Search results for: visual media and computer network etc
3382 The Mechanism Underlying Empathy-Related Helping Behavior: An Investigation of Empathy-Attitude- Action Model
Authors: Wan-Ting Liao, Angela K. Tzeng
Abstract:
Empathy has been an important issue in psychology, education, as well as cognitive neuroscience. Empathy has two major components: cognitive and emotional. Cognitive component refers to the ability to understand others’ perspectives, thoughts, and actions, whereas emotional component refers to understand how others feel. Empathy can be induced, attitude can then be changed, and with enough attitude change, helping behavior can occur. This finding leads us to two questions: is attitude change really necessary for prosocial behavior? And, what roles cognitive and affective empathy play? For the second question, participants with different psychopathic personality (PP) traits are critical because high PP people were found to suffer only affective empathy deficit. Their cognitive empathy shows no significant difference from the control group. 132 college students voluntarily participated in the current three-stage study. Stage 1 was to collect basic information including Interpersonal Reactivity Index (IRI), Psychopathic Personality Inventory-Revised (PPI-R), Attitude Scale, Visual Analogue Scale (VAS), and demographic data. Stage two was for empathy induction with three controversial scenarios, namely domestic violence, depression with a suicide attempt, and an ex-offender. Participants read all three stories and then rewrite the stories by one of two perspectives (empathetic vs. objective). They would then complete the VAS and Attitude Scale one more time for their post-attitude and emotional status. Three IVs were introduced for data analysis: PP (High vs. Low), Responsibility (whether or not the character is responsible for what happened), and Perspective-taking (Empathic vs. Objective). Stage 3 was for the action. Participants were instructed to freely use the 17 tokens they received as donations. They were debriefed and interviewed at the end of the experiment. The major findings were people with higher empathy tend to take more action in helping. Attitude change is not necessary for prosocial behavior. The controversy of the scenarios and how familiar participants are towards target groups play very important roles. Finally, people with high PP tend to show more public prosocial behavior due to their affective empathy deficit. Pre-existing value and belief as well as recent dramatic social events seem to have a big impact and possibly reduce the effect of the independent variables (IV) in our paradigm.Keywords: empathy, cognitive, emotional, psychopathy
Procedia PDF Downloads 1303381 Internal DC Short-Circuit Fault Analysis and Protection for VSI of Wind Power Generation Systems
Authors: Mehdi Radmehr, Amir Hamed Mashhadzadeh, Mehdi Jafari
Abstract:
Traditional HVDC systems are tough to DC short circuits as they are current regulated with a large reactance connected in series with cables. Multi-terminal DC wind farm topologies are attracting increasing research attempt. With AC/DC converters on the generator side, this topology can be developed into a multi-terminal DC network for wind power collection, which is especially suitable for large-scale offshore wind farms. For wind farms, the topology uses high-voltage direct-current transmission based on voltage-source converters (VSC-HVDC). Therefore, they do not suffer from over currents due to DC cable faults and there is no over current to react to. In this study, the multi-terminal DC wind farm topology is introduced. Then, possible internal DC faults are analyzed according to type and characteristic. Fault over current expressions are given in detail. Under this characteristic analysis, fault detection and detailed protection methods are proposed. Theoretical analysis and PSCAD/EMTDC simulations are provided.Keywords: DC short circuits, multi-terminal DC wind farm topologies, HVDC transmission based on VSC, fault analysis
Procedia PDF Downloads 4213380 WhatsApp Application and Challenges of Radio Broadcasting in Northern Nigeria: Special Interest on FRCN Kaduna
Authors: Aliyu Damri
Abstract:
This study analyzed the emergence of WhatsApp and how employees at the Federal Radio Corporation of Nigeria, Kaduna defined the concept base on their vast broadcasting experiences for over five decades and application of the phenomenon to the radio station. It also analyzed the nature, patterns, dimensions, features, challenges as well as the effects of WhatsApp as a social networking site with specific interest on the radio outlet. Also, the study identified how the radio organization responded to the challenges in an attempt to adapt to the new pattern of broadcasting characterized by many technological transformations. The study further explained in details such skills journalists need to function optimally using WhatsApp as well as the impacts of the WhatsApp on radio broadcasting. It used a combination of published materials, focus group discussion, in depth interviews and participant observation on the activities of the radio stations to address the research questions. The data generated provided insight to better understand the challenges posed to FRCN Kaduna as a result of WhatsApp application and how FRCN Kaduna responded to the challenges. It also provided information on the skills journalists need to function optimally in using WhatsApp application in the radio station. The interview and focus group discussion’s transcripts and the published materials were analyzed along thematic pattern related to the research questions in the study. The dominant response relied heavily on change in the radio station’s organizational and technical integration of newsrooms, the use of a multiskilled workforce, application of a flexible and user-friendly technology in all aspects of production, expansion of the station’s services in to new media such as internet and mobile phones as well as sharing of ideas across different units in the radio outfit.Keywords: broadcasting, challenge, northern Nigeria, radio, WhatsApp application
Procedia PDF Downloads 1293379 Laser Writing on Vitroceramic Disks for Petabyte Data Storage
Authors: C. Busuioc, S. I. Jinga, E. Pavel
Abstract:
The continuous need of more non-volatile memories with a higher storage capacity, smaller dimensions and weight, as well as lower costs, has led to the exploration of optical lithography on active media, as well as patterned magnetic composites. In this context, optical lithography is a technique that can provide a significant decrease of the information bit size to the nanometric scale. However, there are some restrictions that arise from the need of breaking the optical diffraction limit. Major achievements have been obtained by employing a vitoceramic material as active medium and a laser beam operated at low power for the direct writing procedure. Thus, optical discs with ultra-high density were fabricated by a conventional melt-quenching method starting from analytical purity reagents. They were subsequently used for 3D recording based on their photosensitive features. Naturally, the next step consists in the elucidation of the composition and structure of the active centers, in correlation with the use of silver and rare-earth compounds for the synthesis of the optical supports. This has been accomplished by modern characterization methods, namely transmission electron microscopy coupled with selected area electron diffraction, scanning transmission electron microscopy and electron energy loss spectroscopy. The influence of laser diode parameters, silver concentration and fluorescent compounds formation on the writing process and final material properties was investigated. The results indicate performances in terms of capacity with two order of magnitude higher than other reported information storage systems. Moreover, the fluorescent photosensitive vitroceramics may be integrated in other applications which appeal to nanofabrication as the driving force in electronics and photonics fields.Keywords: data storage, fluorescent compounds, laser writing, vitroceramics
Procedia PDF Downloads 2253378 Assessing the Impact of Electronic Payment Systems on the Service Delivery of Banks: Case of Nigeria
Authors: Idris lawal
Abstract:
The most recent development in the Nigerian payment system is the venture into “electronic payment system”. Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer’s satisfaction as a direct result of the deployment of electronic payment systems. The study was conducted using structured questionnaire distributed to 50 bank officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including; improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommend that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments, the banking industry and government should show strong commitment and effort to educate the populace on the benefit of patronizing e-payment system to facilitate economic development.Keywords: electronic payment system, service delivery, bank, Nigeria
Procedia PDF Downloads 2813377 Killing Your Children to Hurt Your Partner: Motivations for Revenge Filicide
Authors: Melanie Moen, Christiaan Bezuidenhout
Abstract:
Cases of parents murdering their offspring are incomprehensible but sadly as old as humanity itself. The act of killing your own child is known as filicide. Revenge filicide is an act where one parent kills their own offspring for retribution for hurting and upsetting the other parent. The true extent of filicide in South Africa is unknown, but in the United States, filicide constitutes more or less 2.5% of all murders. The focus of this contribution is to extend the knowledge of revenge filicide. Data was collected through court documents and newspaper articles. Newspapers that cover murder cases are between 75% to 100% accurate compared to official sources. Often family-related murders are violent in nature, and for this reason, these crimes receive extensive media coverage. The cases of twenty revenge filicide murderers (14 male and 6 female) were qualitatively analyzed to determine the motivations and offense characteristics of revenge filicide offenders. Findings related to a loss of social identity due to rejection; extreme rage-type anger; external locus of control; sadism; a desire to cause pain, and a need to inflict harm. The initial emotional response may escalate from mild anger to a level of narcissistic rage which eventually culminates in the murdering of the child to punish and hurt the other parent and to restore control. To our knowledge, our study is the first to systematically examine the motivations related to revenge filicides from a South African perspective. Filicide is a complex phenomenon with diverse possibilities and reasons why it occurs. However, it was apparent in this study that the motivations for revenge filicides were often linked to complex personal and interpersonal relationship problems. Further research within this field is imperative.Keywords: revenge filicide, child murder, rage, anger, narcissistic rage, parent kills child
Procedia PDF Downloads 793376 A Customize Battery Management Approach for Satellite
Authors: Muhammad Affan, Muhammad Ilyas Raza, Muhammad Harris Hashmi
Abstract:
This work is attributed to the battery management unit design of student Satellites under Pakistan National Student Satellite Program (PNSSP). The aim has been to design a customized, low-cost, efficient, reliable and less-complex battery management scheme for the Satellite. Nowadays, Lithium Ion (Li-ion) batteries have become the de-facto standard for remote applications, especially for satellites. Li-ion cells are selected for secondary storage. The design also addresses Li-ion safety requirements by monitoring, balancing and protecting cells for safe and prolonged operation. Accurate voltage measurement of individual cells was the main challenge because all the actions triggered were based on the digital voltage measurement. For this purpose, a resistive-divider network is used to maintain simplicity and cost-effectiveness. To cater the problem of insufficient i/o pins on microcontroller, fast multiplexers and de-multiplexers were used. The discrepancy inherited in the given design is the dissipation of heat due to the dissipative resistors. However, it is still considered to be the optimum adoption, considering the simple and cost-effective nature of the passive balancing technique. Furthermore, it is a completely unique solution, customized to meet specific requirements. However, there is still an option for a more advanced and expensive design.Keywords: satellite, battery module, passive balancing, dissipative
Procedia PDF Downloads 1393375 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)
Authors: Dilip Singh Sisodia, Shrish Verma
Abstract:
Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework
Procedia PDF Downloads 3483374 Estimating PM2.5 Concentrations Based on Landsat 8 Imagery and Historical Field Data over the Metropolitan Area of Mexico City
Authors: Rodrigo T. Sepulveda-Hirose, Ana B. Carrera-Aguilar, Francisco Andree Ramirez-Casas, Alondra Orozco-Gomez, Miguel Angel Sanchez-Caro, Carlos Herrera-Ventosa
Abstract:
High concentrations of particulate matter in the atmosphere pose a threat to human health, especially over areas with high concentrations of population; however, field air pollution monitoring is expensive and time-consuming. In order to achieve reduced costs and global coverage of the whole urban area, remote sensing can be used. This study evaluates PM2.5 concentrations, over the Mexico City´s metropolitan area, are estimated using atmospheric reflectance from LANDSAT 8, satellite imagery and historical PM2.5 measurements of the Automatic Environmental Monitoring Network of Mexico City (RAMA). Through the processing of the available satellite images, a preliminary model was generated to evaluate the optimal bands for the generation of the final model for Mexico City. Work on the final model continues with the results of the preliminary model. It was found that infrared bands have helped to model in other cities, but the effectiveness that these bands could provide for the geographic and climatic conditions of Mexico City is still being evaluated.Keywords: air pollution modeling, Landsat 8, PM2.5, remote sensing
Procedia PDF Downloads 1963373 FreGsd: A Framework for Golbal Software Requirement Engineering
Authors: Alsahli Abdulaziz Abdullah, Hameed Ullah Khan
Abstract:
Software development nowadays is more and more using global ways of development instead of normal development enviroment where development occur in one location. This paper is a aimed to propose a Requirement Engineering framework to support Global Software Development environment with regards to all requirment engineering activities from elicitation to fially magning requirment change. Global software enviroment is more and more gaining better reputation in software developmet with better quality is resulting from developing in this eviroment yet with lower cost.However, failure rate developing in this enviroment is high due to inapproprate requirment development and managment.This paper will add to the software engineering development envrioments discipline and many developers in GSD will benefit from it.Keywords: global software development environment, GSD, requirement engineering, FreGsd, computer engineering
Procedia PDF Downloads 5493372 Diffusion Dynamics of Leech-Heart Inter-Neuron Model
Authors: Arnab Mondal, Sanjeev Kumar Sharma, Ranjit Kumar Upadhyay
Abstract:
We study the spatiotemporal dynamics of a neuronal cable. The processes of one- dimensional (1D) and 2D diffusion are considered for a single variable, which is the membrane voltage, i.e., membrane voltage diffusively interacts for spatiotemporal pattern formalism. The recovery and other variables interact through the membrane voltage. A 3D Leech-Heart (LH) model is introduced to investigate the nonlinear responses of an excitable neuronal cable. The deterministic LH model shows different types of firing properties. We explore the parameter space of the uncoupled LH model and based on the bifurcation diagram, considering v_k2_ashift as a bifurcation parameter, we analyze the 1D diffusion dynamics in three regimes: bursting, regular spiking, and a quiescent state. Depending on parameters, it is shown that the diffusive system may generate regular and irregular bursting or spiking behavior. Further, it is explored a 2D diffusion acting on the membrane voltage, where different types of patterns can be observed. The results show that the LH neurons with different firing characteristics depending on the control parameters participate in a collective behavior of an information processing system that depends on the overall network.Keywords: bifurcation, pattern formation, spatio-temporal dynamics, stability analysis
Procedia PDF Downloads 2223371 A Systematic Review of Prevalence, Gender and Age Differences in Cyberbullying Studies in Croatia
Authors: Stjepka Popović, Lucija Vejmelka
Abstract:
Background: Cyberbullying has become a prevalent issue worldwide, including in Croatia. However, a comprehensive understanding of the extent and nature of cyberbullying in the Croatian context is lacking. Objective: The objective of this systematic review is to evaluate the quality of current research conducted in Croatia on the subject of cyberbullying, identify any gaps in the research, and provide suggestions for future investigations. It examines the prevalence gender and age differences of cyberbullying in Croatia. Participants and Setting: Research is done on secondary data resources (published studies) of cyberbullying in Croatia. The participants in these studies that were included in systematic review are children and youth of all ages residing in Croatia who have been involved in cyberbullying incidents. The setting includes various environments where cyberbullying may occur, such as social media platforms and educational institutions. Methods: To identify pertinent studies on cyberbullying in Croatia, a comprehensive exploration of both international and domestic electronic databases was systematically undertaken. Relevant studies were chosen according to predefined criteria that determined inclusion and exclusion. Key findings from the selected studies were extracted and synthesized, enabling the identification of patterns in the data. Results: A total of 43 studies that fulfilled the inclusion criteria were identified in the review. The prevalence of cyberbullying victimization in Croatia ranged from 7% - 55.3%, with adolescents being the most affected group. The prevalence of cyberbullying perpetration was ranging from 3.2% - 30.3%. The most prevalent form of cyberbullying included gossiping and mocking others. Gender and age differences are highlighted. Conclusions: The outcomes of this systematic review highlight the pressing need for targeted interventions and preventative measures to address cyberbullying in Croatia. Additionally, it is crucial to conduct further research to investigate the long-term impacts and potential factors that can help mitigate cyberbullying in the context of Croatia.Keywords: cyberbullying, online risky behavior, Croatia, systematic review
Procedia PDF Downloads 853370 Thermal Interruption Performance of High Voltage Gas Circuit Breaker Operating with CO₂ Mixtures
Authors: Yacine Babou, Nitesh Ranjan, Branimir Radisavljevic , Martin Seeger, Daniel Over, Torsten Votteler, Bernardo Galletti, Paulo Cristini
Abstract:
In the frame of replacement of Sulfur hexafluoride (SF6) gas as insulating and switching medium, diverse alternative gases, offering acceptable Global Warming Potential and fulfilling requirements in terms of heat dissipation, insulation and arc quenching performances are currently investigated for High Voltage Circuit Breaker applications. Among the potential gases, CO₂ seems a promising candidate for replacing SF6, because on one hand it is environmentally friendly, harmless, non-toxic, non-corrosive, non-flammable and on the other hand previous studies have demonstrated its fair interruption capabilities. The present study aims at investigating the performance of CO₂ for the thermal interruption in high voltage self-blast circuit breakers. In particular, the correlation between thermal interruption performance and arc voltage is considered and the effect of the arc-network interaction on the performance is rigorously analyzed. For the considered designs, the thermal interruption was evaluated by varying the slope at current zero (i.e., di/dt) for which the breaker could interrupt. Besides, the characteristics of the post-arc current are examined in detail for various rated voltages and currents. The outcome of these experimental investigations will be reported and analyzed.Keywords: current zero measurement, high voltage circuit breaker, thermal arc discharge, thermal interruption
Procedia PDF Downloads 1853369 A Further Study on the 4-Ordered Property of Some Chordal Ring Networks
Authors: Shin-Shin Kao, Hsiu-Chunj Pan
Abstract:
Given a graph G. A cycle of G is a sequence of vertices of G such that the first and the last vertices are the same. A hamiltonian cycle of G is a cycle containing all vertices of G. The graph G is k-ordered (resp. k-ordered hamiltonian) if for any sequence of k distinct vertices of G, there exists a cycle (resp. hamiltonian cycle) in G containing these k vertices in the specified order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-ordered. Thus the study of any graph being k-ordered (resp. k-ordered hamiltonian) always starts with k = 4. Most studies about this topic work on graphs with no real applications. To our knowledge, the chordal ring families were the first one utilized as the underlying topology in interconnection networks and shown to be 4-ordered [1]. Furthermore, based on computer experimental results in [1], it was conjectured that some of them are 4-ordered hamiltonian. In this paper, we intend to give some possible directions in proving the conjecture.Keywords: Hamiltonian cycle, 4-ordered, Chordal rings, 3-regular
Procedia PDF Downloads 4343368 Availability Analysis of a Power Plant by Computer Simulation
Authors: Mehmet Savsar
Abstract:
Reliability and availability of power stations are extremely important in order to achieve a required level of power generation. In particular, in the hot desert climate of Kuwait, reliable power generation is extremely important because of cooling requirements at temperatures exceeding 50-centigrade degrees. In this paper, a particular power plant, named Sabiya Power Plant, which has 8 steam turbines and 13 gas turbine stations, has been studied in detail; extensive data are collected; and availability of station units are determined. Furthermore, a simulation model is developed and used to analyze the effects of different maintenance policies on availability of these stations. The results show that significant improvements can be achieved in power plant availabilities if appropriate maintenance policies are implemented.Keywords: power plants, steam turbines, gas turbines, maintenance, availability, simulation
Procedia PDF Downloads 6183367 ‘It Is a Class Thing’: Socio-Economic Factors Sustaining Illicit Trading in New Naira Notes in Ibadan, Nigeria
Authors: Frank C. Amaechi, Adeyinka A. Aderinto, Usman A. Ojedokun, Oludayo Tade
Abstract:
Illicit trading in new naira notes has become a common practice in most communities in Nigeria despite the Central Bank Act’s in 2007 proscription of all forms of naira abuse. This study investigated the socio-economic factors sustaining illicit trading in new naira notes in Ibadan metropolis. The study was exploratory and cross-sectional in design. Neutralization theory was adopted as theoretical framework. Data were generated through the combination of in-depth interview and key informant interview methods. The purposive sampling technique was utilised to select five illicit traders of new naira notes, 32 patrons of the trade and six bank officials. Findings revealed that illicit trading in Nigeria’s national currency is flourishing because of the frequent demand for new naira notes that are not readily available in Nigerian banks. Also, the norm of cash spraying at social events is sustaining the illicit markets for new naira notes in Ibadan metropolis. In addition, a chain of network, comprising three principal actors, is behind the illegal business. A strict enforcement of the law banning cash spraying is advocated as a means of arresting this phenomenon.Keywords: illicit trading, naira notes, national currency, Nigeria
Procedia PDF Downloads 3123366 The Circularity of Re-Refined Used Motor Oils: Measuring Impacts and Ensuring Responsible Procurement
Authors: Farah Kanani
Abstract:
Blue Tide Environmental is a company focused on developing a network of used motor oil recycling facilities across the U.S. They initiated the redesign of its recycling plant in Texas, and aimed to establish an updated carbon footprint of re-refined used motor oils compared to an equivalent product derived from virgin stock that is not re-refined. The aim was to quantify emissions savings of a circular alternative to conventional end-of-life combustion of used motor oil (UMO). To do so, they mandated an ISO-compliant carbon footprint, utilizing complex models requiring geographical and temporal accuracy to accommodate the U.S. refinery market. The quantification of linear and circular flows, proxies for fuel substitution and system expansion for multi-product outputs were all critical methodological choices and were tested through sensitivity analyses. The re-refined system consisted of continuous recycling of UMO and thus, end-of-life is considered non-existent. The unique perspective to this topic will be from a life cycle i.e. holistic one and essentially demonstrate using this example of how a cradle-to-cradle model can be used to quantify a comparative carbon footprint. The intended audience is lubricant manufacturers as the consumers, motor oil industry professionals and other industry members interested in performing a cradle-to-cradle modeling.Keywords: circularity, used motor oil, re-refining, systems expansion
Procedia PDF Downloads 323365 Control of Pipeline Gas Quality to Extend Gas Turbine Life
Authors: Peter J. H. Carnell, Panayiotis Theophanous
Abstract:
Natural gas due to its cleaner combustion characteristics is expected to be the most widely used fuel in the move towards less polluting and renewable energy sources. Thus, the developed world is supplied by a complex network of gas pipelines and natural gas is becoming a major source of fuel. Natural gas delivered directly from the well will differ in composition from gas derived from LNG or produced by anaerobic digestion processes. Each will also have specific contaminants and properties although gas from all sources is likely to enter the distribution system and be blended to provide the desired characteristics such as Higher Heating Value and Wobbe No. The absence of a standard gas composition poses problems when the gas is used as a chemical feedstock, in specialised furnaces or on gas turbines. The chemical industry has suffered in the past as a result of variable gas composition. Transition metal catalysts used in ammonia, methanol and hydrogen plants were easily poisoned by sulphur, chlorides and mercury reducing both activity and catalyst expected lives from years to months. These plants now concentrate on purification and conditioning of the natural gas feed using fixed bed technologies, allowing them to run for several years and having transformed their operations. Similar technologies can be applied to the power industry reducing maintenance requirements and extending the operating life of gas turbines.Keywords: gas composition, gas conditioning, gas turbines, power generation, purification
Procedia PDF Downloads 2863364 Comparing the Theory to the Practice of Islamic Banking: A Case Study of Pakistan
Authors: Zareen Khan
Abstract:
Islamic Banking has experienced high growth in Pakistan in recent years and has successfully survived the economic downturn of 2009-2011. Despite the increase in branch network and expansion of services, it is unclear if Islamic banks are truly following the theory and practical application of Shariah Law. This paper explores the theological basis of Islamic finance and examines the discrepancies between the theory and practice of Islamic banking using Pakistan as a case study. It discusses areas where Islamic banks lack proper Shariah compliance and analyzes the financial weaknesses of Islamic banks in terms of the services offered. Furthermore, the paper offers plausible explanations for the clientele of Islamic banks. The case study has three major findings. Firstly, most of the employees of Islamic banks come from conventional banking backgrounds and the banks have to invest in additional trainings to specialize employees in Islamic Banking. Secondly despite the efforts of State Bank of Pakistan, there is a lack of accounting and auditing standards tailored for Islamic Banking. Thirdly, majority of the clients of Islamic banks in Pakistan are accustomed to conventional banking causing the bankers to “speak the conventional banking language.” Combined, these three factors can create gaps in the practical application of Islamic finance in Islamic banks in Pakistan.Keywords: islamic finance, comparing theory with practice, islamic banking, Pakistan
Procedia PDF Downloads 4633363 Field-observed Thermal Fractures during Reinjection and Its Numerical Simulation
Authors: Wen Luo, Phil J. Vardon, Anne-Catherine Dieudonne
Abstract:
One key process that partly controls the success of geothermal projects is fluid reinjection, which benefits in dealing with waste water, maintaining reservoir pressure, and supplying heat-exchange media, etc. Thus, sustaining the injectivity is of great importance for the efficiency and sustainability of geothermal production. However, the injectivity is sensitive to the reinjection process. Field experiences have illustrated that the injectivity can be damaged or improved. In this paper, the focus is on how the injectivity is improved. Since the injection pressure is far below the formation fracture pressure, hydraulic fracturing cannot be the mechanism contributing to the increase in injectivity. Instead, thermal stimulation has been identified as the main contributor to improving the injectivity. For low-enthalpy geothermal reservoirs, which are not fracture-controlled, thermal fracturing, instead of thermal shearing, is expected to be the mechanism for increasing injectivity. In this paper, field data from the sedimentary low-enthalpy geothermal reservoirs in the Netherlands were analysed to show the occurrence of thermal fracturing due to the cooling shock during reinjection. Injection data were collected and compared to show the effects of the thermal fractures on injectivity. Then, a thermo-hydro-mechanical (THM) model for the near field formation was developed and solved by finite element method to simulate the observed thermal fractures. It was then compared with the HM model, decomposed from the THM model, to illustrate the thermal effects on thermal fracturing. Finally, the effects of operational parameters, i.e. injection temperature and pressure, on the changes in injectivity were studied on the basis of the THM model. The field data analysis and simulation results illustrate that the thermal fracturing occurred during reinjection and contributed to the increase in injectivity. The injection temperature was identified as a key parameter that contributes to thermal fracturing.Keywords: injectivity, reinjection, thermal fracturing, thermo-hydro-mechanical model
Procedia PDF Downloads 2173362 The Ecological Role of Loligo forbesii in the Moray Firth Ecosystem, Northeast Scotland
Authors: Godwin A. Otogo, Sansanee Wangvoralak, Graham J. Pierce, Lee C. Hastie, Beth Scott
Abstract:
The squid Loligo forbesii is suspected to be an important species in marine food webs, as it can strongly impact its prey and be impacted upon by predation, competition, fishing and/or climate variability. To quantify these impacts in the food web, the measurement of its trophic position and ecological role within well-studied ecosystems is essential. An Ecopath model was balanced and run for the Moray Firth ecosystem and was used to investigate the significance of this squid’s trophic roles. The network analysis routine included in Ecopath with Ecosim (EwE) was used to estimate trophic interaction, system indicators (health condition and developmental stage) and food web features. Results indicated that within the Moray Firth squid occupy a top trophic position in the food web and also a major prey item for many other species. Results from Omnivory Index (OI) showed that squid is a generalized feeder transferring energy across wide trophic levels and is more important as a predator than that as a prey in the Moray Firth ecosystem. The results highlight the importance of taking squid into account in the management of Europe’s living marine resources.Keywords: Squid, Loligo forbesii, Ecopath, Moray Firth, Trophic level
Procedia PDF Downloads 4783361 Conspiracy Theories and the Right to Believe
Authors: Zwelenkani Mdlalose
Abstract:
From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility
Procedia PDF Downloads 1023360 Extended Boolean Petri Nets Generating N-Ary Trees
Authors: Riddhi Jangid, Gajendra Pratap Singh
Abstract:
Petri nets, a mathematical tool, is used for modeling in different areas of computer sciences, biological networks, chemical systems and many other disciplines. A Petri net model of a given system is created by the graphical representation that describes the properties and behavior of the system. While looking for the behavior of any system, 1-safe Petri nets are of particular interest to many in the application part. Boolean Petri nets correspond to those class in 1- safe Petri nets that generate all the binary n-vectors in their reachability analysis. We study the class by changing different parameters like the token counts in the places and how the structure of the tree changes in the reachability analysis. We discuss here an extended class of Boolean Petri nets that generates n-ary trees in their reachability-based analysis.Keywords: marking vector, n-vector, petri nets, reachability
Procedia PDF Downloads 823359 Control the Flow of Big Data
Authors: Shizra Waris, Saleem Akhtar
Abstract:
Big data is a research area receiving attention from academia and IT communities. In the digital world, the amounts of data produced and stored have within a short period of time. Consequently this fast increasing rate of data has created many challenges. In this paper, we use functionalism and structuralism paradigms to analyze the genesis of big data applications and its current trends. This paper presents a complete discussion on state-of-the-art big data technologies based on group and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also covers big data analytics techniques, processing methods, some reported case studies from different vendor, several open research challenges and the chances brought about by big data. The similarities and differences of these techniques and technologies based on important limitations are also investigated. Emerging technologies are suggested as a solution for big data problems.Keywords: computer, it community, industry, big data
Procedia PDF Downloads 1943358 An Analysis on the Hidden Transcripts and Power: A Cultural Study on Confliction between Mother and Daughter-in-Law in Contemporary Chinese Television Dramas
Authors: Xiaohui Pan
Abstract:
As the most influential media for the dissemination of Chinese culture, films and television dramas have played cognitive orientation in guiding young audience to understand its cultural value. Taking a retrospective overview of the Chinese domestic film and television dramas in the last decade, it is tangible to notice that Westernization has become irresistible force in the presentation of Chinese youth culture, such as the rise of sensibility, publicity of subjectivity, and the resistance to mainstream discourse. However, the process of deconstruction and transition of these film and television works on Western youth culture brought about more comprehensive conflicts and integration rather than providing a panoramic interpretation to young Chinese. Issues of tradition and modernization, oriental and Western, and serious thinking and the spirit of entertainment overwhelmed those Chinese works. This study attempts to examine the mechanism of young Chinese’s resistance, compromise and re-construction in their marriages during the dynamic cultural intergration between traditional Chinese culture and Western culture. To investigate such a mechanism, this study analyzed four Chinese television dramas themed on family ethics to reveal the conflictions between two generations, mother-in-law and daughter-in-law, aiming to identify their strategies of their struggles. Incorporating the theory of Scott's weapons of the weak, this study examines the dynamic model of the struggles content analysis on their hidden language and the power. The finding shows that young Chinese identified their self-awakening during the resistance. The study also finds out that the external factors might have the functions of switching the power from the strong end to the weak end. The finding of this study can provide useful insights for researchers in this area and for those in the process of exploring cultural integration issues.Keywords: intergration, integration, resistance, youth culture
Procedia PDF Downloads 4253357 Managing Construction and Demolition Wastes - A Case Study of Multi Triagem, Lda
Authors: Cláudia Moço, Maria Santos, Carlos Arsénio, Débora Mendes, Miguel Oliveira. José Paulo Da Silva
Abstract:
Construction industry generates large amounts of waste all over the world. About 450 million tons of construction and demolition wastes (C&DW) are produced annually in the European Union. C&DW are highly heterogeneous materials in size and composition, which imposes strong difficulties on their management. Directive n.º 2008/98/CE, of the European Parliament and of the Council of 6 November establishes that 70 % of the C&DW have to be recycled by 2020. To evaluate possible applications of these materials, a detailed physical, chemical and environmental characterization is necessary. Multi Triagem, Lda. is a company located in Algarve (Portugal) and was supported by the European Regional Development Fund (grant QREN 30307 Multivalor) to quantify and characterize the received C&DW, in order to evaluate their possible applications. This evaluation, performed in collaboration with the University of Algarve, involves a physical, chemical and environmental detailed characterization of the received C&DW. In this work we report on the amounts, trial procedures and properties of the C&DW received over a period of fifteen month. In this period the company received C&DW coming from 393 different origins. The total amount was 32.458 tons, mostly mixtures containing concrete, masonry/mortar and soil/rock. Most of C&DW came from demodulation constructions and diggings. The organic/inert component, namely metal, glass, wood and plastics, were screened first and account for about 3 % of the received materials. The remaining materials were screened and grouped according to their origin and contents, the latter evaluated by visual inspection. Twenty five samples were prepared and submitted to a detailed physical, chemical and environmental analysis. The C&DW aggregates show lower quality properties than natural aggregates for concrete preparation and unbound layers of road pavements. However, chemical analyzes indicated that most samples are environmentally safe. A continuous monitoring of the presence of heavy metals and organic compounds is needed in order to perform a proper screening of the C&DW. C&DW aggregates provide a good alternative to natural aggregates.Keywords: construction and demolition wastes, waste classification, waste composition, waste screening
Procedia PDF Downloads 3513356 Investigation of the Physicochemistry in Leaching of Blackmass for the Recovery of Metals from Spent Lithium-Ion Battery
Authors: Alexandre Chagnes
Abstract:
Lithium-ion battery is the technology of choice in the development of electric vehicles. This technology is now mature, although there are still many challenges to increase their energy density while ensuring an irreproachable safety of use. For this goal, it is necessary to develop new cathodic materials that can be cycled at higher voltages and electrolytes compatible with these materials. But the challenge does not only concern the production of efficient batteries for the electrochemical storage of energy since lithium-ion battery technology relies on the use of critical and/or strategic value resources. It is, therefore, crucial to include Lithium-ion batteries development in a circular economy approach very early. In particular, optimized recycling and reuse of battery components must both minimize their impact on the environment and limit geopolitical issues related to tensions on the mineral resources necessary for lithium-ion battery production. Although recycling will never replace mining, it reduces resource dependence by ensuring the presence of exploitable resources in the territory, which is particularly important for countries like France, where exploited or exploitable resources are limited. This conference addresses the development of a new hydrometallurgical process combining leaching of cathodic material from spent lithium-ion battery in acidic chloride media and solvent extraction process. Most of recycling processes reported in the literature rely on the sulphate route, and a few studies investigate the potentialities of the chloride route despite many advantages and the possibility to develop new chemistry, which could get easier the metal separation. The leaching mechanisms and the solvent extraction equilibria will be presented in this conference. Based on the comprehension of the physicochemistry of leaching and solvent extraction, the present study will introduce a new hydrometallurgical process for the production of cobalt, nickel, manganese and lithium from spent cathodic materials.Keywords: lithium-ion battery, recycling, hydrometallurgy, leaching, solvent extraction
Procedia PDF Downloads 803355 A Conv-Long Short-term Memory Deep Learning Model for Traffic Flow Prediction
Authors: Ali Reza Sattarzadeh, Ronny J. Kutadinata, Pubudu N. Pathirana, Van Thanh Huynh
Abstract:
Traffic congestion has become a severe worldwide problem, affecting everyday life, fuel consumption, time, and air pollution. The primary causes of these issues are inadequate transportation infrastructure, poor traffic signal management, and rising population. Traffic flow forecasting is one of the essential and effective methods in urban congestion and traffic management, which has attracted the attention of researchers. With the development of technology, undeniable progress has been achieved in existing methods. However, there is a possibility of improvement in the extraction of temporal and spatial features to determine the importance of traffic flow sequences and extraction features. In the proposed model, we implement the convolutional neural network (CNN) and long short-term memory (LSTM) deep learning models for mining nonlinear correlations and their effectiveness in increasing the accuracy of traffic flow prediction in the real dataset. According to the experiments, the results indicate that implementing Conv-LSTM networks increases the productivity and accuracy of deep learning models for traffic flow prediction.Keywords: deep learning algorithms, intelligent transportation systems, spatiotemporal features, traffic flow prediction
Procedia PDF Downloads 1713354 Planning Strategies for Urban Flood Mitigation through Different Case Studies of Best Practices across the World
Authors: Bismina Akbar, Smitha M. V.
Abstract:
Flooding is a global phenomenon that causes widespread devastation, economic damage, and loss of human lives. In the past twenty years, the number of reported flood events has increased significantly. Millions of people around the globe are at risk of flooding from coastal, dam breaks, groundwater, and urban surface water and wastewater sources. Climate change is one of the important causes for them since it affects, directly and indirectly, the river network. Although the contribution of climate change is undeniable, human contributions are there to increase the frequency of floods. There are different types of floods, such as Flash floods, Coastal floods, Urban floods, River (or fluvial) floods, and Ponding (or pluvial flooding). This study focuses on formulating mitigation strategies for urban flood risk reduction through analysis of different best practice case studies, including China, Japan, Indonesia, and Brazil. The mitigation measures suggest that apart from the structural and non-structural measures, environmental considerations like blue-green solutions are beneficial for flood risk reduction. And also, Risk-Informed Master plans are essential nowadays to take risk-based decision processes that enable more sustainability and resilience.Keywords: hazard, mitigation, risk reduction, urban flood
Procedia PDF Downloads 773353 Religion and Democracy: Assessing Tolerance in the Diversity of Indonesia
Authors: Harsi Nastiti, Haidar Fikri
Abstract:
Indonesia has been known for its diversity of cultures, ethnics, religions, and races. This diversity signs as the uniqueness of the country, so tolerance becomes vital point here. As a unitary state, tolerance value is established strongly as the foundation of democracy implementation but recently this tolerance condition facing up some problems after regional election. In this case, religion issue takes a main role for the Indonesian political system which is managed into tolerance breaker especially for local democracy. The election of Jakarta’s Governor 2017 can be said as the momentum for the people to rethink the democracy and tolerance meaning. It begins from one of the governor candidates who makes statement about the majority religion and unfortunately the candidate comes from the minority. The statement emerges into a new social movement based on religiosity. Basically, the social movement which is coordinated by Islamic Defender Front (Front Pembela Islam or FPI) and National Movement to Safeguard the Fatwa-Indonesian Ulama Council (GNPF-MUI) want to demand the justice in the name of blasphemy. The action continuously happens in different names (Action 411, 212, etc.). So, this article analyzes the new phenomenon and how does the impact for the tolerance and democracy life in Indonesia. The method is using qualitative method by review of literature and media content analysis. Results show this phenomenon potentially spreading new conflicts far beyond the goal of the action itself; justice. It makes the conflicts more complex after there are actions such as; Parade Kebhinekaan and Aksi Lilin which contrary reacts to the actions before. These actions and reactions rise up the sensitive issues for Indonesia like religions, Pancasila, unity in diversity, ethnics, and races. At the same time raising skepticism; will it be over after the candidate is getting sentenced or becomes the dangerous latent conflict that will threaten tolerance and democracy in Indonesia.Keywords: conflict, democracy, religion, tolerance
Procedia PDF Downloads 291