Search results for: code enforcement
759 Subband Coding and Glottal Closure Instant (GCI) Using SEDREAMS Algorithm
Authors: Harisudha Kuresan, Dhanalakshmi Samiappan, T. Rama Rao
Abstract:
In modern telecommunication applications, Glottal Closure Instants location finding is important and is directly evaluated from the speech waveform. Here, we study the GCI using Speech Event Detection using Residual Excitation and the Mean Based Signal (SEDREAMS) algorithm. Speech coding uses parameter estimation using audio signal processing techniques to model the speech signal combined with generic data compression algorithms to represent the resulting modeled in a compact bit stream. This paper proposes a sub-band coder SBC, which is a type of transform coding and its performance for GCI detection using SEDREAMS are evaluated. In SBCs code in the speech signal is divided into two or more frequency bands and each of these sub-band signal is coded individually. The sub-bands after being processed are recombined to form the output signal, whose bandwidth covers the whole frequency spectrum. Then the signal is decomposed into low and high-frequency components and decimation and interpolation in frequency domain are performed. The proposed structure significantly reduces error, and precise locations of Glottal Closure Instants (GCIs) are found using SEDREAMS algorithm.Keywords: SEDREAMS, GCI, SBC, GOI
Procedia PDF Downloads 356758 Radionuclides Transport Phenomena in Vadose Zone
Authors: R. Testoni, R. Levizzari, M. De Salve
Abstract:
Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection
Procedia PDF Downloads 397757 Descriptive Assessment of Health and Safety Regulations and Its Current Situation in the Construction Industry of Pakistan
Authors: Khawaja A. Wahaj Wani, Aykut Erkal
Abstract:
Pakistan's construction industry, a key player in economic development, has experienced remarkable growth. However, the surge in activities has been accompanied by dangerous working conditions, attributed to legislative gaps and flaws. Unhealthy construction practices, uncertain site conditions, and hazardous environments contribute to a concerning rate of injuries and fatalities. The principal aim of this research study is to undertake a thorough evaluation based on the assessment of the current situation of Health & Safety policies and the surveys performed by stakeholders of Pakistan with the aim of providing solution-centric methodologies for the enforcement of health and safety regulations within construction companies operating on project sites. Recognizing the pivotal role that the construction industry plays in bolstering a nation's economy, it is imperative to address the pressing need for heightened awareness among site engineers and laborers. The study adopts a robust approach, utilizing questionnaire surveys and interviews. As an exclusive investigative study, it encompasses all stakeholders: clients, consultants, contractors, and subcontractors. Targeting PEC-registered companies. Safety performance was assessed through the examination of sixty safety procedures using SPSS-18. A high Cronbach's alpha value of 0.958 ensures data reliability, and non-parametric tests were employed due to the non-normal distribution of data. The safety performance evaluation revealed significant insights. "Using Hoists and Cranes" and "Precautionary Measures (Shoring and Excavation)" exhibited commendable safety levels. Conversely, "Trainings on Safety" displayed a lower safety performance, alongside areas such as "Safety in Contract Documentation," "Meetings for Safety," and "Worker Participation," indicating room for improvement. These findings provide stakeholders with a detailed understanding of current safety measures within Pakistan's construction industry.Keywords: construction industry, health and safety regulations, Pakistan, risk management
Procedia PDF Downloads 55756 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society
Authors: Ada Yurman
Abstract:
Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.Keywords: militarism, political deviance, social construction, social control
Procedia PDF Downloads 112755 A Refinement Strategy Coupling Event-B and Planning Domain Definition Language (PDDL) for Planning Problems
Authors: Sabrine Ammar, Mohamed Tahar Bhiri
Abstract:
Automatic planning has a de facto standard language called Planning Domain Definition Language (PDDL) for describing planning problems. It aims to formalize the planning problems described by the concept of state space. PDDL-related dynamic analysis tools, namely planners and validators, are insufficient for verifying and validating PDDL descriptions. Indeed, these tools made it possible to detect errors a posteriori by means of test activity. In this paper, we recommend a formal approach coupling the two languages Event-B and PDDL, for automatic planning. Event-B is used for formal modeling by stepwise refinement with mathematical proofs of planning problems. Thus, this paper proposes a refinement strategy allowing to obtain reliable PDDL descriptions from an ultimate Event-B model correct by construction. The ultimate Event-B model, correct by construction which is supposed to be translatable into PDDL, is automatically translated into PDDL using our MDE Event-B2PDDL tool.Keywords: code generation, event-b, PDDL, refinement strategy, translation rules
Procedia PDF Downloads 196754 Bit Error Rate Analysis of Multiband OFCDM UWB System in UWB Fading Channel
Authors: Sanjay M. Gulhane, Athar Ravish Khan, Umesh W. Kaware
Abstract:
Orthogonal frequency and code division multiplexing (OFCDM) has received large attention as a modulation scheme to realize high data rate transmission. Multiband (MB) Orthogonal frequency division multiplexing (OFDM) Ultra Wide Band (UWB) system become promising technique for high data rate due to its large number of advantage over Singleband (UWB) system, but it suffer from coherent frequency diversity problem. In this paper we have proposed MB-OFCDM UWB system, in which two-dimensional (2D) spreading (time and frequency domain spreading), has been introduced, combining OFDM with 2D spreading, proposed system can provide frequency diversity. This paper presents the basic structure and main functions of the MB-OFCDM system, and evaluates the bit error rate BER performance of MB-OFDM and MB-OFCDM system under UWB indoor multi-path channel model. It is observe that BER curve of MB-OFCDM UWB improve its performance by 2dB as compare to MB-OFDM UWB system.Keywords: MB-OFDM UWB system, MB-OFCDM UWB system, UWB IEEE channel model, BER
Procedia PDF Downloads 549753 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator
Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula
Abstract:
A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.Keywords: ISA, neural network, Brain Float-16, DUT
Procedia PDF Downloads 94752 Study of Mini Steel Re-Rolling and Pickling Mills for the Reduction of Accidents and Health Hazards
Authors: S. P. Rana
Abstract:
Objectives: For the manufacture of a very thin strip or a strip with a high-quality finish, the stainless steel sheet that is called billet is re-rolled in re-rolling mill to make stainless steel sheet of 18 gauges. The rolls of re-rolling mill exert tremendous pressure over the sheet and there is likely chance of breaking of stainless steel strip from the sheet. The objective of the study was to minimise the number of accidents in steel re-rolling mills due to ejection of stainless steel strip and to minimize the pollution caused by the pickling process used in these units. Methods: Looking into the high rate of frequency and severity of accidents as well as pollution hazard in re-rolling and pickling mills, it becomes essential to make necessary arrangements for prevention of accidents in such type of industry. The author carried out survey/inspections of a large number of re-rolling and pickling mills and allied units. During the course of inspection, the working of these steel re-rolling and pickling mills was closely studied and monitored. A number of accidents involving re-rolling mills were investigated and subsequently remedial measures to prevent the occurrence of such accidents were suggested. Assessment of occupational safety and health system of these units was carried out and compliance level of the statutory requirements was checked. The workers were medically examined and monitored to ascertain their health conditions. Results: Proper use of safety gadgets by workers, machine guarding and regular training brought down the risk to an acceptable level and discharged effluent pollution was brought down to permissible limits. The fatal accidents have been reduced by 83%. Conclusions: Effective enforcement and implementation of the directions/suggestions given to the managements of such units brought down the no. of accidents to a rational level. The number of fatal accidents has reduced by 83% during the study period. The effective implementation of pollution control device curtailed the pollution level to an acceptable level.Keywords: re-rolling mill, hazard, accident, health hazards
Procedia PDF Downloads 442751 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 337750 New Restoration Reagent for Development of Erased Serial Number on Copper Metal Surface
Authors: Lav Kesharwani, Nalini Shankar, A. K. Gupta
Abstract:
A serial number is a unique code assigned for identification of a single unit. Serial number are present on many objects. In an attempt to hide the identity of the numbered item, the numbers are often obliterated or removed by mechanical methods. The present work was carried out with an objective to develop less toxic, less time consuming, more result oriented chemical etching reagent for restoration of serial number on the copper metal plate. Around nine different reagents were prepared using different combination of reagent along with standard reagent and it was applied over 50 erased samples of copper metal and compared it with the standard reagent for restoration of erased marks. After experiment, it was found that the prepared Etching reagent no. 3 (10 g FeCl3 + 20 ml glacial acetic acid + 100 ml distilled H2O) showed the best result for restoration of erased serial number on the copper metal plate .The reagent was also less toxic and less time consuming as compared to standard reagent (19 g FeCl3 + 6 ml cans. HCl + 100 ml distilled H2O).Keywords: serial number restoration, copper plate, obliteration, chemical method
Procedia PDF Downloads 556749 A Niche Sustainable Tourism Product: Stakeholder Perceptions on Sustainable Conference Tourism in Cyprus
Authors: Xenia I. Loizidou, Anthi Gavriel, Demetra Petsa
Abstract:
The tourism industry is a significant contributor to Cyprus's Gross Domestic Product. However, as the main tourism product is 'sun and sea', the industry is significantly unsustainable, with the majority of tourists (approx. 90%) concentrated in coastal areas over a short period of time, causing negative environmental, social, and economic impacts. The newly established Cypriot Deputy Ministry of Tourism aims to diversify the Cypriot tourism industry by focusing on the development of niche tourism products that will elongate the touristic season and divert visitors to inland mountainous and rural areas. In this respect, conference and event tourism is an ideal product for development. The current paper presents the results of fieldwork carried out between January and March 2020 in Cyprus, with key stakeholders within the conference and event tourism sector. The work consisted of a survey and semi-structured interviews to determine the current level of sustainability within the conference tourism sector, the main barriers to the sector's development, as well as key stakeholder insights and suggestions for measures to improve the sector's sustainability. The results suggest that there is a general lack of understanding of the negative economic, environmental and social impacts associated with the organization of conventional conferences and events, compared to the positive impacts of sustainable conferences/events. There also seems to be a lack of awareness of actions that can be taken to make the conference and event sector more sustainable. Incentives, marketing, branding, and training are identified as some of the effective means to improve the sustainability of the Cypriot conference and event sector, as is the development of country-wide sustainability policy and a review and enforcement of national waste management legislation. The research outputs will be utilized for the development of targeted toolkits, training, and awareness-raising activities that will drive Cyprus towards becoming an international sustainable tourism destination.Keywords: conference, event, sustainability, tourism
Procedia PDF Downloads 128748 Simulation of Photocatalytic Degradation of Rhodamine B in Annular Photocatalytic Reactor
Authors: Jatinder Kumar, Ajay Bansal
Abstract:
Simulation of a photocatalytic reactor helps in understanding the complex behavior of the photocatalytic degradation. Simulation also aids the designing and optimization of the photocatalytic reactor. Lack of simulation strategies is a huge hindrance in the commercialization of the photocatalytic technology. With the increased performance of computational resources, and development of simulation software, computational fluid dynamics (CFD) is becoming an affordable engineering tool to simulate and optimize reactor designs. In the present paper, a CFD (Computational fluid dynamics) model for simulating the performance of an immobilized-titanium dioxide based annular photocatalytic reactor was developed. The computational model integrates hydrodynamics, species mass transport, and chemical reaction kinetics using a commercial CFD code Fluent 6.3.26. The CFD model was based on the intrinsic kinetic parameters determined experimentally in a perfectly mixed batch reactor. Rhodamine B, a complex organic compound, was selected as a test pollutant for photocatalytic degradation. It was observed that CFD could become a valuable tool to understand and improve the photocatalytic systems.Keywords: simulation, computational fluid dynamics (CFD), annular photocatalytic reactor, titanium dioxide
Procedia PDF Downloads 585747 Three Dimensional Simulation of the Transient Modeling and Simulation of Different Gas Flows Velocity and Flow Distribution in Catalytic Converter with Porous Media
Authors: Amir Reza Radmanesh, Sina Farajzadeh Khosroshahi, Hani Sadr
Abstract:
The transient catalytic converter performance is governed by complex interactions between exhaust gas flow and the monolithic structure of the catalytic converter. Stringent emission regulations around the world necessitate the use of highly-efficient catalytic converters in vehicle exhaust systems. Computational fluid dynamics (CFD) is a powerful tool for calculating the flow field inside the catalytic converter. Radial velocity profiles, obtained by a commercial CFD code, present very good agreement with respective experimental results published in the literature. However the applicability of CFD for transient simulations is limited by the high CPU demands. In the present work, Geometric modeling ceramic monolith substrate is done with square shaped channel type of Catalytic converter and it is coated platinum and palladium. This example illustrates the effect of flow distribution on thermal response of a catalytic converter and different gas flow velocities, during the critical phase of catalytic converter warm up.Keywords: catalytic converter, computational fluid dynamic, porous media, velocity distribution
Procedia PDF Downloads 858746 Analysis of Steel Beam-Column Joints Under Seismic Loads
Authors: Mizam Doğan
Abstract:
Adapazarı railway car factory, the only railway car factory of Turkey, was constructed in 1950. It was a steel design and it had filled beam sections and truss beam systems. Columns were steel profiles and box sections. The factory was damaged heavily on Izmit Earthquake and closed. In this earthquake 90% of damaged structures are reinforced concrete, the others are %7 prefabricated and 3% steel construction. As can be seen in statistical data, damaged industrial buildings in this earthquake were generally reinforced concrete and prefabricated structures. Adapazari railway car factory is the greatest steel structure damaged in the earthquake. This factory has 95% of the total damaged steel structure area. In this paper; earthquake damages on beams and columns of the factory are studied by considering TS648 'Turkish Standard Building Code for Steel Structures' and also damaged connection elements as welds, rivets and bolts are examined. A model similar to the damaged system is made and high-stress zones are searched. These examinations, conclusions, suggestions are explained by damage photos and details.Keywords: column-beam connection, seismic analysis, seismic load, steel structure
Procedia PDF Downloads 277745 Machine Learning Based Gender Identification of Authors of Entry Programs
Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee
Abstract:
Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning
Procedia PDF Downloads 323744 One-Dimension Model for Positive Displacement Pump with Cavitation Algorithm
Authors: Francesco Rizzuto, Matthew Stickland, Stephan Hannot
Abstract:
The simulation of a positive displacement pump system with commercial software for Computer Fluid Dynamics (CFD), will result in an enormous computational effort due to the complexity of the pump system. This drawback restricts the use of it to a specific part of the pump in one simulation. This research focuses on developing an algorithm that provides a suitable result in agreement with experiment data, without that computational effort. The compressible equations are solved with an explicit algorithm. A comparison is presented between the FV method with Monotonic Upwind scheme for Conservative Laws (MUSCL) with slope limiter and experimental results. The source term for cavitation and friction is introduced into the algorithm with a slipping strategy and solved with a 4th order Runge-Kutta scheme (RK4). Different pumps are modeled and analyzed to evaluate the flexibility of the code. The simulation required minimal computation time and resources without compromising the accuracy of the simulation results. Therefore, this algorithm highlights the feasibility of pressure pulsation simulation as a design tool for an industrial purpose.Keywords: cavitation, diaphragm, DVCM, finite volume, MUSCL, positive displacement pump
Procedia PDF Downloads 155743 The Transnationalization of Anti-Corruption Compliance Programs in Latin America
Authors: Hitalo Silva
Abstract:
The most famous corruption scandals in the past four years were taken in Latin America, especially in Brazil, but besides the stain that these countries suffered in an international field, there was a huge effort to create or modernize its national anti-corruption laws. Also, the countries are implementing new standards for investigations and corporate compliance programs, in order to combat corruption and prevent the money laundering. But here is the following question: is here an invisible uniformization/transnationalization of the anti-corruption systems in Latin America? This new scenario reflects the impacts of the corruption investigations conducted in Latin America countries, such as Car Wash Operation in Brazil, Pretelt Case in Colombia, Gasoducto Sur Peruano case and the Mr. Alex Kouri’s case both in Peru. Legal and institutional pro-transparency reforms were made recently, the companies are trying to implement new standards of conduct and investing in their compliance department. In this sense, there is a huge homogeneity in Latin America concerning the structuring of corporate compliance programs, a truly transnationalization not only of laws but also corporate standards among these countries. Although legislative initiatives vary among the countries, there is a tendency to impose rigid liability standards for the companies being investigated for corruption, not only the personal punishments of their executives, which demonstrate the power of authorities to strength the investigative tools. Also, instruments such as leniency agreements and plea bargain are essential to put a central role in enforcement activities in Latin America. In other words, in a region where six former Presidents were convicted for acts of corruption, and, companies such as Odebrecht that is accused of offering bribes to politicians from Argentina to México, passing through Ecuador, Colombia, Guatemala and Panama, this demonstrates the necessity to increase strength of their legal framework in a sense that unify transnational goals. All things considered, this paper will show how anti-corruption regulators are cooperating in Latin America jurisdictions in order to unify their laws and how the private sector is dealing with this new scenario of corporate culture change.Keywords: compliance, corruption, investigations, Latin America, transnational
Procedia PDF Downloads 125742 Analyzing the Readiness of Resuscitation Team during Cardiac Arrest
Authors: J. Byimana, I. A. Muhire, J. E. Nzabahimana, A. Nyombayire
Abstract:
Introduction: A successful cardiopulmonary resuscitation during a sudden cardiac arrest can be delayed by different components including new hospital setting, lack of adequate training, lack of pre-established resuscitation team and ineffective communication and lead to an unexpected outcome which is death. The main objective of the study was to assess the readiness of resuscitation teams during cardiac arrest and the organizational approaches that would best support their functioning in a new hospital facility, and to detect any factor that may have contributed to responses. This study analyses the readiness of Resuscitation Team (RT) during cardiac arrest. —Material and methods: A prospective Analytic design was carried out at a newly established United Nations level 2 hospital facility, on four RTM (resuscitation team member). A semi structured questionnaire was used to collect data. —Results: This study highlights indicate that the response time during cardiac arrest simulation meet both American heart association (AHA) and European resuscitation council guidelines. The study offers useful evidence about the impact of a new facility on RTM performance and provides an exposure of staff to emergency events within the Work setting.Keywords: cardiac arrest, code blue, simulation, resuscitation team member
Procedia PDF Downloads 221741 Error Probability of Multi-User Detection Techniques
Authors: Komal Babbar
Abstract:
Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)
Procedia PDF Downloads 527740 Experimental and Numerical Analyses of Tehran Research Reactor
Authors: A. Lashkari, H. Khalafi, H. Khazeminejad, S. Khakshourniya
Abstract:
In this paper, a numerical model is presented. The model is used to analyze a steady state thermo-hydraulic and reactivity insertion transient in TRR reference cores respectively. The model predictions are compared with the experiments and PARET code results. The model uses the piecewise constant and lumped parameter methods for the coupled point kinetics and thermal-hydraulics modules respectively. The advantages of the piecewise constant method are simplicity, efficiency and accuracy. A main criterion on the applicability range of this model is that the exit coolant temperature remains below the saturation temperature, i.e. no bulk boiling occurs in the core. The calculation values of power and coolant temperature, in steady state and positive reactivity insertion scenario, are in good agreement with the experiment values. However, the model is a useful tool for the transient analysis of most research reactor encountered in practice. The main objective of this work is using simple calculation methods and benchmarking them with experimental data. This model can be used for training proposes.Keywords: thermal-hydraulic, research reactor, reactivity insertion, numerical modeling
Procedia PDF Downloads 401739 Out of Order: The Rise of Stop and Search in Civil Orders Legislation
Authors: Jodie Bradshaw, Rebecca Dooley, Habib Kadiri, Holly Bird, Aaliyah Felix-West, Udit Mahalingam, Ella Thomson
Abstract:
The sharp rise of civil orders has led to an expansion of police powers, particularly in the realm of stop and search activities. The broad scope and objectives of these civil orders –addressing issues as varied as public safety, crime prevention, and counter-terrorism – has led to ‘mission-creep’, whereby orders were being imposed in a wider range of contexts than initially intended. The ever-widening purview of civil orders in practice necessitates proactive measures by law enforcement which often rely heavily on the utilisation of stop and search, leading to an expansion of stop and search practices and the regulation of public space. Civil liberties organisations, criminal justice and legal practitioners, activist groups, and researchers have argued that civil orders dilute and undermine foundational legal principles, pose a threat to our basic rights and freedoms, facilitate dangerous criminal justice net-widening, and disproportionately target young, working-class people of colour. Many of the provisions in these orders are potentially incompatible with the right to liberty and security. The conditions of an order (whether negative restrictions or positive obligations) tend to be extremely easy to breach –and in some cases, almost impossible for the person subject to the order not to breach. When the conditions of an order are breached, the result is criminal punishment – often in the form of imprisonment. This paper argues that civil orders set people up to fail, sending them down a path towards incarceration and the ultimate deprivation of liberty. The proclaimed intentions underpinning these civil orders – to tackle purportedly ‘undesirable’ behaviour (which in and of itself is not a crime) committed by ‘undesirable’ people – paves the way for justifying violent and racially disproportionate policing practices.Keywords: civil orders, policing, stop and search, crime, civil liberties, criminal punishment, anti-social behaviour
Procedia PDF Downloads 2738 Corporate Codes of Ethics and Earnings Discretion: International Evidence
Authors: Chu Chen, Giorgio Gotti, Tony Kang, Michael Wolfe
Abstract:
This study examines the role of codes of ethics in reducing the extent to which managers’ act opportunistically in reporting earnings. Corporate codes of ethics, by clarifying the boundaries of ethical corporate behaviors and making relevant social norms more salient, have the potential to deter managers from engaging in opportunistic financial reporting practices. In a sample of international companies, we find that the quality of corporate codes of ethics is associated with higher earnings quality, i.e., lower discretionary accruals. Our results are confirmed for a subsample of firms more likely to be engaging in opportunistic reporting behavior, i.e., firms that just meet or beat analysts’ forecasts. Further, codes of ethics play a greater role in reducing earnings management for firms in countries with weaker investor protection mechanisms. Our results suggest that corporate codes of ethics can be a viable alternative to country-level investor protection mechanisms in curbing aggressive reporting behaviors.Keywords: corporate ethics policy, code of ethics, business ethics, earnings discretion, accruals
Procedia PDF Downloads 287737 2D CFD-PBM Coupled Model of Particle Growth in an Industrial Gas Phase Fluidized Bed Polymerization Reactor
Authors: H. Kazemi Esfeh, V. Akbari, M. Ehdaei, T. N. G. Borhani, A. Shamiri, M. Najafi
Abstract:
In an industrial fluidized bed polymerization reactor, particle size distribution (PSD) plays a significant role in the reactor efficiency evaluation. The computational fluid dynamic (CFD) models coupled with population balance equation (CFD-PBM) have been extensively employed to investigate the flow behavior in the poly-disperse multiphase fluidized bed reactors (FBRs) utilizing ANSYS Fluent code. In this study, an existing CFD-PBM/ DQMOM coupled modeling framework has been used to highlight its potential to analyze the industrial-scale gas phase polymerization reactor. The predicted results reveal an acceptable agreement with the observed industrial data in terms of pressure drop and bed height. The simulated results also indicate that the higher particle growth rate can be achieved for bigger particles. Hence, the 2D CFD-PBM/DQMOM coupled model can be used as a reliable tool for analyzing and improving the design and operation of the gas phase polymerization FBRs.Keywords: computational fluid dynamics, population balance equation, fluidized bed polymerization reactor, direct quadrature method of moments
Procedia PDF Downloads 367736 Wind Interference Effect on Tall Building
Authors: Atul K. Desai, Jigar K. Sevalia, Sandip A. Vasanwala
Abstract:
When a building is located in an urban area, it is exposed to a wind of different characteristics then wind over an open terrain. This is development of turbulent wake region behind an upstream building. The interaction with upstream building can produce significant changes in the response of the tall building. Here, in this paper, an attempt has been made to study wind induced interference effects on tall building. In order to study wind induced interference effect (IF) on Tall Building, initially a tall building (which is termed as Principal Building now on wards) with square plan shape has been considered with different Height to Width Ratio and total drag force is obtained considering different terrain conditions as well as different incident wind direction. Then total drag force on Principal Building is obtained by considering adjacent building which is termed as Interfering Building now on wards with different terrain conditions and incident wind angle. To execute study, Computational Fluid Dynamics (CFD) Code namely Fluent and Gambit have been used.Keywords: computational fluid dynamics, tall building, turbulent, wake region, wind
Procedia PDF Downloads 551735 The Social Justice of Movement: Undocumented Immigrant Coalitions in the United States
Authors: Libia Jiménez Chávez
Abstract:
This is a study of freedom riders and their courageous journey for civil rights, but the year was not 1961. It was 2003. This paper chronicles the emergence of a new civil rights movement for immigrant rights through an oral history of the 2003 U.S. Immigrant Workers Freedom Ride (IWFR). During the height of the post-9/11 immigrant repression, a bloc of organizations inspired by the Civil Rights Movement of the 1960s mobilized 900 multinational immigrants and their allies in the fight for legal status, labor protections, family reunification, and civil rights. The activists visited over 100 U.S. cities, met with Congressional leaders in the nation’s capital, and led a rally of over 50,000 people in New York City. This unified effort set the groundwork for the national May Day immigration protests of 2006. Movements can be characterized in two distinct ways: physical movement and social movements. In the past, historians have considered immigrants both as people and as participants in social movements. In contrast, studies of recent migrants tend to say little about their involvement in immigrant political mobilizations. The dominant literature on immigration portrays immigrants as objects of exclusion, border enforcement, detention, and deportation instead of strategic political actors. This paper aims to change this perception. It considers the Freedom Riders both as immigrants who were literally on the move and as participants in a social movement. Through interviews with participants and archival video footage housed at the University of California Los Angeles, it is possible to study this mobile protest as a movement. This contemporary immigrant struggle is an opportunity to explore the makeup and development of a heterogenous immigrant coalition and consider the relationship between population movements and social justice. In addition to oral histories and archival research, the study will utilize social movement literature, U.S. immigration and labor history, and Undocumented Critical Theory to expand the historiography of immigrant social movements in America.Keywords: civil rights, immigrant social movements, undocumented communities, undocumented critical theory
Procedia PDF Downloads 171734 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 268733 Construction of a Desktop Arduino Controlled Propeller Test Stand
Authors: Brian Kozak, Ryan Ferguson, Evan Hockeridge
Abstract:
Aerospace engineering and aeronautical engineering students studying propulsion often learn about propellers and their importance in aviation propulsion. In order to reinforce concepts introduced in the classroom, laboratory projects are used. However, to test a full scale propeller, an engine mounted on a test stand must be used. This engine needs to be enclosed in a test cell for appropriated safety requirements, is expensive to operate, and requires a significant amount of time to change propellers. In order to decrease costs and time requirements, the authors designed and built an electric motor powered desktop Arduino controlled test stand. This test stand is used to enhance student understanding of propeller size and pitch on thrust. The test stand can accommodate propellers up to 25 centimeters in diameter. The code computer allowed for the motor speed to be increased or decreased by 1% per second. Outputs that are measured are thrust, motor rpm, amperes, voltage, and motor temperature. These data are exported as a .CVS file and can be imported into a graphing program for data analysis.Keywords: Arduino, Laboratory Project, Test stand, Propeller
Procedia PDF Downloads 219732 Image Transform Based on Integral Equation-Wavelet Approach
Authors: Yuan Yan Tang, Lina Yang, Hong Li
Abstract:
Harmonic model is a very important approximation for the image transform. The harmanic model converts an image into arbitrary shape; however, this mode cannot be described by any fixed functions in mathematics. In fact, it is represented by partial differential equation (PDE) with boundary conditions. Therefore, to develop an efficient method to solve such a PDE is extremely significant in the image transform. In this paper, a novel Integral Equation-Wavelet based method is presented, which consists of three steps: (1) The partial differential equation is converted into boundary integral equation and representation by an indirect method. (2) The boundary integral equation and representation are changed to plane integral equation and representation by boundary measure formula. (3) The plane integral equation and representation are then solved by a method we call wavelet collocation. Our approach has two main advantages, the shape of an image is arbitrary and the program code is independent of the boundary. The performance of our method is evaluated by numerical experiments.Keywords: harmonic model, partial differential equation (PDE), integral equation, integral representation, boundary measure formula, wavelet collocation
Procedia PDF Downloads 558731 Perception and Effect of Gender-Based Violence on Sustainable Development and Education of Girl-Child in Southwestern Nigeria
Authors: Afolabi Comfort Yemisi
Abstract:
Gender-based violence remains a serious threat to the growth, health, and safety of women and girls globally, including Nigeria. The rising violence of various shades of violence, especially against women and girls in the guise of cultural preservation, raised serious concerns. The challenge of this harmful gender narrative is more critical in attaining the Sustainable Development Goals and Goal 4 (Quality Education) in Nigeria. The study investigated the perception and effects of gender-based violence on sustainable development and education of the girl-child in Southwestern Nigeria. Primary and Secondary data were used for the study. Primary data were obtained using a structured questionnaire administered to young females in tertiary institutions, secondary schools, non-governmental organizations, and government institutions dealing with gender-based violence in the study area, while the secondary data were sourced from journals, books and dailies. A multistage random sampling technique was employed to select a sample of 360 respondents who completed the questionnaire for the study. Descriptive statistics and regression analysis were applied to the data collected. The result revealed a high prevalence of gender-based violence, and it was perceived to be culturally motivated. Sexual violence, sexual harassment and psychological violence were the significant forms of gender-based violence that adversely affected the Sustainable Development Goal 4. The result further revealed that loss of concentration, shame and depression, school drop-out, poor academic performance and inferiority complex were the major effects of gender-based violence on the education of girl-child in the study area. The study recommended that to avert catastrophic damages and adverse effects of gender-based violence on the girl-child, there is a need for thorough awareness and sensitization programmes to build their resilience. Also, enforcement of established laws against gender-based violence by both government and non-governmental institutions is sacrosanct.Keywords: perception, effects, gender-based violence, sustainable development, education, girl-child, sensitisation
Procedia PDF Downloads 11730 A Proposed Framework for Software Redocumentation Using Distributed Data Processing Techniques and Ontology
Authors: Laila Khaled Almawaldi, Hiew Khai Hang, Sugumaran A. l. Nallusamy
Abstract:
Legacy systems are crucial for organizations, but their intricacy and lack of documentation pose challenges for maintenance and enhancement. Redocumentation of legacy systems is vital for automatically or semi-automatically creating documentation for software lacking sufficient records. It aims to enhance system understandability, maintainability, and knowledge transfer. However, existing redocumentation methods need improvement in data processing performance and document generation efficiency. This stems from the necessity to efficiently handle the extensive and complex code of legacy systems. This paper proposes a method for semi-automatic legacy system re-documentation using semantic parallel processing and ontology. Leveraging parallel processing and ontology addresses current challenges by distributing the workload and creating documentation with logically interconnected data. The paper outlines challenges in legacy system redocumentation and suggests a method of redocumentation using parallel processing and ontology for improved efficiency and effectiveness.Keywords: legacy systems, redocumentation, big data analysis, parallel processing
Procedia PDF Downloads 45