Search results for: basis number
12217 Sediment Patterns from Fluid-Bed Interactions: A Direct Numerical Simulations Study on Fluvial Turbulent Flows
Authors: Nadim Zgheib, Sivaramakrishnan Balachandar
Abstract:
We present results on the initial formation of ripples from an initially flattened erodible bed. We use direct numerical simulations (DNS) of turbulent open channel flow over a fixed sinusoidal bed coupled with hydrodynamic stability analysis. We use the direct forcing immersed boundary method to account for the presence of the sediment bed. The resolved flow provides the bed shear stress and consequently the sediment transport rate, which is needed in the stability analysis of the Exner equation. The approach is different from traditional linear stability analysis in the sense that the phase lag between the bed topology, and the sediment flux is obtained from the DNS. We ran 11 simulations at a fixed shear Reynolds number of 180, but for different sediment bed wavelengths. The analysis allows us to sweep a large range of physical and modelling parameters to predict their effects on linear growth. The Froude number appears to be the critical controlling parameter in the early linear development of ripples, in contrast with the dominant role of particle Reynolds number during the equilibrium stage.Keywords: direct numerical simulation, immersed boundary method, sediment-bed interactions, turbulent multiphase flow, linear stability analysis
Procedia PDF Downloads 18712216 GGE-Biplot Analysis of Nano-Titanium Dioxide and Nano-Silica Effects on Sunflower
Authors: Naser Sabaghnia, Mohsen Janmohammadi, Mehdi Mohebodini
Abstract:
Present investigation is performed to evaluate the effects of foliar application of salicylic acid, glycine betaine, ascorbic acid, nano-silica, and nano-titanium dioxide on sunflower. Results showed that the first two principal components were sufficient to create a two-dimensional treatment by trait biplot, and such biplot accounted percentages of 49% and 19%, respectively of the interaction between traits and treatments. The vertex treatments of polygon were ascorbic acid, glycine betaine, nano-TiO2, and control indicated that high performance in some important traits consists of number of days to seed maturity, number of seeds per head, number heads per single plant, hundred seed weight, seed length, seed yield performance, and oil content. Treatments suitable for obtaining the high seed yield were identified in the vector-view function of biplot and displayed nano-silica and nano titanium dioxide as the best treatments suitable for obtaining of high seed yield.Keywords: drought stress, nano-silicon dioxide, oil content, TiO2 nanoparticles
Procedia PDF Downloads 33812215 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks
Authors: Rei-Heng Cheng, Wen-Pinn Fang
Abstract:
A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks
Procedia PDF Downloads 39112214 Foreign Television Programme Contents and Effects on Youths
Authors: Eyitayo Francis Adanlawo
Abstract:
Television is one of humanity’s most important means of communication, a channel through which societal norms and values can be transferred to youths. The imagination created by foreign television programmes ultimately leads to strong emotional responses. Though some foreign films and programmes are educational in nature, the view that the majority of them are inimical to the youths’ positive-believe-system is rife. This has been occasioned by the adoption of repugnant alien cultures, imitation of vulgar slangs, weird hairdo and most visibly an adjustment in values. This study theoretically approaches two research questions: do youths act out the life style of characters seeing in foreign films? Is moral decadence, indiscipline, and vulgar habits being the results of the contents of foreign programmes and films? To establish the basis for relating foreign films watched to social vices as violence, sexual pervasiveness, cultural and traditional moral pollution on youths; Observational learning Theory and Reinnforcement Theory were utilized to answer the research questions and established the effect of foreign films content on youths. We conclude that constant showcasing of violent themes was highly responsible for the upsurge in social vices prevalent among the youths and can destroy the basis of the societal, cultural orientation. Recommendations made range from the need for government to halt the importation of foreign films not censored; the need for local films to portray more positive messages and the need for concrete steps to be taken to eradicate or minimise the use of programme capable of exerting negative influence.Keywords: media (television), moral decadence, youths, values, observation learning theory, reinforcement theory
Procedia PDF Downloads 25212213 Reallocation of Bed Capacity in a Hospital Combining Discrete Event Simulation and Integer Linear Programming
Authors: Muhammed Ordu, Eren Demir, Chris Tofallis
Abstract:
The number of inpatient admissions in the UK has been significantly increasing over the past decade. These increases cause bed occupancy rates to exceed the target level (85%) set by the Department of Health in England. Therefore, hospital service managers are struggling to better manage key resource such as beds. On the other hand, this severe demand pressure might lead to confusion in wards. For example, patients can be admitted to the ward of another inpatient specialty due to lack of resources (i.e., bed). This study aims to develop a simulation-optimization model to reallocate the available number of beds in a mid-sized hospital in the UK. A hospital simulation model was developed to capture the stochastic behaviours of the hospital by taking into account the accident and emergency department, all outpatient and inpatient services, and the interactions between each other. A couple of outputs of the simulation model (e.g., average length of stay and revenue) were generated as inputs to be used in the optimization model. An integer linear programming was developed under a number of constraints (financial, demand, target level of bed occupancy rate and staffing level) with the aims of maximizing number of admitted patients. In addition, a sensitivity analysis was carried out by taking into account unexpected increases on inpatient demand over the next 12 months. As a result, the major findings of the approach proposed in this study optimally reallocate the available number of beds for each inpatient speciality and reveal that 74 beds are idle. In addition, the findings of the study indicate that the hospital wards will be able to cope with 14% demand increase at most in the projected year. In conclusion, this paper sheds a new light on how best to reallocate beds in order to cope with current and future demand for healthcare services.Keywords: bed occupancy rate, bed reallocation, discrete event simulation, inpatient admissions, integer linear programming, projected usage
Procedia PDF Downloads 14412212 Prediction for the Pressure Drop of Gas-Liquid Cylindrical Cyclone in Sub-Sea Production System
Authors: Xu Rumin, Chen Jianyi, Yue Ti, Wang Yaan
Abstract:
With the rapid development of subsea oil and gas exploitation, the demand for the related underwater process equipment is increasing fast. In order to reduce the energy consuming, people tend to separate the gas and oil phase directly on the seabed. Accordingly, an advanced separator is needed. In this paper, the pressure drop of a new type of separator named Gas Liquid Cylindrical Cyclone (GLCC) which is used in the subsea system is investigated by both experiments and numerical simulation. In the experiments, the single phase flow and gas-liquid two phase flow in GLCC were tested. For the simulation, the performance of GLCC under both laboratory and industrial conditions was calculated. The Eulerian model was implemented to describe the mixture flow field in the GLCC under experimental conditions and industrial oil-natural gas conditions. Furthermore, a relationship among Euler number (Eu), Reynolds number (Re), and Froude number (Fr) is generated according to similarity analysis and simulation data, which can present the GLCC separation performance of pressure drop. These results can give reference to the design and application of GLCC in deep sea.Keywords: dimensionless analysis, gas-liquid cylindrical cyclone, numerical simulation, pressure drop
Procedia PDF Downloads 17112211 Model the Off-Shore Ocean-Sea Waves to Generate Electric Power by Design of a Converting Device
Authors: Muthana A. M. Jameel Al-Jaboori
Abstract:
In this paper, we will present a mathematical model to design a system able to generate electricity from ocean-sea waves. We will use the basic principles of the transfer of the energy potential of waves in a chamber to force the air inside a vertical or inclined cylindrical column, which is topped by a wind turbine to rotate the electric generator. The present mathematical model included a high number of variables such as the wave, height, width, length, velocity, and frequency, as well as others for the energy cylindrical column, like varying diameters and heights, and the wave chamber shape diameter and height. While for the wells wind turbine the variables included the number of blades, length, width, and clearance, as well as the rotor and tip radius. Additionally, the turbine rotor and blades must be made from the light and strong material for a smooth blade surface. The variables were too vast and high in number. Then the program was run successfully within the MATLAB and presented very good modeling results.Keywords: water wave, models, Wells turbine, MATLAB program
Procedia PDF Downloads 36312210 Performance Evaluation of Diverging Diamond Interchange Compared to Single Point Diamond Interchange in Riyadh City
Authors: Maged A. Mogalli, Abdullah I. Al-Mansour, Seongkwan Mark Lee
Abstract:
In the last decades, population growth has gradually exceeded transportation infrastructure growth, and today’s transportation professionals are facing challenge on how to meet the mobility needs of a rising population especially in the absence of adequate public transport, as is the case in Saudi Arabia. The traffic movement congestion can be decreased by carrying out some appropriate alternative designs of interchanges such as diverging diamond interchange (DDI) and single diamond interchange (SPDI). In this paper, evaluation of newly implemented DDIs at the interchange of Makkah road with Prince Turki road and the interchange of King Khaled road with Prince Saud Ibn Mohammed Ibn Mugrin road in Riyadh city was carried out. The comparison between the DDI and SPDI is conducted by evaluating different measures of effectiveness (MOE) such as stop delay, average queue length, and number of stops. In this connection, each interchange type was evaluated for traffic flow at peak hours using micro-simulation program namely 'Synchro/SimTarffic' to measure its effectiveness such as stop delay, average queue length, and number of stops. The results of this study show that DDI provides a better result when compared with SPDI in terms of stope delay, average queue length, and number of stops. The stop delay for the SPDI is greater than DDI by three times. Also, the average queue length is approximately twice that of the SPDI when compared to the DDI. Furthermore, the number of stops for the SPDI is about twice as the DDI.Keywords: single point diamond interchange, diverging diamond interchange, measures of effectiveness, simulation
Procedia PDF Downloads 25812209 Numerical Analysis of Heat Transfer Characteristics of an Orthogonal and Obliquely Impinging Air Jet on a Flat Plate
Authors: Abdulrahman Alenezi
Abstract:
This research paper investigates the surface heat transfer characteristics using computational fluid dynamics for orthogonal and inclined impinging jet. A jet Reynolds number (Rₑ) of 10,000, jet-to- plate spacing (H/D) of two and eight and two angles of impingement (α) of 45° and 90° (orthogonal) were employed in this study. An unconfined jet impinges steadily a constant temperature flat surface using air as working fluid. The numerical investigation is validated with an experimental study. This numerical study employs grid dependency investigation and four different types of turbulence models including the transition SSD to accurately predict the second local maximum in Nusselt number. A full analysis of the effect of both turbulence models and mesh size is reported. Numerical values showed excellent agreement with the experimental data for the case of orthogonal impingement. For the case of H/D =6 and α=45° a maximum percentage error of approximately 8.8% occurs of local Nusselt number at stagnation point. Experimental and numerical correlations are presented for four different casesKeywords: turbulence model, inclined jet impingement, single jet impingement, heat transfer, stagnation point
Procedia PDF Downloads 39812208 A Series Solution of Fuzzy Integro-Differential Equation
Authors: Maryam Mosleh, Mahmood Otadi
Abstract:
The hybrid differential equations have a wide range of applications in science and engineering. In this paper, the homotopy analysis method (HAM) is applied to obtain the series solution of the hybrid differential equations. Using the homotopy analysis method, it is possible to find the exact solution or an approximate solution of the problem. Comparisons are made between improved predictor-corrector method, homotopy analysis method and the exact solution. Finally, we illustrate our approach by some numerical example.Keywords: Fuzzy number, parametric form of a fuzzy number, fuzzy integrodifferential equation, homotopy analysis method
Procedia PDF Downloads 55712207 Estimated Number of Mothers Suffering from Postnatal Depression
Authors: Kadhim Alabady
Abstract:
Background: Mental illnesses after childbirth are common. After childbirth, women may experience a variety of postpartum complications such as developing depression during pregnancy and after childbirth. Postpartum depression might increases the risk of developing major depression in the future. The most common is postnatal depression also known as postpartum depression that is believed to affect between 10% – 15% of mothers and the most serious, puerperal psychosis (affecting less than 1%). Purpose: This research simply applies the predictions to the population of Dubai, without any adjustment for local conditions. It is intended to help stakeholders to discuss the scale of the issue locally. Method: Applying the above rates of postnatal depression prevalence (10%–15%) to the number of total live births in Dubai 2014. Setting: Birth registry for Dubai 2011/14. Key findings: it is estimated there would be approximately 2,928–4,392 mothers suffering from postnatal depression in 2014 of which 858–1,287 were nationals and 2,070–3,105 were non–nationals. These figures are likely to fluctuate depending on the number of mothers who have twin births, and these estimates of the level of postnatal depression do not take into account related factors such as the age of the mother and education. Recommendations: To establish mother-infant psychiatric care to target women suffering from depression during pregnancy and puerperium.Keywords: post natal depression, women, mental health, birth
Procedia PDF Downloads 16312206 Examining the Skills of Establishing Number and Space Relations of Science Students with the 'Integrative Perception Test'
Authors: Ni̇sa Yeni̇kalayci, Türkan Aybi̇ke Akarca
Abstract:
The ability of correlation the number and space relations, one of the basic scientific process skills, is being used in the transformation of a two-dimensional object into a three-dimensional image or in the expression of symmetry axes of the object. With this research, it is aimed to determine the ability of science students to establish number and space relations. The research was carried out with a total of 90 students studying in the first semester of the Science Education program of a state university located in the Turkey’s Black Sea Region in the fall semester of 2017-2018 academic year. An ‘Integrative Perception Test (IPT)’ was designed by the researchers to collect the data. Within the scope of IPT, the courses and workbooks specific to the field of science were scanned and the ones without symmetrical structure from the visual items belonging to the ‘Physics - Chemistry – Biology’ sub-fields were selected and listed. During the application, it was expected that students would imagine and draw images of the missing half of the visual items that were given incomplete in the first place. The data obtained from the test in which there are 30 images or pictures in total (f Physics = 10, f Chemistry = 10, f Biology = 10) were analyzed descriptively based on the drawings created by the students as ‘complete (2 points), incomplete/wrong (1 point), empty (0 point)’. For the teaching of new concepts in small aged groups, images or pictures showing symmetrical structures and similar applications can also be used.Keywords: integrative perception, number and space relations, science education, scientific process skills
Procedia PDF Downloads 15212205 The Analysis of Personalized Low-Dose Computed Tomography Protocol Based on Cumulative Effective Radiation Dose and Cumulative Organ Dose for Patients with Breast Cancer with Regular Chest Computed Tomography Follow up
Authors: Okhee Woo
Abstract:
Purpose: The aim of this study is to evaluate 2-year cumulative effective radiation dose and cumulative organ dose on regular follow-up computed tomography (CT) scans in patients with breast cancer and to establish personalized low-dose CT protocol. Methods and Materials: A retrospective study was performed on the patients with breast cancer who were diagnosed and managed consistently on the basis of routine breast cancer follow-up protocol between 2012-01 and 2016-06. Based on ICRP (International Commission on Radiological Protection) 103, the cumulative effective radiation doses of each patient for 2-year follow-up were analyzed using the commercial radiation management software (Radimetrics, Bayer healthcare). The personalized effective doses on each organ were analyzed in detail by the software-providing Monte Carlo simulation. Results: A total of 3822 CT scans on 490 patients was evaluated (age: 52.32±10.69). The mean scan number for each patient was 7.8±4.54. Each patient was exposed 95.54±63.24 mSv of radiation for 2 years. The cumulative CT radiation dose was significantly higher in patients with lymph node metastasis (p = 0.00). The HER-2 positive patients were more exposed to radiation compared to estrogen or progesterone receptor positive patient (p = 0.00). There was no difference in the cumulative effective radiation dose with different age groups. Conclusion: To acknowledge how much radiation exposed to a patient is a starting point of management of radiation exposure for patients with long-term CT follow-up. The precise and personalized protocol, as well as iterative reconstruction, may reduce hazard from unnecessary radiation exposure.Keywords: computed tomography, breast cancer, effective radiation dose, cumulative organ dose
Procedia PDF Downloads 19712204 History and Epidemiology of Foot and Mouth Disease in Afghanistan: A Retrospective Study
Authors: Arash Osmani, Ian Robertson, Ihab Habib, Ahmad Aslami
Abstract:
Foot and Mouth Disease (FMD) is endemic in Afghanistan. A retrospective study of data collected through passive surveillance of outbreaks of FMD from 1995 to 2016 was undertaken. A total of 1471 outbreaks were reported between 1995 and 2008. Of 7776 samples originating from 34 provinces tested between 2009 and 2016 4845 (62.3%) tested positive. The prevalence varied significantly between years (2009 and 2016) (P < 0.001); however, the number of outbreaks did not differ significantly (P = 0.24) between 1995 and 2008. During this period, there was a strong correlation between the number of outbreaks reported and the number of districts with infected animals (r = 0.74, P = 0.002). Serotype O was the predominant serotype detected, although serotypes A and Asia1 were also detected. Cattle were involved in all outbreaks reported. Herat province in the north-west (bordering Iran), Nangarhar province in the east (bordering Pakistan) and Kabul province in the centre of the country had infections detected in all years of the study. The findings from this study provide valuable direction for further research to understand the epidemiology of FMD in Afghanistan.Keywords: foot and mouth disease, retrospective, epidemiology, Afghanistan
Procedia PDF Downloads 14612203 A Coordination of Supply Chain Disruption in Different Types of Manufacturing Environments: A Case Study of Sugar Manufacturing Company
Authors: Max Moleke, Gilbert Mbonde
Abstract:
Coordinating supply chain process within a manufacturing environment is a very critical aspect of any organization. Nowadays, most manufacturing industries turn to look at only the financial indicator which in real life situation on the shop floor, there are a number of supply chain disruptions that are been ignored. In this work, we had to look at different types of supply chain disruption and their various impact within the organization. A number of Industrial engineering tools are employed which includes, Multifactor productivity, activity on arrow and rescheduling plans. The final result shows that supply chain disruption various with different geographical area where the production plant is operating.Keywords: supply chain, disruptions, flow shop scheduling, uncertainty
Procedia PDF Downloads 42912202 Vehicle Speed Estimation Using Image Processing
Authors: Prodipta Bhowmik, Poulami Saha, Preety Mehra, Yogesh Soni, Triloki Nath Jha
Abstract:
In India, the smart city concept is growing day by day. So, for smart city development, a better traffic management and monitoring system is a very important requirement. Nowadays, road accidents increase due to more vehicles on the road. Reckless driving is mainly responsible for a huge number of accidents. So, an efficient traffic management system is required for all kinds of roads to control the traffic speed. The speed limit varies from road to road basis. Previously, there was a radar system but due to high cost and less precision, the radar system is unable to become favorable in a traffic management system. Traffic management system faces different types of problems every day and it has become a researchable topic on how to solve this problem. This paper proposed a computer vision and machine learning-based automated system for multiple vehicle detection, tracking, and speed estimation of vehicles using image processing. Detection of vehicles and estimating their speed from a real-time video is tough work to do. The objective of this paper is to detect vehicles and estimate their speed as accurately as possible. So for this, a real-time video is first captured, then the frames are extracted from that video, then from that frames, the vehicles are detected, and thereafter, the tracking of vehicles starts, and finally, the speed of the moving vehicles is estimated. The goal of this method is to develop a cost-friendly system that can able to detect multiple types of vehicles at the same time.Keywords: OpenCV, Haar Cascade classifier, DLIB, YOLOV3, centroid tracker, vehicle detection, vehicle tracking, vehicle speed estimation, computer vision
Procedia PDF Downloads 8412201 We Are Thriving: Increasing the Number of Women in Engineering
Authors: Kathryn Redmond, Mojdeh Asadollahi Pajouh, Grace Panther, Rick Evans, Stacey Kulesza, Jia Liang
Abstract:
An on-going focus in engineering education research is on increasing the number of women in engineering. While the number of women participating in engineering project teams has increased over the past five years, the number of women enrolled in engineering colleges remains stagnant. Previous studies have explored why the number of women enrolled in engineering colleges remains small. In doing so, researchers focused primarily on negative experiences women encountered. Instead of looking at negative experiences, which can further deter women from entering the field, the aim of this study is to explore the personal and institutional factors that allow women to succeed and thrive in undergraduate engineering programs. There are two research questions addressed in this paper. The first is: what are the personal traits and characteristics that allow women to thrive in engineering? The other is: what are the institutional policies and culture, as well as micro-level behaviors on project teams, that influence the environment for women to thrive in engineering? Two women studying engineering at an R1 university were interviewed. Each woman was interviewed three times for a total of six interviews. The phenomenographic interviews focused on the lived experiences of the participants to better understand thriving in engineering. The first interview focused on the women’s personal life and background, the second on their learning journey and project team experiences, and the third focused on videos the women took through a method called Photovoice. Interviews were transcribed, and an inductive thematic analysis was conducted. Four themes were identified. Multiple coders were utilized to ensure trustworthiness and increase interrater reliability. Results indicate that thriving women have supportive families, experienced gender biases, and enjoy hands-on engineering and creating a final product. These traits and experiences may help inspire younger women to pursue engineering degrees and can help inform institutions as they make policy changes to support women. Additional women will be recruited from four different universities to further develop a theoretical framework to help inform institutions in how they can support women to thrive in engineering.Keywords: diversity, inclusion, project teams, women in engineering
Procedia PDF Downloads 10912200 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 28912199 Phonological and Syntactic Evidence from Arabic in Favor of Biolinguistics
Authors: Marwan Jarrah
Abstract:
This research paper provides two pieces of phonological and syntactic evidence from Arabic for biolinguistics perspective of language processing. The first piece of evidence concerns the instances where a singular noun is converted to a plural noun in Arabic. Based on the findings of several research papers, this study shows that a singular word does not lose any of its moras when it is pluralized either regularly or irregularly. This mora conservation principle complies with the general physical law of the conservation of mass which states that mass is neither created nor destroyed but changed from one form into another. The second piece of evidence concerns the observation that when the object in some Arabic dialects including Jordanian Arabic and Najdi Arabic is a topic and positioned in situ (i.e. after the verb), the verb agrees with it, something that generates an agreeing inflection marker of the verb that agrees in Number, Person, and Gender with the in-situ topicalized object. This interaction between the verb and the object in such cases is invoked because of the extra feature the object bears, i.e. TOPIC feature. We suggest that such an interaction complies with the general natural law that elements become active when they, e.g., get an additional electron, when the mass number is not equal to the atomic number.Keywords: biolinguistics, Arabic, physics, interaction
Procedia PDF Downloads 23012198 Automatic Teller Machine System Security by Using Mobile SMS Code
Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem
Abstract:
The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition
Procedia PDF Downloads 36512197 Analysis of Exploitation Damages of the Frame Scaffolding
Authors: A. Robak, M. Pieńko, E. Błazik-Borowa, J. Bęc, I. Szer
Abstract:
The analyzes and classifications presented in the article were based on the research carried out in year 2016 and 2017 on a group of nearly one hundred scaffoldings assembled and used on construction sites in different parts of Poland. During scaffolding selection process efforts were made to maintain diversification in terms of parameters such as scaffolding size, investment size, type of investment, location and nature of conducted works. This resulted in the research being carried out on scaffoldings used for church renovation in a small town or attached to the facades of classic apartment blocks, as well as on scaffoldings used during construction of skyscrapers or facilities of the largest power plants. This variety allows to formulate general conclusions about the technical condition of used frame scaffoldings. Exploitation damages of the frame scaffolding elements were divided into three groups. The first group includes damages to the main structural components, which reduce the strength of the scaffolding elements and hence the whole structure. The qualitative analysis of these damages was made on the basis of numerical models that take into account the geometry of the damage and on the basis of computational nonlinear static analyzes. The second group focuses on exploitation damages such as the lack of a pin on the guardrail bolt which may cause an imminent threat to people using scaffolding. These are local damages that do not affect the bearing capacity and stability of the whole structure but are very important for safe use. The last group consider damages that reduce only aesthetic values and do not have direct impact on bearing capacity and safety of use. Apart from qualitative analyzes the article will present quantitative analyzes showing how frequently given type of damage occurs.Keywords: scaffolding, damage, safety, numerical analysis
Procedia PDF Downloads 25912196 The Effects of Self-Efficacy on Life Satisfaction
Authors: Gao ya
Abstract:
This present study aims to find the relationship between self-efficacy and life satisfaction and the effects of self-efficacy on life satisfaction among Chinese people whose age is from 27-32, born between 1990 and 1995. People who were born between 1990 and 1995 are worthy to receive more attention now because the 90s was always received a lot of focus and labeled negatively as soon as they were born. And a large number of researches study people in individualism society more. So we chose the specific population whose age is from 27 to 32 live in a collectivist society. Demographic information was collected, including age, gender, education level, marital status, income level, number of children. We used the general self-efficacy scale(GSC) and the satisfaction with Life Scale(SLS) to collect data. A total of 350 questionnaires were distributed in and collected from mainland China, then 261 valid questionnaires were returned in the end, making a response rate of 74.57 percent. Some statistics techniques were used, like regression, correlation, ANOVA, T-test and general linear model, to measure variables. The findings were that self-efficacy positively related to life satisfaction. And self-efficacy influences life satisfaction significantly. At the same time, the relationship between demographic information and life satisfaction was analyzed.Keywords: marital status, life satisfaction, number of children, self-efficacy, income level
Procedia PDF Downloads 12112195 The Attitude of Students towards the Use of the Social Networks in Education
Authors: Abdulmjeid Aljerawi
Abstract:
This study aimed to investigate the students' attitudes towards the use of social networking in education. Due to the nature of the study, and on the basis of its problem, objectives, and questions, the researcher used the descriptive approach. An appropriate questionnaire was prepared and validity and reliability were ensured. The questionnaire was then applied to the study sample of 434 students from King Saud University.Keywords: social networks, education, learning, students
Procedia PDF Downloads 27812194 Interpreting Some Transformational Aspects of Pentatonicism in Post-tonal Chinese Music on Dual Interval Space
Authors: Man-Ching Yu
Abstract:
In Chinese music, pentatonic collection is central in constituting all the harmonic and melodic elements; most of the traditional Chinese musicians particularly emphasize the importance of the smoothness between pentatonic collections when one collection modulates to another collection, articulating the roles of the pentatonic common tones. On the contrary, in post-tonal Chinese music the central features of the pentatonic modulations tend to reflect a larger number of semitonal relationships with a lesser number of common tones. This paper offers an analytical account of the transformations between pentatonic collections that arise in post-tonal Chinese music by adopting the methodology of the Tonnetz, in particular, Dual Interval Space (DIS), to elaborate and reexamine pentatonicism by focusing on the transformations between pentatonic elements, especially semitonal motion and common tones. In the essay, various pentatonic passages will be analyzed by means of DIS for highlighting the transformation of the collections. It will be shown that the pentatonic collections that are in semitonal, third, and augmented fourth relationships exhibit the maximum number of semitonal shifts.Keywords: tonnetz, pentatonicism, post-tonal Chinese music, dual interval space, transformation
Procedia PDF Downloads 56212193 Nest-Site Selection of Crested Lark (Galerida cristata) in Yazd Province, Iran
Authors: Shirin Aghanajafizadeh
Abstract:
Nest site selection of Crested Lark was investigated in Boroyeh wildlife sanctuary of Harat during spring 2014. Habitat variables such as number of plant species, soil texture, distance to the nearest water resources, farms and roads were compared in the species presence plots with absence ones. Our analysis showed that the average number of Zygophyllum atriplicoidesand, Artemisia sieberi were higher while fine-textured soil percent cover (with very little and gravel) was lower in species presence plots than control plots. We resulted that the most affecting factor in the species nest site selection is the number of Z .atriplicoides and soil texture. Z. atriplicoides and A. sieberi can provide cover for nests and chickens against predators and environmental harsh events such as sunshine and wind. The stability of built nest forces the birds to select sites with not fine-textured soil. Some of the nests were detected in Alfalfa farms that can be related to its cover producing capability.Keywords: habitat selection, Yazd Province, presence and absence plots, habitat variables
Procedia PDF Downloads 18612192 Thermal Instability in Rivlin-Ericksen Elastico-Viscous Nanofluid with Connective Boundary Condition: Effect of Vertical Throughflow
Authors: Shivani Saini
Abstract:
The effect of vertical throughflow on the onset of convection in Rivlin-Ericksen Elastico-Viscous nanofluid with convective boundary condition is investigated. The flow is stimulated with modified Darcy model under the assumption that the nanoparticle volume fraction is not actively managed on the boundaries. The heat conservation equation is formulated by introducing the convective term of nanoparticle flux. A linear stability analysis based upon normal mode is performed, and an approximate solution of eigenvalue problems is obtained using the Galerkin weighted residual method. Investigation of the dependence of the Rayleigh number on various viscous and nanofluid parameter is performed. It is found that through flow and nanofluid parameters hasten the convection while capacity ratio, kinematics viscoelasticity, and Vadasz number do not govern the stationary convection. Using the convective component of nanoparticle flux, critical wave number is the function of nanofluid parameters as well as the throughflow parameter. The obtained solution provides important physical insight into the behavior of this model.Keywords: Darcy model, nanofluid, porous layer, throughflow
Procedia PDF Downloads 13712191 Limitations of Recent National Enactments on International Crimes: The Case of Kenya, Uganda and Sudan
Authors: Emma Charlene Lubaale
Abstract:
The International Criminal Court (ICC) operates based on the principle of complementarity. On the basis of this principle, states enjoy the primary right to prosecute international crimes, with the ICC intervening only when a state with jurisdiction over an international crime is unable or unwilling to prosecute. To ably exercise their primary right to prosecute international crimes domestically, a number of states are taking steps to criminalise international crimes in their national laws. Significant to note, many of the laws enacted are not being applied in the prosecution of the international crimes allegedly committed. Kenya, Uganda and Sudan are some notable states where commission of international crimes is documented. All these states have recently enacted laws on international crimes. Kenya enacted the International Crimes Act in 2008, Uganda enacted the International Criminal Court Act in 2010 and in 2007, Sudan made provision for international crimes under its Armed Forces Act. However, in all these three states, the enacted national laws on international crimes have thus far not featured in any of the proceedings before these states’ courts. Instead, these states have either relied on ordinary crimes to prosecute international crimes or not prosecuted international crimes altogether. This paper underscores the limitations of the enacted laws, explaining why, even with efforts taken by these states to enact national laws on international crimes, these laws cannot be relied on to advance accountability for the international crimes. Notably, the laws in Kenya and Uganda do not have retroactive application. In Sudan, despite the 2007 reforms, the structure of military justice in Sudan has the effect of placing certain categories of individuals beyond the reach of international criminal justice. For Kenya and Uganda, it is concluded that the only benefit that flows from these enactments is reliance on them to prosecute future international crimes. For Sudan, the 2007 reforms will only have the desired impact if reforms are equally made to the structure of military justice.Keywords: complementarity, national laws, Kenya, Sudan, Uganda, international crimes, limitations
Procedia PDF Downloads 28212190 Reducing Unnecessary CT Aorta Scans in the Emergency Department
Authors: Ibrahim Abouelkhir
Abstract:
Background: Prior to this project, the number of CT aorta requests from our Emergency Department (ED) was reported by the radiology department to be high with a low positive event rate: only 1- 2% of CT aortas performed were positive for acute aortic syndrome. This trend raised concerns about the time required to process and report these scans, potentially impacting the timely reporting of other high-priority imaging, such as trauma-related scans. Other harms identified were unnecessary radiation, patients spending longer in ED contributing to overcrowding, and, most importantly, the patient not getting the right care the first time. The radiology department also raised the problem of reporting bias because they expected our CT aortas to be normal. Aim: The main aim of this project was to reduce the number of unnecessary CT aortas requested, which would be shown by 1. Number of CT aortas requested and 2. Positive event rate. Methodology: This was a quality improvement project carried out in the ED at Frimley Park Hospital, UK. Starting from 1 st January 2024, we recorded the number of days required to reach 35 CT aorta requests. We looked at all patients presenting to the ED over the age of 16 for whom a CT aorta was requested by the ED team. We looked at how many of these scans were positive for acute aortic syndrome. The intervention was a change in practice: all CT aortas should be approved by an ED consultant or ST4+ registrar (5th April 2024). We then reviewed the number of days it took to reach a total of 35 CT aorta requests following the intervention and again reviewed how many were positive. Results: Prior to the intervention, 35 CT Aorta scans were performed over a 20-day period. Following the implementation of the ED senior doctor vetting process, the same number of CT Aorta scan requests was observed over 50 days - more than twice the pre-intervention period. This indicates a significant reduction in the rate of CT Aorta scans being requested. During the pre-intervention phase, there were two positive cases of acute aortic syndrome. In the post-intervention period, there were zero. Conclusion: The mandatory review of CT Aorta scan requested by the ED consultant effectively reduced the number of scans requested. However, this intervention did not lead to an increase in positive scan results. We noted that post-intervention, approximately 50% of scans had been approved by registrar-grade doctors and, only 50% had been approved by ED consultants, and the majority were not in-person reviews. We wonder if restricting the approval to consultant grade only might improve the results, and furthermore, in person reviews should be the gold standard.Keywords: quality improvement project, CT aorta scans, emergency department, radiology department, aortic dissection, scan request vetting, clinical outcomes, imaging efficiency
Procedia PDF Downloads 1012189 A Review of Research on Pre-training Technology for Natural Language Processing
Authors: Moquan Gong
Abstract:
In recent years, with the rapid development of deep learning, pre-training technology for natural language processing has made great progress. The early field of natural language processing has long used word vector methods such as Word2Vec to encode text. These word vector methods can also be regarded as static pre-training techniques. However, this context-free text representation brings very limited improvement to subsequent natural language processing tasks and cannot solve the problem of word polysemy. ELMo proposes a context-sensitive text representation method that can effectively handle polysemy problems. Since then, pre-training language models such as GPT and BERT have been proposed one after another. Among them, the BERT model has significantly improved its performance on many typical downstream tasks, greatly promoting the technological development in the field of natural language processing, and has since entered the field of natural language processing. The era of dynamic pre-training technology. Since then, a large number of pre-trained language models based on BERT and XLNet have continued to emerge, and pre-training technology has become an indispensable mainstream technology in the field of natural language processing. This article first gives an overview of pre-training technology and its development history, and introduces in detail the classic pre-training technology in the field of natural language processing, including early static pre-training technology and classic dynamic pre-training technology; and then briefly sorts out a series of enlightening technologies. Pre-training technology, including improved models based on BERT and XLNet; on this basis, analyze the problems faced by current pre-training technology research; finally, look forward to the future development trend of pre-training technology.Keywords: natural language processing, pre-training, language model, word vectors
Procedia PDF Downloads 5712188 Development of Electronic Governance as an Element of Reforming State Governance According to the Adjarian Example
Authors: Irakli Manvelidze, Genadi Iashvili, Giga Phartenadze, Giorgi Katamadze
Abstract:
Establishment of electronic governance in the region is facing serious problems. Organizational, technical, social and methodological problems have been identified after the research. These problems currently create serious barriers and prevent the development of effective e-governance. Lack of human resources, difference in program targets of the centre and the region, lack of citizens’ awareness about the project of electronic governance are other issues that should be mentioned. In spite of positive changes the overall situation concerning development of modern information-communication technologies in Adjara is not satisfactory. The information systems in the region can be described as transforming in a democratic way which needs serious reforms. Current situation shows that unsystematic, uncoordinated actions were made which overall represents more chaotic rather than coordinated systematic process. Therefore, a strategic document ‘Adjarian Electronic Government’ should be created which will ensure systematic development of electronic governance in the region. The implementation of the strategy of ‘Adjarian Electronic Government’ should be based on not only conceptual and instrumental but also legal basics. A legal normative basis should be created which will include formation of electronic government’s instrumental basis as well as creation of united regional system of electronic document management. Meanwhile types of documents which would be used in inter institutional relations should be defined under a legal norm. Creation of regional united system of e-filing will regulate regional public institutions, relations between local self-government and public organizations as well as it will ensure coordinated work of all regional public institutions.Keywords: e-government, information society, public administration, reforming state governance, public institutions
Procedia PDF Downloads 282