Search results for: core principles
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3693

Search results for: core principles

2913 Constructing and Circulating Knowledge in Continuous Education: A Study of Norwegian Educational-Psychological Counsellors' Reflection Logs in Post-Graduate Education

Authors: Moen Torill, Rismark Marit, Astrid M. Solvberg

Abstract:

In Norway, every municipality shall provide an educational psychological service, EPS, to support kindergartens and schools in their work with children and youths with special needs. The EPS focus its work on individuals, aiming to identify special needs and to give advice to teachers and parents when they ask for it. In addition, the service also give priority to prevention and system intervention in kindergartens and schools. To master these big tasks university courses are established to support EPS counsellors' continuous learning. There is, however, a need for more in-depth and systematic knowledge on how they experience the courses they attend. In this study, EPS counsellors’ reflection logs during a particular course are investigated. The research question is: what are the content and priorities of the reflections that are communicated in the logs produced by the educational psychological counsellors during a post-graduate course? The investigated course is a credit course organized over a one-year period in two one-semester modules. The altogether 55 students enrolled in the course work as EPS counsellors in various municipalities across Norway. At the end of each day throughout the course period, the participants wrote reflection logs about what they had experienced during the day. The data material consists of 165 pages of typed text. The collaborating researchers studied the data material to ascertain, differentiate and understand the meaning of the content in each log. The analysis also involved the search for similarity in content and development of analytical categories that described the focus and primary concerns in each of the written logs. This involved constant 'critical and sustained discussions' for mutual construction of meaning between the co-researchers in the developing categories. The process is inspired by Grounded Theory. This means that the concepts developed during the analysis derived from the data material and not chosen prior to the investigation. The analysis revealed that the concept 'Useful' frequently appeared in the participants’ reflections and, as such, 'Useful' serves as a core category. The core category is described through three major categories: (1) knowledge sharing (concerning direct and indirect work with students with special needs) with colleagues is useful, (2) reflections on models and theoretical concepts (concerning students with special needs) are useful, (3) reflection on the role as EPS counsellor is useful. In all the categories, the notion of useful occurs in the participants’ emphasis on and acknowledgement of the immediate and direct link between the university course content and their daily work practice. Even if each category has an importance and value of its own, it is crucial that they are understood in connection with one another and as interwoven. It is the connectedness that gives the core category an overarching explanatory power. The knowledge from this study may be a relevant contribution when it comes to designing new courses that support continuing professional development for EPS counsellors, whether for post-graduate university courses or local courses at the EPS offices or whether in Norway or other countries in the world.

Keywords: constructing and circulating knowledge, educational-psychological counsellor, higher education, professional development

Procedia PDF Downloads 99
2912 Intensive Intercultural English Language for Enhanced School Community Engagement: An Exploratory Study Applied to Parents from Language Backgrounds Other Than English in a Regional Australian Primary School

Authors: Ann Dashwood

Abstract:

Using standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify interactional settings for which parents who are isolated from the daily use of functional Australian cultural language learned to engage more effectively in their children’s learning at school. The outcomes measured parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures. The study used quantitative and qualitative methods. The principles of communicative task-based language learning combined with intercultural communication principles provided the theoretical base for intensive English task-based learning and engagement. The quantitative analysis examined data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively informed the study. Currently significant numbers of projects are active in community centres and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study was significant to explore the effects of conducting intensive English with parents of varied English language backgrounds by targeting language use for social interactions in the community, specific engagement in school activities, cultural interaction with teachers and responsiveness to complying with school procedures.

Keywords: engagement, intercultural communication, LBOTE, school community

Procedia PDF Downloads 94
2911 Implications of Humanizing Pedagogy on Learning Design in a Technology-Enhanced Language Learning Environment: Critical Reflections on Student Identity and Agency

Authors: Mukhtar Raban

Abstract:

Nelson Mandela University subscribes to a humanizing pedagogy (HP), as housed under broader critical pedagogy, that underpins and informs learning and teaching activities at the institution. The investigation sought to explore the implications of humanizing and critical pedagogical considerations for a technology-enhanced language learning (TELL) environment in a university course. The paper inquires into the design of a learning resource in an online learning environment of an English communication module, that applied HP principles. With an objective of creating agentive spaces for foregrounding identity, student voice, critical self-reflection, and recognition of others’ humanity; a flexible and open 'My Presence' feature was added to the TELL environment that allowed students and lecturers to share elements of their backgrounds in a ‘mutually vulnerable’ manner as a way of establishing digital identity and a more ‘human’ presence in the online language learning encounter, serving as a catalyst for the recognition of the ‘other’. Following a qualitative research design, the study adopted an auto-ethnographic approach, complementing the critical inquiry nature embedded into the activity’s practices. The study’s findings provide critical reflections and deductions on the possibilities of leveraging digital human expression within a humanizing pedagogical framework to advance the realization of HP-adoption in language learning and teaching encounters. It was found that the consideration of humanizing pedagogical principles in the design of online learning was more effective when the critical outcomes were explicated to students and lecturers prior to the completion of the activities. The integration of humanizing pedagogy also led to a contextual advancement of ‘affective’ language learning. Upon critical reflection and analysis, student identity and agency can flourish in a technology-enhanced learning environment when humanizing, and critical pedagogy influences the learning design.

Keywords: critical reflection, humanizing pedagogy, student identity, technology-enhanced language learning

Procedia PDF Downloads 113
2910 A Study of a Diachronic Relationship between Two Weak Inflection Classes in Norwegian, with Emphasis on Unexpected Productivity

Authors: Emilija Tribocka

Abstract:

This contribution presents parts of an ongoing study of a diachronic relationship between two weak verb classes in Norwegian, the a-class (cf. the paradigm of ‘throw’: kasta – kastar – kasta – kasta) and the e-class (cf. the paradigm of ‘buy’: kjøpa – kjøper – kjøpte – kjøpt). The study investigates inflection class shifts between the two classes with Old Norse, the ancestor of Modern Norwegian, as a starting point. Examination of inflection in 38 verbs in four chosen dialect areas (106 places of attestations) demonstrates that the shifts from the a-class to the e-class are widespread to varying degrees in three out of four investigated areas and are more common than the shifts in the opposite direction. The diachronic productivity of the e-class is unexpected for several reasons. There is general agreement that type frequency is an important factor influencing productivity. The a-class (53% of all weak verbs) was more type frequent in Old Norse than the e-class (42% of all weak verbs). Thus, given the type frequency, the expansion of the e-class is unexpected. Furthermore, in the ‘core’ areas of expanded e-class inflection, the shifts disregard phonological principles creating forms with uncomfortable consonant clusters, e.g., fiskte instead of fiska, the preterit of fiska ‘fish’. Later on, these forms may be contracted, i.e., fiskte > fiste. In this contribution, two factors influencing the shifts are presented: phonological form and token frequency. Verbs with the stem ending in a consonant cluster, particularly when the cluster ends in -t, hardly ever shift to the e-class. As a matter of fact, verbs with this structure belonging to the e-class in Old Norse shift to the a-class in Modern Norwegian, e.g., ON e-class verb skipta ‘change’ shifts to the a-class. This shift occurs as a result of the lack of morpho-phonological transparency between the stem and the preterit suffix of the e-class, -te. As there is a phonological fusion between the stem ending in -t and the suffix beginning in -t, the transparent a-class inflection is chosen. Token frequency plays an important role in the shifts, too, in some dialects. In one of the investigated areas, the most token frequent verbs of the ON e-class remain in the e-class (e.g., høyra ‘hear’, leva ‘live’, kjøpa ‘buy’), while less frequent verbs may shift to the a-class. Furthermore, the results indicate that the shift from the a-class to the e-class occurs in some of the most token frequent verbs of the ON a-class in this area, e.g., lika ‘like’, lova ‘promise’, svara ‘answer’. The latter is unexpected as frequent items tend to remain stable. This study presents a case of unexpected productivity, demonstrating that minor patterns can grow and outdo major patterns. Thus, type frequency is not the only factor that determines productivity. The study addresses the role of phonological form and token frequency in the spread of inflection patterns.

Keywords: inflection class, productivity, token frequency, phonological form

Procedia PDF Downloads 45
2909 The Subcellular Localisation of EhRRP6 and Its Involvement in Pre-Ribosomal RNA Processing in Growth-Stressed Entamoeba histolytica

Authors: S. S. Singh, A. Bhattacharya, S. Bhattacharya

Abstract:

The eukaryotic exosome complex plays a pivotal role in RNA biogenesis, maturation, surveillance and differential expression of various RNAs in response to varying environmental signals. The exosome is composed of evolutionary conserved nine core subunits and the associated exonucleases Rrp6 and Rrp44. Rrp6p is crucial for the processing of rRNAs, other non-coding RNAs, regulation of polyA tail length and termination of transcription. Rrp6p, a 3’-5’ exonuclease is required for degradation of 5’-external transcribed spacer (ETS) released from the rRNA precursors during the early steps of pre-rRNA processing. In the parasitic protist Entamoeba histolytica in response to growth stress, there occurs the accumulation of unprocessed pre-rRNA and 5’ ETS sub fragment. To understand the processes leading to this accumulation, we looked for Rrp6 and the exosome subunits in E. histolytica, by in silico approaches. Of the nine core exosomal subunits, seven had high percentage of sequence similarity with the yeast and human. The EhRrp6 homolog contained exoribonuclease and HRDC domains like yeast but its N- terminus lacked the PMC2NT domain. EhRrp6 complemented the temperature sensitive phenotype of yeast rrp6Δ cells suggesting conservation of biological activity. We showed 3’-5’ exoribonuclease activity of EhRrp6p with in vitro-synthesized appropriate RNAs substrates. Like the yeast enzyme, EhRrp6p degraded unstructured RNA, but could degrade the stem-loops slowly. Furthermore, immunolocalization revealed that EhRrp6 was nuclear-localized in normal cells but was diminished from nucleus during serum starvation, which could explain the accumulation of 5’ETS during stress. Our study shows functional conservation of EhRrp6p in E.histolytica, an early-branching eukaryote, and will help to understand the evolution of exosomal components and their regulatory function.

Keywords: entamoeba histolytica, exosome complex, rRNA processing, Rrp6

Procedia PDF Downloads 181
2908 A Preliminary Study on the Effects of Equestrian and Basketball Exercises in Children with Autism

Authors: Li Shuping, Shu Huaping, Yi Chaofan, Tao Jiang

Abstract:

Equestrian practice is often considered having a unique effect on improving symptoms in children with autism. This study evaluated and measured the changes in daily behavior, morphological, physical function, and fitness indexes of two group children with autism by means of 12 weeks of equestrian and basketball exercises. 19 clinically diagnosed children with moderate/mild autism were randomly divided into equestrian group (9 children, age=10.11±1.90y) and basketball group (10 children, age=10.70±2.16y). Both the equestrian and basketball groups practiced twice a week for 45 to 60 minutes each time. Three scales, the Autism Behavior Checklist (ABC), the Childhood Autism Rating Scale (CARS) and the Clancy Autism Behavior Scale (CABS) were used to assess their human behavior and psychology. Four morphological, seven physical function and fitness indicators were measured to evaluate the effects of the two exercises on the children’s body. The evaluations were taken by every four weeks ( pre-exercise, the 4th week, the 8th week and 12th week (post exercise). The result showed that the total scores of ABC, CARS and CABS, the dimension scores of ABC on the somatic motor, language and life self-care obtained after exercise were significantly lower than those obtained before 12 week exercises in both groups. The ABC feeling dimension scores of equestrian group and ABC communication dimension score of basketball group were significantly lower,and The upper arm circumference, sitting forward flexion, 40 second sit-up, 15s lateral jump, vital capacity, and single foot standing of both groups were significantly higher than that of before exercise.. The BMI of equestrian group was significantly reduced. The handgrip strength of basketball group was significantly increased. In conclusion, both types of exercises could improve daily behavior, morphological, physical function, and fitness indexes of the children with autism. However, the behavioral psychological scores, body morphology and function indicators and time points were different in the middle and back of the two interventions.But the indicators and the timing of the improvement were different. To the group of equestrian, the improvement of the flexibility occurred at week 4, the improvement of the sensory perception, control and use their own body, and promote the development of core strength endurance, coordination and cardiopulmonary function occurred at week 8,and the improvement of core strength endurance, coordination and cardiopulmonary function occurred at week 12. To the group of basketball, the improvement of the hand strength, balance, flexibility and cardiopulmonary function occurred at week 4, the improvement of the self-care ability and language expression ability, and core strength endurance and coordination occurred at week 8, the improvement of the control and use of their own body and social interaction ability occurred at week 12. In comparison of the exercise effects, the equestrian exercise improved the physical control and application ability appeared earlier than that of basketball group. Basketball exercise improved the language expression ability, self-care ability, balance ability and cardiopulmonary function of autistic children appeared earlier than that of equestrian group.

Keywords: intervention, children with autism, equestrain, basketball

Procedia PDF Downloads 46
2907 The Digitalization of Occupational Health and Safety Training: A Fourth Industrial Revolution Perspective

Authors: Deonie Botha

Abstract:

Digital transformation and the digitization of occupational health and safety training have grown exponentially due to a variety of contributing factors. The literature suggests that digitalization has numerous benefits but also has associated challenges. The aim of the paper is to develop an understanding of both the perceived benefits and challenges of digitalization in an occupational health and safety context in an effort to design and develop e-learning interventions that will optimize the benefits of digitalization and address the associated challenges. The paper proposes, deliberate and tests the design principles of an e-learning intervention to ensure alignment with the requirements of a digitally transformed environment. The results of the research are based on a literature review regarding the requirements and effect of the Fourth Industrial Revolution on learning and e-learning in particular. The findings of the literature review are enhanced with empirical research in the form of a case study conducted in an organization that designs and develops e-learning content in the occupational health and safety industry. The primary findings of the research indicated that: (i) The requirements of learners and organizations in respect of e-learning are different than previously (i.e., a pre-Fourth Industrial Revolution related work setting). (ii) The design principles of an e-learning intervention need to be aligned with the entire value chain of the organization. (iii) Digital twins support and enhance the design and development of e-learning. (iv)Learning should incorporate a multitude of sensory experiences and should not only be based on visual stimulation. (v) Data that are generated as a result of e-learning interventions should be incorporated into big data streams to be analyzed and to become actionable. It is therefore concluded that there is general consensus on the requirements that e-learning interventions need to adhere to in a digitally transformed occupational health and safety work environment. The challenge remains for organizations to incorporate data generated as a result of e-learning interventions into the digital ecosystem of the organization.

Keywords: digitalization, training, fourth industrial revolution, big data

Procedia PDF Downloads 135
2906 A Theory-Based Analysis on Implications of Democracy in Cambodia

Authors: Puthsodary Tat

Abstract:

Democracy has been categorially accepted and used as foreign and domestic policy agendas for the hope of peace, economic growth and prosperity for more than 25 years in Cambodia. However, the country is now in the grip of dictatorship, human rights violations, and prospective economic sanctions. This paper examines different perceptions and experiences of democratic assistance. In this study, the author employs discourse theory, idealism and realism as a theory-based methodology for debating and assessing the implications of democratization. Discourse theory is used to establish a platform for understanding discursive formations, body of knowledge and the games of truth of democracy. Idealist approaches give rational arguments for adopting key tenets that work well on the ground. In contrast, realism allows for some sweeping critiques of utopian ideal and offers particular views on why Western hegemonic missions do not work well. From idealist views, the research finds that Cambodian people still believe that democracy is a prima facie universality for peace, growth and prosperity. From realism, democratization is on the brink of death in three reasons. Firstly, there are tensions between Western and local discourses about democratic values and norms. Secondly, democratic tenets have been undermined by the ruling party-controlled courts, corruption, structural oppression and political patronage-based institutions. The third pitfall is partly associated with foreign aid dependency and geopolitical power struggles in the region. Finally, the study offers a precise mosaic of democratic principles that may be used to avoid a future geopolitical and economic crisis.

Keywords: corruption, democracy, democratic principles, discourse theory, discursive formations, foreign aid dependency, games of truth, geopolitical and economic crisis, geopolitical power struggle, hegemonic mission, idealism, realism, utopian ideal

Procedia PDF Downloads 186
2905 Death Penalty and Life in Prison Penalty as Violations of the Principles of Human Dignity and Rehabilitation

Authors: Maria Elisabete da Costa Ferreira

Abstract:

Violent crimes, such as terrorism, organized crime and homicides, are increasing all around the World. This fact calls for the necessity to reflect upon the effectiveness of the deterrence offered by the criminal sanctions set today. The severity of the penalties depends on the social, cultural and even religious background of the State in question. In some States, such as Portugal, the common citizen finds the sentences too soft on the perpetrator and too long to be obtained. On the other hand, in 2023, several States still apply the death penalty, among which the USA, China, and most Middle Eastern countries. As for life in prison without the possibility of parole, the number of countries accepting this possibility in their criminal law is much higher, including England and Wales, the Netherlands, Moldova, Bulgaria, Italy, Ukraine, Poland, Turkey, Russia, and Serbia. This research aims to demonstrate that both the death penalty and life in prison penalty violate the principles of human dignity and social rehabilitation of the perpetrator and propose alternative penalties that can effectively protect society from crime. The research utilizes three main methodologies: the historical method, the comparative method, and the critical method. The historical method is employed to investigate the evolution of criminal penalties over time. The comparative method is used to compare the practices of different states regarding the death penalty and life in prison penalty. Finally, the critical method is applied to analyze and evaluate the shortcomings of these penalties. From a theoretical point of view, there have been drawn several theories throughout the years to support the idea that perpetrators of crimes should be punished. Today, one of the most commonly accepted theories sustains that the penalty will only be legitimate when necessary to protect society from the perpetrator and to rehabilitate him into society. Foremost, the choice of the penalty and the form of its execution should be guided by the principle of human dignity. The death penalty and life in prison penalty fail to achieve the goal of rehabilitation and disregard the human dignity principle. The right to life is a fundamental right declared in the Universal Declaration of Human Rights and stated in most Constitutions in the World. In conclusion, the research demonstrates that the death penalty and life in prison penalty are in violation of the principles of human dignity and social rehabilitation. These penalties fail to achieve their intended goals and disregard fundamental human rights. Although it may sound tempting to some States to rethink the current system of instated penalties to the admission of these penalties, it is imperative to take the inverse road because the protection of society must be achieved with respect to the perpetrator's fundamental rights, so, alternative penalties must be enforced. Society's belief in its citizen's ability to change must be reinforced, and, ultimately, the belief in Humankind. The findings of this research contribute to the discussion on the use of these penalties and aim to contribute to their decreasing usage in society.

Keywords: death penalty, life in prison penalty, human dignity, rehabilitation

Procedia PDF Downloads 55
2904 Simulation Study on Effects of Surfactant Properties on Surfactant Enhanced Oil Recovery from Fractured Reservoirs

Authors: Xiaoqian Cheng, Jon Kleppe, Ole Torsaeter

Abstract:

One objective of this work is to analyze the effects of surfactant properties (viscosity, concentration, and adsorption) on surfactant enhanced oil recovery at laboratory scale. The other objective is to obtain the functional relationships between surfactant properties and the ultimate oil recovery and oil recovery rate. A core is cut into two parts from the middle to imitate the matrix with a horizontal fracture. An injector and a producer are at the left and right sides of the fracture separately. The middle slice of the core is used as the model in this paper, whose size is 4cm x 0.1cm x 4.1cm, and the space of the fracture in the middle is 0.1 cm. The original properties of matrix, brine, oil in the base case are from Ekofisk Field. The properties of surfactant are from literature. Eclipse is used as the simulator. The results are followings: 1) The viscosity of surfactant solution has a positive linear relationship with surfactant oil recovery time. And the relationship between viscosity and oil production rate is an inverse function. The viscosity of surfactant solution has no obvious effect on ultimate oil recovery. Since most of the surfactant has no big effect on viscosity of brine, the viscosity of surfactant solution is not a key parameter of surfactant screening for surfactant flooding in fractured reservoirs. 2) The increase of surfactant concentration results a decrease of oil recovery rate and an increase of ultimate oil recovery. However, there are no functions could describe the relationships. Study on economy should be conducted because of the price of surfactant and oil. 3) In the study of surfactant adsorption, assume that the matrix wettability is changed to water-wet when the surfactant adsorption is to the maximum at all cases. And the ratio of surfactant adsorption and surfactant concentration (Cads/Csurf) is used to estimate the functional relationship. The results show that the relationship between ultimate oil recovery and Cads/Csurf is a logarithmic function. The oil production rate has a positive linear relationship with exp(Cads/Csurf). The work here could be used as a reference for the surfactant screening of surfactant enhanced oil recovery from fractured reservoirs. And the functional relationships between surfactant properties and the oil recovery rate and ultimate oil recovery help to improve upscaling methods.

Keywords: fractured reservoirs, surfactant adsorption, surfactant concentration, surfactant EOR, surfactant viscosity

Procedia PDF Downloads 155
2903 Visualization of Taiwan's Religious Social Networking Sites

Authors: Jia-Jane Shuai

Abstract:

Purpose of this research aims to improve understanding of the nature of online religion by examining the religious social websites. What motivates individual users to use the online religious social websites, and which factors affect those motivations. We survey various online religious social websites provided by different religions, especially the Taiwanese folk religion. Based on the theory of the Content Analysis and Social Network Analysis, religious social websites and religious web activities are examined. This research examined the folk religion websites’ presentation and contents that promote the religious use of the Internet in Taiwan. The difference among different religions and religious websites also be compared. First, this study used keywords to examine what types of messages gained the most clicks of “Like”, “Share” and comments on Facebook. Dividing the messages into four media types, namely, text, link, video, and photo, reveal which category receive more likes and comments than the others. Meanwhile, this study analyzed the five dialogic principles of religious websites accessed from mobile phones and also assessed their mobile readiness. Using the five principles of dialogic theory as a basis, do a general survey on the websites with elements of online religion. Second, the project analyzed the characteristics of Taiwanese participants for online religious activities. Grounded by social network analysis and text mining, this study comparatively explores the network structure, interaction pattern, and geographic distribution of users involved in communication networks of the folk religion in social websites and mobile sites. We studied the linkage preference of different religious groups. The difference among different religions and religious websites also be compared. We examined the reasons for the success of these websites, as well as reasons why young users accept new religious media. The outcome of the research will be useful for online religious service providers and non-profit organizations to manage social websites and internet marketing.

Keywords: content analysis, online religion, social network analysis, social websites

Procedia PDF Downloads 151
2902 A Rule Adumbrated: Bailment on Terms

Authors: David Gibbs-Kneller

Abstract:

Only parties to a contract can enforce it. This is the privity of the contract. Carriage contracts frequently involve intermediated relationships. While the carrier and cargo-owner will agree on a contract for carriage, there is no privity or consideration between the cargo-owner and third parties. To overcome this, the contract utilizes ‘bailment on terms’ or the rule in Morris. Morris v C W Martin & Sons Ltd is authority for the following: A sub-bailee and bailor may rely on terms of a bailment where the bailor has consented to sub-bailment “on terms”. Bailment on terms can play a significant part in making litigation decisions and determining liability. It is used in standard form contracts and courts have also strived to find consent to bailment on terms in agreements so as to avoid the consequences of privity of contract. However, what this paper exposes is the false legal basis for this model. Lord Denning gave an account adumbrated of the law of bailments to justify the rule in Morris. What Lord Denning was really doing was objecting to the doctrine of privity. To do so, he wrongly asserted there was a lacuna in law that meant third parties could not avail themselves upon terms of a contract. Next, he provided a false analogy between purely contractual rights and possessory liens. Finally, he gave accounts of authorities to say they supported the rule in Morris when they did not. Surprisingly, subsequent case law on the point has not properly engaged with this reasoning. The Pioneer Container held that since the rule in Morris lay in bailments, the decision is not dependent on the doctrine of privity. Yet the basis for this statement was Morris. Once these reasons have been discounted, all bailment on terms rests on is the claim that the law of bailments is an independent source of law. Bailment on terms should not be retained, for it is contrary to established principles in the law of property, tort, and contract. That undermines the certainty of those principles by risking their collapse because there is nothing that keeps bailment on terms within the confines of bailments only. As such, bailment on terms is not good law and should not be used in standard form contracts or by the courts as a means of determining liability. If bailment on terms is a pragmatic rule to retain, it is recommended that rules governing carriage contracts should be amended.

Keywords: bailment, carriage of goods, contract law, privity

Procedia PDF Downloads 174
2901 Decomposition of the Discount Function Into Impatience and Uncertainty Aversion. How Neurofinance Can Help to Understand Behavioral Anomalies

Authors: Roberta Martino, Viviana Ventre

Abstract:

Intertemporal choices are choices under conditions of uncertainty in which the consequences are distributed over time. The Discounted Utility Model is the essential reference for describing the individual in the context of intertemporal choice. The model is based on the idea that the individual selects the alternative with the highest utility, which is calculated by multiplying the cardinal utility of the outcome, as if the reception were instantaneous, by the discount function that determines a decrease in the utility value according to how the actual reception of the outcome is far away from the moment the choice is made. Initially, the discount function was assumed to have an exponential trend, whose decrease over time is constant, in line with a profile of a rational investor described by classical economics. Instead, empirical evidence called for the formulation of alternative, hyperbolic models that better represented the actual actions of the investor. Attitudes that do not comply with the principles of classical rationality are termed anomalous, i.e., difficult to rationalize and describe through normative models. The development of behavioral finance, which describes investor behavior through cognitive psychology, has shown that deviations from rationality are due to the limited rationality condition of human beings. What this means is that when a choice is made in a very difficult and information-rich environment, the brain does a compromise job between the cognitive effort required and the selection of an alternative. Moreover, the evaluation and selection phase of the alternative, the collection and processing of information, are dynamics conditioned by systematic distortions of the decision-making process that are the behavioral biases involving the individual's emotional and cognitive system. In this paper we present an original decomposition of the discount function to investigate the psychological principles of hyperbolic discounting. It is possible to decompose the curve into two components: the first component is responsible for the smaller decrease in the outcome as time increases and is related to the individual's impatience; the second component relates to the change in the direction of the tangent vector to the curve and indicates how much the individual perceives the indeterminacy of the future indicating his or her aversion to uncertainty. This decomposition allows interesting conclusions to be drawn with respect to the concept of impatience and the emotional drives involved in decision-making. The contribution that neuroscience can make to decision theory and inter-temporal choice theory is vast as it would allow the description of the decision-making process as the relationship between the individual's emotional and cognitive factors. Neurofinance is a discipline that uses a multidisciplinary approach to investigate how the brain influences decision-making. Indeed, considering that the decision-making process is linked to the activity of the prefrontal cortex and amygdala, neurofinance can help determine the extent to which abnormal attitudes respect the principles of rationality.

Keywords: impatience, intertemporal choice, neurofinance, rationality, uncertainty

Procedia PDF Downloads 110
2900 Construction Strategy of Urban Public Space in Driverless Era

Authors: Yang Ye, Hongfei Qiu, Yaqi Li

Abstract:

The planning and construction of traditional cities are oriented by cars, which leads to the problems of insufficient urban public space, fragmentation, and low utilization efficiency. With the development of driverless technology, the urban structure will change from the traditional single-core grid structure to the multi-core model. In terms of traffic organization, with the release of land for traffic facilities, public space will become more continuous and integrated with traffic space. In the context of driverless technology, urban public reconstruction is characterized by modularization and high efficiency, and its planning and layout features accord with points (service facilities), lines (smart lines), surfaces (activity centers). The public space of driverless urban roads will provide diversified urban public facilities and services. The intensive urban layout makes the commercial public space realize the functions of central activities and style display, respectively, in the interior (building atrium) and the exterior (building periphery). In addition to recreation function, urban green space can also utilize underground parking space to realize efficient dispatching of shared cars. The roads inside the residential community will be integrated into the urban landscape, providing conditions for the community public activity space with changing time sequence and improving the efficiency of space utilization. The intervention of driverless technology will change the thinking of traditional urban construction and turn it into a human-oriented one. As a result, urban public space will be richer, more connected, more efficient, and the urban space justice will be optimized. By summarizing the frontier research, this paper discusses the impact of unmanned driving on cities, especially urban public space, which is beneficial for landscape architects to cope with the future development and changes of the industry and provides a reference for the related research and practice.

Keywords: driverless, urban public space, construction strategy, urban design

Procedia PDF Downloads 97
2899 Credit Cooperatives: A Factor for Improving the Sustainable Management of Private Forests

Authors: Todor Nickolov Stoyanov

Abstract:

Cooperatives are present in all countries and in almost all sectors, including agriculture, forestry, food, finance, health, marketing, insurance and credit. Strong cooperatives are able to overcome many of the difficulties faced by private owners. Cooperatives use seven principles, including the 'Community Concern" principle, which enables cooperatives to work for the sustainable development of the community. The members of cooperatives may use different systems for generating year-round employment and for receiving sustainable income through performing different forestry activities. Various methods are used during the preparation of the report. These include literature reviews, statistics, secondary data and expert interviews. The members of the cooperatives are benefits exclusively from increasing the efficiency of the various products and from the overall yield of the harvest, and ultimately from achieving better profit through cooperative efforts. Cooperatives also use other types of activities that are an additional opportunity for cooperative income. There are many heterogeneous activities in the production and service sectors of the forest cooperatives under consideration. Some cooperatives serve dairies, distilleries, woodworking enterprises, tourist homes, hotels and motels, shops, ski slopes, sheep breeding, etc. Through the revenue generated by the activity, cooperatives have the opportunity to carry out various environmental and protective activities - recreation, water protection, protection of endangered and endemic species, etc., which in the case of small-scale forests cannot be achieved and the management is not sustainable. The conclusions indicate the results received in the analysis. Cooperative management of forests and forest lands gives higher incomes to individual owners. The management of forests and forest lands through cooperatives helps to carry out different environmental and protective activities. Cooperative forest management provides additional means of subsistence to the owners of poor forest lands. Cooperative management of forests and forest lands support owners to implement the forest management plans and to apply sustainable management of these territories.

Keywords: cooperative, forestry, forest owners, principles of cooperation

Procedia PDF Downloads 221
2898 Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa

Authors: O. E. Eberechi, G. P. Stevens

Abstract:

Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims.

Keywords: access to justice, underpinning legal theory, refugee, sexual violence

Procedia PDF Downloads 413
2897 Procedure to Optimize the Performance of Chemical Laser Using the Genetic Algorithm Optimizations

Authors: Mohammedi Ferhate

Abstract:

This work presents details of the study of the entire flow inside the facility where the exothermic chemical reaction process in the chemical laser cavity is analyzed. In our paper we will describe the principles of chemical lasers where flow reversal is produced by chemical reactions. We explain the device for converting chemical potential energy laser energy. We see that the phenomenon thus has an explosive trend. Finally, the feasibility and effectiveness of the proposed method is demonstrated by computer simulation

Keywords: genetic, lasers, nozzle, programming

Procedia PDF Downloads 77
2896 Mobile Application Interventions in Positive Psychology: Current Status and Recommendations for Effective App Design

Authors: Gus Salazar, Jeremy Bekker, Lauren Linford, Jared Warren

Abstract:

Positive psychology practices allow for its principles to be applied to all people, regardless of their current level of functioning. To increase the dissemination of these practices, interventions are being adapted for use with digital technology, such as mobile apps. However, the research regarding positive psychology mobile app interventions is still in its infancy. In an effort to facilitate progress in this important area, we 1) conducted a qualitative review to summarize the current state of the positive psychology mobile app literature and 2) developed research-supported recommendations for positive psychology app development to maximize behavior change. In our literature review, we found that while positive psychology apps varied widely in content and purpose, there was a near-complete lack of research supporting their effectiveness. Most apps provided no rationale for the behavioral change techniques (BCTs) they employed in their app, and most did not develop their app with specific theoretical frameworks or design models in mind. Given this problem, we recommended four steps for effective positive psychology app design. First, developers must establish their app in a research-supported theory of change. Second, researchers must select appropriate behavioral change techniques which are consistent with their app’s goals. Third, researchers must leverage effective design principles. These steps will help mobile applications use data-driven methods for encouraging behavior change in their users. Lastly, we discuss directions for future research. In particular, researchers must investigate the effectiveness of various BCTs in positive psychology interventions. Although there is some research on this point, we do not yet clearly understand the mechanisms within the apps that lead to behavior change. Additionally, app developers must also provide data on the effectiveness of their mobile apps. As developers follow these steps for effective app development and as researchers continue to investigate what makes these apps most effective, we will provide millions of people in need with access to research-based mental health resources.

Keywords: behavioral change techniques, mobile app, mobile intervention, positive psychology

Procedia PDF Downloads 208
2895 Impact of Work Cycles on Autonomous Digital Learning

Authors: Bi̇rsen Tutunis, Zuhal Aydin

Abstract:

Guided digital learning has attracted many researchers as it leads to autonomous learning.The developments in Guided digital learning have led to changes in teaching and learning in English Language Teaching classes (Jeong-Bae, 2014). This study reports on tasks designed under the principles of learner autonomy in an online learning platform ‘’Webquest’’ with the purpose of teaching English to Turkish tertiary level students at a foundation university in Istanbul. Guided digital learning blog project contents were organized according to work-cycles phases (planning and negotiation phase, decision-making phase, project phase and evaluation phase) which are compatible with the principles of autonomous learning (Legenhausen,2003). The aim of the study was to implement the class blog project to find out its impact on students’ behaviours and beliefs towards autonomous learning. The mixed method research approach was taken. 24 tertiary level students participated in the study on voluntary basis. Data analysis was performed with Statistical Package for the Social Sciences. According to the results, students' attitudes towards digital learning did not differ before and after the training application. The learning styles of the students and their knowledge on digital learning scores differed. It has been observed that the students' learning styles and their digital learning scores increased after the training application. Autonomous beliefs, autonomous behaviors, group cohesion and group norms differed before and after the training application. Students' motivation level, strategies for learning English, perceptions of responsibility and out-of-class activity scores differed before and after the training application. It was seen that work-cycles in online classes create student centered learning that fosters autonomy. This paper will display the work cycles in detail and the researchers will give examples of in and beyond class activities and blog projects.

Keywords: guided digital learning, work cycles, english language teaching, autonomous learning

Procedia PDF Downloads 58
2894 Linguistic Analysis of Holy Scriptures: A Comparative Study of Islamic Jurisprudence and the Western Hermeneutical Tradition

Authors: Sana Ammad

Abstract:

The tradition of linguistic analysis in Islam and Christianity has developed independently of each other in lieu of the social developments specific to their historical context. However, recently increasing number of Muslim academics educated in the West have tried to apply the Western tradition of linguistic interpretation to the Qur’anic text while completely disregarding the Islamic linguistic tradition used and developed by the traditional scholars over the centuries. The aim of the paper is to outline the linguistic tools and methods used by the traditional Islamic scholars for the purpose of interpretating the Holy Qur’an and shed light on how they contribute towards a better understanding of the text compared to their Western counterparts. This paper carries out a descriptive-comparative study of the linguistic tools developed and perfected by the traditional scholars in Islam for the purpose of textual analysis of the Qur’an as they have been described in the authentic works of Usul Al Fiqh (Jurisprudence) and the principles of textual analysis employed by the Western hermeneutical tradition for the study of the Bible. First, it briefly outlines the independent historical development of the two traditions emphasizing the final normative shape that they have taken. Then it draws a comparison of the two traditions highlighting the similarities and the differences existing between them. In the end, the paper demonstrates the level of academic excellence achieved by the traditional linguistic scholars in their efforts to develop appropriate tools of textual interpretation and how these tools are more suitable for interpreting the Qur’an compared to the Western principles. Since the aim of interpreters of both the traditions is to try and attain an objective understanding of the Scriptures, the emphasis of the paper shall be to highlight how well the Islamic method of linguistic interpretation contributes to an objective understanding of the Qur’anic text. The paper concludes with the following findings: The Western hermeneutical tradition of linguistic analysis developed within the Western historical context. However, the Islamic method of linguistic analysis is much more highly developed and complex and serves better the purpose of objective understanding of the Holy text.

Keywords: Islamic jurisprudence, linguistic analysis, textual interpretation, western hermeneutics

Procedia PDF Downloads 311
2893 A Survey of Baseband Architecture for Software Defined Radio

Authors: M. A. Fodha, H. Benfradj, A. Ghazel

Abstract:

This paper is a survey of recent works that proposes a baseband processor architecture for software defined radio. A classification of different approaches is proposed. The performance of each architecture is also discussed in order to clarify the suitable approaches that meet software-defined radio constraints.

Keywords: multi-core architectures, reconfigurable architectures, software defined radio, baseband processor

Procedia PDF Downloads 455
2892 Modelling of Heat Transfer during Controlled Cooling of Thermo-Mechanically Treated Rebars Using Computational Fluid Dynamics Approach

Authors: Rohit Agarwal, Mrityunjay K. Singh, Soma Ghosh, Ramesh Shankar, Biswajit Ghosh, Vinay V. Mahashabde

Abstract:

Thermo-mechanical treatment (TMT) of rebars is a critical process to impart sufficient strength and ductility to rebar. TMT rebars are produced by the Tempcore process, involves an 'in-line' heat treatment in which hot rolled bar (temperature is around 1080°C) is passed through water boxes where it is quenched under high pressure water jets (temperature is around 25°C). The quenching rate dictates composite structure consisting (four non-homogenously distributed phases of rebar microstructure) pearlite-ferrite, bainite, and tempered martensite (from core to rim). The ferrite and pearlite phases present at core induce ductility to rebar while martensitic rim induces appropriate strength. The TMT process is difficult to model as it brings multitude of complex physics such as heat transfer, highly turbulent fluid flow, multicomponent and multiphase flow present in the control volume. Additionally the presence of film boiling regime (above Leidenfrost point) due to steam formation adds complexity to domain. A coupled heat transfer and fluid flow model based on computational fluid dynamics (CFD) has been developed at product technology division of Tata Steel, India which efficiently predicts temperature profile and percentage martensite rim thickness of rebar during quenching process. The model has been validated with 16 mm rolling of New Bar mill (NBM) plant of Tata Steel Limited, India. Furthermore, based on the scenario analyses, optimal configuration of nozzles was found which helped in subsequent increase in rolling speed.

Keywords: boiling, critical heat flux, nozzles, thermo-mechanical treatment

Procedia PDF Downloads 191
2891 Software Engineering Revolution Driven by Complexity Science

Authors: Jay Xiong, Li Lin

Abstract:

This paper introduces a new software engineering paradigm based on complexity science, called NSE (Nonlinear Software Engineering paradigm). The purpose of establishing NSE is to help software development organizations double their productivity, half their cost, and increase the quality of their products in several orders of magnitude simultaneously. NSE complies with the essential principles of complexity science. NSE brings revolutionary changes to almost all aspects in software engineering. NSE has been fully implemented with its support platform Panorama++.

Keywords: complexity science, software development, software engineering, software maintenance

Procedia PDF Downloads 249
2890 Identification and Understanding of Colloidal Destabilization Mechanisms in Geothermal Processes

Authors: Ines Raies, Eric Kohler, Marc Fleury, Béatrice Ledésert

Abstract:

In this work, the impact of clay minerals on the formation damage of sandstone reservoirs is studied to provide a better understanding of the problem of deep geothermal reservoir permeability reduction due to fine particle dispersion and migration. In some situations, despite the presence of filters in the geothermal loop at the surface, particles smaller than the filter size (<1 µm) may surprisingly generate significant permeability reduction affecting in the long term the overall performance of the geothermal system. Our study is carried out on cores from a Triassic reservoir in the Paris Basin (Feigneux, 60 km Northeast of Paris). Our goal is to first identify the clays responsible for clogging, a mineralogical characterization of these natural samples was carried out by coupling X-Ray Diffraction (XRD), Scanning Electron Microscopy (SEM) and Energy Dispersive X-ray Spectroscopy (EDS). The results show that the studied stratigraphic interval contains mostly illite and chlorite particles. Moreover, the spatial arrangement of the clays in the rocks as well as the morphology and size of the particles, suggest that illite is more easily mobilized than chlorite by the flow in the pore network. Thus, based on these results, illite particles were prepared and used in core flooding in order to better understand the factors leading to the aggregation and deposition of this type of clay particles in geothermal reservoirs under various physicochemical and hydrodynamic conditions. First, the stability of illite suspensions under geothermal conditions has been investigated using different characterization techniques, including Dynamic Light Scattering (DLS) and Scanning Transmission Electron Microscopy (STEM). Various parameters such as the hydrodynamic radius (around 100 nm), the morphology and surface area of aggregates were measured. Then, core-flooding experiments were carried out using sand columns to mimic the permeability decline due to the injection of illite-containing fluids in sandstone reservoirs. In particular, the effects of ionic strength, temperature, particle concentration and flow rate of the injected fluid were investigated. When the ionic strength increases, a permeability decline of more than a factor of 2 could be observed for pore velocities representative of in-situ conditions. Further details of the retention of particles in the columns were obtained from Magnetic Resonance Imaging and X-ray Tomography techniques, showing that the particle deposition is nonuniform along the column. It is clearly shown that very fine particles as small as 100 nm can generate significant permeability reduction under specific conditions in high permeability porous media representative of the Triassic reservoirs of the Paris basin. These retention mechanisms are explained in the general framework of the DLVO theory

Keywords: geothermal energy, reinjection, clays, colloids, retention, porosity, permeability decline, clogging, characterization, XRD, SEM-EDS, STEM, DLS, NMR, core flooding experiments

Procedia PDF Downloads 157
2889 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 69
2888 Economics of Conflict: Core Economic Dimensions of the Georgian-South Ossetian Context

Authors: V. Charaia

Abstract:

This article presents SWOT analysis for Georgian - South Ossetian conflict. The research analyzes socio-economic aspects and considers future prospects for all sides including neighbor countries and regions. Also it includes the possibilities of positive intervention of neighbor countries to solve the conflict or to mitigate its negative results. The main question of the article is: What will it take to award Georgians and South Ossetians with a peace dividend?

Keywords: conflict economics, investments, trade, remittances

Procedia PDF Downloads 218
2887 Collaboration-Based Islamic Financial Services: Case Study of Islamic Fintech in Indonesia

Authors: Erika Takidah, Salina Kassim

Abstract:

Digital transformation has accelerated in the new millennium. It is reshaping the financial services industry from a traditional system to financial technology. Moreover, the number of financial inclusion rates in Indonesia is less than 60%. An innovative model needed to elucidate this national problem. On the other hand, the Islamic financial service industry and financial technology grow fast as a new aspire in economic development. An Islamic bank, takaful, Islamic microfinance, Islamic financial technology and Islamic social finance institution could collaborate to intensify the financial inclusion number in Indonesia. The primary motive of this paper is to examine the strategy of collaboration-based Islamic financial services to enhance financial inclusion in Indonesia, particularly facing the digital era. The fundamental findings for the main problems are the foundations and key ecosystems aspect involved in the development of collaboration-based Islamic financial services. By using the Interpretive Structural Model (ISM) approach, the core problems faced in the development of the models have lacked policy instruments guarding the collaboration-based Islamic financial services with fintech work process and availability of human resources for fintech. The core strategies or foundations that are needed in the framework of collaboration-based Islamic financial services are the ability to manage and analyze data in the big data era. For the aspects of the Ecosystem or actors involved in the development of this model, the important actor is government or regulator, educational institutions, and also existing industries (Islamic financial services). The outcome of the study designates that strategy collaboration of Islamic financial services institution supported by robust technology, a legal and regulatory commitment of the regulators and policymakers of the Islamic financial institutions, extensive public awareness of financial inclusion in Indonesia. The study limited itself to realize financial inclusion, particularly in Islamic finance development in Indonesia. The study will have an inference for the concerned professional bodies, regulators, policymakers, stakeholders, and practitioners of Islamic financial service institutions.

Keywords: collaboration, financial inclusion, Islamic financial services, Islamic fintech

Procedia PDF Downloads 117
2886 3d Property Modelling of the Lower Acacus Reservoir, Ghadames Basin, Libya

Authors: Aimen Saleh

Abstract:

The Silurian Lower Acacus sandstone is one of the main reservoirs in North West Libya. Our aim in this study is to grasp a robust understanding of the hydrocarbon potential and distribution in the area. To date, the depositional environment of the Lower Acacus reservoir still open to discussion and contradiction. Henceforth, building three dimensional (3D) property modelling is one way to support the analysis and description of the reservoir, its properties and characterizations, so this will be of great value in this project. The 3D model integrates different data set, these incorporates well logs data, petrophysical reservoir properties and seismic data as well. The finalized depositional environment model of the Lower Acacus concludes that the area is located in a deltaic transitional depositional setting, which ranges from a wave dominated delta into tide dominated delta type. This interpretation carried out through a series of steps of model generation, core description and Formation Microresistivity Image tool (FMI) interpretation. After the analysis of the core data, the Lower Acacus layers shows a strong effect of tidal energy. Whereas these traces found imprinted in different types of sedimentary structures, for examples; presence of some crossbedding, such as herringbones structures, wavy and flaser cross beddings. In spite of recognition of some minor marine transgression events in the area, on the contrary, the coarsening upward cycles of sand and shale layers in the Lower Acacus demonstrate presence of a major regressive phase of the sea level. However, consequently, we produced a final package of this model in a complemented set of facies distribution, porosity and oil presence. And also it shows the record of the petroleum system, and the procedure of Hydrocarbon migration and accumulation. Finally, this model suggests that the area can be outlined into three main segments of hydrocarbon potential, which can be a textbook guide for future exploration and production strategies in the area.

Keywords: Acacus, Ghadames , Libya, Silurian

Procedia PDF Downloads 120
2885 Optimization of Titanium Leaching Process Using Experimental Design

Authors: Arash Rafiei, Carroll Moore

Abstract:

Leaching process as the first stage of hydrometallurgy is a multidisciplinary system including material properties, chemistry, reactor design, mechanics and fluid dynamics. Therefore, doing leaching system optimization by pure scientific methods need lots of times and expenses. In this work, a mixture of two titanium ores and one titanium slag are used for extracting titanium for leaching stage of TiO2 pigment production procedure. Optimum titanium extraction can be obtained from following strategies: i) Maximizing titanium extraction without selective digestion; and ii) Optimizing selective titanium extraction by balancing between maximum titanium extraction and minimum impurity digestion. The main difference between two strategies is due to process optimization framework. For the first strategy, the most important stage of production process is concerned as the main stage and rest of stages would be adopted with respect to the main stage. The second strategy optimizes performance of more than one stage at once. The second strategy has more technical complexity compared to the first one but it brings more economical and technical advantages for the leaching system. Obviously, each strategy has its own optimum operational zone that is not as same as the other one and the best operational zone is chosen due to complexity, economical and practical aspects of the leaching system. Experimental design has been carried out by using Taguchi method. The most important advantages of this methodology are involving different technical aspects of leaching process; minimizing the number of needed experiments as well as time and expense; and concerning the role of parameter interactions due to principles of multifactor-at-time optimization. Leaching tests have been done at batch scale on lab with appropriate control on temperature. The leaching tank geometry has been concerned as an important factor to provide comparable agitation conditions. Data analysis has been done by using reactor design and mass balancing principles. Finally, optimum zone for operational parameters are determined for each leaching strategy and discussed due to their economical and practical aspects.

Keywords: titanium leaching, optimization, experimental design, performance analysis

Procedia PDF Downloads 354
2884 Method for Auto-Calibrate Projector and Color-Depth Systems for Spatial Augmented Reality Applications

Authors: R. Estrada, A. Henriquez, R. Becerra, C. Laguna

Abstract:

Spatial Augmented Reality is a variation of Augmented Reality where the Head-Mounted Display is not required. This variation of Augmented Reality is useful in cases where the need for a Head-Mounted Display itself is a limitation. To achieve this, Spatial Augmented Reality techniques substitute the technological elements of Augmented Reality; the virtual world is projected onto a physical surface. To create an interactive spatial augmented experience, the application must be aware of the spatial relations that exist between its core elements. In this case, the core elements are referred to as a projection system and an input system, and the process to achieve this spatial awareness is called system calibration. The Spatial Augmented Reality system is considered calibrated if the projected virtual world scale is similar to the real-world scale, meaning that a virtual object will maintain its perceived dimensions when projected to the real world. Also, the input system is calibrated if the application knows the relative position of a point in the projection plane and the RGB-depth sensor origin point. Any kind of projection technology can be used, light-based projectors, close-range projectors, and screens, as long as it complies with the defined constraints; the method was tested on different configurations. The proposed procedure does not rely on a physical marker, minimizing the human intervention on the process. The tests are made using a Kinect V2 as an input sensor and several projection devices. In order to test the method, the constraints defined were applied to a variety of physical configurations; once the method was executed, some variables were obtained to measure the method performance. It was demonstrated that the method obtained can solve different arrangements, giving the user a wide range of setup possibilities.

Keywords: color depth sensor, human computer interface, interactive surface, spatial augmented reality

Procedia PDF Downloads 107