Search results for: pulp and paper waste
18517 Epistemological and Ethical Dimensions of Current Concepts of Human Resilience in the Neurosciences
Authors: Norbert W. Paul
Abstract:
Since a number of years, scientific interest in human resilience is rapidly increasing especially in psychology and more recently and highly visible in neurobiological research. Concepts of resilience are regularly discussed in the light of liminal experiences and existential challenges in human life. Resilience research is providing both, explanatory models and strategies to promote or foster human resilience. Surprisingly, these approaches attracted little attention so far in philosophy in general and in ethics in particular. This is even more astonishing given the fact that the neurosciences as such have been and still are of major interest to philosophy and ethics and even brought about the specialized field of neuroethics, which, however, is not concerned with concepts of resilience, so far. As a result of the little attention given to the topic of resilience, the whole concept has to date been a philosophically under-theorized. This abstinence of ethics and philosophy in resilience research is lamentable because resilience as a concept as well as resilience interventions based on neurobiological findings do undoubtedly pose philosophical, social and ethical questions. In this paper, we will argue that particular notions of resilience are crossing the sometimes fine line between maintaining a person’s mental health despite the impact of severe psychological or physical adverse events and ethically more debatable discourses of enhancement. While we neither argue for or against enhancement nor re-interpret resilience research and interventions by subsuming them strategies of psychological and/or neuro-enhancement, we encourage those who see social or ethical problems with enhancement technologies should also take a closer look on resilience and the related neurobiological concepts. We will proceed in three steps. In our first step, we will describe the concept of resilience in general and its neurobiological study in particular. Here, we will point out some important differences in the way ‘resilience’ is conceptualized and how neurobiological research understands resilience. In what follows we will try to show that a one-sided concept of resilience – as it is often presented in neurobiological research on resilience – does pose social and ethical problems. Secondly, we will identify and explore the social and ethical challenges of (neurobiological) enhancement. In the last and final step of this paper, we will argue that a one-sided reading of resilience can be understood as latent form of enhancement in transition and poses ethical questions similar to those discussed in relation to other approaches to the biomedical enhancement of humans.Keywords: resilience, neurosciences, epistemology, bioethics
Procedia PDF Downloads 16518516 Role of Consultancy in Engineering Education
Authors: V. Nalina, P. Jayarekha
Abstract:
Consultancy by an engineering faculty member of an institution undertakes consulting assignments to provide professional or technical solutions to specific fields. Consulting is providing an opportunity for the engineering faculty to share their insights for the real world problems. It is a dynamic learning process with respect to students and faculty as it increases the teaching and research activities. In this paper, we discuss the need for consultancy in engineering education with faculty contribution towards consultancy and advantages of consultancy to institutions. Balance the workload of the faculty consulting with the responsibilities of academics defined by the universities.Keywords: consultancy, academic consulting, engineering consultancy, faculty consulting
Procedia PDF Downloads 44318515 Female Entrepreneurship in Transitional Economies: An In-Depth Comparative Study about Challenges Facing Female Entrepreneurs in Nigeria and Egypt
Authors: Dina Mohamed Ayman, Rafieu Akin
Abstract:
In an attempt to increase the female total entrepreneurial activities (TEA) within Egypt and Nigeria, this paper aims to investigate the challenges facing female entrepreneurs operating in Egypt, in relative to Nigeria. In this regard, both researchers undertook a qualitative approach due to the scarcity of the literature reviewed on the topic; in those particular countries, and as an in-depth comparative mode. Therefore, ten Egyptian entrepreneurs in relative to ten Nigerian entrepreneurs were in-depth investigated. The research findings prove that female entrepreneurs face complex problems for being both gender and country-specific. Regarding the gender-specific obstacles, the work/life imbalance due to the scarcity of child-care nurseries and the prevalence of the gender-role division while performing the house chores rather than the concept of co-operation, acted as a main source of cultural challenge because women are considered mostly as 'housewives'. However, interestingly, this specific gender-discrimination challenge is proven to have no grounded effect in terms of the business-establishment and daily dealings neither in Egypt nor Nigeria, as one of the sample exclaimed 'as long as you pay, then no gender difference is set on the table'. Other country-specific challenges facing female entrepreneurs, lied in, the aggregate weak entrepreneurial framework governing both countries, also, women faced the difficulty of access to financial institutions with collateral requirements that are usually "hardly to be met", besides, the absence of the "micro-credit-Grameen-banks" concept. As well, the scarcity of incubators and business training centers providing network, consultancy and well-trained workforce to female entrepreneurs constitute a major hurdle for women entrepreneurs operating in both countries. Finally, this paper will conclude the research by offering a set of public-policy recommendations to pave the way for females to choose self-employment as a career path.Keywords: entrepreneurship, female entrepreneurship, obstacles, framework conditions, culture, micro-credit
Procedia PDF Downloads 37418514 Electrical Properties of CVD-Graphene on SiC
Authors: Bilal Jabakhanji, Dimitris Kazazis, Adrien Michon, Christophe Consejo, Wilfried Desrat, Benoit Jouault
Abstract:
In this paper, we investigate the electrical properties of graphene grown by Chemical Vapor Deposition (CVD) on the Si face of SiC substrates. Depending on the growth condition, hole or electron doping can be achieved, down to a few 1011cm−2. The high homogeneity of the graphene and the low intrinsic carrier concentration, allow the remarkable observation of the Half Integer Quantum Hall Effect, typical of graphene, at the centimeter scale.Keywords: graphene, quantum hall effect, chemical vapor, deposition, silicon carbide
Procedia PDF Downloads 67218513 Geometric Properties of Some q-Bessel Functions
Authors: İbrahim Aktaş, Árpád Baricz
Abstract:
In this paper, the radii of star likeness of the Jackson and Hahn-Exton q-Bessel functions are considered, and for each of them three different normalizations is applied. By applying Euler-Rayleigh inequalities for the first positive zeros of these functions tight lower, and upper bounds for the radii of starlikeness of these functions are obtained. The Laguerre-Pólya class of real entire functions plays an important role in this study. In particular, we obtain some new bounds for the first positive zero of the derivative of the classical Bessel function of the first kind.Keywords: bessel function, lommel function, radius of starlikeness and convexity, Struve function
Procedia PDF Downloads 27818512 Computational Fluid Dynamicsfd Simulations of Air Pollutant Dispersion: Validation of Fire Dynamic Simulator Against the Cute Experiments of the Cost ES1006 Action
Authors: Virginie Hergault, Siham Chebbah, Bertrand Frere
Abstract:
Following in-house objectives, Central laboratory of Paris police Prefecture conducted a general review on models and Computational Fluid Dynamics (CFD) codes used to simulate pollutant dispersion in the atmosphere. Starting from that review and considering main features of Large Eddy Simulation, Central Laboratory Of Paris Police Prefecture (LCPP) postulates that the Fire Dynamics Simulator (FDS) model, from National Institute of Standards and Technology (NIST), should be well suited for air pollutant dispersion modeling. This paper focuses on the implementation and the evaluation of FDS in the frame of the European COST ES1006 Action. This action aimed at quantifying the performance of modeling approaches. In this paper, the CUTE dataset carried out in the city of Hamburg, and its mock-up has been used. We have performed a comparison of FDS results with wind tunnel measurements from CUTE trials on the one hand, and, on the other, with the models results involved in the COST Action. The most time-consuming part of creating input data for simulations is the transfer of obstacle geometry information to the format required by SDS. Thus, we have developed Python codes to convert automatically building and topographic data to the FDS input file. In order to evaluate the predictions of FDS with observations, statistical performance measures have been used. These metrics include the fractional bias (FB), the normalized mean square error (NMSE) and the fraction of predictions within a factor of two of observations (FAC2). As well as the CFD models tested in the COST Action, FDS results demonstrate a good agreement with measured concentrations. Furthermore, the metrics assessment indicate that FB and NMSE meet the tolerance acceptable.Keywords: numerical simulations, atmospheric dispersion, cost ES1006 action, CFD model, cute experiments, wind tunnel data, numerical results
Procedia PDF Downloads 14018511 Cryptography Based Authentication Methods
Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf
Abstract:
This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.Keywords: information security, cryptography, system access control, authentication, network security
Procedia PDF Downloads 47318510 The Youth Employment Peculiarities in Post-Soviet Georgia
Authors: M. Lobzhanidze, N. Damenia
Abstract:
The article analyzes the current structural changes in the economy of Georgia, liberalization and integration processes of the economy. In accordance with this analysis, the peculiarities and the problems of youth employment are revealed. In the paper, the Georgian labor market and its contradictions are studied. Based on the analysis of materials, the socio-economic losses caused by the long-term and mass unemployment of young people are revealed, the objective and subjective circumstances of getting higher education are studied. The youth employment and unemployment rates are analyzed. Based on the research, the factors that increase unemployment are identified. According to the analysis of the youth employment, it has appeared that the unemployment share in the number of economically active population has increased in the younger age group. It demonstrates the high requirements of the labour market in terms of the quality of the workforce. Also, it is highlighted that young people are exposed to a highly paid job. The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend, etc.) and qualitative research (in-depth interview), as well as analysis, induction and comparison methods. The article presents the data by the National Statistics Office of Georgia and the Ministry of Agriculture of Georgia, policy documents of the Parliament of Georgia, scientific papers by Georgian and foreign scientists, analytical reports, publications and EU research materials on similar issues. The work estimates the students and graduates employment problems existing in the state development strategy and priorities. The measures to overcome the challenges are defined. The article describes the mechanisms of state regulation of youth employment and the ways of improving this regulatory base. As for major findings, it should be highlighted that the main problems are: lack of experience and incompatibility of youth qualification with the requirements of the labor market. Accordingly, it is concluded that the unemployment rate of young people in Georgia is increasing.Keywords: migration of youth, youth employment, migration management, youth employment and unemployment
Procedia PDF Downloads 15218509 Italian Colonial Strategy in Libya and the Conflict of Super Powers
Authors: Mohamed Basheer Abdul Atti Hassan
Abstract:
This research paper will follow the main outlines of the Italian colonization in Libya in a historical geopolitical approach; before we reach the contemporary map. In this study, we are also concerned with following the chain's links, not as drama in time, but as a strategy in place, so that it draws to us a map of power and the distribution of political formations throughout this period within and around Libya. From the sum of these variable distributions and successive balances, we can come up with the basic principles that determined the Italian history in Libya and formed its political entity, which is a compass of guidance and an indication of the future.Keywords: conflict, Mediterranean, colonization, political history
Procedia PDF Downloads 16718508 A Survey on the Sun Tracking Systems and Its Principle for Getting Maximum Sun Radiation
Authors: Talha Ali Khan
Abstract:
Discovering different energy resources to fulfill the world's growing demand is now one of the society’s bigger challenges for the next half-century. The main task is to convert the sun radiation into electricity via photovoltaic solar cells which is suddenly decreasing $/watt of delivered solar electricity. Therefore, in this context the sun trackers are those devices that can be used to ameliorate efficiency. In this paper, a variety of the sun tracking systems are evaluated and their merits and demerits are highlighted. The most adept and proficient sun-tracking devices are polar axis and azimuth-elevation types.Keywords: dual axis, fixed axis, sun tracker, sun radiation
Procedia PDF Downloads 45818507 Maximum Power Point Tracking Using FLC Tuned with GA
Authors: Mohamed Amine Haraoubia, Abdelaziz Hamzaoui, Najib Essounbouli
Abstract:
The pursuit of the MPPT has led to the development of many kinds of controllers, one of which is the Fuzzy Logic Controller, which has proven its worth. To further tune this controller this paper will discuss and analyze the use of Genetic Algorithms to tune the Fuzzy Logic Controller. It will provide an introduction to both systems, and test their compatibility and performance.Keywords: fuzzy logic controller, fuzzy logic, genetic algorithm, maximum power point, maximum power point tracking
Procedia PDF Downloads 38018506 Influence of Temperature and Precipitation Changes on Desertification
Authors: Kukuri Tavartkiladze, Nana Bolashvili
Abstract:
The purpose of this paper was separation and study of the part of structure regime, which directly affects the process of desertification. A simple scheme was prepared for the assessment of desertification process; surface air temperature and precipitation for the years of 1936-2009 were analyzed. The map of distribution of the Desertification Contributing Coefficient in the territory of Georgia was compiled. The simple scheme for identification of the intensity of the desertification contributing process has been developed and the illustrative example of its practical application for the territory of Georgia has been conducted.Keywords: aridity, climate change, desertification, precipitation
Procedia PDF Downloads 34018505 Knowledge Sharing Behavior and Cognitive Dissonance: The Influence of Assertive Conflict Management Strategy and Team Psychological Safety
Authors: Matthew P. Mancini, Vincent Ribiere
Abstract:
Today’s workers face more numerous and complex challenges and are required to be increasingly interdependent and faster learners. Knowledge sharing activities between people have been understood as a significant element affecting organizational innovation performance. While they do have the potential to spark cognitive conflict, disagreement is important from an organizational perspective because it can stimulate the development of new ideas and perhaps pave the way for creativity, innovation, and competitive advantage. How teams cope with the cognitive conflict dimension of knowledge sharing and the associated interpersonal risk is what captures our attention. Specifically, assertive conflict management strategies have a positive influence on knowledge sharing behaviors, and team psychological safety has a positive influence on knowledge sharing intention. This paper focuses on explaining the impact that these factors have on the shaping of an individual’s decision to engage or not in knowledge sharing activities. To accomplish this, we performed an empirical analysis on the results of our questionnaire about knowledge-sharing related conflict management and team psychological safety in pharmaceutical enterprises located in North America, Europe, and Asia. First, univariate analysis is used to characterize behavior regarding conflict management strategy into two groups. Group 1 presents assertive conflict management strategies and group 2 shows unassertive ones. Then, by using SEM methodology, we evaluated the relationships between them and the team psychological safety construct with the knowledge sharing process. The results of the SEM analysis show that assertive conflict management strategies affect the knowledge sharing process the most with a small, but significant effect from team psychological safety. The findings suggest that assertive conflict management strategies are just as important as knowledge sharing intentions for encouraging knowledge sharing behavior. This paper provides clear insights into how employees manage the sharing of their knowledge in the face of conflict and interpersonal risk and the relative importance of these factors in sustaining productive knowledge sharing activities.Keywords: cognitive dissonance, conflict management, knowledge sharing, organizational behavior, psychological safety
Procedia PDF Downloads 31818504 3D Printing: Rebounding from Global Supply Chain Disruption Due to Natural Disaster
Authors: Gurjinder Singh, Jasmeen Kaur, Mukul Dhiman
Abstract:
This paper mainly describes the significance of 3D printing in the supply chain management in a scenario when there is disruption in global supply chain. Furthermore, the development and implementation of supply chain strategies in context of 3D printing technology is framed to make supply chain of an organization resilient to disruption caused by natural disasters.Keywords: 3D printing, global supply chain, supply chain management, supply chain strategies
Procedia PDF Downloads 48218503 Synchronization of a Perturbed Satellite Attitude Motion using Active Sliding Mode Controller
Authors: Djaouida Sadaoui
Abstract:
In this paper, the design procedure of the active sliding mode controller which is a combination of the active controller and the sliding mode controller is given first and then the problem of synchronization of two satellites systems is discussed for the proposed method. Finally, numerical results are presented to evaluate the robustness and effectiveness of the proposed control strategy.Keywords: active control, sliding mode control, synchronization, satellite attitude
Procedia PDF Downloads 50118502 Determining the Policy Space of the Partido Socialista Obrero Español Government in Managing Spain's Economic and Financial Crisis
Authors: A. Pascual Ramsay
Abstract:
Accounts of the management of the economic and euro crisis in Spain have been dominated by an emphasis on external constraints. However, this approach leaves unanswered important questions about the role of domestic political factors. Using systematic qualitative primary research and employing elite interviewing and process tracing, this paper aims to fill this gap for the period of the Partido Socialista Obrero Español (PSOE) administration. The paper shows that domestic politics played a crucial role in the management of the crisis, most importantly by determining the shape of the measures undertaken. In its three distinct stages – downplaying/inaction, reaction/stimulus, and austerity/reform – the PSOE's response was certainly constrained by external factors, most notably EMU membership and the actions of sovereign-bond investors, the ECB and Germany. Yet while these external constraints forced the government to act, domestic political factors fundamentally shaped the content of key measures: the fiscal stimulus, the labour, financial and pension reforms, the refusal to accept a bailout or the reform of the Constitution. Seven factors were particularly influential: i) electoral and political cost, ii) party and partisanship, iii) organised interests, iv) domestic institutions, v) ideological preferences, vi) ineffective decision-making, and vii) judgement and personal characteristics of decision-makers. In conclusion, domestic politics played an important role in the management of the crisis, a role that has been underestimated by dominant approaches focusing on external constraints and weak domestic policy autonomy. The findings provide empirical evidence to support research agendas that identify significant state discretion in the face of international economic integration and an important role for domestic political factors such as institutions, material interests, partisanship and ideology in shaping economic outcomes.Keywords: economic crisis, Euro, PSOE, Spain
Procedia PDF Downloads 12418501 The Need to Enhance Online Consumer Protection in KSA
Authors: Abdulrahman Aloufi
Abstract:
E-commerce has evolved to become a functional and mainstream tool of global trading, including in the Kingdom of Saudi Arabia. Consequently, online consumers need protection just as much as consumers in the offline world. In 2019, the Ministry of Commerce in Saudi Arabia established a so-called ‘e-commerce law’; however, this law does not cover the court enforcement of contracts entered into by international vendors, so it is not applicable in cross-border situations. The purpose of this paper is to identify the gaps present in this new e-commerce law in Saudi Arabia.Keywords: consumer protection, e-commerce law, Saudi consumer, international vendor
Procedia PDF Downloads 18118500 H.263 Based Video Transceiver for Wireless Camera System
Authors: Won-Ho Kim
Abstract:
In this paper, a design of H.263 based wireless video transceiver is presented for wireless camera system. It uses standard WIFI transceiver and the covering area is up to 100m. Furthermore the standard H.263 video encoding technique is used for video compression since wireless video transmitter is unable to transmit high capacity raw data in real time and the implemented system is capable of streaming at speed of less than 1Mbps using NTSC 720x480 video.Keywords: wireless video transceiver, video surveillance camera, H.263 video encoding digital signal processing
Procedia PDF Downloads 37118499 Measuring Enterprise Growth: Pitfalls and Implications
Authors: N. Šarlija, S. Pfeifer, M. Jeger, A. Bilandžić
Abstract:
Enterprise growth is generally considered as a key driver of competitiveness, employment, economic development and social inclusion. As such, it is perceived to be a highly desirable outcome of entrepreneurship for scholars and decision makers. The huge academic debate resulted in the multitude of theoretical frameworks focused on explaining growth stages, determinants and future prospects. It has been widely accepted that enterprise growth is most likely nonlinear, temporal and related to the variety of factors which reflect the individual, firm, organizational, industry or environmental determinants of growth. However, factors that affect growth are not easily captured, instruments to measure those factors are often arbitrary, causality between variables and growth is elusive, indicating that growth is not easily modeled. Furthermore, in line with heterogeneous nature of the growth phenomenon, there is a vast number of measurement constructs assessing growth which are used interchangeably. Differences among various growth measures, at conceptual as well as at operationalization level, can hinder theory development which emphasizes the need for more empirically robust studies. In line with these highlights, the main purpose of this paper is twofold. Firstly, to compare structure and performance of three growth prediction models based on the main growth measures: Revenues, employment and assets growth. Secondly, to explore the prospects of financial indicators, set as exact, visible, standardized and accessible variables, to serve as determinants of enterprise growth. Finally, to contribute to the understanding of the implications on research results and recommendations for growth caused by different growth measures. The models include a range of financial indicators as lag determinants of the enterprises’ performances during the 2008-2013, extracted from the national register of the financial statements of SMEs in Croatia. The design and testing stage of the modeling used the logistic regression procedures. Findings confirm that growth prediction models based on different measures of growth have different set of predictors. Moreover, the relationship between particular predictors and growth measure is inconsistent, namely the same predictor positively related to one growth measure may exert negative effect on a different growth measure. Overall, financial indicators alone can serve as good proxy of growth and yield adequate predictive power of the models. The paper sheds light on both methodology and conceptual framework of enterprise growth by using a range of variables which serve as a proxy for the multitude of internal and external determinants, but are unlike them, accessible, available, exact and free of perceptual nuances in building up the model. Selection of the growth measure seems to have significant impact on the implications and recommendations related to growth. Furthermore, the paper points out to potential pitfalls of measuring and predicting growth. Overall, the results and the implications of the study are relevant for advancing academic debates on growth-related methodology, and can contribute to evidence-based decisions of policy makers.Keywords: growth measurement constructs, logistic regression, prediction of growth potential, small and medium-sized enterprises
Procedia PDF Downloads 25518498 New Approach for Constructing a Secure Biometric Database
Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir
Abstract:
The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking
Procedia PDF Downloads 39418497 The Discriminate Analysis and Relevant Model for Mapping Export Potential
Authors: Jana Gutierez Chvalkovska, Michal Mejstrik, Matej Urban
Abstract:
There are pending discussions over the mapping of country export potential in order to refocus export strategy of firms and its evidence-based promotion by the Export Credit Agencies (ECAs) and other permitted vehicles of governments. In this paper we develop our version of an applied model that offers “stepwise” elimination of unattractive markets. We modify and calibrate the model for the particular features of the Czech Republic and specific pilot cases where we apply an individual approach to each sector.Keywords: export strategy, modeling export, calibration, export promotion
Procedia PDF Downloads 50118496 Portfolio Risk Management Using Quantum Annealing
Authors: Thomas Doutre, Emmanuel De Meric De Bellefon
Abstract:
This paper describes the application of local-search metaheuristic quantum annealing to portfolio opti- mization. Heuristic technics are particularly handy when Markowitz’ classical Mean-Variance problem is enriched with additional realistic constraints. Once tailored to the problem, computational experiments on real collected data have shown the superiority of quantum annealing over simulated annealing for this constrained optimization problem, taking advantages of quantum effects such as tunnelling.Keywords: optimization, portfolio risk management, quantum annealing, metaheuristic
Procedia PDF Downloads 38918495 Medical Images Enhancement Using New Dynamic Band Pass Filter
Authors: Abdellatif Baba
Abstract:
In order to facilitate medical images analysis by improving their quality and readability, we present in this paper a new dynamic band pass filter as a general and suitable operator for different types of medical images. Our objective is to enrich the details of any treated medical image to make it sufficiently clear enough to give an understood and simplified meaning even for unspecialized people in the medical domain.Keywords: medical image enhancement, dynamic band pass filter, analysis improvement
Procedia PDF Downloads 29318494 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm
Authors: R. Kiruthika, A. Kannan
Abstract:
Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm
Procedia PDF Downloads 36718493 An Approach to Wind Turbine Modeling for Increasing Its Efficiency
Authors: Rishikesh Dingari, Sai Kiran Dornala
Abstract:
In this paper, a simple method of achieving maximum power by mechanical energy transmission device (METD) with integration to induction generator is proposed. METD functioning is explained and dynamic response of system to step input is plotted. Induction generator is being operated at self-excited mode with excitation capacitor at stator. Voltage and current are observed when linked to METD.Keywords: mechanical energy transmitting device(METD), self-excited induction generator, wind turbine, hydraulic actuators
Procedia PDF Downloads 34718492 Optical Flow Technique for Supersonic Jet Measurements
Authors: Haoxiang Desmond Lim, Jie Wu, Tze How Daniel New, Shengxian Shi
Abstract:
This paper outlines the development of a novel experimental technique in quantifying supersonic jet flows, in an attempt to avoid seeding particle problems frequently associated with particle-image velocimetry (PIV) techniques at high Mach numbers. Based on optical flow algorithms, the idea behind the technique involves using high speed cameras to capture Schlieren images of the supersonic jet shear layers, before they are subjected to an adapted optical flow algorithm based on the Horn-Schnuck method to determine the associated flow fields. The proposed method is capable of offering full-field unsteady flow information with potentially higher accuracy and resolution than existing point-measurements or PIV techniques. Preliminary study via numerical simulations of a circular de Laval jet nozzle successfully reveals flow and shock structures typically associated with supersonic jet flows, which serve as useful data for subsequent validation of the optical flow based experimental results. For experimental technique, a Z-type Schlieren setup is proposed with supersonic jet operated in cold mode, stagnation pressure of 8.2 bar and exit velocity of Mach 1.5. High-speed single-frame or double-frame cameras are used to capture successive Schlieren images. As implementation of optical flow technique to supersonic flows remains rare, the current focus revolves around methodology validation through synthetic images. The results of validation test offers valuable insight into how the optical flow algorithm can be further improved to improve robustness and accuracy. Details of the methodology employed and challenges faced will be further elaborated in the final conference paper should the abstract be accepted. Despite these challenges however, this novel supersonic flow measurement technique may potentially offer a simpler way to identify and quantify the fine spatial structures within the shock shear layer.Keywords: Schlieren, optical flow, supersonic jets, shock shear layer
Procedia PDF Downloads 31418491 Availability and Utilization of Health Care Facilities in Jalpaiguri Town
Authors: Sharmistha Mukherjee
Abstract:
Health care is the basic requirement for all. The prime question is who gets what, where and how? The unequal distribution of basic facilities do have a adverse effect on the users. The paper tries to examine health care in terms of available facilities, the health care need and how people perceive to it in a small town of Jalpaiguri in the midst of tea gardens in North Bengal. The morbidity pattern is also minutely observed with a section describing the organizational structure of health care keeping in mind the utilization.Keywords: availability, distribution, health care, utilization
Procedia PDF Downloads 53018490 Review of Models of Consumer Behaviour and Influence of Emotions in the Decision Making
Authors: Mikel Alonso López
Abstract:
In order to begin the process of studying the task of making consumer decisions, the main decision models must be analyzed. The objective of this task is to see if there is a presence of emotions in those models, and analyze how authors that have created them consider their impact in consumer choices. In this paper, the most important models of consumer behavior are analysed. This review is useful to consider an unproblematic background knowledge in the literature. The order that has been established for this study is chronological.Keywords: consumer behaviour, emotions, decision making, consumer psychology
Procedia PDF Downloads 45518489 A Novel Probablistic Strategy for Modeling Photovoltaic Based Distributed Generators
Authors: Engy A. Mohamed, Y. G. Hegazy
Abstract:
This paper presents a novel algorithm for modeling photovoltaic based distributed generators for the purpose of optimal planning of distribution networks. The proposed algorithm utilizes sequential Monte Carlo method in order to accurately consider the stochastic nature of photovoltaic based distributed generators. The proposed algorithm is implemented in MATLAB environment and the results obtained are presented and discussed.Keywords: comulative distribution function, distributed generation, Monte Carlo
Procedia PDF Downloads 59018488 An Assessment of Rice Yield Improvement Among Smallholder Rice Farmers in Asunafo North Municipality of Ghana
Authors: Isaac Diaka, Matsui Kenichi
Abstract:
Ghana’s rice production has increased mainly because of increased cultivated areas. On this point, scholars who promoted crop production increase for food security have overlooked the fact that its per-acre yield has not increased. Also, Ghana’s domestic rice production has not contributed much to domestic rice consumption especially in major cities where consumers tend to rely on imported rice from Asia. Considering these points, the paper seeks to understand why smallholder rice farmers have not been able to increase per acre rice yield. It also examines smallholder rice farmers’ rice yield improvement needs, and the relationship that exist between rice farmers’ socioeconomic factors and their yield levels by rice varieties. The study adopted a simple random sampling technique to select 154 rice farmers for a questionnaire survey between October and November 2020. The data was analyzed by performing a correlation analysis, an independent t-test, and Kendall’s coefficient of concordance. The results showed that 58.4% of the respondents cultivated popular high-yield varieties like AGRA and Jasmine. The rest used local varieties. Regarding respondents’ yield differentials, AGRA and Jasmine had an average yield of 2.6 mt/ha, which is higher than that of local varieties (1.6mt/ha). The study found untimely availability of improved seed varieties and high cost of inputs some of the major reasons affecting yield in the area. For respondents’ yield improvement needs, Kendall’s coefficient of concordance showed that access to improved varieties, irrigation infrastructure, and row planting were respondents’ major technological needs. As to their non-technological needs, the respondents needed timely information about rice production, access to credit support options, and extension services. The correlation analysis revealed that farm size and off-farm income exhibited a positive and negative association towards respondents’ yield level, respectively. This paper then discusses recommendations for providing with improved rice production technologies to farmers.Keywords: Ghana, rice, smallholder farmers, yield improvement.
Procedia PDF Downloads 98