Search results for: hypotenuse leg difference method
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21967

Search results for: hypotenuse leg difference method

14497 The Roots of the Robust and Looting Economy (poverty and inequality) in Iran after the 1979 Revolution, From the Perspective of Acem Oglu & Robinson theory

Authors: Vorya Shabrandi

Abstract:

The study factors of poverty and inequality causes in countries is the subject of many scholars and economists in the last century, theorists in various areas of economic science know different factors as the roots of poverty and inequality in Iran after the 1979 revolution. Economists have emphasized political elements and political scientists on political elements. This research reviews the political economy of poverty and corruption in Iran after the revolution. The findings of this research, based on AcemOgluand Robinson theory, show how the institutional structural dependence of Iran's economy to raw has led to the growth of its non-economic economic institutions and its consequence of the continuity of the release and looting economy and poverty and inequality in Iran's political economy Is. This research was carried out using descriptive-analytical and comparative methods. Many economists try to justify the conditions of the country based on war, sanctions; And the external factors, and ... knows. In this study, we tried to examine the roots of poverty and the looting economy of Iran by implementing Research AcemOgluand Robinson on the institutions and roots of poverty. Looking for a framework for understanding why countries, such as Iran, the reason for the difference in revenue in different countries, as well as the poor or wealth of countries, regardless of the non-effective and non-professional institutions, and why inefficient institutions in some countries, such as Iran, such as Iran It remains and does not have a voluntary political powers to change these institutions. Findings The research shows that institutions are broadly the main reason for the roots of the robust and looting economy (poverty and inequality) in Iran.

Keywords: Iran, plunderable (Loot) economy, raw shopping, poverty and inequality, acem oglu and robinson, non-inclusive institutions

Procedia PDF Downloads 128
14496 The Evaluation of Antioxidant Activity of Aloe Vera (Aloe barbadensis miller)

Authors: R. A. Akande, M. L. Mnisi

Abstract:

Introduction: Aloe vera (Aloe barbadensis miller) flowers are carried in a large candelabra-like flower-head. Aloe barbadensis miller has been known as a traditional herbal medicine for the treatment of many diseases and sicknesses mainly for skin conditions such as sunburns, cold sores and frostbite. It is also used as a fresh food preservative. The main objective of this study is to determine the antioxidant activity of Aloe barbadensis miller. Methodology: The plant material (3g) was separately extracted with 30 mL of solvent with varying polarities (methanol and ethyl acetate)(technical grade, Merck) in 50ml polyester centrifuge tubes. The tubes was be shaken for 30 minutes on a linear shaker and left over night. The supernatant was filtered using a Whitman No. 1 filter paper before being transferred into pre-weighed glass containers. The solvent was allowed to evaporate under a fan in a room to quantify extraction efficacy. The, tin layer chromatography(TLC) plates were prepared and Pasteur pipette was used for spotting each extractant (methanol and ethyl acetate) on the TLC plates and the plate was developed in saturated TLC tank .and dipped in vanillin sulphuric acid mixture and heated at 110 to detect separate compound .and dipped in DDPH in methanol to detect antioxidant. Expected contribution to knowledge: It was observed that different compounds which interact differently with different solvent such as methanol, ethyl acetate having difference polarities were observed. The yellow spots also observed from the plate dipped in DDPH indicate that Aloe barbadensis miller has antioxidant.

Keywords: antioxidant activity, Aloe barbadensis miller, tin layer chromatography, DDPH

Procedia PDF Downloads 434
14495 Wound Healing Potential and Comparison of Mummy Substance Effect on Adipose and Wharton’s Jelly-Derived Mesenchymal Stem Cells Co-Cultured with Human Fibroblast

Authors: Sepideh Hassanpour Khodaei

Abstract:

Background/Objectives: The purpose of this study is to evaluate the effect of mummy substances on two issues of proliferation and production of matrix protein synthesis in wound healing. Methods: The methodology used for this aim involves isolating mesenchymal stem cells and human fibroblasts procured at Pastor Institute, Iran. The cells were treated with mummy substances separately and co-cultured between ASCs and WJSCs, and fibroblasts. Proliferation was assessed by Ki67 method in monolayer conditions. Synthesis of components of extracellular matrix (ECM) such as collagen type I, type III, and fibronectin 1 (FN1) was determined by qPCR. Results: The effects of adipocyte stem cells (ASCs), Wharton Jelly Stem Cells (WJSCs), and Mummy material on fibroblast proliferation and migration were evaluated. The present finding underlined the importance of Mummy material, ASCs, and WJSCs in the proliferation and migration of fibroblast cells. Furthermore, the expression of collagen I, III, and FN1 was increased in the presence of the above material and cells. Conclusion: This study presented an effective in vitro method for the healing process. Hence, the prospect of utilizing Mummy material and stem cell-based therapies in wound healing as a therapeutic approach is promising.

Keywords: mummy material, wound healing, adipose tissue, Wharton’s jelly

Procedia PDF Downloads 97
14494 Antimicrobial Activity of Ethnobotanically Selected Medicinal Plants Used in the Treatment of Sexually Transmitted Diseases

Authors: Thilivhali Emmanuel Tshikalange, Phiwokuhle Mamba

Abstract:

Ten medicinal plants used traditionally in the treatment of sexually transmitted diseases (STDs) and urinary tract infections (UTIs) were selected from an ethnobotanical database developed in Mpumalanga. The plants were investigated for their antimicrobial activity against five bacterial strains (Escherichia coli, Klebsiella oxytoca, Klebsiella pneumoniae, Neisseria gonorrhoeae and Staphylococcus aureus) and one fungal strain (Candida albicans). Eight of the plants inhibited the growth of all microorganisms at a concentration range of 0.4 mg/ml to 12.5 mg/ml. Acacia karroo showed the most promising antimicrobial activity, with a minimum inhibitory concentration (MIC) of 0.4 mg/ml on Staphylococcus aureus and 0.8 mg/ml on Neisseria gonorrhoeae. All ten plants were further investigated for their antioxidant activities using the DPPH scavenging method. Acacia karroo and Rhoicissus tridentata subsp. cuneifolia showed good antioxidant activity with IC50 values of 0.83 mg/ml and 0.06 mg/ml, respectively. The toxicity of plants was determined using the XTT reduction method against Vero cells. None of the ten plants showed toxicity on the cells. The obtained results confirmed that Acacia karroo and possibly Rhoicissus tridentata subsp. cuneifolia have the potential of being used as antimicrobial agents in the treatment of STDs and UTIs. These results support and validate traditional use of medicinal plants studied.

Keywords: antimicrobial, antioxidant, Neisseria gonorrhoeae, sexually transmitted diseases

Procedia PDF Downloads 322
14493 An Observer-Based Direct Adaptive Fuzzy Sliding Control with Adjustable Membership Functions

Authors: Alireza Gholami, Amir H. D. Markazi

Abstract:

In this paper, an observer-based direct adaptive fuzzy sliding mode (OAFSM) algorithm is proposed. In the proposed algorithm, the zero-input dynamics of the plant could be unknown. The input connection matrix is used to combine the sliding surfaces of individual subsystems, and an adaptive fuzzy algorithm is used to estimate an equivalent sliding mode control input directly. The fuzzy membership functions, which were determined by time consuming try and error processes in previous works, are adjusted by adaptive algorithms. The other advantage of the proposed controller is that the input gain matrix is not limited to be diagonal, i.e. the plant could be over/under actuated provided that controllability and observability are preserved. An observer is constructed to directly estimate the state tracking error, and the nonlinear part of the observer is constructed by an adaptive fuzzy algorithm. The main advantage of the proposed observer is that, the measured outputs is not limited to the first entry of a canonical-form state vector. The closed-loop stability of the proposed method is proved using a Lyapunov-based approach. The proposed method is applied numerically on a multi-link robot manipulator, which verifies the performance of the closed-loop control. Moreover, the performance of the proposed algorithm is compared with some conventional control algorithms.

Keywords: adaptive algorithm, fuzzy systems, membership functions, observer

Procedia PDF Downloads 189
14492 A Systematic Snapshot of Software Outsourcing Challenges

Authors: Issam Jebreen, Eman Al-Qbelat

Abstract:

Outsourcing software development projects can be challenging, and there are several common challenges that organizations face. A study was conducted with a sample of 46 papers on outsourcing challenges, and the results show that there are several common challenges faced by organizations when outsourcing software development projects. Poor outsourcing relationship was identified as the most significant challenge, with 35% of the papers referencing it. Lack of quality was the second most significant challenge, with 33% of the papers referencing it. Language and cultural differences were the third most significant challenge, with 24% of the papers referencing it. Non-competitive price was another challenge faced by organizations, with 21% of the papers referencing it. Poor coordination and communication were also identified as a challenge, with 21% of the papers referencing it. Opportunistic behavior, lack of contract negotiation, inadequate user involvement, and constraints due to time zone were also challenges faced by organizations. Other challenges faced by organizations included poor project management, lack of technical capabilities, vendor employee high turnover, poor requirement specification, IPR issues, poor management of budget, schedule, and delay, geopolitical and country instability, the difference in development methodologies, failure to manage end-user expectations, and poor monitoring and control. In conclusion, outsourcing software development projects can be challenging, but organizations can mitigate these challenges by selecting the right outsourcing partner, having a well-defined contract and clear communication, having a clear understanding of the requirements, and implementing effective project management practices.

Keywords: software outsourcing, vendor, outsourcing challenges, quality model, continent, country, global outsourcing, IT workforce outsourcing.

Procedia PDF Downloads 75
14491 Global Navigation Satellite System and Precise Point Positioning as Remote Sensing Tools for Monitoring Tropospheric Water Vapor

Authors: Panupong Makvichian

Abstract:

Global Navigation Satellite System (GNSS) is nowadays a common technology that improves navigation functions in our life. Additionally, GNSS is also being employed on behalf of an accurate atmospheric sensor these times. Meteorology is a practical application of GNSS, which is unnoticeable in the background of people’s life. GNSS Precise Point Positioning (PPP) is a positioning method that requires data from a single dual-frequency receiver and precise information about satellite positions and satellite clocks. In addition, careful attention to mitigate various error sources is required. All the above data are combined in a sophisticated mathematical algorithm. At this point, the research is going to demonstrate how GNSS and PPP method is capable to provide high-precision estimates, such as 3D positions or Zenith tropospheric delays (ZTDs). ZTDs combined with pressure and temperature information allows us to estimate the water vapor in the atmosphere as precipitable water vapor (PWV). If the process is replicated for a network of GNSS sensors, we can create thematic maps that allow extract water content information in any location within the network area. All of the above are possible thanks to the advances in GNSS data processing. Therefore, we are able to use GNSS data for climatic trend analysis and acquisition of the further knowledge about the atmospheric water content.

Keywords: GNSS, precise point positioning, Zenith tropospheric delays, precipitable water vapor

Procedia PDF Downloads 184
14490 Slovenia Rider/Driver Gaze Behavior Comparative Analysis

Authors: Tomaž Tollazzi, Matjaž Šraml, Chiara Gruden, Marko Renčelj

Abstract:

Motorcycle riders are an increasing group of road users. The intrinsic characteristics of powered two-wheelers (PTW) allow them to be particularly flexible, both in urban and extra-urban environments. Nevertheless, crash statistics indicate that riders involved in road accidents are highly likely to suffer severe injuries, underlining the vulnerability of this group of road users. An element that can greatly affect the safety of PTW users is road design, as roads are usually designed for two-track vehicles (cars, buses, and lorries) and usually do not consider the needs of PTWs. Additionally, handling a motorcycle is quite different from driving a car; thus, the behavior of riders is different from that of drivers. The aim of this research was to compare how different road designs are perceived by riders and drivers and to preliminarily assess if riders’ behavior and attention allocation are related. For this research, an eye-tracking experiment was developed outdoors. Both drivers and riders travelled along a route comprising four different road designs and various road layouts, and the output was analyzed both qualitatively and quantitatively. Although it was not possible to carry out a statistical analysis due to the limited number of participants, the results demonstrate that there is a difference in the gaze behavior of drivers and riders, with the latter being far more focused on the left-hand side of the road and concentrating on defined elements of road design. Furthermore, the experiment demonstrated that a higher number of fixations is related to lower speeds. Finally, it was noted that both kinds of road users focus well on the carriageway, leading to the conclusion that the indications given through road markings may be much more effective than vertical signalization, which has rarely been observed.

Keywords: road safety, powered two-wheelers, eye-tracking, gaze behavior

Procedia PDF Downloads 67
14489 Giant Achievements in Food Processing

Authors: Farnaz Amidi Fazli

Abstract:

After long period of human experience about food processing from raw eating to canning of food in the last century now it is time to use novel technologies which are sometimes completely different from common technologies. It is possible to decontaminate food without using heat or the foods are stored without using cold chain. Pulsed electric field (PEF) processing is a non-thermal method of food preservation that uses short bursts of electricity, PEF can be used for processing liquid and semi-liquid food products. PEF processing offers high quality fresh-like liquid foods with excellent flavor, nutritional value, and shelf-life. High pressure processing (HPP) technology has the potential to fulfill both consumer and scientific requirements. The use of HPP for over 50 years has found applications in non-food industries. For food applications, ‘high pressure’ can be generally considered to be up to 600 MPa for most food products. After years, freezing has its high potential to food preservation due to new and quick freezing methods. Foods which are prepared by this technology have more acceptability and high quality comparing with old fashion slow freezing. Thus, quick freezing has further been adopted as a widespread commercial method for long-term preservation of perishable foods which improved both the health and convenience of everyone in the industrialised countries. Above parameters are achieved by Fluidised-bed freezing systems, freezing by immersion and Hydrofluidisation on the other hand new thawing methods like high-pressure, microwave, ohmic, and acoustic thawing have a key role in quality and adaptability of final product.

Keywords: quick freezing, thawing, high pressure, pulse electric, hydrofluidisation

Procedia PDF Downloads 309
14488 Impact of Traditional Male Circumcision Mishaps Towards Newly Initiated Men's Advancement in Education in South Africa

Authors: Thanduxolo Nomngcoyiya, Simon M. Kang’ethe

Abstract:

The aim of this article is to explore whether a relationship exists between traditional male circumcision mishaps and level of education in the Eastern Cape, South Africa, exemplified by an empirical case study. The study used qualitative paradigm; was exploratory in nature and used case study design that was descriptive and exploratory; and entailed interviewing twenty-eight (28) research participants comprising of eleven (11) newly initiated men and their families on one-on-one in-depth interviews, twelve (12) traditional nurses and community members in focus group discussions; and five (5) society key informants on key informant method. An interview guide served as a data collection instrument for focus group discussions, key informant method and in-depth interviews with unstructured open-ended questions. Findings indicated an array of traditional male circumcision (TMC) gaps, some of which were indicative of a relationship between the mishaps and level of education: the phenomenon of schooling became secondary in newly initiated men’s lives; TMC mishaps became a drawback towards the newly initiated men’s education progression; the newly initiated men are sacrificed at the altar of culture, and TMC mishaps ushered in socioeconomic setback to the newly initiated men. The study suggested that: TMC be developmental; TMC as a cultural endeavor be educational and human rights friendly; and the need to identify and integrate all other players with diverse specialties.

Keywords: culture, education for all, EFA, millennium development goals, traditional male circumcision

Procedia PDF Downloads 169
14487 Analyses of Defects in Flexible Silicon Photovoltaic Modules via Thermal Imaging and Electroluminescence

Authors: S. Maleczek, K. Drabczyk, L. Bogdan, A. Iwan

Abstract:

It is known that for industrial applications using solar panel constructed from silicon solar cells require high-efficiency performance. One of the main problems in solar panels is different mechanical and structural defects, causing the decrease of generated power. To analyse defects in solar cells, various techniques are used. However, the thermal imaging is fast and simple method for locating defects. The main goal of this work was to analyze defects in constructed flexible silicon photovoltaic modules via thermal imaging and electroluminescence method. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management. Thermal behavior was observed using thermographic camera (VIGOcam v50, VIGO System S.A, Poland) using a DC conventional source. Electroluminescence was observed by Steinbeis Center Photovoltaics (Stuttgart, Germany) equipped with a camera, in which there is a Si-CCD, 16 Mpix detector Kodak KAF-16803type. The camera has a typical spectral response in the range 350 - 1100 nm with a maximum QE of 60 % at 550 nm. In our work commercial silicon solar cells with the size 156 × 156 mm were cut for nine parts (called single solar cells) and used to create photovoltaic modules with the size of 160 × 70 cm (containing about 80 single solar cells). Flexible silicon photovoltaic modules on polyamides or polyester fabric were constructed and investigated taking into consideration anomalies on the surface of modules. Thermal imaging provided evidence of visible voltage-activated conduction. In electro-luminescence images, two regions are noticeable: darker, where solar cell is inactive and brighter corresponding with correctly working photovoltaic cells. The electroluminescence method is non-destructive and gives greater resolution of images thereby allowing a more precise evaluation of microcracks of solar cell after lamination process. Our study showed good correlations between defects observed by thermal imaging and electroluminescence. Finally, we can conclude that the thermographic examination of large scale photovoltaic modules allows us the fast, simple and inexpensive localization of defects at the single solar cells and modules. Moreover, thermographic camera was also useful to detection electrical interconnection between single solar cells.

Keywords: electro-luminescence, flexible devices, silicon solar cells, thermal imaging

Procedia PDF Downloads 300
14486 The Formulation of the Mecelle and Other Codified Laws in the Ottoman Empire: Transformation Overturning the Sharia Principles

Authors: Tianqi Yin

Abstract:

The sharia had been the legislative basis in the Ottoman Empire since its emergence. The authority of sharia was superlative in the Islamic society compared to the power of the sulta, the nominal ruler of the nation, regulating essentially every aspect of people’s lives according to an ethical code. In modernity, however, as European sovereignty employed forces to re-engineer the Islamic world to make it more like their own, a society ruled by a state, the Ottoman legislation system encountered a great challenge of adopting codified laws to replace sharia with the formulation of the Mecelle being a prominent case. Interpretations of this transformation have been contentious, with the key debate revolving around whether these codified laws are authentic representations of sharia or alien legal formulations authorized by the modern nation-state under heavy European colonial influence. Because of the difference in methodology of the diverse theories, challenges toward having a universal conclusion on this issue remain. This paper argues that the formulation of the Mecelle and other codified laws is a discontinuity of sharia due to European modernity’s influence and that the emphasis on elements of Islamic laws is a tactic employed to promote this process. These codified laws signals a complete social transformation from the Islamic society ruled by the sharia to a replication of the European society that is ruled by a comprehensive ruling system of the modern state. In addition to advancing the discussion on the characterization of the codification movement in the Ottoman Empire in modernity, the research also promotes the determination of the nature of the modern codification movement globally.

Keywords: codification, mecelle, modernity, sharia, ottoman empire

Procedia PDF Downloads 76
14485 Factors Controlling Durability of Some Egyptian Non-Stylolitic Marbleized Limestone to Salt Weathering

Authors: H. El Shayab, G. M. Kamh, N. G. Abdel Ghafour, M. L. Abdel Latif

Abstract:

Nowadays, marbleized limestone becomes one of the most important sources of the mineral wealth in Egypt as they have beautiful colors (white, grey, rose, yellow and creamy, etc.) make it very suitable for decoration purposes. Non-styolitic marbleized limestone which not contains styolitic surfaces. The current study aims to study different factors controlling durability of non-styolitic marbleized limestone against salt crystallization weathering. The achievement aim of the research was required nine representative samples were collected from the studied areas. Three samples from each of the studied areas. The studied samples was characterized by various instrumental methods before salt weathering, to determine its mineralogical composition, chemical composition and pore physical properties respectively. The obtained results revealed that both of Duwi and Delga studied samples nearly have the same average ∆M% 1.63 and 1.51 respectively and consequently A.I. stage of deformation. On the other hand, average ∆M% of Wata studied samples is 0.29 i.e. lower than two other studied areas. Wata studied samples are more durable against salt crystallization test than Duwi and Delga. The difference in salt crystallization durability may be resulted from one of the following factors: Microscopic textural effect as both of micrite and skeletal percent are in directly proportional to durability of stones to salt weathering. Dolomite mineral present as a secondary are in indirectly proportional to durability of stones to salt weathering. Increase in MgO% also associated with decrease the durability of studied samples against salt crystallization test. Finally, all factors affecting positively against salt crystallization test presents in Wadi Wata studied samples rather than others two areas.

Keywords: marbleized limestone, salt weathering, Wata, salt weathering

Procedia PDF Downloads 302
14484 Study of the Persian Gulf’s and Oman Sea’s Numerical Tidal Currents

Authors: Fatemeh Sadat Sharifi

Abstract:

In this research, a barotropic model was employed to consider the tidal studies in the Persian Gulf and Oman Sea, where the only sufficient force was the tidal force. To do that, a finite-difference, free-surface model called Regional Ocean Modeling System (ROMS), was employed on the data over the Persian Gulf and Oman Sea. To analyze flow patterns of the region, the results of limited size model of The Finite Volume Community Ocean Model (FVCOM) were appropriated. The two points were determined since both are one of the most critical water body in case of the economy, biology, fishery, Shipping, navigation, and petroleum extraction. The OSU Tidal Prediction Software (OTPS) tide and observation data validated the modeled result. Next, tidal elevation and speed, and tidal analysis were interpreted. Preliminary results determine a significant accuracy in the tidal height compared with observation and OTPS data, declaring that tidal currents are highest in Hormuz Strait and the narrow and shallow region between Iranian coasts and Islands. Furthermore, tidal analysis clarifies that the M_2 component has the most significant value. Finally, the Persian Gulf tidal currents are divided into two branches: the first branch converts from south to Qatar and via United Arab Emirate rotates to Hormuz Strait. The secondary branch, in north and west, extends up to the highest point in the Persian Gulf and in the head of Gulf turns counterclockwise.

Keywords: numerical model, barotropic tide, tidal currents, OSU tidal prediction software, OTPS

Procedia PDF Downloads 117
14483 The Connection between Heroism and Violence in War Narratives from the Aspect of Rituals

Authors: Rita Fofai

Abstract:

The aim of the study is to help peacebuilding by analyzing the symbolical level of fights in the war. Despite the sufferings, war heroism still represents such a noble value in war narratives (especially in literature and films, whether it is high- or popular culture) which can make warfare attractive for every age-group. The questions of the study will revolve around the events when heroism is not a necessary and unselfish act for a greater good, but when the primary aim is to express strength in order to build self-mythology. Since war is a scene where the mythological level can meet reality, and even modern narratives use the elements of rituals and sacral references in even secular contexts, understanding the connection between rites and modern battles will ground this study, and the analysis will follow the logic of the violent rites. From this aspect, war is not merely the fight for different countries and ideas, but the fight of mankind with superhuman and natural or supernatural phenomena, as well. In this context, enemy symbolizes the threat of the world which is unpredictable for mankind, and the fight becomes a ritual combat; therefore the winner’s symbolic reward is to redefine himself or herself not only in the human environment but in the context of the whole world. The analysis of the study reveals that this kind of violence does not represents real heroism and rarely results in recruitment, on the contrary, conserves fear and the feeling of weakness, which is the root cause of this kind of act. The result of this study is a way to reshape the attitude toward so-called heroic war violence which is often a part of war narratives even nowadays. Since stepping out of the war tradition is mainly a cultural question, redefining the connection between society and narratives which has an effect on mentality and emotions, giving a clear guide to making difference between heroism and useless violence is very important in peacebuilding.

Keywords: war, ritual, heroism, violence, narratives, culture

Procedia PDF Downloads 112
14482 Investigating the Shear Behaviour of Fouled Ballast Using Discrete Element Modelling

Authors: Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiathmakjornr

Abstract:

For several hundred years, the design of railway tracks has practically remained unchanged. Traditionally, rail tracks are placed on a ballast layer due to several reasons, including economy, rapid drainage, and high load bearing capacity. The primary function of ballast is to distributing dynamic track loads to sub-ballast and subgrade layers, while also providing lateral resistance and allowing for rapid drainage. Upon repeated trainloads, the ballast becomes fouled due to ballast degradation and the intrusion of fines which adversely affects the strength and deformation behaviour of ballast. This paper presents the use of three-dimensional discrete element method (DEM) in studying the shear behaviour of the fouled ballast subjected to direct shear loading. Irregularly shaped particles of ballast were modelled by grouping many spherical balls together in appropriate sizes to simulate representative ballast aggregates. Fouled ballast was modelled by injecting a specified number of miniature spherical particles into the void spaces. The DEM simulation highlights that the peak shear stress of the ballast assembly decreases and the dilation of fouled ballast increases with an increase level of fouling. Additionally, the distributions of contact force chain and particle displacement vectors were captured during shearing progress, explaining the formation of shear band and the evolutions of volumetric change of fouled ballast.

Keywords: railway ballast, coal fouling, discrete element modelling, discrete element method

Procedia PDF Downloads 437
14481 Perceived Effects of Work-Family Balance on Employee’s Job Satisfaction among Extension Agents in Southwest Nigeria

Authors: B. G. Abiona, A. A. Onaseso, T. D. Odetayo, J. Yila, O. E. Fapojuwo, K. G. Adeosun

Abstract:

This study determines the perceived effects of work-family balance on employees’ job satisfaction among Extension Agents in the Agricultural Development Programme (ADP) in southwest Nigeria. A multistage sampling technique was used to select 256 respondents for the study. Data on personal characteristics, work-family balance domain, and job satisfaction were collected. The collected data were analysed using descriptive statistics, Chi-square, Pearson Product Moment Correlation (PPMC), multiple linear regression, and Student T-test. Results revealed that the mean age of the respondents was 40 years; the majority (59.3%) of the respondents were male, and slightly above half (51.6%) of the respondents had MSc as their highest academic qualification. Findings revealed that turnover intention (x ̅ = 3.20) and work-role conflict (x ̅ = 3.06) were the major perceived work-family balance domain in the studied areas. Further, the result showed that the respondents have a high (79%) level of job satisfaction. Multiple linear regression revealed that job involvement (ß=0.167, p<0.01) and work-role conflict (ß= -0.221, p<0.05) contributed significantly to employees’ level of job satisfaction. The results of the Student T-test revealed a significant difference in the perceived work-family balance domain (t = 0.43, p<0.05) between the two studied areas. The study concluded that work-role conflict among employees causes work-family imbalance and, therefore, negatively affects employees’ job satisfaction. The definition of job design among the respondents that will create a balance between work and family is highly recommended.

Keywords: work-life, conflict, job satisfaction, extension agent

Procedia PDF Downloads 76
14480 Femicide: The Political and Social Blind Spot in the Legal and Welfare State of Germany

Authors: Kristina F. Wolff

Abstract:

Background: In the Federal Republic of Germany, violence against women is deeply embedded in society. Germany is, as of March 2020, the most populous member state of the European Union with 83.2 million inhabitants and, although more than half of its inhabitants are women, gender equality was not certified in the Basic Law until 1957. Women have only been allowed to enter paid employment without their husband's consent since 1977 and have marital rape prosecuted only since 1997. While the lack of equality between men and women is named in the preamble of the Istanbul Convention as the cause of gender-specific, structural, traditional violence against women, Germany continues to sink on the latest Gender Equality Index. According to Police Crime Statistics (PCS), women are significantly more often victims of lethal violence, emanating from men than vice versa. The PCS, which, since 2015, also collects gender-specific data on violent crimes, is kept by the Federal Criminal Police Office, but without taking into account the relevant criteria for targeted prevention, such as the history of violence of the perpetrator/killer, weapon, motivation, etc.. Institutions such as EIGE or the World Health Organization have been asking Germany for years in vain for comparable data on violence against women in order to gain an overview or to develop cross-border synergies. The PCS are the only official data collection on violence against women. All players involved are depend on this data set, which is published only in November of the following year and is thus already completely outdated at the time of publication. In order to combat German femicides causally, purposefully and efficiently, evidence-based data was urgently needed. Methodology: Beginning in January 2019, a database was set up that now tracks more than 600 German femicides, broken down by more than 100 crime-related individual criteria, which in turn go far beyond the official PCS. These data are evaluated on the one hand by daily media research, and on the other hand by case-specific inquiries at the respective public prosecutor's offices and courts nationwide. This quantitative long-term study covers domestic violence as well as a variety of different types of gender-specific, lethal violence, including, for example, femicides committed by German citizens abroad. Additionallyalcohol/ narcotic and/or drug abuse, infanticides and the gender aspect in the judiciary are also considered. Results: Since November 2020, evidence-based data from a scientific survey have been available for the first time in Germany, supplementing the rudimentary picture of reality provided by PCS with a number of relevant parameters. The most important goal of the study is to identify "red flags" that enable general preventive awareness, that serve increasingly precise hazard assessment in acute hazard situations, and from which concrete instructions for action can be identified. Already at a very early stage of the study it could be proven that in more than half of all femicides with a sexual perpetrator/victim constellation there was an age difference of five years or more. Summary: Without reliable data and an understanding of the nature and extent, cause and effect, it is impossible to sustainably curb violence against girls and women, which increasingly often culminates in femicide. In Germany, valid data from a scientific survey has been available for the first time since November 2020, supplementing the rudimentary reality picture of the official and, to date, sole crime statistics with several relevant parameters. The basic research provides insights into geo-concentration, monthly peaks and the modus operandi of male violent excesses. A significant increase of child homicides in the course of femicides and/or child homicides as an instrument of violence against the mother could be proven as well as a danger of affected persons due to an age difference of five years and more. In view of the steadily increasing wave of violence against women, these study results are an eminent contribution to the preventive containment of German femicides.

Keywords: femicide, violence against women, gender specific data, rule Of law, Istanbul convention, gender equality, gender based violence

Procedia PDF Downloads 76
14479 The Relationship between the Use of Social Networks with Executive Functions and Academic Performance in High School Students in Tehran

Authors: Esmail Sadipour

Abstract:

The use of social networks is increasing day by day in all societies. The purpose of this research was to know the relationship between the use of social networks (Instagram, WhatsApp, and Telegram) with executive functions and academic performance in first-year female high school students. This research was applied in terms of purpose, quantitative in terms of data type, and correlational in terms of technique. The population of this research consisted of all female high school students in the first year of district 2 of Tehran. Using Green's formula, the sample size of 150 people was determined and selected by cluster random method. In this way, from all 17 high schools in district 2 of Tehran, 5 high schools were selected by a simple random method and then one class was selected from each high school, and a total of 155 students were selected. To measure the use of social networks, a researcher-made questionnaire was used, the Barclay test (2012) was used for executive functions, and last semester's GPA was used for academic performance. Pearson's correlation coefficient and multivariate regression were used to analyze the data. The results showed that there is a negative relationship between the amount of use of social networks and self-control, self-motivation and time self-management. In other words, the more the use of social networks, the fewer executive functions of students, self-control, self-motivation, and self-management of their time. Also, with the increase in the use of social networks, the academic performance of students has decreased.

Keywords: social networks, executive function, academic performance, working memory

Procedia PDF Downloads 72
14478 Methane Oxidation to Methanol Catalyzed by Copper Oxide Clusters Supported in MIL-53(Al): A Density Functional Theory Study

Authors: Chun-Wei Yeh, Santhanamoorthi Nachimuthu, Jyh-Chiang Jiang

Abstract:

Reducing greenhouse gases or converting them into fuels and chemicals with added value is vital for the environment. Given the enhanced techniques for hydrocarbon extraction in this context, the catalytic conversion of methane to methanol is particularly intriguing for future applications as vehicle fuels and/or bulk chemicals. Metal-organic frameworks (MOFs) have received much attention recently for the oxidation of methane to methanol. In addition, biomimetic material, particulate methane monooxygenase (pMMO), has been reported to convert methane using copper oxide clusters as active sites. Inspired by these, in this study, we considered the well-known MIL-53(Al) MOF as support for copper oxide clusters (Cu2Ox, Cu3Ox) to investigate their reactivity towards methane oxidation using Density Functional Theory (DFT) calculations. The copper oxide clusters (Cu2O2, Cu3O2) are modeled by oxidizing copper clusters (Cu2, Cu3) with two oxidizers, O2 and N2O. The initial C-H bond activation barriers on Cu2O2/MIL-53(Al) and Cu3O2/MIL-53(Al) catalysts are 0.70 eV and 0.64 eV, respectively, and are the rate-determining steps in the overall methane conversion to methanol reactions. The desorption energy of the methanol over the Cu2O/MIL-53(Al) and Cu3O/MIL-53(Al) is 0.71eV and 0.75 eV, respectively. Furthermore, to explore the prospect of catalyst reusability, we considered the different oxidants and proposed the different reaction pathways for completing the reaction cycle and regenerating the active copper oxide clusters. To know the reason for the difference between bi-copper and tri-cooper systems, we also did an electronic analysis. Finally, we calculate the Microkinetic Simulation. The result shows that the reaction can happen at room temperature.

Keywords: DFT study, copper oxide cluster, MOFs, methane conversion

Procedia PDF Downloads 59
14477 Advanced Combinatorial Method for Solving Complex Fault Trees

Authors: José de Jesús Rivero Oliva, Jesús Salomón Llanes, Manuel Perdomo Ojeda, Antonio Torres Valle

Abstract:

Combinatorial explosion is a common problem to both predominant methods for solving fault trees: Minimal Cut Set (MCS) approach and Binary Decision Diagram (BDD). High memory consumption impedes the complete solution of very complex fault trees. Only approximated non-conservative solutions are possible in these cases using truncation or other simplification techniques. The paper proposes a method (CSolv+) for solving complex fault trees, without any possibility of combinatorial explosion. Each individual MCS is immediately discarded after its contribution to the basic events importance measures and the Top gate Upper Bound Probability (TUBP) has been accounted. An estimation of the Top gate Exact Probability (TEP) is also provided. Therefore, running in a computer cluster, CSolv+ will guarantee the complete solution of complex fault trees. It was successfully applied to 40 fault trees from the Aralia fault trees database, performing the evaluation of the top gate probability, the 1000 Significant MCSs (SMCS), and the Fussell-Vesely, RRW and RAW importance measures for all basic events. The high complexity fault tree nus9601 was solved with truncation probabilities from 10-²¹ to 10-²⁷ just to limit the execution time. The solution corresponding to 10-²⁷ evaluated 3.530.592.796 MCSs in 3 hours and 15 minutes.

Keywords: system reliability analysis, probabilistic risk assessment, fault tree analysis, basic events importance measures

Procedia PDF Downloads 24
14476 Modified Acetamidobenzoxazolone Based Biomarker for Translocator Protein Mapping during Neuroinflammation

Authors: Anjani Kumar Tiwari, Neelam Kumari, Anil Mishra

Abstract:

The 18-kDa translocator protein (TSPO) previously called as peripheral benzodiazepine receptor, is proven biomarker for variety of neuroinflammation. TSPO is tryptophane rich five transmembranal protein found on outer mitochondrial membrane of steroid synthesising and immunomodulatory cells. In case of neuronal damage or inflammation the expression level of TSPO get upregulated as an immunomodulatory response. By utilizing Benzoxazolone as a basic scaffold, series of TSPO ligands have been designed followed by their screening through in silico studies. Synthesis has been planned by employing convergent methodology in six high yielding steps. For the synthesized ligands the ‘in vitro’ assay was performed to determine the binding affinity in term of Ki. On ischemic rat brain, autoradiography studies were also carried to check the specificity and affinity of the designed radiolabelled ligand for TSPO.Screening was performed on the basis of GScore of CADD based schrodinger software. All the modified and better prospective compound were successfully carried out and characterized by spectroscopic techniques (FTIR, NMR and HRMS). In vitro binding assay showed best binding affinity Ki = 6.1+ 0.3 for TSPO over central benzodiazepine receptor (CBR) Ki > 200. ARG studies indicated higher uptake of two analogues on the lesion side compared with that on the non-lesion side of ischemic rat brains. Displacement experiments with unlabelled ligand had minimized the difference in uptake between the two sides which indicates the specificity of the ligand towards TSPO receptor.

Keywords: TSPO, PET, imaging, Acetamidobenzoxazolone

Procedia PDF Downloads 128
14475 Screening Deformed Red Blood Cells Irradiated by Ionizing Radiations Using Windowed Fourier Transform

Authors: Dahi Ghareab Abdelsalam Ibrahim, R. H. Bakr

Abstract:

Ionizing radiation, such as gamma radiation and X-rays, has many applications in medical diagnoses and cancer treatment. In this paper, we used the windowed Fourier transform to extract the complex image of the deformed red blood cells. The real values of the complex image are used to extract the best fitting of the deformed cell boundary. Male albino rats are irradiated by γ-rays from ⁶⁰Co. The male albino rats are anesthetized with ether, and then blood samples are collected from the eye vein by heparinized capillary tubes for studying the radiation-damaging effect in-vivo by the proposed windowed Fourier transform. The peripheral blood films are prepared according to the Brown method. The peripheral blood film is photographed by using an Automatic Image Contour Analysis system (SAMICA) from ELBEK-Bildanalyse GmbH, Siegen, Germany. The SAMICA system is provided with an electronic camera connected to a computer through a built-in interface card, and the image can be magnified up to 1200 times and displayed by the computer. The images of the peripheral blood films are then analyzed by the windowed Fourier transform method to extract the precise deformation from the best fitting. Based on accurate deformation evaluation of the red blood cells, diseases can be diagnosed in their primary stages.

Keywords: windowed Fourier transform, red blood cells, phase wrapping, Image processing

Procedia PDF Downloads 67
14474 Effect of Bull Exposure on Post-Partum Estrus Interval in Nili-Ravi Buffaloes

Authors: Muhammad Saleem Akhtar, Mushtaq Hussain Lashari, Ejaz Ahmad, Tanveer Ahmad, Laeeq Akbar Lodhi, Ijaz Ahmad, Masood Akhtar

Abstract:

The objective of this study was to determine the effect of bull exposure continuously or intermittently or its excretory products after calving on postpartum interval to estrus, in Nili-Ravi buffalo. Forty-eight buffaloes of Nili-Ravi breed were allocated one of the four treatments in a totally randomized plan using a 4 x 1 factorial design. The four treatment groups were BEC (Bull Exposed Continuously), BEI (Bull Exposed Intermittently), EPB (Excretory Products of Bull) and BNE (Bull Not Exposed). BEC; buffaloes (n = 12) were exposed continuously to the physical presence of a bull whereas in BEI; buffaloes (n = 12) were exposed intermittently to the physical presence of bull. EPB; buffaloes (n = 12) were exposed to discharge waste (urine and feces) of bull and BNE buffaloes (n = 12) were not exposed to a bull or discharge waste of bulls. Buffaloes were exposed on day 15 after parturition. Day 15 postpartum represented d 0 for each treatment. The postpartum interval from calving to first behavioural estrus was 66.88 days in BEC, 75.12 days in BEI, 77.28 days in EPB and 76.5 days in BNE treatments. Postpartum interval to first behavioural estrus was shorter in BEC than BEI, EPB, and BNE treatments. There was no significant difference in postpartum interval to estrus between BEI, EPB and BNE treatments. In present study, the percentage of buffaloes showing estrus during experimental period was 75.0%, 66.66%, 66.66% and 58.33% in BEC, BEI, EPB and BNE treatments, respectively. The mean serum progesterone concentration did not differ significantly between BEC and other (BEI, EPB, and BNE) treatments. It was concluded that presence of bull has positive effect in reducing calving interval in Nili Ravi buffalo.

Keywords: calving interval, biostimulation, buffalo, bull exposure

Procedia PDF Downloads 232
14473 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 382
14472 Effect of Catalyst Preparation Method on Dry Reforming of Methane with Supported and Promoted Catalysts

Authors: Sanjay P. Gandhi, Sanjay S. Patel

Abstract:

Dry (CO2) reforming of methane (DRM) is both scientific and industrial importance. In recent decades, CO2 utilization has become increasingly important in view of the escalating global warming phenomenon. This reaction produces syngas that can be used to produce a wide range of products, such as higher alkanes and oxygenates by means of Fischer–Tropsch synthesis. DRM is inevitably accompanied by deactivation due to carbon deposition. DRM is also a highly endothermic reaction and requires operating temperatures of 800–1000 °C to attain high equilibrium conversion of CH4 and CO2 to H2 and CO and to minimize the thermodynamic driving force for carbon deposition. The catalysts used are often composed of transition Methods like Nickel, supported on metallic and non-metallic oxides such as alumina and silica. However, many of these catalysts undergo severe deactivation due to carbon deposition. Noble metals have also been studied and are typically found to be much more resistant to carbon deposition than Ni catalysts, but are generally uneconomical. Noble metals can also be used to promote the Ni catalysts in order to increase their resistance to deactivation. In order to design catalysts that minimize deactivation, it is necessary to understand the elementary steps involved in the activation and conversion of CH4 and CO2. CO2 reforming methane over promoted catalyst was studied. The influence of ZrO2, CeO2 and the behavior of Ni-Al2O3 Catalyst, prepare by wet-impregnation and Co-precipitated method was studied. XRD, BET Analysis for different promoted and unprompted Catalyst was studied.

Keywords: CO2 reforming of methane, Ni catalyst, promoted and unprompted catalyst, effect of catalyst preparation

Procedia PDF Downloads 449
14471 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 179
14470 Ultrathin Tin-Silicalite 1 Zeolite Membrane in Ester Solvent Recovery

Authors: Kun Liang Ang, Eng Toon Saw, Wei He, Xuecheng Dong, Seeram Ramakrishna

Abstract:

Ester solvents are widely used in pharmaceutical, printing and flavor industry due to their good miscibility, low toxicity, and high volatility. Through pervaporation, these ester solvents can be recovered from industrial wastewater. While metal-doped silicalite 1 zeolite membranes are commonly used in organic solvent recovery in the pervaporation process, these ceramic membranes suffer from low membrane permeation flux, mainly due to the high thickness of the metal-doped zeolite membrane. Herein, a simple method of fabricating an ultrathin tin-silicalite 1 membrane supported on alumina tube is reported. This ultrathin membrane is able to achieve high permeation flux and separation factor for an ester in a diluted aqueous solution. Nanosized tin-Silicalite 1 seeds which are smaller than 500nm has been formed through hydrothermal synthesis. The sn-Silicalite 1 seeds were then seeded onto alumina tube through dip coating, and the tin-Silicalite 1 membrane was then formed by hydrothermal synthesis in an autoclave through secondary growth method. Multiple membrane synthesis factors such as seed size, ceramic substrate surface pore size selection, and secondary growth conditions were studied for their effects on zeolite membrane growth. The microstructure, morphology and the membrane thickness of tin-Silicalite 1 zeolite membrane were examined. The membrane separation performance and stability will also be reported.

Keywords: ceramic membrane, pervaporation, solvent recovery, Sn-MFI zeolite

Procedia PDF Downloads 170
14469 An Overview of Food Waste Management Technologies; The Advantages of Using New Management Methods over the Older Methods to Reduce the Environmental Impacts of Food Waste, Conserve Resources, and Energy Recovery

Authors: Bahareh Asefi, Fereidoun Farzaneh, Ghazaleh Asefi

Abstract:

Continuous increasing food waste produced on a global as well as national scale may lead to burgeoning environmental and economic problems. Simultaneously, decreasing the use efficiencies of natural resources such as land, water, and energy is occurring. On the other hand, food waste has a high-energy content, which seems ideal to achieve dual benefits in terms of energy recovery and the improvement of resource use efficiencies. Therefore, to decrease the environmental impacts of food waste and resource conservation, the researcher has focused on traditional methods of using food waste as a resource through different approaches such as anaerobic digestion, composting, incineration, and landfill. The adverse environmental effects of growing food waste make it difficult for traditional food waste treatment and management methods to balance social, economic, and environmental benefits. The old technology does not need to develop, but several new technologies such as microbial fuel cells, food waste disposal, and bio-converting food waste technology still need to establish or appropriately considered. It is pointed out that some new technologies can take into account various benefits. Since the information about food waste and its management method is critical for executable policy, a review of the latest information regarding the source of food waste and its management technology in some counties is provided in this study.

Keywords: food waste, management technology, innovative method, bio converting food waste, microbial fuel cell

Procedia PDF Downloads 98
14468 Satellite LiDAR-Based Digital Terrain Model Correction using Gaussian Process Regression

Authors: Keisuke Takahata, Hiroshi Suetsugu

Abstract:

Forest height is an important parameter for forest biomass estimation, and precise elevation data is essential for accurate forest height estimation. There are several globally or nationally available digital elevation models (DEMs) like SRTM and ASTER. However, its accuracy is reported to be low particularly in mountainous areas where there are closed canopy or steep slope. Recently, space-borne LiDAR, such as the Global Ecosystem Dynamics Investigation (GEDI), have started to provide sparse but accurate ground elevation and canopy height estimates. Several studies have reported the high degree of accuracy in their elevation products on their exact footprints, while it is not clear how this sparse information can be used for wider area. In this study, we developed a digital terrain model correction algorithm by spatially interpolating the difference between existing DEMs and GEDI elevation products by using Gaussian Process (GP) regression model. The result shows that our GP-based methodology can reduce the mean bias of the elevation data from 3.7m to 0.3m when we use airborne LiDAR-derived elevation information as ground truth. Our algorithm is also capable of quantifying the elevation data uncertainty, which is critical requirement for biomass inventory. Upcoming satellite-LiDAR missions, like MOLI (Multi-footprint Observation Lidar and Imager), are expected to contribute to the more accurate digital terrain model generation.

Keywords: digital terrain model, satellite LiDAR, gaussian processes, uncertainty quantification

Procedia PDF Downloads 160