Search results for: original oil-in-place
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1476

Search results for: original oil-in-place

666 The Post-Colonial Yoruba Poets as Agents of Political and Economic Emancipation in Nigeria

Authors: Isaac Alonge Olusola

Abstract:

One of the major peculiarities of man is the ability to communicate and interact with language. The original Yoruba society, before the advent of the Europeans, was purely oral. That is the major means of inter- personal communication was through speaking. The abolition of slave trade by Britain marked the beginning of development of Yoruba alphabet and introduction of writing around 1800. However, most of the writing was Christian religion-focused. Later, the introduction of British colonial rule led to the introduction of writing that dwelt on political and economic emancipation. On October 1, 1960, Nigeria was granted independence by the British colonial masters and self-rule started in Nigeria. Unfortunately, the military and civilian administrations brought about political and economic oppression instead of comfort. The discomfort brought about by Nigerian political and military rulers turned the Yoruba poets to activists, reactionaries and critics. This paper will give a brief preamble on the history of Nigeria and how she got her political independence from the British in 1960. It will thereafter go further to mention some political and economic hardship brought about by Nigerian leaders. Using literary theories called semiotics and structuralism, the reactions and criticisms of some Yoruba poets will be mentioned and analyzed vis-à-vis the counter reactions of the governments in power. Moreover, the paper will bring about a conclusion on how to create a conducive atmosphere for the Yoruba poets to operate in Nigeria. Finally, suggestions will be offered on how the Nigerian government and Yoruba poets can co-exist positively to bring about a better standard of living to Nigerians and also promote good governance

Keywords: Yoruba, Yoruba language, Yoruba poets, political leaders

Procedia PDF Downloads 136
665 Sheathed Cotton Fibers: Material for Oil-Spill Cleanup

Authors: Benjamin M Dauda, Esther Ibrahim, Sylvester Gadimoh, Asabe Mustapha, Jiyah Mohammed

Abstract:

Despite diverse optimization techniques on natural hydrophilic fibers, hydrophobic synthetic fibers are still the best oil sorption materials. However, these hydrophobic fibers are not biodegradable, making their disposal problematic. To this end, this work sets out to develop Nonwoven sorbents from epoxy-coated Cotton fibers. As a way of improving the compatibility of the crude oil and reduction of moisture absorption, cotton fibers were coated with epoxy resin by immersion in acetone-thinned epoxy solution. A needle-punching machine was used to convert the fibers into coherent nonwoven sheets. An oil sorption experiment was then carried out. The result indicates that the developed epoxy-modified sorbent has a higher crude oil-sorption capacity compared with those of untreated cotton and commercial polypropylene sorbents. Absorption Curves show that the coated fiber and polypropylene sorbent saturated faster than the uncoated cotton fiber pad. The result also shows that the coated cotton sorbent adsorbed crude faster than the polypropylene sorbent, and the equilibrium exhaustion was also higher. After a simple mechanical squeezing process, the Nonwoven pads could be restored to their original form and repeatedly recycled for oil/water separation. The results indicate that the cotton-coated non-woven pads hold promise for the cleanup of oil spills. Our data suggests that the sorption behaviors of the epoxy-coated Nonwoven pads and their crude oil sorption capacity are relatively stable under various environmental conditions compared to the commercial sheet.

Keywords: oil spill, adsorption, cotton, epoxy, nonwoven

Procedia PDF Downloads 50
664 Preserving Digital Arabic Text Integrity Using Blockchain Technology

Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

Abstract:

With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.

Keywords: arabic text, authentication, blockchain, integrity, quran, verification

Procedia PDF Downloads 158
663 Seaworthiness and Liability Risks Involving Technology and Cybersecurity in Transport and Logistics

Authors: Eugene Wong, Felix Chan, Linsey Chen, Joey Cheung

Abstract:

The widespread use of technologies and cyber/digital means for complex maritime operations have led to a sharp rise in global cyber-attacks. They have generated an increasing number of liability disputes, insurance claims, and legal proceedings. An array of antiquated case law, regulations, international conventions, and obsolete contractual clauses drafted in the pre-technology era have become grossly inadequate in addressing the contemporary challenges. This paper offers a critique of the ambiguity of cybersecurity liabilities under the obligation of seaworthiness entailed in the Hague-Visby Rules, which apply either by law in a large number of jurisdictions or by express incorporation into the shipping documents. This paper also evaluates the legal and technological criteria for assessing whether a vessel is properly equipped with the latest offshore technologies for navigation and cargo delivery operations. Examples include computer applications, networks and servers, enterprise systems, global positioning systems, and data centers. A critical analysis of the carriers’ obligations to exercise due diligence in preventing or mitigating cyber-attacks is also conducted in this paper. It is hoped that the present study will offer original and crucial insights to policymakers, regulators, carriers, cargo interests, and insurance underwriters closely involved in dispute prevention and resolution arising from cybersecurity liabilities.

Keywords: seaworthiness, cybersecurity, liabilities, risks, maritime, transport

Procedia PDF Downloads 133
662 Spiritual Recovery of People with Bipolar Disorder in Malaysia: A Grounded Theory Study

Authors: Mohamad Shariff Nurasikin, Paul Crawford, Nicola Wright

Abstract:

People with any mental disorder can get benefit from the spiritual aspects of life for recovery, particularly in searching for the meaning of life and engaging in meaningful activities. However, little is known about such effects in the population of bipolar disorder. The concepts of spirituality are highly contestable, as they are too broad and removed from the original religious understanding. The concepts are more notable as encompassing multi-dimensional aspects of people’s lives such as social, emotional, and psychological. Viewing that Western or secular worldview dominates most of the literature in spirituality, it is time to explore the concept of spirituality from the Eastern and religious worldview, such as the Malaysian view. Thus, the aim of this study is to provide a conceptual understanding of people with bipolar disorder with a religious affiliation in Malaysia. This study employs a Grounded Theory and explores the narratives from the interviews of 25 participants. The narratives strongly suggest the salient resources or can be referred to as various forms of capital, as in the capital theory, namely, religious, social, psychological, and medicinal. More important is how these capitals are the enablers for recovery in mental health and well-being, where the participants in the sample engage in a more meaningful life and positive adaptations. This study also extends the Bourdieusian spiritual capital, in which the salient resources are termed as the capital bundle. More significant is how the capital bundles are working contiguously in building and accumulating the spiritual capital. This process is conducive to recovery within the social life of people with bipolar disorder or perhaps other mental disorders.

Keywords: bipolar, Bourdeau, recovery, spiritual

Procedia PDF Downloads 381
661 Interpreting Form Based Code in Historic Residential Corridor

Authors: Diljan C. K.

Abstract:

Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.

Keywords: form based code, urban conservation, heritage, historic corridor

Procedia PDF Downloads 108
660 Evaluation of Residual Stresses in Human Face as a Function of Growth

Authors: M. A. Askari, M. A. Nazari, P. Perrier, Y. Payan

Abstract:

Growth and remodeling of biological structures have gained lots of attention over the past decades. Determining the response of living tissues to mechanical loads is necessary for a wide range of developing fields such as prosthetics design or computerassisted surgical interventions. It is a well-known fact that biological structures are never stress-free, even when externally unloaded. The exact origin of these residual stresses is not clear, but theoretically, growth is one of the main sources. Extracting body organ’s shapes from medical imaging does not produce any information regarding the existing residual stresses in that organ. The simplest cause of such stresses is gravity since an organ grows under its influence from birth. Ignoring such residual stresses might cause erroneous results in numerical simulations. Accounting for residual stresses due to tissue growth can improve the accuracy of mechanical analysis results. This paper presents an original computational framework based on gradual growth to determine the residual stresses due to growth. To illustrate the method, we apply it to a finite element model of a healthy human face reconstructed from medical images. The distribution of residual stress in facial tissues is computed, which can overcome the effect of gravity and maintain tissues firmness. Our assumption is that tissue wrinkles caused by aging could be a consequence of decreasing residual stress and thus not counteracting gravity. Taking into account these stresses seems therefore extremely important in maxillofacial surgery. It would indeed help surgeons to estimate tissues changes after surgery.

Keywords: finite element method, growth, residual stress, soft tissue

Procedia PDF Downloads 266
659 Igbo Art: A Reflection of the Igbo’s Visual Culture

Authors: David Osa-Egonwa

Abstract:

Visual culture is the expression of the norms and social behavior of a society in visual images. A reflection simply shows you how you look when you stand before a mirror, a clear water or stream. The mirror does not alter, improve or distort your original appearance, neither does it show you a caricature of what stands before it, this is the case with visual images created by a tribe or society. The ‘uli’ is hand drawn body design done on Igbo women and speaks of a culture of body adornment which is a practice that is appreciated by that tribe. The use of pattern of the gliding python snake ‘ije eke’ or ‘ijeagwo’ for wall painting speaks of the Igbo culture as one that appreciates wall paintings based on these patterns. Modern life came and brought a lot of change to the Igbo-speaking people of Nigeria. Change cloaked in the garment of Westernization has influenced the culture of the Igbos. This has resulted in a problem which is a break in the cultural practice that has also affected art produced by the Igbos. Before the colonial masters arrived and changed the established culture practiced by the Igbos, visual images were created that retained the culture of this people. To bring this point to limelight, this paper has adopted a historical method. A large number of works produced during pre and post-colonial era which range from sculptural pieces, paintings and other artifacts, just to mention a few, were studied carefully and it was discovered that the visual images hold the culture or aspects of the culture of the Igbos in their renditions and can rightly serve as a mirror of the Igbo visual culture.

Keywords: artistic renditions, historical method, Igbo visual culture, changes

Procedia PDF Downloads 182
658 Bayesian Inference of Physicochemical Quality Elements of Tropical Lagoon Nokoué (Benin)

Authors: Hounyèmè Romuald, Maxime Logez, Mama Daouda, Argillier Christine

Abstract:

In view of the very strong degradation of aquatic ecosystems, it is urgent to set up monitoring systems that are best able to report on the effects of the stresses they undergo. This is particularly true in developing countries, where specific and relevant quality standards and funding for monitoring programs are lacking. The objective of this study was to make a relevant and objective choice of physicochemical parameters informative of the main stressors occurring on African lakes and to identify their alteration thresholds. Based on statistical analyses of the relationship between several driving forces and the physicochemical parameters of the Nokoué lagoon, relevant Physico-chemical parameters were selected for its monitoring. An innovative method based on Bayesian statistical modeling was used. Eleven Physico-chemical parameters were selected for their response to at least one stressor and their threshold quality standards were also established: Total Phosphorus (<4.5mg/L), Orthophosphates (<0.2mg/L), Nitrates (<0.5 mg/L), TKN (<1.85 mg/L), Dry Organic Matter (<5 mg/L), Dissolved Oxygen (>4 mg/L), BOD (<11.6 mg/L), Salinity (7.6 .), Water Temperature (<28.7 °C), pH (>6.2), and Transparency (>0.9 m). According to the System for the Evaluation of Coastal Water Quality, these thresholds correspond to” good to medium” suitability classes, except for total phosphorus. One of the original features of this study is the use of the bounds of the credibility interval of the fixed-effect coefficients as local weathering standards for the characterization of the Physico-chemical status of this anthropized African ecosystem.

Keywords: driving forces, alteration thresholds, acadjas, monitoring, modeling, human activities

Procedia PDF Downloads 88
657 A Study on the Disclosure Experience of Adoptees

Authors: Tsung Chieh Ma, I-Ling Chen

Abstract:

Disclosing family origins to adoptees is an important topic in the adoption process. Adoption agencies usually educate adoptive parents on how to disclose to adoptees, but many adoptive parents worry that the disclosure will affect the parent–child relationship. Thus, how adoptees would like to receive the disclosure and whether they subjectively feel that the parent–child relationship is affected are both topics worthy of further discussion. This research takes a qualitative approach and connects with adoption agencies to interview six adoptees who are now adults. The purpose of the interviews is to learn about their experience receiving disclosures and their subjective feelings after learning of their family origins. The aim is to reveal the changes disclosure brought to the parent–child relationship and whether common concerns are raised due to the adoptive status. We also want to know about factors that affect their identification with their adopted status so that we can consequently give advice to other adoptive families. in this study finds that adoptees see disclosure as a process rather than an isolated event. The majority want to be told their family origin as early and proactively as possible and expect to learn the reasons they were given up for adoption and taken in as adoptees. The disclosure does not necessarily influence the parent–child relationship, and adoptees care more about the positive experiences they had with adoptive parents in their childhood. Moreover, adopted children seek contact with their original family mostly to understand why they were given up for adoption. The effects of disclosure depend on how the adoptive parents or other significant people in the lives of adoptees interpret the identity of the adoptees. That is, their response and attitude toward the identity have a lasting impact on the adoptees. The study suggests that early disclosure gives adoptees a chance to internalize the experience in the process and find self-identification.

Keywords: adoption, adoptees, disclosure of family origins, parent–child relationship, self-identity

Procedia PDF Downloads 67
656 Theoretical Modeling of Self-Healing Polymers Crosslinked by Dynamic Bonds

Authors: Qiming Wang

Abstract:

Dynamic polymer networks (DPNs) crosslinked by dynamic bonds have received intensive attention because of their special crack-healing capability. Diverse DPNs have been synthesized using a number of dynamic bonds, including dynamic covalent bond, hydrogen bond, ionic bond, metal-ligand coordination, hydrophobic interaction, and others. Despite the promising success in the polymer synthesis, the fundamental understanding of their self-healing mechanics is still at the very beginning. Especially, a general analytical model to understand the interfacial self-healing behaviors of DPNs has not been established. Here, we develop polymer-network based analytical theories that can mechanistically model the constitutive behaviors and interfacial self-healing behaviors of DPNs. We consider that the DPN is composed of interpenetrating networks crosslinked by dynamic bonds. bonds obey a force-dependent chemical kinetics. During the self-healing process, we consider the The network chains follow inhomogeneous chain-length distributions and the dynamic polymer chains diffuse across the interface to reform the dynamic bonds, being modeled by a diffusion-reaction theory. The theories can predict the stress-stretch behaviors of original and self-healed DPNs, as well as the healing strength in a function of healing time. We show that the theoretically predicted healing behaviors can consistently match the documented experimental results of DPNs with various dynamic bonds, including dynamic covalent bonds (diarylbibenzofuranone and olefin metathesis), hydrogen bonds, and ionic bonds. We expect our model to be a powerful tool for the self-healing community to invent, design, understand, and optimize self-healing DPNs with various dynamic bonds.

Keywords: self-healing polymers, dynamic covalent bonds, hydrogen bonds, ionic bonds

Procedia PDF Downloads 183
655 Stabilization of Medical Waste Incineration Fly Ash in Cement Mortar Matrix

Authors: Tanvir Ahmed, Musfira Rahman, Rumpa Chowdhury

Abstract:

We performed laboratory experiments to assess the suitability of using medical waste incineration fly ash in cement as a construction material based on the engineering properties of fly ash-cement matrix and the leaching potential of toxic heavy metals from the stabilized mix. Fly ash-cement samples were prepared with different proportions of fly ash (0%, 5%, 10%, 15% and 20% by weight) in the laboratory controlled conditions. The solidified matrix exhibited a compressive strength from 3950 to 4980 psi when fly ash is mixed in varying proportions. The 28-day compressive strength has been found to decrease with the increase in fly ash content, but it meets the minimum requirement of compressive strength for cement-mortar. Soundness test results for cement-mortar mixes having up to 15% fly ash. Final and initial setting times of cement have been found to generally increase with fly ash content. Water requirement (for normal consistency) also increased with the increase in fly ash content in cement. Based on physical properties of the cement-mortar matrix it is recommended that up to 10% (by weight) medical waste incineration fly ash can be incorporated for producing cement-mortar of optimum quality. Leaching behaviours of several targeted heavy metals (As, Cu, Ni, Cd, Pb, Hg and Zn) were analyzed using Toxicity Characteristics Leaching Procedure (TCLP) on fly ash and solidified fly ash-cement matrix. It was found that the leached concentrations of As, Cu, Cd, Pb and Zn were reduced by 80.13%, 89.47%, 33.33% and 23.9% respectively for 10% fly ash incorporated cement-mortar matrix compared to that of original fly ash. The leached concentrations of heavy metals were from the matrix were far below the EPA land disposal limits. These results suggest that the solidified fly ash incorporated cement-mortar matrix can effectively confine and immobilize the heavy metals contained in the fly ash.

Keywords: cement-mortar, fly ash, leaching, waste management

Procedia PDF Downloads 169
654 An Assessment of Different Blade Tip Timing (BTT) Algorithms Using an Experimentally Validated Finite Element Model Simulator

Authors: Mohamed Mohamed, Philip Bonello, Peter Russhard

Abstract:

Blade Tip Timing (BTT) is a technology concerned with the estimation of both frequency and amplitude of rotating blades. A BTT system comprises two main parts: (a) the arrival time measurement system, and (b) the analysis algorithms. Simulators play an important role in the development of the analysis algorithms since they generate blade tip displacement data from the simulated blade vibration under controlled conditions. This enables an assessment of the performance of the different algorithms with respect to their ability to accurately reproduce the original simulated vibration. Such an assessment is usually not possible with real engine data since there is no practical alternative to BTT for blade vibration measurement. Most simulators used in the literature are based on a simple spring-mass-damper model to determine the vibration. In this work, a more realistic experimentally validated simulator based on the Finite Element (FE) model of a bladed disc (blisk) is first presented. It is then used to generate the necessary data for the assessment of different BTT algorithms. The FE modelling is validated using both a hammer test and two firewire cameras for the mode shapes. A number of autoregressive methods, fitting methods and state-of-the-art inverse methods (i.e. Russhard) are compared. All methods are compared with respect to both synchronous and asynchronous excitations with both single and simultaneous frequencies. The study assesses the applicability of each method for different conditions of vibration, amount of sampling data, and testing facilities, according to its performance and efficiency under these conditions.

Keywords: blade tip timing, blisk, finite element, vibration measurement

Procedia PDF Downloads 303
653 Generative Adversarial Network Based Fingerprint Anti-Spoofing Limitations

Authors: Yehjune Heo

Abstract:

Fingerprint Anti-Spoofing approaches have been actively developed and applied in real-world applications. One of the main problems for Fingerprint Anti-Spoofing is not robust to unseen samples, especially in real-world scenarios. A possible solution will be to generate artificial, but realistic fingerprint samples and use them for training in order to achieve good generalization. This paper contains experimental and comparative results with currently popular GAN based methods and uses realistic synthesis of fingerprints in training in order to increase the performance. Among various GAN models, the most popular StyleGAN is used for the experiments. The CNN models were first trained with the dataset that did not contain generated fake images and the accuracy along with the mean average error rate were recorded. Then, the fake generated images (fake images of live fingerprints and fake images of spoof fingerprints) were each combined with the original images (real images of live fingerprints and real images of spoof fingerprints), and various CNN models were trained. The best performances for each CNN model, trained with the dataset of generated fake images and each time the accuracy and the mean average error rate, were recorded. We observe that current GAN based approaches need significant improvements for the Anti-Spoofing performance, although the overall quality of the synthesized fingerprints seems to be reasonable. We include the analysis of this performance degradation, especially with a small number of samples. In addition, we suggest several approaches towards improved generalization with a small number of samples, by focusing on what GAN based approaches should learn and should not learn.

Keywords: anti-spoofing, CNN, fingerprint recognition, GAN

Procedia PDF Downloads 180
652 Structural Damage Detection via Incomplete Model Data Using Output Data Only

Authors: Ahmed Noor Al-qayyim, Barlas Özden Çağlayan

Abstract:

Structural failure is caused mainly by damage that often occurs on structures. Many researchers focus on obtaining very efficient tools to detect the damage in structures in the early state. In the past decades, a subject that has received considerable attention in literature is the damage detection as determined by variations in the dynamic characteristics or response of structures. This study presents a new damage identification technique. The technique detects the damage location for the incomplete structure system using output data only. The method indicates the damage based on the free vibration test data by using “Two Points - Condensation (TPC) technique”. This method creates a set of matrices by reducing the structural system to two degrees of freedom systems. The current stiffness matrices are obtained from optimization of the equation of motion using the measured test data. The current stiffness matrices are compared with original (undamaged) stiffness matrices. High percentage changes in matrices’ coefficients lead to the location of the damage. TPC technique is applied to the experimental data of a simply supported steel beam model structure after inducing thickness change in one element. Where two cases are considered, the method detects the damage and determines its location accurately in both cases. In addition, the results illustrate that these changes in stiffness matrix can be a useful tool for continuous monitoring of structural safety using ambient vibration data. Furthermore, its efficiency proves that this technique can also be used for big structures.

Keywords: damage detection, optimization, signals processing, structural health monitoring, two points–condensation

Procedia PDF Downloads 357
651 Inherited Eye Diseases in Africa: A Scoping Review and Strategy for an African Longitudinal Eye Study

Authors: Bawa Yusuf Muhammad, Musa Abubakar Kana, Aminatu Abdulrahman, Kerry Goetz

Abstract:

Background: Inherited eye diseases are disorders that affect globally, 1 in 1000 people. The six main world populations have created databases containing information on eye genotypes. Aim: The aim of the scoping review was to mine and present the available information to date on the genetics of inherited eye diseases within the African continent. Method: Literature Search Strategy was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). PubMed and Google Scholar searched for articles on inherited eye diseases from inception to 20th June 2022. Both Original and review articles that report on inherited, genetic or developmental/congenital eye diseases within the African Continent were included in the research. Results: A total of 1162 citations were obtained, but only 37 articles were reviewed based on the inclusion and exclusion criteria. The highest output of publications on inherited eye diseases comes from South Africa and Tunisia (about 43%), followed by Morocco and Egypt (27%), then Sub-Saharan Africa and North Africa (13.50%), while the remaining articles (16.5%) originated from Nigeria, Ghana, Mauritania Cameroon, Zimbabwe and combined article between Zimbabwe and Cameroon. Glaucoma and inherited retinal disorders represent the most studied diseases, followed by Albinism and congenital cataracts, respectively. Conclusion: Despite the growing research from Tunisia, Morocco, Egypt and South Africa, Sub-Saharan Africa remains almost a virgin region to explore the genetics of eye diseases.

Keywords: inherited eye diseases, Africa, scoping review, longitudinal eye study

Procedia PDF Downloads 52
650 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 389
649 Determination of the Stability of Haloperidol Tablets and Phenytoin Capsules Stored in the Inpatient Dispensary System (Swisslog) by the Respective HPLC and Raman Spectroscopy Assay

Authors: Carol Yue-En Ong, Angelina Hui-Min Tan, Quan Liu, Paul Chi-Lui Ho

Abstract:

A public general hospital in Singapore has recently implemented an automated unit-dose machine in their inpatient dispensary, Swisslog, with the objective of reducing human error and improving patient safety. However, a concern in stability arises as tablets are removed from their original packaging (bottled loose tablets/capsules) and are repackaged into individual, clear plastic wrappers as unit doses in the system. Drugs that are light-sensitive and hygroscopic would be more susceptible to degradation as the wrapper does not offer full protection. Hence, this study was carried out to study the stability of haloperidol tablets and phenytoin capsules that are light-sensitive and hygroscopic respectively. Validated HPLC-UV assays were first established for quantification of these two compounds. The medications involved were put in the Swisslog and sampled every week for one month. The collected data was analysed and showed no degradation over time. This study also explored an alternative approach for drug stability determination-Raman spectroscopy. The advantage of Raman spectroscopy is its high time efficiency and non-destructive nature. The results suggest that drug degradation can indeed be detected using Raman microscopy, but further research is needed to establish this approach for quantification or qualification of compounds. NanoRam®, a portable Raman spectrocope was also used alongside Raman microscopy but was unsuccessful in detecting degradation in this study.

Keywords: drug stability, haloperidol, HPLC, phenytoin, raman spectroscopy, Swisslog

Procedia PDF Downloads 343
648 Object Oriented Fault Tree Analysis Methodology

Authors: Yi Xiong, Tao Kong

Abstract:

Traditional safety, risk and reliability analysis approaches are problem-oriented, which make it great workload when analyzing complicated and huge system, besides, too much repetitive work would to do if the analyzed system composed by many similar components. It is pressing need an object and function oriented approach to maintain high consistency with problem domain. A new approach is proposed to overcome these shortcomings of traditional approaches, the concepts: class, abstract, inheritance, polymorphism and encapsulation are introduced into FTA and establish the professional class library that the abstractions of physical objects in real word, four areas relevant information also be proposed as the establish help guide. The interaction between classes is completed by the inside or external methods that mapping the attributes to base events through fully search the knowledge base, which forms good encapsulation. The object oriented fault tree analysis system that analyze and evaluate the system safety and reliability according to the original appearance of the problem is set up, where could mapped directly from the class and object to the problem domain of the fault tree analysis. All the system failure situations can be analyzed through this bottom-up fault tree construction approach. Under this approach architecture, FTA approach is developed, which avoids the human influence of the analyst on analysis results. It reveals the inherent safety problems of analyzed system itself and provides a new way of thinking and development for safety analysis. So that object oriented technology in the field of safety applications and development, safety theory is conducive to innovation.

Keywords: FTA, knowledge base, object-oriented technology, reliability analysis

Procedia PDF Downloads 246
647 Forest Risk and Vulnerability Assessment: A Case Study from East Bokaro Coal Mining Area in India

Authors: Sujata Upgupta, Prasoon Kumar Singh

Abstract:

The expansion of large scale coal mining into forest areas is a potential hazard for the local biodiversity and wildlife. The objective of this study is to provide a picture of the threat that coal mining poses to the forests of the East Bokaro landscape. The vulnerable forest areas at risk have been assessed and the priority areas for conservation have been presented. The forested areas at risk in the current scenario have been assessed and compared with the past conditions using classification and buffer based overlay approach. Forest vulnerability has been assessed using an analytical framework based on systematic indicators and composite vulnerability index values. The results indicate that more than 4 km2 of forests have been lost from 1973 to 2016. Large patches of forests have been diverted for coal mining projects. Forests in the northern part of the coal field within 1-3 km radius around the coal mines are at immediate risk. The original contiguous forests have been converted into fragmented and degraded forest patches. Most of the collieries are located within or very close to the forests thus threatening the biodiversity and hydrology of the surrounding regions. Based on the vulnerability values estimated, it was concluded that more than 90% of the forested grids in East Bokaro are highly vulnerable to mining. The forests in the sub-districts of Bermo and Chandrapura have been identified as the most vulnerable to coal mining activities. This case study would add to the capacity of the forest managers and mine managers to address the risk and vulnerability of forests at a small landscape level in order to achieve sustainable development.

Keywords: forest, coal mining, indicators, vulnerability

Procedia PDF Downloads 387
646 Recontextualisation of Political Discourse: A Case Study of Translation of News Stories

Authors: Hossein Sabouri

Abstract:

News stories as one of the branches of political discourse has always been regarded a sensitive and challenging area. Political translators often encounter some struggles that are vitally important when it comes to deal with the political tension between the source culture and the target one. Translating news stories is of prime importance since it has widespread availability and power of defining or even changing the facts. News translation is usually more than straight transfer of source text. Like original text endeavoring to manipulate the readers’ minds with imposing their ideologies, translated text seeking to change these ideologies influenced by ideological power. In other words, translation product is not considered more than a recontextualisation of the source text. The present study examines possible criteria for occurring changes in the translation process of news stories based on the ideological and political stance of translator using theories of ‘critical discourse analysis’and ‘translation and power. Fairclough investigates the ideological issues in (political) discourse and Tymoczko studies the political and power-related engagement of the translator in the process of translation. Incorporation of Fairclough and Gentzler and Tymoczko’s theories paves the way for the researcher to looks at the ideological power position of the translator. Data collection and analysis have been accomplished using 17 political-text samples taken from online news agencies which are related to the ‘Iran’s Nuclear Program’. Based on the findings, recontextualisation is mainly observed in terms of the strategies of ‘substitution, omissions, and addition’ in the translation process. The results of the study suggest that there is a significant relationship between the translation of political texts and ideologies of target culture.

Keywords: news translation, recontextualisation, ideological power, political discourse

Procedia PDF Downloads 188
645 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing

Authors: Surichai Butcha, Dararat Khampusaen

Abstract:

As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.

Keywords: citing source, EFL writing, e-learning, Internet, plagiarism

Procedia PDF Downloads 147
644 Method to Find a ε-Optimal Control of Stochastic Differential Equation Driven by a Brownian Motion

Authors: Francys Souza, Alberto Ohashi, Dorival Leao

Abstract:

We present a general solution for finding the ε-optimal controls for non-Markovian stochastic systems as stochastic differential equations driven by Brownian motion, which is a problem recognized as a difficult solution. The contribution appears in the development of mathematical tools to deal with modeling and control of non-Markovian systems, whose applicability in different areas is well known. The methodology used consists to discretize the problem through a random discretization. In this way, we transform an infinite dimensional problem in a finite dimensional, thereafter we use measurable selection arguments, to find a control on an explicit form for the discretized problem. Then, we prove the control found for the discretized problem is a ε-optimal control for the original problem. Our theory provides a concrete description of a rather general class, among the principals, we can highlight financial problems such as portfolio control, hedging, super-hedging, pairs-trading and others. Therefore, our main contribution is the development of a tool to explicitly the ε-optimal control for non-Markovian stochastic systems. The pathwise analysis was made through a random discretization jointly with measurable selection arguments, has provided us with a structure to transform an infinite dimensional problem into a finite dimensional. The theory is applied to stochastic control problems based on path-dependent stochastic differential equations, where both drift and diffusion components are controlled. We are able to explicitly show optimal control with our method.

Keywords: dynamic programming equation, optimal control, stochastic control, stochastic differential equation

Procedia PDF Downloads 183
643 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 515
642 Revitalising Warsaw: The Significance of Incorporating 18th Century Art in Post-War Architecture Reconstruction

Authors: Aleksandra Kondraciuk

Abstract:

The reconstruction of post-war architecture in Warsaw is an important and complex project that requires physical restoration and cultural preservation. The incorporation of 18th-century art within the renovated structures of the urban area forms a crucial aspect of the reconstruction procedure. Information was gathered by interviewing current residents, examining additional data, and researching archival materials. This form of art was once a thriving cultural centre in Warsaw, playing a significant role in its history. Adding it to the rebuilt structures links them to the city’s vibrant past, making them more meaningful for locals and visitors. The reconstructed buildings showcase 18th-century art forms, including sketches, drawings, and paintings, accurately replicating the original buildings’ architectural details and decorative elements. These art forms elevate the buildings from mere functional spaces to works of art themselves, thus augmenting the beauty and distinctiveness of the city, setting it apart from other cities worldwide. Furthermore, this art form symbolises the city’s tenacity in adversity and destruction. Revitalising Warsaw requires rebuilding its physical structures, restoring its cultural identity, and preserving its rich history. Incorporating 18th-century art into the post-war architectural reconstruction process is a powerful way to achieve these goals and maintain the city. This approach acknowledges the city’s history and cultural significance, fostering a sense of continuity between the past and present, which is crucial for the city’s future growth and prosperity.

Keywords: 18th-century art, building reconstruction, cultural preservation, post-war architecture

Procedia PDF Downloads 70
641 Optimizing Nature Protection and Tourism in Urban Parks

Authors: Milena Lakicevic

Abstract:

The paper deals with the problem of optimizing management options for urban parks within different scenarios of nature protection and tourism importance. The procedure is demonstrated on a case study example of urban parks in Novi Sad (Serbia). Six management strategies for the selected area have been processed by the decision support method PROMETHEE. Two criteria used for the evaluation were nature protection and tourism and each of them has been divided into a set of indicators: for nature protection those were biodiversity and preservation of original landscape, while for tourism those were recreation potential, aesthetic values, accessibility and culture features. It was pre-assumed that each indicator in a set is equally important to a corresponding criterion. This way, the research was focused on a sensitivity analysis of criteria weights. In other words, weights of indicators were fixed and weights of criteria altered along the entire scale (from the value of 0 to the value of 1), and the assessment has been performed in two-dimensional surrounding. As a result, one could conclude which management strategy would be the most appropriate along with changing of criteria importance. The final ranking of management alternatives was followed up by investigating the mean PROMETHEE Φ values for all options considered and when altering the importance of nature protection/tourism. This type of analysis enabled detecting an alternative with a solid performance along the entire scale, i.e., regardlessly of criteria importance. That management strategy can be seen as a compromise solution when the weight of criteria is not defined. As a conclusion, it can be said that, in some cases, instead of having criteria importance fixed it is important to test the outputs depending on the different schemes of criteria weighting. The research demonstrates the state of the final decision when the decision maker can estimate criteria importance, but also in cases when the importance of criteria is not established or known.

Keywords: criteria weights, PROMETHEE, sensitivity analysis, urban parks

Procedia PDF Downloads 183
640 Improving the Global Competitiveness of SMEs by Logistics Transportation Management: Case Study Chicken Meat Supply Chain

Authors: P. Vanichkobchinda

Abstract:

The Logistics Transportation techniques, Open Vehicle Routing (OVR) is an approach toward transportation cost reduction, especially for long distance pickup and delivery nodes. The outstanding characteristic of OVR is that the route starting node and ending node are not necessary the same as in typical vehicle routing problems. This advantage enables the routing to flow continuously and the vehicle does not always return to its home base. This research aims to develop a heuristic for the open vehicle routing problem with pickup and delivery under time window and loading capacity constraints to minimize the total distance. The proposed heuristic is developed based on the Insertion method, which is a simple method and suitable for the rapid calculation that allows insertion of the new additional transportation requirements along the original paths. According to the heuristic analysis, cost comparisons between the proposed heuristic and companies are using method, nearest neighbor method show that the insertion heuristic. Moreover, the proposed heuristic gave superior solutions in all types of test problems. In conclusion, the proposed heuristic can effectively and efficiently solve the open vehicle routing. The research indicates that the improvement of new transport's calculation and the open vehicle routing with "Insertion Heuristic" represent a better outcome with 34.3 percent in average. in cost savings. Moreover, the proposed heuristic gave superior solutions in all types of test problems. In conclusion, the proposed heuristic can effectively and efficiently solve the open vehicle routing.

Keywords: business competitiveness, cost reduction, SMEs, logistics transportation, VRP

Procedia PDF Downloads 681
639 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions

Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib

Abstract:

Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.

Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption

Procedia PDF Downloads 405
638 Theatrical Architecture in Bologna at the Beginning of the Twentieth Century: The Renaissance of Modernissimo Cinema

Authors: Giorgia Predari, Riccardo Gulli

Abstract:

The paper describes the history and the stylistic choices adopted in the construction of Palazzo Ronzani in Bologna, which was the first building to rise after the heavy demolitions carried out in the historical center of the city at the beginning of the twentieth century. In 1910, the local administration adopted a detailed plan to change the aspect of the city, as it was already happening in the main European capitals. In this context, starting from 1911, the architect and scenographer Gualtiero Pontoni designed for Alessandro Ronzani -the owner of a well-known Bolognese beer company- his Palazzo, which is listed among the first multifunctional buildings in Bologna, containing offices, commercial activities, and entertainment spaces. In an area of about 2000 m², the architect was able to propose a theatre with a capacity of 2000 seats at the basement, shops, a cafè-chantant and a restaurant on the ground floor, clubs, studios and commercial stores on the mezzanine and the first plan, and a hotel on the upper floors. The whole core of the building, at the underground levels, consisted of a reinforced concrete frame (one of the first examples of this type of construction in the city), which allowed the hall to have a free span of 11 x 12 meters, and a height of about 9 meters. Used until 2007 as a cinema, the hall has remained then in disuse for almost 10 years, but now an important functional restoration project with a strong architectural and scenographic value is taking place. It will bring the spaces back to the original geometries, in a historical and artistic condition inspired by the styles of the early Twentieth century.

Keywords: Modernissimo, Palazzo Ronzani, liberty, Bologna

Procedia PDF Downloads 117
637 Liver and Liver Lesion Segmentation From Abdominal CT Scans

Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid

Abstract:

The interpretation of medical images benefits from anatomical and physiological priors to optimize computer- aided diagnosis applications. Segmentation of liver and liver lesion is regarded as a major primary step in computer aided diagnosis of liver diseases. Precise liver segmentation in abdominal CT images is one of the most important steps for the computer-aided diagnosis of liver pathology. In this papers, a semi- automated method for medical image data is presented for the liver and liver lesion segmentation data using mathematical morphology. Our algorithm is currency in two parts. In the first, we seek to determine the region of interest by applying the morphological filters to extract the liver. The second step consists to detect the liver lesion. In this task; we proposed a new method developed for the semi-automatic segmentation of the liver and hepatic lesions. Our proposed method is based on the anatomical information and mathematical morphology tools used in the image processing field. At first, we try to improve the quality of the original image and image gradient by applying the spatial filter followed by the morphological filters. The second step consists to calculate the internal and external markers of the liver and hepatic lesions. Thereafter we proceed to the liver and hepatic lesions segmentation by the watershed transform controlled by markers. The validation of the developed algorithm is done using several images. Obtained results show the good performances of our proposed algorithm

Keywords: anisotropic diffusion filter, CT images, hepatic lesion segmentation, Liver segmentation, morphological filter, the watershed algorithm

Procedia PDF Downloads 445