Search results for: vehicle routing problems
6822 Impact of Teacher’s Behavior in Class Room on Socialization and Mental Health of School Children: A Student’s Perspective
Authors: Umaiza Bashir, Ushna Farukh
Abstract:
The present study examined the perspective of school students regarding teacher’s behavioral pattern during a teaching in classroom and its influence on the students’ socialization particularly forming peer relationships with the development of emotional, behavioral problems in school children. To study these dimension of teacher-student classroom relationship, 210 school children (105 girls and 105 boys) within the age range of 14 to 18 years were taken from the government, private schools. The cross-sectional research design was used in which stratified random sampling was done. Teacher-student interaction scale was used to assess the teacher-student relationship in the classroom, which had two factors such as positive and negative interaction. Peer relationship scale was administered to investigate the socialization of students, and School Children Problem Scale was also given to the participants to explore their emotional, behavioral issues. The analysis of Pearson correlation showed that there is a significant positive relationship between negative teacher-student interaction and student’s emotional-behavioral as well as social problems. Another analysis of t-test revealed that boys perceived more positive interaction with teachers than girls (p < 0.01). Girls showed more emotional behavioral problems than boys (p < 0.001) Linear regression explained that age, gender, negative teacher’s interaction with students and victimization in social gathering predicts mental health problems in school children. This study suggests and highlights the need for the school counselors for the better mental health of students and teachers.Keywords: teacher-student interaction, school psychology, student’s emotional behavioral problems
Procedia PDF Downloads 1676821 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2266820 Fuzzy Rules Based Improved BEENISH Protocol for Wireless Sensor Networks
Authors: Rishabh Sharma
Abstract:
The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.Keywords: wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system
Procedia PDF Downloads 1036819 Problems in Lifelong Education Course in Information and Communication Technology
Authors: Hisham Md.Suhadi, Faaizah Shahbodin, Jamaluddin Hashim, Nurul Huda Mahsudi, Mahathir Mohd Sarjan
Abstract:
The study is the way to identify the problems that occur in organizing short courses lifelong learning in the information and communication technology (ICT) education which are faced by the lecturer and staff at the Mara Skill Institute and Industrial Training Institute in Pahang, Malaysia. The important aspects of these issues are classified to five which are selecting the courses administrative. Fifty lecturers and staff were selected as a respondent. The sample is selected by using the non-random sampling method purpose sampling. The questionnaire is used as a research instrument and divided into five main parts. All the data that gain from the questionnaire are analyzed by using the SPSS in term of mean, standard deviation and percentage. The findings showed that there are the problems occur in organizing the short course for lifelong learning in ICT education.Keywords: lifelong Education, information and communication technology, short course, ICT education, courses administrative
Procedia PDF Downloads 4536818 Learning in the Virtual Laboratory via Design of Automation Process for Wooden Hammers Marking
Authors: A. Javorova, J. Oravcova, K. Velisek
Abstract:
The article summarizes the experience of technical subjects teaching methodologies using a number of software products to solve specific assigned tasks described in this paper. Task is about the problems of automation and mechanization in the industry. Specifically, it focuses on introducing automation in the wood industry. The article describes the design of the automation process for marking wooden hammers. Similar problems are solved by students in CA laboratory.Keywords: CA system, education, simulation, subject
Procedia PDF Downloads 2946817 The Role of Metaheuristic Approaches in Engineering Problems
Authors: Ferzat Anka
Abstract:
Many types of problems can be solved using traditional analytical methods. However, these methods take a long time and cause inefficient use of resources. In particular, different approaches may be required in solving complex and global engineering problems that we frequently encounter in real life. The bigger and more complex a problem, the harder it is to solve. Such problems are called Nondeterministic Polynomial time (NP-hard) in the literature. The main reasons for recommending different metaheuristic algorithms for various problems are the use of simple concepts, the use of simple mathematical equations and structures, the use of non-derivative mechanisms, the avoidance of local optima, and their fast convergence. They are also flexible, as they can be applied to different problems without very specific modifications. Thanks to these features, it can be easily embedded even in many hardware devices. Accordingly, this approach can also be used in trend application areas such as IoT, big data, and parallel structures. Indeed, the metaheuristic approaches are algorithms that return near-optimal results for solving large-scale optimization problems. This study is focused on the new metaheuristic method that has been merged with the chaotic approach. It is based on the chaos theorem and helps relevant algorithms to improve the diversity of the population and fast convergence. This approach is based on Chimp Optimization Algorithm (ChOA), that is a recently introduced metaheuristic algorithm inspired by nature. This algorithm identified four types of chimpanzee groups: attacker, barrier, chaser, and driver, and proposed a suitable mathematical model for them based on the various intelligence and sexual motivations of chimpanzees. However, this algorithm is not more successful in the convergence rate and escaping of the local optimum trap in solving high-dimensional problems. Although it and some of its variants use some strategies to overcome these problems, it is observed that it is not sufficient. Therefore, in this study, a newly expanded variant is described. In the algorithm called Ex-ChOA, hybrid models are proposed for position updates of search agents, and a dynamic switching mechanism is provided for transition phases. This flexible structure solves the slow convergence problem of ChOA and improves its accuracy in multidimensional problems. Therefore, it tries to achieve success in solving global, complex, and constrained problems. The main contribution of this study is 1) It improves the accuracy and solves the slow convergence problem of the ChOA. 2) It proposes new hybrid movement strategy models for position updates of search agents. 3) It provides success in solving global, complex, and constrained problems. 4) It provides a dynamic switching mechanism between phases. The performance of the Ex-ChOA algorithm is analyzed on a total of 8 benchmark functions, as well as a total of 2 classical and constrained engineering problems. The proposed algorithm is compared with the ChoA, and several well-known variants (Weighted-ChoA, Enhanced-ChoA) are used. In addition, an Improved algorithm from the Grey Wolf Optimizer (I-GWO) method is chosen for comparison since the working model is similar. The obtained results depict that the proposed algorithm performs better or equivalently to the compared algorithms.Keywords: optimization, metaheuristic, chimp optimization algorithm, engineering constrained problems
Procedia PDF Downloads 766816 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems
Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh
Abstract:
It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property
Procedia PDF Downloads 2036815 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding
Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha
Abstract:
Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network
Procedia PDF Downloads 4456814 Problem Solving: Process or Product? A Mathematics Approach to Problem Solving in Knowledge Management
Authors: A. Giannakopoulos, S. B. Buckley
Abstract:
Problem solving in any field is recognised as a prerequisite for any advancement in knowledge. For example in South Africa it is one of the seven critical outcomes of education together with critical thinking. As a systematic way to problem solving was initiated in mathematics by the great mathematician George Polya (the father of problem solving), more detailed and comprehensive ways in problem solving have been developed. This paper is based on the findings by the author and subsequent recommendations for further research in problem solving and critical thinking. Although the study was done in mathematics, there is no doubt by now in almost anyone’s mind that mathematics is involved to a greater or a lesser extent in all fields, from symbols, to variables, to equations, to logic, to critical thinking. Therefore it stands to reason that mathematical principles and learning cannot be divorced from any field. In management of knowledge situations, the types of problems are similar to mathematics problems varying from simple to analogical to complex; from well-structured to ill-structured problems. While simple problems could be solved by employees by adhering to prescribed sequential steps (the process), analogical and complex problems cannot be proceduralised and that diminishes the capacity of the organisation of knowledge creation and innovation. The low efficiency in some organisations and the low pass rates in mathematics prompted the author to view problem solving as a product. The authors argue that using mathematical approaches to knowledge management problem solving and treating problem solving as a product will empower the employee through further training to tackle analogical and complex problems. The question the authors asked was: If it is true that problem solving and critical thinking are indeed basic skills necessary for advancement of knowledge why is there so little literature of knowledge management (KM) about them and how they are connected and advance KM?This paper concludes with a conceptual model which is based on general accepted principles of knowledge acquisition (developing a learning organisation), knowledge creation, sharing, disseminating and storing thereof, the five pillars of knowledge management (KM). This model, also expands on Gray’s framework on KM practices and problem solving and opens the doors to a new approach to training employees in general and domain specific areas problems which can be adapted in any type of organisation.Keywords: critical thinking, knowledge management, mathematics, problem solving
Procedia PDF Downloads 5956813 Improving the Uniformity of Electrostatic Meter’s Spatial Sensitivity
Authors: Mohamed Abdalla, Ruixue Cheng, Jianyong Zhang
Abstract:
In pneumatic conveying, the solids are mixed with air or gas. In industries such as coal fired power stations, blast furnaces for iron making, cement and flour processing, the mass flow rate of solids needs to be monitored or controlled. However the current gas-solids two-phase flow measurement techniques are not as accurate as the flow meters available for the single phase flow. One of the problems that the multi-phase flow meters to face is that the flow profiles vary with measurement locations and conditions of pipe routing, bends, elbows and other restriction devices in conveying system as well as conveying velocity and concentration. To measure solids flow rate or concentration with non-even distribution of solids in gas, a uniform spatial sensitivity is required for a multi-phase flow meter. However, there are not many meters inherently have such property. The circular electrostatic meter is a popular choice for gas-solids flow measurement with its high sensitivity to flow, robust construction, low cost for installation and non-intrusive nature. However such meters have the inherent non-uniform spatial sensitivity. This paper first analyses the spatial sensitivity of circular electrostatic meter in general and then by combining the effect of the sensitivity to a single particle and the sensing volume for a given electrode geometry, the paper reveals first time how a circular electrostatic meter responds to a roping flow stream, which is much more complex than what is believed at present. The paper will provide the recent research findings on spatial sensitivity investigation at the University of Tees side based on Finite element analysis using Ansys Fluent software, including time and frequency domain characteristics and the effect of electrode geometry. The simulation results will be compared tothe experimental results obtained on a large scale (14” diameter) rig. The purpose of this research is paving a way to achieve a uniform spatial sensitivity for the circular electrostatic sensor by mean of compensation so as to improve overall accuracy of gas-solids flow measurement.Keywords: spatial sensitivity, electrostatic sensor, pneumatic conveying, Ansys Fluent software
Procedia PDF Downloads 3656812 Impact of Electric Vehicles on Energy Consumption and Environment
Authors: Amela Ajanovic, Reinhard Haas
Abstract:
Electric vehicles (EVs) are considered as an important means to cope with current environmental problems in transport. However, their high capital costs and limited driving ranges state major barriers to a broader market penetration. The core objective of this paper is to investigate the future market prospects of various types of EVs from an economic and ecological point of view. Our method of approach is based on the calculation of total cost of ownership of EVs in comparison to conventional cars and a life-cycle approach to assess the environmental benignity. The most crucial parameters in this context are km driven per year, depreciation time of the car and interest rate. The analysis of future prospects it is based on technological learning regarding investment costs of batteries. The major results are the major disadvantages of battery electric vehicles (BEVs) are the high capital costs, mainly due to the battery, and a low driving range in comparison to conventional vehicles. These problems could be reduced with plug-in hybrids (PHEV) and range extenders (REXs). However, these technologies have lower CO₂ emissions in the whole energy supply chain than conventional vehicles, but unlike BEV they are not zero-emission vehicles at the point of use. The number of km driven has a higher impact on total mobility costs than the learning rate. Hence, the use of EVs as taxis and in car-sharing leads to the best economic performance. The most popular EVs are currently full hybrid EVs. They have only slightly higher costs and similar operating ranges as conventional vehicles. But since they are dependent on fossil fuels, they can only be seen as energy efficiency measure. However, they can serve as a bridging technology, as long as BEVs and fuel cell vehicle do not gain high popularity, and together with PHEVs and REX contribute to faster technological learning and reduction in battery costs. Regarding the promotion of EVs, the best results could be reached with a combination of monetary and non-monetary incentives, as in Norway for example. The major conclusion is that to harvest the full environmental benefits of EVs a very important aspect is the introduction of CO₂-based fuel taxes. This should ensure that the electricity for EVs is generated from renewable energy sources; otherwise, total CO₂ emissions are likely higher than those of conventional cars.Keywords: costs, mobility, policy, sustainability,
Procedia PDF Downloads 2246811 A Novel Multi-Objective Park and Ride Control Scheme Using Renewable Energy Sources: Cairo Case Study
Authors: Mohammed Elsayed Lotfy Elsayed Abouzeid, Tomonobu Senjyu
Abstract:
A novel multi-objective park and ride control approach is presented in this research. Park and ride will encourage the owners of the vehicles to leave their cars in the nearest points (on the edges of the crowded cities) and use public transportation facilities (train, bus, metro, or mon-rail) to reach their work inside the crowded city. The proposed control scheme is used to design electric vehicle charging stations (EVCS) to charge 1000 electric vehicles (EV) during their owners' work time. Cairo, Egypt is used as a case study. Photovoltaic (PV) and battery energy storage system (BESS) are used to meet the EVCS demand. Two multi-objective optimization techniques (MOGA and epsilon-MOGA) are utilized to get the optimal sizes of PV and BESS so as to meet the load demand and minimize the total life cycle cost. Detailed analysis and comparison are held to investigate the performance of the proposed control scheme using MATLAB.Keywords: Battery Energy Storage System, Electric Vehicle, Park and Ride, Photovoltaic, Multi-objective
Procedia PDF Downloads 1416810 Measuring and Evaluating the Effectiveness of Mobile High Efficiency Particulate Air Filtering on Particulate Matter within the Road Traffic Network of a Sample of Non-Sparse and Sparse Urban Environments in the UK
Authors: Richard Maguire
Abstract:
This research evaluates the efficiency of using mobile HEPA filters to reduce localized Particulate Matter (PM), Total Volatile Organic Chemical (TVOC) and Formaldehyde (HCHO) Air Pollution. The research is being performed using a standard HEPA filter that is tube fitted and attached to a motor vehicle. The velocity of the vehicle is used to generate the pressure difference that allows the filter to remove PM, VOC and HCOC pollution from the localized atmosphere of a road transport traffic route. The testing has been performed on a sample of traffic routes in Non-Sparse and Sparse urban environments within the UK. Pre and Post filter measuring of the PM2.5 Air Quality has been carried out along with demographics of the climate environment, including live filming of the traffic conditions. This provides a base line for future national and international research. The effectiveness measurement is generated through evaluating the difference in PM2.5 Air Quality measured pre- and post- the mobile filter test equipment. A series of further research opportunities and future exploitation options are made based on the results of the research.Keywords: high efficiency particulate air, HEPA filter, particulate matter, traffic pollution
Procedia PDF Downloads 1216809 Modelling of Filters CO2 (Carbondioxide) and CO (Carbonmonoxide) Portable in Motor Vehicle's Exhaust with Absorbent Chitosan
Authors: Yuandanis Wahyu Salam, Irfi Panrepi, Nuraeni
Abstract:
The increased of greenhouse gases, that is CO2 (carbondioxide) in atmosphere induce the rising of earth’s surface average temperature. One of the largest contributors to greenhouse gases is motor vehicles. Smoke which is emitted by motor’s exhaust containing gases such as CO2 (carbondioxide) and CO (carbon monoxide). Chemically, chitosan is cellulose like plant fiber that has the ability to bind like absorbant foam. Chitosan is a natural antacid (absorb toxins), when chitosan is spread over the surface of water, chitosan is able to absorb fats, oils, heavy metals, and other toxic substances. Judging from the nature of chitosan is able to absorb various toxic substances, it is expected that chitosan is also able to filter out gas emission from the motor vehicles. This study designing a carbondioxide filter in the exhaust of motor vehicles using chitosan as its absorbant. It aims to filter out gases in the exhaust so that CO2 and CO can be reducted before emitted by exhaust. Form of this reseach is study of literature and applied with experimental research of tool manufacture. Data collected through documentary studies by studying books, magazines, thesis, search on the internet as well as the relevant reference. This study will produce a filters which has main function to filter out CO2 and CO emissions that generated by vehicle’s exhaust and can be used as portable.Keywords: filter, carbon, carbondioxide, exhaust, chitosan
Procedia PDF Downloads 3496808 Successful Management of a Boy with Mild Persistent Asthma: A Longitudinal Case
Authors: A. Lubis, L. Setiawati, A. R. Setyoningrum, A. Suryawan, Irwanto
Abstract:
Asthma is a condition that causing chronic health problems in children. In addition to basic therapy against disease, we must try to reduce the impact of chronic health problems and also optimize their medical aspect of growth and development. A boy with mild asthma attack frequent episode did not showed any improvement with medical treatment and his asthma control test was 11. From radiologic examination he got hyperaerated lung and billateral sinusitis maxillaris; skin test results were house dust, food and pet allergy; an overweight body; bad school grades; psychological and environmental problem. We followed and evaluated this boy in 6 months, treated holistically. Even we could not do much on environmental but no more psychological and school problems, his on a good bodyweight and his asthma control test was 22. A case of a child with mild asthma attack frequent episode was reported. Asthma clinical course show no significant improvement when other predisposing factor is not well-controlled and a child’s growth and development may be affected. Improving condition of the patient can be created with the help of loving and caring way of nurturing from the parents and supportive peer group. Therefore, continuous and consistent monitoring is required because prognosis of asthma is generally good when regularly and properly controlled.Keywords: asthma, chronic health problems, growth, development
Procedia PDF Downloads 2286807 Aerodynamic Design of a Light Long Range Blended Wing Body Unmanned Vehicle
Authors: Halison da Silva Pereira, Ciro Sobrinho Campolina Martins, Vitor Mainenti Leal Lopes
Abstract:
Long range performance is a goal for aircraft configuration optimization. Blended Wing Body (BWB) is presented in many works of literature as the most aerodynamically efficient design for a fixed-wing aircraft. Because of its high weight to thrust ratio, BWB is the ideal configuration for many Unmanned Aerial Vehicle (UAV) missions on geomatics applications. In this work, a BWB aerodynamic design for typical light geomatics payload is presented. Aerodynamic non-dimensional coefficients are predicted using low Reynolds number computational techniques (3D Panel Method) and wing parameters like aspect ratio, taper ratio, wing twist and sweep are optimized for high cruise performance and flight quality. The methodology of this work is a summary of tailless aircraft wing design and its application, with appropriate computational schemes, to light UAV subjected to low Reynolds number flows leads to conclusions like the higher performance and flight quality of thicker airfoils in the airframe body and the benefits of using aerodynamic twist rather than just geometric.Keywords: blended wing body, low Reynolds number, panel method, UAV
Procedia PDF Downloads 5856806 Graphical Modeling of High Dimension Processes with an Environmental Application
Authors: Ali S. Gargoum
Abstract:
Graphical modeling plays an important role in providing efficient probability calculations in high dimensional problems (computational efficiency). In this paper, we address one of such problems where we discuss fragmenting puff models and some distributional assumptions concerning models for the instantaneous, emission readings and for the fragmenting process. A graphical representation in terms of a junction tree of the conditional probability breakdown of puffs and puff fragments is proposed.Keywords: graphical models, influence diagrams, junction trees, Bayesian nets
Procedia PDF Downloads 3956805 Computational Code for Solving the Navier-Stokes Equations on Unstructured Meshes Applied to the Leading Edge of the Brazilian Hypersonic Scramjet 14-X
Authors: Jayme R. T. Silva, Paulo G. P. Toro, Angelo Passaro, Giannino P. Camillo, Antonio C. Oliveira
Abstract:
An in-house C++ code has been developed, at the Prof. Henry T. Nagamatsu Laboratory of Aerothermodynamics and Hypersonics from the Institute of Advanced Studies (Brazil), to estimate the aerothermodynamic properties around the Hypersonic Vehicle Integrated to the Scramjet. In the future, this code will be applied to the design of the Brazilian Scramjet Technological Demonstrator 14-X B. The first step towards accomplishing this objective, is to apply the in-house C++ code at the leading edge of a flat plate, simulating the leading edge of the 14-X Hypersonic Vehicle, making possible the wave phenomena of oblique shock and boundary layer to be analyzed. The development of modern hypersonic space vehicles requires knowledge regarding the characteristics of hypersonic flows in the vicinity of a leading edge of lifting surfaces. The strong interaction between a shock wave and a boundary layer, in a high supersonic Mach number 4 viscous flow, close to the leading edge of the plate, considering no slip condition, is numerically investigated. The small slip region is neglecting. The study consists of solving the fluid flow equations for unstructured meshes applying the SIMPLE algorithm for Finite Volume Method. Unstructured meshes are generated by the in-house software ‘Modeler’ that was developed at Virtual’s Engineering Laboratory from the Institute of Advanced Studies, initially developed for Finite Element problems and, in this work, adapted to the resolution of the Navier-Stokes equations based on the SIMPLE pressure-correction scheme for all-speed flows, Finite Volume Method based. The in-house C++ code is based on the two-dimensional Navier-Stokes equations considering non-steady flow, with nobody forces, no volumetric heating, and no mass diffusion. Air is considered as calorically perfect gas, with constant Prandtl number and Sutherland's law for the viscosity. Solutions of the flat plate problem for Mach number 4 include pressure, temperature, density and velocity profiles as well as 2-D contours. Also, the boundary layer thickness, boundary conditions, and mesh configurations are presented. The same problem has been solved by the academic license of the software Ansys Fluent and for another C++ in-house code, which solves the fluid flow equations in structured meshes, applying the MacCormack method for Finite Difference Method, and the results will be compared.Keywords: boundary-layer, scramjet, simple algorithm, shock wave
Procedia PDF Downloads 4876804 A New Tool for Global Optimization Problems: Cuttlefish Algorithm
Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman
Abstract:
This paper presents a new meta-heuristic bio-inspired optimization algorithm which is called Cuttlefish Algorithm (CFA). The algorithm mimics the mechanism of color changing behavior of the cuttlefish to solve numerical global optimization problems. The colors and patterns of the cuttlefish are produced by reflected light from three different layers of cells. The proposed algorithm considers mainly two processes: reflection and visibility. Reflection process simulates light reflection mechanism used by these layers, while visibility process simulates visibility of matching patterns of the cuttlefish. To show the effectiveness of the algorithm, it is tested with some other popular bio-inspired optimization algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Bees Algorithm (BA) that have been previously proposed in the literature. Simulations and obtained results indicate that the proposed CFA is superior when compared with these algorithms.Keywords: Cuttlefish Algorithm, bio-inspired algorithms, optimization, global optimization problems
Procedia PDF Downloads 5616803 Effects of Exposure to Domestic Physical Violence on Children's Behavior: A Chinese Community-Based Sample
Authors: Cao Yuping, Li Longfei, Zhao Xingfu, Zhang Yalin
Abstract:
Purpose: This study examined the effects of exposure to domestic physical violence (DPV) on children’s behavior in a community sample. Method: Ninety-three 12-16 year-old adolescents exposed to DPV were matched with 54 adolescents with no exposure to DPV based on age, gender, family composition and parental age and education level. Participation included assessment with the Childhood Trauma Questionnaire (CTQ-SF) and Child Behavior Checklist (CBCL) by the adolescents and their parents respectively. Results: CBCL total score and anxiety/depression, social interaction problems, attention problems, delinquency, aggression and externalizing scores were significantly higher in adolescents exposed to DPV than those in controls (all ps<0.05).The CBCL total score and scores of anxiety/depression, social interaction problems, attention problems, delinquency, aggression and externalizing behaviors of boys were significantly higher in the research group than in the controls (all ps<0.05). Delinquency scores in abused adolescents were significantly higher than in DPV witnessed (p<0.05), but no other scores of CBCL were significant different. Different subtypes of behavioral problems were associated with different types of abuse. Conclusions: DPV exposure is associated with adverse behaviors in children, especially among boys. Children witness DPV alone have similar behavioral scores as the abused children. We recommend that both abused and DPV witness adolescents in Chinese communities need treatment to mitigate the effects on maladjusted behaviors.Keywords: domestic violence, child, behavior, community, China
Procedia PDF Downloads 3716802 The Algorithm to Solve the Extend General Malfatti’s Problem in a Convex Circular Triangle
Authors: Ching-Shoei Chiang
Abstract:
The Malfatti’s Problem solves the problem of fitting 3 circles into a right triangle such that these 3 circles are tangent to each other, and each circle is also tangent to a pair of the triangle’s sides. This problem has been extended to any triangle (called general Malfatti’s Problem). Furthermore, the problem has been extended to have 1+2+…+n circles inside the triangle with special tangency properties among circles and triangle sides; we call it extended general Malfatti’s problem. In the extended general Malfatti’s problem, call it Tri(Tn), where Tn is the triangle number, there are closed-form solutions for Tri(T₁) (inscribed circle) problem and Tri(T₂) (3 Malfatti’s circles) problem. These problems become more complex when n is greater than 2. In solving Tri(Tn) problem, n>2, algorithms have been proposed to solve these problems numerically. With a similar idea, this paper proposed an algorithm to find the radii of circles with the same tangency properties. Instead of the boundary of the triangle being a straight line, we use a convex circular arc as the boundary and try to find Tn circles inside this convex circular triangle with the same tangency properties among circles and boundary Carc. We call these problems the Carc(Tn) problems. The CPU time it takes for Carc(T16) problem, which finds 136 circles inside a convex circular triangle with specified tangency properties, is less than one second.Keywords: circle packing, computer-aided geometric design, geometric constraint solver, Malfatti’s problem
Procedia PDF Downloads 1096801 Study of Launch Recovery Control Dynamics of Retro Propulsive Reusable Rockets
Authors: Pratyush Agnihotri
Abstract:
The space missions are very costly because the transportation to the space is highly expensive and therefore there is the need to achieve complete re-usability in our launch vehicles to make the missions highly economic by cost cutting of the material recovered. Launcher reusability is the most efficient approach to decreasing admittance to space access economy, however stays an incredible specialized hurdle for the aerospace industry. Major concern of the difficulties lies in guidance and control procedure and calculations, specifically for those of the controlled landing stage, which should empower an exact landing with low fuel edges. Although cutting edge ways for navigation and control are present viz hybrid navigation and robust control. But for powered descent and landing of first stage of launch vehicle the guidance control is need to enable on board optimization. At first the CAD model of the launch vehicle I.e. space x falcon 9 rocket is presented for better understanding of the architecture that needs to be identified for the guidance and control solution for the recovery of the launcher. The focus is on providing the landing phase guidance scheme for recovery and re usability of first stage using retro propulsion. After reviewing various GNC solutions, to achieve accuracy in pre requisite landing online convex and successive optimization are explored as the guidance schemes.Keywords: guidance, navigation, control, retro propulsion, reusable rockets
Procedia PDF Downloads 896800 The Patterns of Cross-Sentence: An Event-Related Potential Study of Mathematical Word Problem
Authors: Tien-Ching Yao, Ching-Ching Lu
Abstract:
Understanding human language processing is one of the main challenges of current cognitive neuroscience. The aims of the present study were to use a sentence decision task combined with event-related potentials to investigate the psychological reality of "cross-sentence patterns." Therefore, we take the math word problems the experimental materials and use the ERPs' P600 component to verify. In this study, the experimental material consisted of 200 math word problems with three different conditions were used ( multiplication word problems、division word problems type 1、division word problems type 2 ). Eighteen Mandarin native speakers participated in the ERPs study (14 of whom were female). The result of the grand average waveforms suggests a later posterior positivity at around 500ms - 900ms. These findings were tested statistically using repeated measures ANOVAs at the component caused by the stimulus type of different questions. Results suggest that three conditions present significant (P < 0.05) on the Mean Amplitude, Latency, and Peak Amplitude. The result showed the characteristic timing and posterior scalp distribution of a P600 effect. We interpreted these characteristic responses as the psychological reality of "cross-sentence patterns." These results provide insights into the sentence processing issues in linguistic theory and psycholinguistic models of language processing and advance our understanding of how people make sense of information during language comprehension.Keywords: language processing, sentence comprehension, event-related potentials, cross-sentence patterns
Procedia PDF Downloads 1486799 A Preliminary Investigation on Factors that Influence Malaysian Road User’s Close Following Behaviour
Authors: Siti Hikmah Musthar, Ahmad Saifizul, Mohamed Rehan Karim, Jamilah Mohamad, Farah Fazlinda Mohamad
Abstract:
This paper aims to look at the situation of close following behaviour from the introductory phase before conducting a profound investigation and discussion on this subject. Close following behaviour is known as behaviour during when drivers follow front vehicle with headways lower than two-second. As such, the study of close-following is important due to the degree of negative consequences this behaviour can cause commonly identified as rear-end collision especially when road safety is concerned. This paper presents a preliminary results of close-following behaviour among selected respondents (n=515) in Peninsular Malaysia at selected highways and federal roads. Respondents were interviewed with survey questions tending to examine their actual driving behaviour related to close-following and their perception towards the subject of close following. Selected findings (four selected questions) are discussed in this paper of which identified as essential for deliberation (as opposed to other questions in the survey questionnaire) as far as a preliminary discussion is concerned. Through the statistical test of one-way ANOVA, study found that gender of drivers is not significant to influence drivers to close follow but instead, type of vehicle the respondent drives had more significant to influence drivers to have tendency to perform close following behaviour.Keywords: close-following, driver behaviour, rear-end crash, road safety
Procedia PDF Downloads 4196798 Application of Soft Systems Methodology in Solving Disaster Emergency Logistics Problems
Authors: Alhasan Hakami, Arun Kumar, Sung J. Shim, Yousef Abu Nahleh
Abstract:
In recent years, many high intensity earthquakes have occurred around the world, such as the 2011 earthquake in Tohoku, Japan. These large-scale disasters caused huge casualties and losses. In addition, inefficient disaster response operations also caused the second wave of casualties and losses, and expanded the damage. Effective disaster management can be used to respond to the chaotic situation, and reduce the damage. However, some inefficient disaster response operations are still used. Therefore, this case study chose the 921 earthquakes for analysing disaster emergency logistics problems and proposed the Soft Systems Methodology (SSM) to solve disaster emergency logistics problems. Moreover, it analyses the effect of human factors on system operation, and suggests a solution to improve the system.Keywords: soft systems methodology, emergency logistics, earthquakes, Japan, system operation
Procedia PDF Downloads 4396797 Mental Health Awareness and Help Seeking Among Adolescents in Kerala
Authors: Fathima M. A., Milu Maria Anto
Abstract:
Aim: The current study aims to explore the understanding about Mental Health and the likelihood to seek help for mental health problems among adolescents in the state of Kerala (India). Method: A cross sectional exploratory design was used. Samples were selected using convenience sampling. Ninety nine high school and higher secondary school students who had enrolled in the program “Responsible Adolescents (READ)” organized by MKMS Education from Kerala participated in this study. The data for the present study was collected using google forms prior to the commencement of the READ programme. Open-ended questions were used to explore the understanding of participants about mental health, mental health problems, causes of mental health problems and the role of mental health professionals. The likelihood to seek help (from friends, parents, teachers and mental health professionals) for mental health problems was assessed using a visual analogue scale. Further open-ended questions were used to identify what changes in teachers and parents will make them feel more comfortable to approach them when they need help. Content analysis was used to identify themes and coded data was further analyzed using correlation. Results: The results show that students have a fair idea about what Mental Health is. Even though the majority is familiar with the names of mental health disorders, relatively fewer students identify it as irregularity in mental functions such as thoughts, emotions and behaviors. The students tend to attribute symptoms of mental health problems as the cause of mental health problems. Very few students have the understanding that biological variations and adverse childhood experiences are primary causes for the development of mental health problems. Less than half of the students were aware of the role of psychiatrists and psychologists in mental health treatment. The students were more likely to seek help from parents and friends during distress. They had a medium inclination to seek help from mental health professionals and showed even lower likelihood to seek help from teachers. The majority of the students responded that they would be more comfortable approaching teachers if they were more open-minded and approachable as well as non-judgmental and non-dismissive. Conclusion: Findings show that there is inadequate awareness among adolescents about mental health problems and their causes. There is a lack of understanding about the roles of two main mental health professionals which can pose a big hurdle in accessing adequate help from the appropriate professional at the right time. The low likelihood to seek help from teachers for mental health problems is very concerning. The major barriers reported by the students in seeking help from teachers were the judgmental and dismissive approach. The findings throw light on the current level of awareness about mental health and mental health help-seeking, which can be utilized in framing mental health awareness programs for students as well as teachers.Keywords: Mental Health Awareness, Adolescent Mental Health, Help Seeking Behavior, School Mental Health
Procedia PDF Downloads 2676796 Differential Infection of Primary Human B-Cells and EBV Positive B-Lymphoma Cell Lines by Recombinant AAV Serotypes
Authors: Elham Ahmadi, Mehrdad Ravanshad, Joyce Fingeroth, Mazyar Ziyaeyan, Rajesh Panigrahi, Jun Xie, Gao Guangping
Abstract:
B-cell proliferative disorders often occur among persons that are T-cell compromised. These disorders are primarily EBV+ and can first present with a focal lesion. Direct introduction of oncolytic viruses into localized tumors provides theoretical advantages over chemotherapy and immunotherapy by reducing systemic toxicity, to which the immunocompromised host is most vulnerable. Widely studied as a vehicle for gene therapy, AAV has only rarely been applied to treat cancer. As a prelude to development of a therapeutic vehicle, we assessed the ability of 15 distinct recombinant AAV serotypes (rAAV1, rAAV2, rAAV3b, rAAV4, rAAV5, rAAV6, rAAV6.2, rAAV6TM, rAAV7, rAAV8, rAAVrh8, rAAV9, rAAVrh10, rAAV39, rAAV43) bearing eGFP to infect human B-cell tumor lines compared with primary B-cells in vitro. Enhanced infection of tumor lines by AAV 6.2 was demonstrated by flow cytometry. EBV superinfection of EBV negative B-cell tumor lines increased susceptibility to AAV6.2 infection. As proof of concept, AAV6.2 bearing HSV-1 thymidine kinase in place of eGFP eliminated tumor cells upon exposure to ganciclovir.Keywords: AAV, gene therapy, lymphoma, malignancy, tropism
Procedia PDF Downloads 1176795 A Review on the Problems of Constructing a Theory of Quantum Gravity
Authors: Amber Jamal, Imran Siddiqui, Syed Tanveer Iqbal
Abstract:
This review is aimed to shed some light on problems constructing a theory of spacetime and geometry in terms of all quantum degrees of freedom called ‘Quantum Gravity’. Such a theory, which is effective at all scales of distances and energies, describes the enigma of the beginning of the Universe, its possible end, and reducing to general relativity at large distances but in a semi-classical approximation. Furthermore, the theory of quantum gravity also describes the Universe as a whole and provides a description of most fundamental questions that have puzzled scientists for decades, such as: what is space, what is time, and what is the fundamental structure of the Universe, is the spacetime discrete, if it is, where does the continuum of spacetime come from at low energies and macroscopic scales and where does it emerge from its fundamentally discrete building blocks? Quantum Field Theory (QFT) is a framework which describes the microscopic properties and dynamics of the basic building blocks of any condensed matter system. In QFT, atoms are quanta of continuous fields. At smaller scales or higher energies, the continuum description of spacetime fails. Therefore, a new description is required in terms of microscopic constituents (atoms or molecules). The objective of this scientific endeavor is to discuss the above-mentioned problems rigorously and to discuss possible way-out of the problems.Keywords: QFT, quantum degrees of freedom, quantum gravity, semi-classical approximation
Procedia PDF Downloads 1186794 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks
Authors: Ebrahim Alrashed
Abstract:
Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.Keywords: energy-aware routing, reliability, sink-hole attack, WSN
Procedia PDF Downloads 3956793 Eco-Entrepreneurship Education in India: Exploring Online Course Structure
Authors: Vishwas Chakranarayan, Mariyam Al Salman
Abstract:
Despite the global environmental threats, previous approaches used to overcome these problems have failed to prevent environmental degradation. Scholars believe that entrepreneurs can help conserve habitats, combat climate change, increase freshwater availability, sustain biodiversity, and reduce environmental degradation and deforestation. The pandemic is creating a different ecosystem for fostering the eco-entrepreneurship opportunities. However, attending a course physically is a challenge for many willing learners. Therefore, it is an opportune time to contemplate on developing a social entrepreneurship curriculum which can be offered online.Keywords: ecopreneurship, environmental problems, environmental degradation, entrepreneurship education
Procedia PDF Downloads 165