, M. Matula, J. Pejchal, D. Jun, R. Stetina
Abstract:
Sulfur mustard (bis(2-chlorethyl) sulfide) is highly toxic, chemical warfare agent that has been used in the past in several armed conflicts. Except for the skin, respiratory tract is one of the important routes of exposure. The elucidation and understanding of the mechanism of toxicity of SM have been effort intensive research. The multiple targets character of SM caused cellular damage resulted in activation of many different mechanisms which contribute to cellular response and participate in the final cytopathology effect. In our present work, we compared time-dependent changes in sulfur mustard exposed adult human lung fibroblasts NHLF and lung epithelial alveolar cell line A-549. Cell viability (MTT assay, Calcein-AM assay, and xCELLigence - real-time cell analysis), apoptosis (flow cytometry), mitochondrial membrane potential (Δψm, flow cytometry), reactive oxygen species induction (DC and cell cycle distribution (flow cytometry) were studied. We observed significantly decreased mitochondrial membrane potential and subsequent induction of apoptosis correlating with decreased cellular viability in the sulfur mustard exposed cells. In low concentrations, sulfur mustard-induced S-phase cell cycle arrest, on the other hand, high concentrations, cell cycle phase distribution of sulfur mustard exposed cells resembled cell cycle phase distribution of control group, which implies nonspecific cell cycle inhibition. Epithelial cells A-549 was found as more sensible to sulfur mustard toxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.Keywords: apoptosis, cell cycle, cytotoxicity, sulfur mustard
Procedia PDF Downloads 194159 Automation of Savitsky's Method for Power Calculation of High Speed Vessel and Generating Empirical Formula
Authors: M. Towhidur Rahman, Nasim Zaman Piyas, M. Sadiqul Baree, Shahnewaz Ahmed
Abstract:
The design of high-speed craft has recently become one of the most active areas of naval architecture. Speed increase makes these vehicles more efficient and useful for military, economic or leisure purpose. The planing hull is designed specifically to achieve relatively high speed on the surface of the water. Speed on the water surface is closely related to the size of the vessel and the installed power. The Savitsky method was first presented in 1964 for application to non-monohedric hulls and for application to stepped hulls. This method is well known as a reliable comparative to CFD analysis of hull resistance. A computer program based on Savitsky’s method has been developed using MATLAB. The power of high-speed vessels has been computed in this research. At first, the program reads some principal parameters such as displacement, LCG, Speed, Deadrise angle, inclination of thrust line with respect to keel line etc. and calculates the resistance of the hull using empirical planning equations of Savitsky. However, some functions used in the empirical equations are available only in the graphical form, which is not suitable for the automatic computation. We use digital plotting system to extract data from nomogram. As a result, value of wetted length-beam ratio and trim angle can be determined directly from the input of initial variables, which makes the power calculation automated without manually plotting of secondary variables such as p/b and other coefficients and the regression equations of those functions are derived by using data from different charts. Finally, the trim angle, mean wetted length-beam ratio, frictional coefficient, resistance, and power are computed and compared with the results of Savitsky and good agreement has been observed.Keywords: nomogram, planing hull, principal parameters, regression
Procedia PDF Downloads 405158 Evaluation of Outpatient Management of Proctological Surgery under Saddle Block
Authors: Bouhouf Atef, Beloulou Mohamed Lamine
Abstract:
Introduction: Outpatient surgery is continually developing compared to conventional inpatient surgery; its rate is constantly increasing every year due to global socio-economic pressure. Most hospitals continue to perform proctologic surgery in conventional hospitalization. Purpose: As part of a monocentric prospective descriptive study, we examined the feasibility of proctologic surgery under saddle block on an outpatient basis with the same safety conditions as in traditional hospitalization. Material and methods: This is a monocentric prospective descriptive study spread over a period of 24 months, from December 2018 to December 2020 including 150 patients meeting the medico-surgical and socio-environmental criteria of eligibility for outpatient surgery, operated for proctological pathologies under saddle block in outpatient mode, in the surgery department of the regional military hospital of Constantine Algeria. The data were collected and analyzed by the biomedical statistics software Epi-info and Microsoft Excel, then compared with other related studies. Results: This study involved over a period of two years, 150 male patients with an average age of 32 years (20-64). Most patients (95,33%) were ASA I class, and 4,67% ASA II class. All patients received saddle blocks. The average length of stay of patients was six hours. The quality indicators in outpatient surgery in our study were: zero (0)% of deprogrammings, three (3)% of conversions to full hospitalization, 0,7% of readmissions, an average waiting time before access to the operating room of 83 minutes without delay of discharge, a satisfaction rate of 90,8% and a reduction in the cost compared to conventional inpatient surgery in proportions ranging from – 32,6% and – 48,75%. Conclusions: The outpatient management of proctological surgery under saddle block is very beneficial in terms of safety, efficiency, simplicity, and economy. Our results are in line with those of the literature and our work deserves to be continued to include many patients.Keywords: outpatient surgery, proctological surgery, saddle block, satisfaction, cost
Procedia PDF Downloads 23157 Determination of Activation Energy for Thermal Decomposition of Selected Soft Tissues Components
Authors: M. Ekiert, T. Uhl, A. Mlyniec
Abstract:
Tendons are the biological soft tissue structures composed of collagen, proteoglycan, glycoproteins, water and cells of extracellular matrix (ECM). Tendons, which primary function is to transfer force generated by the muscles to the bones causing joints movement, are exposed to many micro and macro damages. In fact, tendons and ligaments trauma are one of the most numerous injuries of human musculoskeletal system, causing for many people (particularly for athletes and physically active people), recurring disorders, chronic pain or even inability of movement. The number of tendons reconstruction and transplantation procedures is increasing every year. Therefore, studies on soft tissues storage conditions (influencing i.e. tissue aging) seem to be an extremely important issue. In this study, an atomic-scale investigation on the kinetics of decomposition of two selected tendon components – collagen type I (which forms a 60-85% of a tendon dry mass) and elastin protein (which combine with ECM creates elastic fibers of connective tissues) is presented. A molecular model of collagen and elastin was developed based on crystal structure of triple-helical collagen-like 1QSU peptide and P15502 human elastin protein, respectively. Each model employed 4 linear strands collagen/elastin strands per unit cell, distributed in 2x2 matrix arrangement, placed in simulation box filled with water molecules. A decomposition phenomena was simulated with molecular dynamics (MD) method using ReaxFF force field and periodic boundary conditions. A set of NVT-MD runs was performed for 1000K temperature range in order to obtained temperature-depended rate of production of decomposition by-products. Based on calculated reaction rates activation energies and pre-exponential factors, required to formulate Arrhenius equations describing kinetics of decomposition of tested soft tissue components, were calculated. Moreover, by adjusting a model developed for collagen, system scalability and correct implementation of the periodic boundary conditions were evaluated. An obtained results provide a deeper insight into decomposition of selected tendon components. A developed methodology may also be easily transferred to other connective tissue elements and therefore might be used for further studies on soft tissues aging.Keywords: decomposition, molecular dynamics, soft tissue, tendons
Procedia PDF Downloads 210156 Comparison of Direction of Arrival Estimation Method for Drone Based on Phased Microphone Array
Authors: Jiwon Lee, Yeong-Ju Go, Jong-Soo Choi
Abstract:
Drones were first developed for military use and were used in World War 1. But recently drones have been used in a variety of fields. Several companies actively utilize drone technology to strengthen their services, and in agriculture, drones are used for crop monitoring and sowing. Other people use drones for hobby activities such as photography. However, as the range of use of drones expands rapidly, problems caused by drones such as improperly flying, privacy and terrorism are also increasing. As the need for monitoring and tracking of drones increases, researches are progressing accordingly. The drone detection system estimates the position of the drone using the physical phenomena that occur when the drones fly. The drone detection system measures being developed utilize many approaches, such as radar, infrared camera, and acoustic detection systems. Among the various drone detection system, the acoustic detection system is advantageous in that the microphone array system is small, inexpensive, and easy to operate than other systems. In this paper, the acoustic signal is acquired by using minimum microphone when drone is flying, and direction of drone is estimated. When estimating the Direction of Arrival(DOA), there is a method of calculating the DOA based on the Time Difference of Arrival(TDOA) and a method of calculating the DOA based on the beamforming. The TDOA technique requires less number of microphones than the beamforming technique, but is weak in noisy environments and can only estimate the DOA of a single source. The beamforming technique requires more microphones than the TDOA technique. However, it is strong against the noisy environment and it is possible to simultaneously estimate the DOA of several drones. When estimating the DOA using acoustic signals emitted from the drone, it is impossible to measure the position of the drone, and only the direction can be estimated. To overcome this problem, in this work we show how to estimate the position of drones by arranging multiple microphone arrays. The microphone array used in the experiments was four tetrahedral microphones. We simulated the performance of each DOA algorithm and demonstrated the simulation results through experiments.Keywords: acoustic sensing, direction of arrival, drone detection, microphone array
Procedia PDF Downloads 160155 A Web Service Based Sensor Data Management System
Authors: Rose A. Yemson, Ping Jiang, Oyedeji L. Inumoh
Abstract:
The deployment of wireless sensor network has rapidly increased, however with the increased capacity and diversity of sensors, and applications ranging from biological, environmental, military etc. generates tremendous volume of data’s where more attention is placed on the distributed sensing and little on how to manage, analyze, retrieve and understand the data generated. This makes it more quite difficult to process live sensor data, run concurrent control and update because sensor data are either heavyweight, complex, and slow. This work will focus on developing a web service platform for automatic detection of sensors, acquisition of sensor data, storage of sensor data into a database, processing of sensor data using reconfigurable software components. This work will also create a web service based sensor data management system to monitor physical movement of an individual wearing wireless network sensor technology (SunSPOT). The sensor will detect movement of that individual by sensing the acceleration in the direction of X, Y and Z axes accordingly and then send the sensed reading to a database that will be interfaced with an internet platform. The collected sensed data will determine the posture of the person such as standing, sitting and lying down. The system is designed using the Unified Modeling Language (UML) and implemented using Java, JavaScript, html and MySQL. This system allows real time monitoring an individual closely and obtain their physical activity details without been physically presence for in-situ measurement which enables you to work remotely instead of the time consuming check of an individual. These details can help in evaluating an individual’s physical activity and generate feedback on medication. It can also help in keeping track of any mandatory physical activities required to be done by the individuals. These evaluations and feedback can help in maintaining a better health status of the individual and providing improved health care.Keywords: HTML, java, javascript, MySQL, sunspot, UML, web-based, wireless network sensor
Procedia PDF Downloads 212154 China-Pakistan Nexus and Its Implication for India
Authors: Riddhi Chopra
Abstract:
While China’s friendship with a number of countries has waxed and waned over the decades, Sino-Pak relationship is said to have withstood the vicissitudes of larger international politics as well as changes in regional and domestic currents. Pakistan, one of the first countries to recognize the People’s Republic of China, thus providing China with a corridor into the energy rich Muslim states which was reciprocated with a continual stream of no-strings-attached military hardware and defense-related assistance from Beijing. The joint enmity towards India also provided the initial thrust to a burgeoning Sino-Pak friendship. This paper intends to provide a profound analysis of the strategic relation between China-Pakistan and examine India as a determining factor. The Pakistan-China strategic relationship has been conventionally viewed by India as a zero sum game, wherein any gains accrued by Pakistan or China through their partnership is seen as a direct detriment to the evolution of India-Pakistan or India-China relation. The paper evaluates various factors which were crucial for the synthesis of such a strong relation and presents a comprehensive study of the various policies and programs that have been undertaken by the two countries to tie India to South Asia and reduce its sphere of influence. The geographic dynamics is said to breed a natural coalition, dominating the strategic ambitions of both Beijing and Islamabad hence directing their relationship. In addition to the obvious geopolitical factors, there are several dense collaborations between the two nations knitting a relatively close partnership. Moreover, an attempt has been made to assess the irritants in China-Pak relations and the initiatives taken by the two to further strengthen it. Current trends in diplomatic, economic and defense cooperation – along with the staunch affinity rooted in history and consistent geo-strategic interests – points to a strong and strengthening relationship, significant in directing India’s foreign and security policies. This paper seeks to analyze the changing power dynamics of the China-Pak nexus with external actors such as US and India with an ulterior motive of their own and predict the change in power dynamics between the four countries.Keywords: China, Pakistan, India, strategy
Procedia PDF Downloads 268