Search results for: military establishment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1399

Search results for: military establishment

679 Application of Bacteriophage and Essential Oil to Enhance Photocatalytic Efficiency

Authors: Myriam Ben Said, Dhekra Trabelsi, Faouzi Achouri, Marwa Ben Saad, Latifa Bousselmi, Ahmed Ghrabi

Abstract:

This present study suggests the use of biological and natural bactericide, cheap, safe to handle, natural, environmentally benign agents to enhance the conventional wastewater treatment process. In the same sense, to highlight the enhancement of wastewater photocatalytic treatability, we were used virulent bacteriophage(s) and essential oils (EOs). The pre-phago-treatment of wastewater with lytic phage(s), leads to a decrease in bacterial density and, consequently, limits the establishment of intercellular communication (QS), thus preventing biofilm formation and inhibiting the expression of other virulence factors after photocatalysis. Moreover, to increase the photocatalytic efficiency, we were added to the secondary treated wastewater 1/1000 (w/v) of EO of thyme (T. vulgaris). This EO showed in vitro an anti-biofilm activity through the inhibition of plonctonic cell mobility and their attachment on an inert surface and also the deterioration of the sessile structure. The presence of photoactivatable molecules (photosensitizes) in this type of oil allows the optimization of photocatalytic efficiency without hazards relayed to dyes and chemicals reagent. The use of ‘biological and natural tools’ in combination with usual water treatment process can be considered as a safety procedure to reduce and/or to prevent the recontamination of treated water and also to prevent the re-expression of virulent factors by pathogenic bacteria such as biofilm formation with friendly processes.

Keywords: biofilm, essential oil, optimization, phage, photocatalysis, wastewater

Procedia PDF Downloads 154
678 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 426
677 MXene-Based Self-Sensing of Damage in Fiber Composites

Authors: Latha Nataraj, Todd Henry, Micheal Wallock, Asha Hall, Christine Hatter, Babak Anasori, Yury Gogotsi

Abstract:

Multifunctional composites with enhanced strength and toughness for superior damage tolerance are essential for advanced aerospace and military applications. Detection of structural changes prior to visible damage may be achieved by incorporating fillers with tunable properties such as two-dimensional (2D) nanomaterials with high aspect ratios and more surface-active sites. While 2D graphene with large surface areas, good mechanical properties, and high electrical conductivity seems ideal as a filler, the single-atomic thickness can lead to bending and rolling during processing, requiring post-processing to bond to polymer matrices. Lately, an emerging family of 2D transition metal carbides and nitrides, MXenes, has attracted much attention since their discovery in 2011. Metallic electronic conductivity and good mechanical properties, even with increased polymer content, coupled with hydrophilicity make MXenes a good candidate as a filler material in polymer composites and exceptional as multifunctional damage indicators in composites. Here, we systematically study MXene-based (Ti₃C₂) coated on glass fibers for fiber reinforced polymer composite for self-sensing using microscopy and micromechanical testing. Further testing is in progress through the investigation of local variations in optical, acoustic, and thermal properties within the damage sites in response to strain caused by mechanical loading.

Keywords: damage sensing, fiber composites, MXene, self-sensing

Procedia PDF Downloads 120
676 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 348
675 Psychopedagogical Service for the Promotion of Cognitive Abilities in Competitive Athletes

Authors: T. Esteves, S. Mesquita, A. Santos, A. Campina, C. Costa-Lobo

Abstract:

The theme regarding the differentiation of high-performance athletes has always aroused curiosity and fascination, becoming a target for study, especially in the social and human sciences. It was from the 60's and 70's that the concern for the study of the excellence of athletes that showed indices of high performance in sports began to arise. From the 1990s, it became possible to specify the mental competencies and psychological characteristics associated with Olympic athletes with high levels of success. Several studies considered that well-structured pre-competitive and competitive routines and plans were predictors of sports success. Likewise, the high levels of motivation, commitment and concentration; the high levels of self-confidence and optimism; the presence of effective coping strategies to deal with distractions and unexpected situations or events; adequate regulation of activation and anxiety; the establishment and formulation of objectives; and mental visualization and practice were determinants in the manifestation of excellence in these athletes. As such, the promotion of these cognitive abilities has been emphasized in the good performance of the athletes. With the objective of implementing cognitive stimulation programs to meet the specific needs of talented athletes, together with pedagogical activities to promote educational strategies and promote interpersonal relationships, this communication systematizes a proposal for a psychopedagogical service to promote cognitive abilities in competitive athletes, SPAC, to implement in a Portuguese soccer team. This service will be based on a holistic vision in order to promote talent.

Keywords: athletes, cognitive abilities, high competition, psycho-pedagogical service

Procedia PDF Downloads 280
674 Two-stage Robust Optimization for Collaborative Distribution Network Design Under Uncertainty

Authors: Reza Alikhani

Abstract:

This research focuses on the establishment of horizontal cooperation among companies to enhance their operational efficiency and competitiveness. The study proposes an approach to horizontal collaboration, called coalition configuration, which involves partnering companies sharing distribution centers in a network design problem. The paper investigates which coalition should be formed in each distribution center to minimize the total cost of the network. Moreover, potential uncertainties, such as operational and disruption risks, are considered during the collaborative design phase. To address this problem, a two-stage robust optimization model for collaborative distribution network design under surging demand and facility disruptions is presented, along with a column-and-constraint generation algorithm to obtain exact solutions tailored to the proposed formulation. Extensive numerical experiments are conducted to analyze solutions obtained by the model in various scenarios, including decisions ranging from fully centralized to fully decentralized settings, collaborative versus non-collaborative approaches, and different amounts of uncertainty budgets. The results show that the coalition formation mechanism proposes some solutions that are competitive with the savings of the grand coalition. The research also highlights that collaboration increases network flexibility and resilience while reducing costs associated with demand and capacity uncertainties.

Keywords: logistics, warehouse sharing, robust facility location, collaboration for resilience

Procedia PDF Downloads 69
673 Spatio-Temporal Pest Risk Analysis with ‘BioClass’

Authors: Vladimir A. Todiras

Abstract:

Spatio-temporal models provide new possibilities for real-time action in pest risk analysis. It should be noted that estimation of the possibility and probability of introduction of a pest and of its economic consequences involves many uncertainties. We present a new mapping technique that assesses pest invasion risk using online BioClass software. BioClass is a GIS tool designed to solve multiple-criteria classification and optimization problems based on fuzzy logic and level set methods. This research describes a method for predicting the potential establishment and spread of a plant pest into new areas using a case study: corn rootworm (Diabrotica spp.), tomato leaf miner (Tuta absoluta) and plum fruit moth (Grapholita funebrana). Our study demonstrated that in BioClass we can combine fuzzy logic and geographic information systems with knowledge of pest biology and environmental data to derive new information for decision making. Pests are sensitive to a warming climate, as temperature greatly affects their survival and reproductive rate and capacity. Changes have been observed in the distribution, frequency and severity of outbreaks of Helicoverpa armigera on tomato. BioClass has demonstrated to be a powerful tool for applying dynamic models and map the potential future distribution of a species, enable resource to make decisions about dangerous and invasive species management and control.

Keywords: classification, model, pest, risk

Procedia PDF Downloads 282
672 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 272
671 Novel Practices in Research and Innovation Management

Authors: A. Ravinder Nath, D. Jaya Prakash, T. Venkateshwarlu, P. Raja Rao

Abstract:

The introduction of novel practices in research and innovation management at the university are likely to make a real difference in improving the quality of life and boost the global competitiveness for sustainable economic growth. Establishment a specific institutional structure at the university level provides professional management and administrative expertise to the university’s research community by sourcing out funding opportunities, extending guidance in grant proposal preparation and submission and also assisting in the post award reporting and regulatory observance. In addition to these it can involve in negotiating fair and equitable research contracts. Further it administer research governance to provide support and encourage collaborations across all disciplines of the university with industry, government, community based organizations, foundations, and associations at the local, regional, national and international levels/scales. The partnerships in research and innovation are more powerful and far needed tools for knowledge-based economy, where the universities can offer the services of much wanted human resources to promote, foster, and sustain excellence in research. In addition to this the institutes provide amply desired infrastructure and expertise to work with the investigators, and the industry will generate required financial resources in a coordinated manner. Further it is possible to carryout high-end applied research and synergizes the research capabilities and professional skills of students, faculty, scientists, and industrial work force.

Keywords: collaborations, competitiveness, contracts, governance

Procedia PDF Downloads 397
670 A Framework for University Social Responsibility and Sustainability: The Case of South Valley University, Egypt

Authors: Alaa Tag-Eldin Mohamed

Abstract:

The environmental, cultural, social, and technological changes have led higher education institutes to question their traditional roles. Many declarations and frameworks highlight the importance of fulfilling social responsibility of higher education institutes. The study aims at developing a framework of university social responsibility and sustainability (USR&S) with focus on South Valley University (SVU) as a case study of Egyptian Universities. The study used meetings with 12 vice deans of community services and environmental affairs on social responsibility and environmental issues. The proposed framework integrates social responsibility with strategic management through the establishment and maintenance of the vision, mission, values, goals and management systems; elaboration of policies; provision of actions; evaluation of services and development of social collaboration with stakeholders to meet current and future needs of the community and environment. The framework links between different stakeholders internally and externally using communication and reporting tools. The results show that SVU integrates social responsibility and sustainability in its strategic plans. It has policies and actions however fragmented and lack of appropriate structure and budgeting. The proposed framework could be valuable for researchers and decision makers of the Egyptian Universities. The study proposed recommendations and highlighted building on the results and conducting future research.

Keywords: corporate social responsibility (CSR), south valley university, sustainable university, university social responsibility and sustainability (USR&S)

Procedia PDF Downloads 346
669 Farmers’ Awareness of Pillars of Planting for Food and Jobs Programme in Ghana

Authors: Franklin Nantui Mabe, Gideon Danso-Abbeam, Dennis Sedem Ehiakpor

Abstract:

In order for the government of Ghana through the Ministry of Food and Agriculture to motivate farmers to adopt improved agricultural technologies, expand their farms and encourage youth to enter into agricultural production so as to increase crop productivity, “Planting for Food and Jobs” (PFJ) programme was launched in April 2017. The PFJ programme covers five pillars, namely, provision of subsidized and improved seeds; subsidized fertilizer; agricultural extension services; establishment of markets; and e-agriculture. This study assesses the awareness of farmers about the packages of these pillars using the Likert scale, paired t-test and Spearman’s rank correlation coefficient. The study adopted a mixed research design. A semi-structured questionnaire and checklist were used to collect data. The data collection was done using interviews and focus group discussions. The PFJ pillar farmers are much aware is a subsidy on fertilizer followed by a subsidy on improved seeds. Electronic agriculture is a pillar with the lowest level of awareness. There is a strong positive correlation between awareness of fertilizer and seed packages suggestion their complementarities. Lack of information/awareness of the packages of the programme can affect farmers’ participation in all the pillars. Farmers, in particular, should be educated for them to know what they are entitled to in each of the pillars. The programme implementation plan should also be made available to farmers as a guide.

Keywords: awareness, planting for food and jobs, programme, farmers, likert scale

Procedia PDF Downloads 231
668 Building Information Modelling (BIM) and Unmanned Aerial Vehicles (UAV) Technologies in Road Construction Project Monitoring and Management: Case Study of a Project in Cyprus

Authors: Yiannis Vacanas, Kyriacos Themistocleous, Athos Agapiou, Diofantos Hadjimitsis

Abstract:

Building Information Modelling (BIM) technology is considered by construction professionals as a very valuable process in modern design, procurement and project management. Construction professionals of all disciplines can use a single 3D model which BIM technology provides, to design a project accurately and furthermore monitor the progress of construction works effectively and efficiently. Unmanned Aerial Vehicles (UAVs), a technology initially developed for military applications, is now without any difficulty accessible and has already been used by commercial industries, including the construction industry. UAV technology has mainly been used for collection of images that allow visual monitoring of building and civil engineering projects conditions in various circumstances. UAVs, nevertheless, have undergone significant advances in equipment capabilities and now have the capacity to acquire high-resolution imagery from many angles in a cost effective manner, and by using photogrammetry methods, someone can determine characteristics such as distances, angles, areas, volumes and elevations of an area within overlapping images. In order to examine the potential of using a combination of BIM and UAV technologies in construction project management, this paper presents the results of a case study of a typical road construction project where the combined use of the two technologies was used in order to achieve efficient and accurate as-built data collection of the works progress, with outcomes such as volumes, and production of sections and 3D models, information necessary in project progress monitoring and efficient project management.

Keywords: BIM, project management, project monitoring, UAV

Procedia PDF Downloads 303
667 Effect of Experience on Evacuation of Mice in Emergency Conditions

Authors: Teng Zhang, Shenshi Huang, Gang Xu, Xuelin Zhang, Shouxiang Lu

Abstract:

With the acceleration of urbanization and the increasing of the population in the city, the evacuation of pedestrians suffering from disaster environments such as fire in a room or other limited space becomes a vital issue in modern society. Mice have been used in experimental crowd evacuation in recent years for its good similarities to human in physical structure and stress reaction. In this study, the effect of experience or memory on the collective behavior of mice was explored. To help mice familiarize themselves with the design of the space and the stimulus caused by smoke, we trained them repeatedly for 2 days so that they can escape from the emergency conditions as soon as possible. The escape pattern, trajectories, walking speed, turning angle and mean individual escape time of mice in each training trail were analyzed. We found that mice can build memory quickly after the first trial on the first day. On the second day, the evacuation of mice was maintained in a stable and efficient state. Meanwhile, the group with size of 30 (G30) had a shorter mean individual escape time compared with G12. Furthermore, we tested the experience of evacuation skill of mice after several days. The results showed that the mice can hold the experience or memory over 3 weeks. We proposed the importance of experience of evacuation skill and the research of training methods in experimental evacuation of mice. The results can deepen our understanding of collective behavior of mice and conduce to the establishment of animal models in the study of pedestrian crowd dynamics in emergency conditions.

Keywords: experience, evacuation, mice, group size, behavior

Procedia PDF Downloads 268
666 A Cross-Cultural Investigation of Self-Compassion in Adolescents Across Gender

Authors: H. N. Cheung

Abstract:

Self-compassion encourages one to accept oneself, reduce self-criticism and self-judgment, and see one’s shortcomings and setbacks in a balanced view. Adolescent self-compassion is a crucial protective factor against mental illness. It is, however, affected by gender. Given the scarcity of self-compassion scales for adolescents, the current study evaluates the Self-Compassion Scale for Youth (SCS-Y) in a large cross-cultural sample and investigates how the subscales of SCS-Y relate to the dimensions of depressive symptoms across gender. Through the internet-based Qualtrics, a total of 2881 teenagers aged 12 to 18 years were recruited from Hong Kong (HK), China, and the United Kingdom. A Multiple Indicator Multiple Cause (MIMIC) model was used to evaluate measurement invariance of the SCS-Y, and differential item functioning (DIF) was checked across gender. Upon the establishment of the best model, a multigroup structural equation model (SEM) was built between factors of SCS-Y and Multidimensional depression assessment scale (MDAS) which assesses four dimensions of depressive symptoms (emotional, cognitive, somatic and interpersonal). The SCS-Y was shown to have good reliability and validity. The MIMIC model produced a good model fit for a hypothetical six-factor model (CFI = 0.980; TLI = 0.974; RMSEA = 0.038) and no item was flagged for DIF across gender. A gender difference was observed between SCS-Y factors and depression dimensions. Conclusions: The SCS-Y exhibits good psychometric characteristics, including measurement invariance across gender. The study also highlights the gender difference between self-compassion factors and depression dimensions.

Keywords: self compassion, gender, depression, structural equation modelling, MIMIC model

Procedia PDF Downloads 71
665 Assessing the Empowerment of Muslim Women in Malawi: A Case Study of the Muslim Women Organisation

Authors: Ulemu Maseko

Abstract:

This research is a critical assessment of the empowerment of Muslim women in Malawi. The study assessed, evaluated, and analyzed how the Muslim Women Organization (MWO) has influenced gender equality and women empowerment in different Islamic communities. In analyzing the data collected for this research, the study has examined the following topics: The way MWO has interpreted Islamic women’s rights, the various stereotypes Muslim women face, and lastly, the factors contributing to the limitation of Muslim women’s rights in Malawi. Towards this analysis, the study revealed that women groups such as MWO are crucial in understanding Muslim women and the different dynamics related to their empowerment. Therefore, it is necessary to understand how Muslim women comprehend various Islamic sources and how they link religion to their position and participation in society. To achieve the scope of this study, relevant works of literature that best described Islam in Malawi, Muslim women groups, and women empowerment in Malawi were used, coupled with a qualitative research approach that involved interviews, focus group discussions, and participant observations. In addition, phenomenology and feminist theoretical frameworks were used to examine and analyze the findings. Based on the findings, it can be concluded that MWO is a significant body for gender equality and women empowerment initiatives in the Malawian Islamic community. Since its establishment in 1985 till the time of this study, MWO has been an imperative driving force towards an Islamic women’s discourse that uses Islamic teachings, faith, policies, and practices to justify the role of the Muslim woman in society. This has been enlightening for their platform and has given them more confidence to justify the empowerment of Muslim women and support different initiatives towards social change.

Keywords: Islam, women, empowerment, Malawi

Procedia PDF Downloads 80
664 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 803
663 Heuristic Algorithms for Time Based Weapon-Target Assignment Problem

Authors: Hyun Seop Uhm, Yong Ho Choi, Ji Eun Kim, Young Hoon Lee

Abstract:

Weapon-target assignment (WTA) is a problem that assigns available launchers to appropriate targets in order to defend assets. Various algorithms for WTA have been developed over past years for both in the static and dynamic environment (denoted by SWTA and DWTA respectively). Due to the problem requirement to be solved in a relevant computational time, WTA has suffered from the solution efficiency. As a result, SWTA and DWTA problems have been solved in the limited situation of the battlefield. In this paper, the general situation under continuous time is considered by Time based Weapon Target Assignment (TWTA) problem. TWTA are studied using the mixed integer programming model, and three heuristic algorithms; decomposed opt-opt, decomposed opt-greedy, and greedy algorithms are suggested. Although the TWTA optimization model works inefficiently when it is characterized by a large size, the decomposed opt-opt algorithm based on the linearization and decomposition method extracted efficient solutions in a reasonable computation time. Because the computation time of the scheduling part is too long to solve by the optimization model, several algorithms based on greedy is proposed. The models show lower performance value than that of the decomposed opt-opt algorithm, but very short time is needed to compute. Hence, this paper proposes an improved method by applying decomposition to TWTA, and more practical and effectual methods can be developed for using TWTA on the battlefield.

Keywords: air and missile defense, weapon target assignment, mixed integer programming, piecewise linearization, decomposition algorithm, military operations research

Procedia PDF Downloads 336
662 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors

Authors: Jacob J. Shila, Xiaoyu O. Wu

Abstract:

As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.

Keywords: human factors, incidents and accidents, safety, UAS, UAV

Procedia PDF Downloads 242
661 Climate Change and Migration from Ngala and Kala-Balge LGAs, North-Eastern Borno State, Nigeria

Authors: Adam Modu Abbas

Abstract:

Nigeria, due to its location, size and population is very vulnerable to the impact of climate change. Little effort is however made to address most of the problems, despite the fact that sufficient understanding is made on the impact of climate change and problems emanating from it are also always being propagated. Migration, one of the resultant effects of climate change is however given less attention. This paper focuses on the climate change impact and one of resulting effects, migration and its associated problems. Purposive sampling technique was adopted in sampling 250 respondents who were mainly family members of out-migrants from Ngala and Kala-Balge LGAs of North-eastern Borno State, Nigeria. Available literatures were consulted for the types of climate change impacts. The results revealed that, climate change leads to climatic variation over the space with numerous effects on the environment such as intermittent droughts, desertification/deforestation, low water table and establishment of dams across the courses of the main sources of water supply to the Lake Chad. Many people in the study area either migrated to Cameroon’s Darrak, Lake Doi and Mayo Mbund, Lagos, Nigeria, leaving some members of their families at home. More than half of respondents indicated that the heads of the households migrated as a result of poor harvest due to diminishing or fluctuating rains/drought and/or drying of river Surbewel. It is recommended that; inter-basin water transfers should be embarked upon.

Keywords: climate, change, migration, dam, intermittent

Procedia PDF Downloads 443
660 Mapping of Adrenal Gland Diseases Research in Middle East Countries: A Scientometric Analysis, 2007-2013

Authors: Zahra Emami, Mohammad Ebrahim Khamseh, Nahid Hashemi Madani, Iman Kermani

Abstract:

The aim of the study was to map scientific research on adrenal gland diseases in the Middle East countries through the Web of Science database using scientometric analysis. Data were analyzed with Excel software; and HistCite was used for mapping of the scientific texts. In this study, from a total of 268 retrieved records, 1125 authors from 328 institutions published their texts in 138 journals. Among 17 Middle East countries, Turkey ranked first with 164 documents (61.19%), Israel ranked second with 47 documents (15.53%) and Iran came in the third place with 26 documents. Most of the publications (185 documents, 69.2%) were articles. Among the universities of the Middle East, Istanbul University had the highest science production rate (9.7%). The Journal of Clinical Endocrinology & Metabolism had the highest TGCS (243 citations). In the scientific mapping, 7 clusters were formed based on TLCS (Total Local Citation Score) & TGCS (Total Global Citation Score). considering the study results, establishment of scientific connections and collaboration with other countries and use of publications on adrenal gland diseases from high ranking universities can help in the development of this field and promote the medical practice in this regard. Moreover, investigation of the formed clusters in relation to Congenital Hyperplasia and puberty related disorders can be research priorities for investigators.

Keywords: mapping, scientific research, adrenal gland diseases, scientometric

Procedia PDF Downloads 273
659 The Use of Self-Determination Theory to Assess the Opportunities and Challenges for Blended E-Learning in Egypt: An Analysis of the Motivations of Logistics Lecturers

Authors: Aisha Tarek Noour, Nick Hubbard

Abstract:

Blended e-Learning (BL) is proving to be an effective pedagogical tool in many areas of business and management education, but there remains a number of barriers to overcome before its implementation. This paper seeks to analyse the views of lecturers towards BL according to Self-Determination Theory (SDT), and identifies the opportunities and challenges for using BL in Logistics Education in an Egyptian higher education establishment. SDT is approached from a different perspective and the relationship between intrinsic motivation (IM), extrinsic motivation (EM), and amotivation (AM) is analysed and related to the opportunities and challenges of the BL method. The case study methodology comprises of a series of interviews with lecturers employed at three Colleges of International Transport and Logistics (CITLs) at the Arab Academy for Science, Technology, Maritime and Transport (AAST&MT) in Egypt. A structured face-to-face interview was undertaken with 61 interviewees across all faculty positions: Deans, Associate Professors, Assistant Professor, Department Heads, Part-time instructors, Teaching Assistants, and Graduate Teaching Assistants. The findings were based on "content analysis" of the interview transcripts and use of the NVivo10 software program. The research contributes to the application of SDT within the field of BL through an analysis of the views of lecturers towards the opportunities and challenges that BL offers to logistics educators in Egypt.

Keywords: intrinsic motivation, extrinsic motivation, amotivation, autonomy, competence, relatedness, self-determination theory and blended e-learning

Procedia PDF Downloads 440
658 Wolof Voice Response Recognition System: A Deep Learning Model for Wolof Audio Classification

Authors: Krishna Mohan Bathula, Fatou Bintou Loucoubar, FNU Kaleemunnisa, Christelle Scharff, Mark Anthony De Castro

Abstract:

Voice recognition algorithms such as automatic speech recognition and text-to-speech systems with African languages can play an important role in bridging the digital divide of Artificial Intelligence in Africa, contributing to the establishment of a fully inclusive information society. This paper proposes a Deep Learning model that can classify the user responses as inputs for an interactive voice response system. A dataset with Wolof language words ‘yes’ and ‘no’ is collected as audio recordings. A two stage Data Augmentation approach is adopted for enhancing the dataset size required by the deep neural network. Data preprocessing and feature engineering with Mel-Frequency Cepstral Coefficients are implemented. Convolutional Neural Networks (CNNs) have proven to be very powerful in image classification and are promising for audio processing when sounds are transformed into spectra. For performing voice response classification, the recordings are transformed into sound frequency feature spectra and then applied image classification methodology using a deep CNN model. The inference model of this trained and reusable Wolof voice response recognition system can be integrated with many applications associated with both web and mobile platforms.

Keywords: automatic speech recognition, interactive voice response, voice response recognition, wolof word classification

Procedia PDF Downloads 116
657 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 137
656 Evaluation of Urban Land Development Direction in Kabul City, Afghanistan

Authors: Ahmad Sharif Ahmadi, Yoshitaka Kajita

Abstract:

Kabul, the capital and largest city in Afghanistan has been experiencing a massive population expansion and fast economic development in last decade, in which urban land has increasingly expanded and formed a high informal development territory in the city. This paper investigates the urban land development direction based on the integrated urbanization trends in Kabul city since the last and the fastest ever urban land growth period (1999-2008), which is parallel with the establishment of the new government in Afghanistan. Considering the existing challenges in terms of informal settlements, squatter settlements, the population expansion of the city, and fast economic development, as well as the huge influx of returning refugees from neighboring countries, and the sprawl direction of urbanization of the Kabul city urban fringes, this research focuses on the possible urban land development direction and trends for the city. The paper studies the feasible future land development direction of Kabul city in the northern part called Shamali basin, in which district 17 is the gateway for future development. The area has much developable area including eight districts of Kabul province, and the vast area of Parwan and Kapisa provinces. The northern area of the Kabul city generally has favorable conditions for further urbanization from the city. It is a large and relatively flat area of area in the northern part of Kabul city, with ample water resources available from the Panjshir basin as a base principle of land development direction in the area.

Keywords: Kabul city, land development trends, urban land development, urbanization

Procedia PDF Downloads 281
655 Communication Tools Used in Teaching and Their Effects: An Empirical Study on the T. C. Selcuk University Samples

Authors: Sedat Simsek, Tugay Arat

Abstract:

Today's communication concept, which has a great revolution with the printing press which has been found by Gutenberg, has no boundary thanks to advanced communication devices and the internet. It is possible to take advantage in many areas, such as from medicine to social sciences or from mathematics to education, from the computers that was first produced for the purpose of military services. The use of these developing technologies in the field of education has created a great vision changes in both training and having education. Materials, which can be considered as basic communication resources and used in traditional education has begun to lose its significance, and some technologies have begun to replace them such as internet, computers, smart boards, projection devices and mobile phone. On the other hand, the programs and applications used in these technologies have also been developed. University students use virtual books instead of the traditional printed book, use cell phones instead of note books, use the internet and virtual databases instead of the library to research. They even submit their homework with interactive methods rather than printed materials. The traditional education system, these technologies, which increase productivity, have brought a new dimension to education. The aim of this study is to determine the influence of technologies in the learning process of students and to find whether is there any similarities and differences that arise from the their faculty that they have been educated and and their learning process. In addition to this, it is aimed to determine the level of ICT usage of students studying at the university level. In this context, the advantages and conveniences of the technology used by students are also scrutinized. In this study, we used surveys to collect data. The data were analyzed by using SPSS 16 statistical program with the appropriate testing.

Keywords: education, communication technologies, role of technology, teaching

Procedia PDF Downloads 303
654 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 260
653 Comparison of Acetylcholinesterase Reactivators Cytotoxicity with Their Structure

Authors: Lubica Muckova, Petr Jost, Jaroslav Pejchal, Daniel Jun

Abstract:

The development of acetylcholinesterase reactivators, i.e. antidotes against organophosphorus poisoning, is an important goal of defence research. The aim of this study was to compare cytotoxicity and chemical structure of 5 currently available (pralidoxime, trimedoxime, obidoxime, methoxime, and asoxime) and 4 newly developed compounds (K027, K074, K075, and K203). In oximes, there could be at least four important structural factors affecting their toxicity, including the number of oxime groups in the molecule, the position of oxime group(s) on pyridinium ring, the length of carbon linker, and the substitution by oxygen or insertion of the double bond into the connection chain. The cytotoxicity of tested substances was measured using colorimetric 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl-tetrazolium bromide assay (MTT assay) in SH-SY5Y cell line. Toxicity was expressed as toxicological index IC₅₀. The tested compounds showed different cytotoxicity ranging from 1.5 to 27 mM. K027 was the least, and methoxime was the most toxic reactivator. The lowest toxicity was found in a monopyridinium reactivator and bispyridinium reactivators with simple 3C carbon linker. Shortening of connection chain length to 1C, incorporation of oxygen moiety into 3C compounds, elongation of carbon linker to 4C and insertion of a double bond into 4C substances increase AChE reactivators' cytotoxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.

Keywords: acetylcholinesterase, cytotoxicity, organophosphorus poisoning, reactivators of acetylcholinesterase

Procedia PDF Downloads 307
652 Reviewing the Effect of Healing Design on Mental Health Establishments in the Context of India

Authors: Aratrika Sarkar, Jayita Guha Niyogi

Abstract:

This paper focuses on the application of general healing design theories to modulate them into case-specific and contextual design considerations. Existing literature focuses on the relationship between architecture and mental health. Primary case studies are selected in India to focus on the effect of a specific location on design considerations. They are qualitatively analysed to further contextualise the inferences from the literature study. An academic project is cited as an example to apply the learnings from the study and understand the influence of various parameters on the design process for further conclusion. Literature studies, case studies and hypothetical design applications helped in finding the different ways of achieving the similar goal of a sensitive approach toward mental health. Along with salutogenic parameters, category of establishment, age group, location of the site and user preference plays a crucial role in the design process. Design of mental health establishments, especially in India, has to involve transparency between stakeholders and users. Owing to different climatic zones and diverse sociocultural traditions, the approach toward healing should adapt accordingly. It should be an effort towards striking a balance between contradictory elements of healing design and resolving the dilemmas with sensitivity and consensus. Lastly, the design should not force a person towards communication or companionship but rather let the person realise that naturally through the healing process.

Keywords: contextual healing design, deinstitutionalisation, Indian mental healthcare establishments, environmental psychology, salutogenesis, therapeutic design

Procedia PDF Downloads 108
651 Access to Apprenticeships and the Impact of Individual and School Level Characteristics

Authors: Marianne Dæhlen

Abstract:

Periods of apprenticeships are characteristic of many vocational educational training (VET) systems. In many countries, becoming a skilled worker implies that the journey starts with an application for apprenticeships at a company or another relevant training establishment. In Norway, where this study is conducted, VET students start their journey with two years of school-based training before applying for two years of apprenticeship. Previous research has shown that access to apprenticeships differs by family background (socio-economic, immigrant, etc.), gender, school grades, and region. The question we raise in this study is whether the status, reputation, or position of the vocational school contributes to VET students’ access to apprenticeships. Data and methods: Register data containing information about schools’ and VET students’ characteristics will be analyzed in multilevel regression analyses. At the school level, the data will contain information on school size, shares of immigrants and/or share of male/female students, and grade requirements for admission. At the VET-student level, the register contains information on e.g., gender, school grades, educational program/trade, obtaining apprenticeship or not. The data set comprises about 3,000 students. Results: The register data is expected to be received in November 2024 and consequently, any results are not present at the point of this call. The planned article is part of a larger research project granted from the Norwegian Research Council and will, accordingly to the plan, start up in December 2024.

Keywords: apprenticeships, VET-students’ characteristics, vocational schools, quantitative methods

Procedia PDF Downloads 9
650 The Role of Gender in English Language Acquisition for Chinese Medical Students

Authors: Christopher Celozzi, Sarah Kochav

Abstract:

Our research investigates the numerous challenges faced by Chinese ESL university students enrolled in the medical and related healthcare professional fields. The over-arching research question is how gender influences classroom participation and learning. The second research question addressed is 'what instructional strategies may be utilized to promote student participation and language acquisition?'. Participants’ language ability has been assessed and evaluated in order to facilitate the establishment of a statistical baseline for the subsequent intervention. This research delves deeper into each individual’s personal and academic circumstances, in an effort to reveal any held intrinsic gender beliefs and social identities that may influence learning. Also considered is the impact on learning for a homogenized student population within a uniform, highly structured learning environment. Specially, what is the influence of China’s ‘one-child policy’ on individual learning habits? The impact of their millennial identity and reliance on social media is also examined. A qualitative methodology with a case study approach is employed, with interviews conducted among the participants. Student response to the intervention and selected remediation strategies are documented, analyzed and discussed. The findings of the study may serve to inform educator instructional practice, while advancing the student learner in their pursuit of English competency in highly competitive professions.

Keywords: Chinese students, gender, English, language acquisition

Procedia PDF Downloads 205