Search results for: tube-based robust MPC
345 An Intelligent Text Independent Speaker Identification Using VQ-GMM Model Based Multiple Classifier System
Authors: Ben Soltane Cheima, Ittansa Yonas Kelbesa
Abstract:
Speaker Identification (SI) is the task of establishing identity of an individual based on his/her voice characteristics. The SI task is typically achieved by two-stage signal processing: training and testing. The training process calculates speaker specific feature parameters from the speech and generates speaker models accordingly. In the testing phase, speech samples from unknown speakers are compared with the models and classified. Even though performance of speaker identification systems has improved due to recent advances in speech processing techniques, there is still need of improvement. In this paper, a Closed-Set Tex-Independent Speaker Identification System (CISI) based on a Multiple Classifier System (MCS) is proposed, using Mel Frequency Cepstrum Coefficient (MFCC) as feature extraction and suitable combination of vector quantization (VQ) and Gaussian Mixture Model (GMM) together with Expectation Maximization algorithm (EM) for speaker modeling. The use of Voice Activity Detector (VAD) with a hybrid approach based on Short Time Energy (STE) and Statistical Modeling of Background Noise in the pre-processing step of the feature extraction yields a better and more robust automatic speaker identification system. Also investigation of Linde-Buzo-Gray (LBG) clustering algorithm for initialization of GMM, for estimating the underlying parameters, in the EM step improved the convergence rate and systems performance. It also uses relative index as confidence measures in case of contradiction in identification process by GMM and VQ as well. Simulation results carried out on voxforge.org speech database using MATLAB highlight the efficacy of the proposed method compared to earlier work.Keywords: feature extraction, speaker modeling, feature matching, Mel frequency cepstrum coefficient (MFCC), Gaussian mixture model (GMM), vector quantization (VQ), Linde-Buzo-Gray (LBG), expectation maximization (EM), pre-processing, voice activity detection (VAD), short time energy (STE), background noise statistical modeling, closed-set tex-independent speaker identification system (CISI)
Procedia PDF Downloads 309344 Reactions of 4-Aryl-1H-1,2,3-Triazoles with Cycloalkenones and Epoxides: Synthesis of 2,4- and 1,4-Disubstituted 1,2,3-Triazoles
Authors: Ujjawal Kumar Bhagat, Kamaluddin, Rama Krishna Peddinti
Abstract:
The Huisgen’s 1,3-dipolar [3+2] cycloaddition of organic azides and alkynes often give the mixtures of both the regioisomers 1,4- and 1,5- disubstituted 1,2,3-triazoles. Later, in presence of metal salts (click chemistry) such as copper(I)-catalyzed azide-alkyne cycloaddition (CuAAC) was used for the synthesis of 1,4-disubstituted 1,2,3-triazoles as a sole products regioselectively. Also, the ‘click reactions’ of Ruthenium-catalyzed azides-alkynes cycloaddition (RuAAC) is used for the synthesis of 1,5-disubstituted 1,2,3-triazoles as a single isomer. The synthesis of 1,4- and 1.5-disubstituted 1,2,3-triazoles has become the gold standard of ‘click chemistry’ due to its reliability, specificity, and biocompatibility. The 1,4- and 1,5-disubstituted 1,2,3-triazoles have emerged as one of the most powerful entities in the varieties of biological properties like antibacterial, antitubercular, antitumor, antifungal and antiprotozoal activities. Some of the 1,4,5-trisubstituted 1,2,3-triazoles exhibit Hsp90 inhibiting properties. The 1,4-disubstituted 1,2,3-triazoles also play a big role in the area of material sciences. The triazole-derived oligomeric, polymeric structures are the potential materials for the preparation of organic optoelectronics, silicon elastomers and unimolecular block copolymers. By the virtue of hydrogen bonding and dipole interactions, the 1,2,3-triazole moiety readily associates with the biological targets. Since, the 4-aryl-1H-1,2,3-triazoles are stable entities, they are chemically robust and very less reactive. In this regard, the addition of 4-aryl-1H-1,2,3-triazoles as nucleophiles to α,β-unsaturated carbonyls and nucleophilic substitution with the epoxides constitutes a powerful and challenging synthetic approach for the generation of disubstituted 1,2,3-triazoles. Herein, we have developed aza-Michael addition of 4-aryl-1H-1,2,3-triazoles to 2-cycloalken-1-ones in the presence of an organic base (DABCO) in acetonotrile solvent leading to the formation of disubstituted 1,2,3-triazoles. The reaction provides 1,4-disubstituted triazoles, 3-(4-aryl-1H-1,2,3-triazol-1-yl)cycloalkanones in major amount along with 1,5-disubstituted 1,2,3-triazoles, minor regioisomers with excellent combined chemical yields (upto99%). The nucleophilic behavior of 4-aryl-1H-1,2,3-triazoles was also tested in the ring opening of meso-epoxides in the presence of organic bases (DABCO/Et3N) in acetonotrile solvent furnishing the two regioisomers1,4- and 1,5-disubstituted 1,2,3-triazoles. Thus, the novelty of this methodology is synthesis of diversified disubstituted 1,2,3-triazoles under metal free condition.The results will be presented in detail.Keywords: aza-Michael addition, cycloalkenones, epoxides, triazoles
Procedia PDF Downloads 323343 Hydrodynamic and Water Quality Modelling to Support Alternative Fuels Maritime Operations Incident Planning & Impact Assessments
Authors: Chow Jeng Hei, Pavel Tkalich, Low Kai Sheng Bryan
Abstract:
Due to the growing demand for sustainability in the maritime industry, there has been a significant increase in focus on alternative fuels such as biofuels, liquefied natural gas (LNG), hydrogen, methanol and ammonia to reduce the carbon footprint of vessels. Alternative fuels offer efficient transportability and significantly reduce carbon dioxide emissions, a critical factor in combating global warming. In an era where the world is determined to tackle climate change, the utilization of methanol is projected to witness a consistent rise in demand, even during downturns in the oil and gas industry. Since 2022, there has been an increase in methanol loading and discharging operations for industrial use in Singapore. These operations were conducted across various storage tank terminals at Jurong Island of varying capacities, which are also used to store alternative fuels for bunkering requirements. The key objective of this research is to support the green shipping industries in the transformation to new fuels such as methanol and ammonia, especially in evolving the capability to inform risk assessment and management of spills. In the unlikely event of accidental spills, a highly reliable forecasting system must be in place to provide mitigation measures and ahead planning. The outcomes of this research would lead to an enhanced metocean prediction capability and, together with advanced sensing, will continuously build up a robust digital twin of the bunkering operating environment. Outputs from the developments will contribute to management strategies for alternative marine fuel spills, including best practices, safety challenges and crisis management. The outputs can also benefit key port operators and the various bunkering, petrochemicals, shipping, protection and indemnity, and emergency response sectors. The forecasted datasets provide a forecast of the expected atmosphere and hydrodynamic conditions prior to bunkering exercises, enabling a better understanding of the metocean conditions ahead and allowing for more refined spill incident management planningKeywords: clean fuels, hydrodynamics, coastal engineering, impact assessments
Procedia PDF Downloads 70342 False Assumptions Made in Cybersecurity Curriculum: K-12
Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass
Abstract:
With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.Keywords: assumptions, cybersecurity, k-12, teacher
Procedia PDF Downloads 166341 Novel p22-Monoclonal Antibody Based Blocking ELISA for the Detection of African Swine Fever Virus Antibodies in Serum
Authors: Ghebremedhin Tsegay, Weldu Tesfagaber, Yuanmao Zhu, Xijun He, Wan Wang, Zhenjiang Zhang, Encheng Sun, Jinya Zhang, Yuntao Guan, Fang Li, Renqiang Liu, Zhigao Bu, Dongming Zhao*
Abstract:
African swine fever (ASF) is a highly infectious viral disease of pigs, resulting in significant economic loss worldwide. As there is no approved vaccines and treatments, the control of ASF entirely depends on early diagnosis and culling of infected pigs. Thus, highly specific and sensitive diagnostic assays are required for accurate and early diagnosis of ASF virus (ASFV). Currently, only a few recombinant proteins have been tested and validated for use as reagents in ASF diagnostic assays. The most promising ones for ASFV antibody detection were p72, p30, p54, and pp62. So far, three ELISA kits based on these recombinant proteins have been commercialized. Due to the complex nature of the virus and variety forms of the disease, robust serodiagnostic assays are still required. ASFV p22 protein, encoded by KP177R gene, is located in the inner membrane of viral particle and appeared transiently in the plasma membrane early after virus infection. The p22 protein interacts with numerous cellular proteins, involved in processes of phagocytosis and endocytosis through different cellular pathways. However, p22 does not seem to be involved in virus replication or swine pathogenicity. In this study, E.coli expressed recombinant p22 protein was used to generate a monoclonal antibody (mAb), and its potential use for the development of blocking ELISA (bELISA) was evaluated. A total of 806 pig serum samples were tested to evaluate the bELISA. Acording the ROC (Reciever operating chracteristic) analysis, 100% sensitivity and 98.10% of specificity was recorded when the PI cut-off value was set at 47%. The novel assay was able to detect the antibodies as early as 9 days post infection. Finaly, a highly sensitive, specific and rapid novel p22-mAb based bELISA assay was developed, and optimized for detection of antibodies against genotype I and II ASFVs. It is a promising candidate for an early and acurate detection of the antibodies and is highly expected to have a valuable role in the containment and prevention of ASF.Keywords: ASFV, blocking ELISA, diagnosis, monoclonal antibodies, sensitivity, specificity
Procedia PDF Downloads 77340 Filling the Policy Gap for Coastal Resources Management: Case of Evidence-Based Mangrove Institutional Strengthening in Cameroon
Authors: Julius Niba Fon, Jean Hude E. Moudingo
Abstract:
Mangrove ecosystems in Cameroon are valuable both in services and functions as they play host to carbon sinks, fishery breeding grounds and natural coastal barriers against storms. In addition to the globally important biodiversity that they contain, they also contribute to local livelihoods. Despite these appraisals, a reduction of about 30 % over a 25 years period due to anthropogenic and natural actions has been recorded. The key drivers influencing mangrove change include population growth, climate change, economic and political trends and upstream habitat use. Reversing the trend of mangrove loss and growing vulnerability of coastal peoples requires a real commitment by the government to develop and implement robust level policies. It has been observed in Cameroon that special ecosystems like mangroves are insufficiently addressed by forestry and/or environment programs. Given these facts, the Food Agriculture Organization (FAO) in partnership with the Government of Cameroon and other development actors have put in place the project for sustainable community-based management and conservation of mangrove ecosystems in Cameroon. The aim is to address two issues notably the present weak institutional and legal framework for mangrove management, and the unrestricted and unsustainable harvesting of mangrove resources. Civil society organizations like the Cameroon Wildlife Conservation Society, Cameroon Ecology and Organization for the Environment and Development have been working to reduce the deforestation and degradation trend of Cameroon mangroves and also bringing the mangrove agenda to the fore in national and international arenas. Following a desktop approach, we found out that in situ and ex situ initiatives on mangrove management and conservation exist on propagation of improved fish smoke ovens to reduce fuel wood consumption, mangrove forest regeneration, shrimps farming and mangrove protected areas management. The evidence generated from the field experiences are inputs for processes of improving the legal and institutional framework for mangrove management in Cameroon, such as the elaboration of norms for mangroves management engaged by the government.Keywords: mangrove ecosystem, legal and institutional framework, climate change, civil society organizations
Procedia PDF Downloads 365339 The Impact of Mergers and Acquisitions on Financial Deepening in the Nigerian Banking Sector
Authors: Onyinyechi Joy Kingdom
Abstract:
Mergers and Acquisitions (M&A) have been proposed as a mechanism through which, problems associated with inefficiency or poor performance in financial institution could be addressed. The aim of this study is to examine the proposition that recapitalization of banks, which encouraged Mergers and Acquisitions in Nigeria banking system, would strengthen the domestic banks, improve financial deepening and the confidence of depositors. Hence, this study examines the impact of the 2005 M&A in the Nigerian-banking sector on financial deepening using mixed method (quantitative and qualitative approach). The quantitative process of this study utilised annual time series for financial deepening indicator for the period of 1997 to 2012. While, the qualitative aspect adopted semi-structured interview to collate data from three merged banks and three stand-alone banks to explore, understand and complement the quantitative results. Furthermore, a framework thematic analysis is employed to analyse the themes developed using NVivo 11 software. Using the quantitative approach, findings from the equality of mean test (EMT) used suggests that M&A have significant impact on financial deepening. However, this method is not robust enough given its weak validity as it does not control for other potential factors that may determine financial deepening. Thus, to control for other factors that may affect the level of financial deepening, a Multiple Regression Model (MRM) and Interrupted Times Series Analysis (ITSA) were applied. The coefficient for M&A dummy turned negative and insignificant using MRM. In addition, the estimated linear trend of the post intervention when ITSA was applied suggests that after M&A, the level of financial deepening decreased annually; however, this was statistically insignificant. Similarly, using the qualitative approach, the results from the interview supported the quantitative results from ITSA and MRM. The result suggests that interest rate should fall when capital base is increased to improve financial deepening. Hence, this study contributes to the existing literature the importance of other factors that may affect financial deepening and the economy when policies that will enhance bank performance and the economy are made. In addition, this study will enable the use of valuable policy instruments relevant to monetary authorities when formulating policies that will strengthen the Nigerian banking sector and the economy.Keywords: mergers and acquisitions, recapitalization, financial deepening, efficiency, financial crisis
Procedia PDF Downloads 398338 Implementing Lesson Study in Qatari Mathematics Classroom: A Case Study of a New Experience for Teachers through IMPULS-QU Lesson Study Program
Authors: Areej Isam Barham
Abstract:
The implementation of Japanese lesson study approach in the mathematics classroom has been grown worldwide as a model of professional development for teachers. In Qatar, the implementation of IMPULS-QU lesson study program aimed to establish a robust organizational improvement model of professional development for mathematics teachers in Qatar schools. This study describes the implementation of a lesson study model at Al-Markhyia Independent Primary School through different stages; and discusses how the planning process, the research lesson, and the post discussion participates in providing teachers and researchers with a successful research lesson for teacher professional development. The research followed a case study approach in one mathematics classroom. Two teachers and one professional development specialist participated the planning process. One teacher conducted the research lesson study by introducing a problem solving related to the concept of the ‘Mean’ in a mathematics class, 21 students in grade 6 participated in solving the mathematic problem, 11 teachers, 4 professional development specialists, and 4 mathematics professors observed the research lesson. All previous participants except the students participated in a pre and post-lesson discussion within this research. This study followed a qualitative research approach by analyzing the collected data through different stages in the research lesson study. Observation, field notes, and semi-structured interviews conducted to collect data to achieve the research aims. One feature of this lesson study research is that this research describes the implementation for a lesson study as a new experience for one mathematics teacher and 21 students after 3 years of conducting IMPULS-QU project in Al-Markhyia school. The research describes various stages through the implementation of this lesson study model starting from the planning process and ending by the post discussion process. Findings of the study also address the impact of lesson study approach in teaching mathematics for the development of teachers from their point views. Results of the study show the benefits of using lesson study from the point views of participated teachers, theory perceptions about the essential features of lesson study, and their needs for future development. The discussion of the study addresses different features and issues related to the implementation of IMPULS-QU lesson study model in the mathematics classroom. In the light of the study, the research presents recommendations and suggestions for future professional development.Keywords: lesson study, mathematics education, mathematics teaching experience, teacher professional development
Procedia PDF Downloads 185337 SUSTAINEXT–Validating a Zero-Waste: Dynamic, Multivalorization Route Biorefinery for Plant Extracts
Authors: Adriana Diaz Triana, Wolfgang Wimmer, Sebastian Glaser, Rainer Pamminger
Abstract:
SUSTAINEXT is a pioneer initiative in Extremadura, Spain under the EU Biobased industries. SUSTANEXT will scale-up and validate an industrial facility to produce botanical extracts, based on three key pillars. First, the whole valorization of bio-based feedstocks with a zero-waste and zero-emissions ambition. SUSTAINEXT will be deployed with six feedstocks. Three medicinal and aromatic plants (Rosemary, Chamomile, and Lemon verbena) will be locally sourced from disused tobacco fields with installed agri-voltaics; and three underexploited agro-industrial side streams will be further valorized (Olive, artichoke-cardoon, and pomegranate). Second, a dynamic, analytical biorefinery (DYANA) will isolate polyphenol and tri-terpenes from feedstocks in a disruptive and circular way. SUSTAINEXT explores 12 valorization routes (VRs) to extract and purify 46 functional ingredients, of which 13 are new in the market and 12 are newly produced in Europe. Third, the integrated and versatile value chain engages all actors, from feedstocks suppliers to extract users in the industries of food, animal feed, nutraceuticals, cosmetics, chemical performance, soil enhancers and fertilizers. This paper addresses SUTAINEXT activities towards zero impacts and full regulatory compliance. A comprehensive Life Cycle Thinking approach is proposed, with four complementary assessments running iteratively along the project duration (4,5 years). These are the Life Cycle Cost (LCCA), Life Cycle (LCA), Social Life Cycle (S-LCA) and Circularity (CA) assessments. The LCA will help evaluate the feedstock suitability parameters and intrinsic characteristics that quantify the feedstock´s grade for a determined use, and the feedstock´s suitability index for a specific VR. The LCA will also study the emissions, land use change, energy generation and consumption, and other environmental aspects and impacts of the VRs, to identify the most resource efficient and less impactful distribution of products from the circular biorefinery model used in SUSTAINEXT. Challenges to complete the LCA include the definition of the system boundaries, carrying out a robust inventory, and the proper allocation of impacts to the different VRs.Keywords: biorefinery, botanical extracts, life cycle assessment, valorization routes.
Procedia PDF Downloads 22336 Trajectory Tracking of Fixed-Wing Unmanned Aerial Vehicle Using Fuzzy-Based Sliding Mode Controller
Authors: Feleke Tsegaye
Abstract:
The work in this thesis mainly focuses on trajectory tracking of fixed wing unmanned aerial vehicle (FWUAV) by using fuzzy based sliding mode controller(FSMC) for surveillance applications. Unmanned Aerial Vehicles (UAVs) are general-purpose aircraft built to fly autonomously. This technology is applied in a variety of sectors, including the military, to improve defense, surveillance, and logistics. The model of FWUAV is complex due to its high non-linearity and coupling effect. In this thesis, input decoupling is done through extracting the dominant inputs during the design of the controller and considering the remaining inputs as uncertainty. The proper and steady flight maneuvering of UAVs under uncertain and unstable circumstances is the most critical problem for researchers studying UAVs. A FSMC technique was suggested to tackle the complexity of FWUAV systems. The trajectory tracking control algorithm primarily uses the sliding-mode (SM) variable structure control method to address the system’s control issue. In the SM control, a fuzzy logic control(FLC) algorithm is utilized in place of the discontinuous phase of the SM controller to reduce the chattering impact. In the reaching and sliding stages of SM control, Lyapunov theory is used to assure finite-time convergence. A comparison between the conventional SM controller and the suggested controller is done in relation to the chattering effect as well as tracking performance. It is evident that the chattering is effectively reduced, the suggested controller provides a quick response with a minimum steady-state error, and the controller is robust in the face of unknown disturbances. The designed control strategy is simulated with the nonlinear model of FWUAV using the MATLAB® / Simulink® environments. The simulation result shows the suggested controller operates effectively, maintains an aircraft’s stability, and will hold the aircraft’s targeted flight path despite the presence of uncertainty and disturbances.Keywords: fixed-wing UAVs, sliding mode controller, fuzzy logic controller, chattering, coupling effect, surveillance, finite-time convergence, Lyapunov theory, flight path
Procedia PDF Downloads 57335 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI
Authors: Brennan Lodge
Abstract:
Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies
Procedia PDF Downloads 95334 Waste Management Option for Bioplastics Alongside Conventional Plastics
Authors: Dan Akesson, Gauthaman Kuzhanthaivelu, Martin Bohlen, Sunil K. Ramamoorthy
Abstract:
Bioplastics can be defined as polymers derived partly or completely from biomass. Bioplastics can be biodegradable such as polylactic acid (PLA) and polyhydroxyalkonoates (PHA); or non-biodegradable (biobased polyethylene (bio-PE), polypropylene (bio-PP), polyethylene terephthalate (bio-PET)). The usage of such bioplastics is expected to increase in the future due to new found interest in sustainable materials. At the same time, these plastics become a new type of waste in the recycling stream. Most countries do not have separate bioplastics collection for it to be recycled or composted. After a brief introduction of bioplastics such as PLA in the UK, these plastics are once again replaced by conventional plastics by many establishments due to lack of commercial composting. Recycling companies fear the contamination of conventional plastic in the recycling stream and they said they would have to invest in expensive new equipment to separate bioplastics and recycle it separately. This project studies what happens when bioplastics contaminate conventional plastics. Three commonly used conventional plastics were selected for this study: polyethylene (PE), polypropylene (PP) and polyethylene terephthalate (PET). In order to simulate contamination, two biopolymers, either polyhydroxyalkanoate (PHA) or thermoplastic starch (TPS) were blended with the conventional polymers. The amount of bioplastics in conventional plastics was either 1% or 5%. The blended plastics were processed again to see the effect of degradation. The results from contamination showed that the tensile strength and the modulus of PE was almost unaffected whereas the elongation is clearly reduced indicating the increase in brittleness of the plastic. Generally, it can be said that PP is slightly more sensitive to the contamination than PE. This can be explained by the fact that the melting point of PP is higher than for PE and as a consequence, the biopolymer will degrade more quickly. However, the reduction of the tensile properties for PP is relatively modest. Impact strength is generally a more sensitive test method towards contamination. Again, PE is relatively unaffected by the contamination but for PP there is a relatively large reduction of the impact properties already at 1% contamination. PET is polyester, and it is, by its very nature, more sensitive to degradation than PE and PP. PET also has a much higher melting point than PE and PP, and as a consequence, the biopolymer will quickly degrade at the processing temperature of PET. As for the tensile strength, PET can tolerate 1% contamination without any reduction of the tensile strength. However, when the impact strength is examined, it is clear that already at 1% contamination, there is a strong reduction of the properties. The thermal properties show the change in the crystallinity. The blends were also characterized by SEM. Biphasic morphology can be seen as the two polymers are not truly blendable which also contributes to reduced mechanical properties. The study shows that PE is relatively robust against contamination, while polypropylene (PP) is sensitive and polyethylene terephthalate (PET) can be quite sensitive towards contamination.Keywords: bioplastics, contamination, recycling, waste management
Procedia PDF Downloads 225333 Effect of Surfactant Concentration on Dissolution of Hydrodynamically Trapped Sparingly Soluble Oil Micro Droplets
Authors: Adil Mustafa, Ahmet Erten, Alper Kiraz, Melikhan Tanyeri
Abstract:
Work presented here is based on a novel experimental technique used to hydrodynamically trap oil microdroplets inside a microfluidic chip at the junction of microchannels known as stagnation point. Hydrodynamic trapping has been recently used to trap and manipulate a number of particles starting from microbeads to DNA and single cells. Benzyl Benzoate (BB) is used as droplet material. The microdroplets are trapped individually at stagnation point and their dissolution was observed. Experiments are performed for two concentrations (10mM or 10µM) of AOT surfactant (Docusate Sodium Salt) and two flow rates for each case. Moreover, experimental data is compared with Zhang-Yang-Mao (ZYM) model which studies dissolution of liquid microdroplets in the presence of a host fluid experiencing extensional creeping flow. Industrial processes like polymer blending systems in which heat or mass transport occurs experience extensional flow and an insight into these phenomena is of significant importance to many industrial processes. The experimental technique exploited here gives an insight into the dissolution of liquid microdroplets under extensional flow regime. The comparison of our experimental results with ZYM model reveals that dissolution of microdroplets at lower surfactant concentration (10µM) fits the ZYM model at saturation concentration (Cs) value reported in literature (Cs = 15×10⁻³Kg\m³) while for higher surfactant concentration (10mM) which is also above the critical micelle concentration (CMC) of surfactant (5mM) the data fits ZYM model at (Cs = 45×10⁻³Kg\m³) which is 3X times the value reported in literature. The difference in Cs value from the literature shows enhancement in dissolution rate of sparingly soluble BB microdroplets at surfactant concentrations higher than CMC. Enhancement in the dissolution of sparingly soluble materials is of great importance in pharmaceutical industry. Enhancement in the dissolution of sparingly soluble drugs is a key research area for drug design industry. The experimental method is also advantageous because it is robust and has no mechanical contact with droplets under study are freely suspended in the fluid as compared existing methods used for testing dissolution of drugs. The experiments also give an insight into CMC measurement for surfactants.Keywords: extensional flow, hydrodynamic trapping, Zhang-Yang-Mao, CMC
Procedia PDF Downloads 346332 Exploration of Probiotics and Anti-Microbial Agents in Fermented Milk from Pakistani Camel spp. Breeds
Authors: Deeba N. Baig, Ateeqa Ijaz, Saloome Rafiq
Abstract:
Camel is a religious and culturally significant animal in Asian and African regions. In Pakistan Dromedary and Bactrian are common camel breeds. Other than the transportation use, it is a pivotal source of milk and meat. The quality of its milk and meat is predominantly dependent on the geographical location and variety of vegetation available for the diet. Camel milk (CM) is highly nutritious because of its reduced cholesterol and sugar contents along with enhanced minerals and vitamins level. The absence of beta-lactoglobulin (like human milk), makes CM a safer alternative for infants and children having Cow Milk Allergy (CMA). In addition to this, it has a unique probiotic profile both in raw and fermented form. Number of Lactic acid bacteria (LAB) including lactococcus, lactobacillus, enterococcus, streptococcus, weissella, pediococcus and many other bacteria have been detected. From these LAB Lactobacilli, Bifidobacterium and Enterococcus are widely used commercially for fermentation purpose. CM has high therapeutic value as its effectiveness is known against various ailments like fever, arthritis, asthma, gastritis, hepatitis, Jaundice, constipation, postpartum care of women, anti-venom, dropsy etc. It also has anti-diabetic, anti-microbial, antitumor potential along with its robust efficacy in the treatment of auto-immune disorders. Recently, the role of CM has been explored in brain-gut axis for the therapeutics of neurodevelopmental disorders. In this connection, a lot of grey area was available to explore the probiotics and therapeutics latent in the CM available in Pakistan. Thus, current study was designed to explore the predominant probiotic flora and antimicrobial potential of CM from different local breeds of Pakistan. The probiotics have been identified through biochemical, physiological and ribo-typing methods. In addition to this, bacteriocins (antimicrobial-agents) were screened through PCR-based approach. Results of this study revealed that CM from different breeds of camel depicted a number of similar probiotic candidates along with the range of limited variability. However, the nucleotide sequence analysis of selected anti-listerial bacteriocins exposed least variability. As a conclusion, the CM has sufficient probiotic availability and significant anti-microbial potential.Keywords: bacteriocins, camel milk, probiotics potential, therapeutics
Procedia PDF Downloads 134331 Development of a Data-Driven Method for Diagnosing the State of Health of Battery Cells, Based on the Use of an Electrochemical Aging Model, with a View to Their Use in Second Life
Authors: Desplanches Maxime
Abstract:
Accurate estimation of the remaining useful life of lithium-ion batteries for electronic devices is crucial. Data-driven methodologies encounter challenges related to data volume and acquisition protocols, particularly in capturing a comprehensive range of aging indicators. To address these limitations, we propose a hybrid approach that integrates an electrochemical model with state-of-the-art data analysis techniques, yielding a comprehensive database. Our methodology involves infusing an aging phenomenon into a Newman model, leading to the creation of an extensive database capturing various aging states based on non-destructive parameters. This database serves as a robust foundation for subsequent analysis. Leveraging advanced data analysis techniques, notably principal component analysis and t-Distributed Stochastic Neighbor Embedding, we extract pivotal information from the data. This information is harnessed to construct a regression function using either random forest or support vector machine algorithms. The resulting predictor demonstrates a 5% error margin in estimating remaining battery life, providing actionable insights for optimizing usage. Furthermore, the database was built from the Newman model calibrated for aging and performance using data from a European project called Teesmat. The model was then initialized numerous times with different aging values, for instance, with varying thicknesses of SEI (Solid Electrolyte Interphase). This comprehensive approach ensures a thorough exploration of battery aging dynamics, enhancing the accuracy and reliability of our predictive model. Of particular importance is our reliance on the database generated through the integration of the electrochemical model. This database serves as a crucial asset in advancing our understanding of aging states. Beyond its capability for precise remaining life predictions, this database-driven approach offers valuable insights for optimizing battery usage and adapting the predictor to various scenarios. This underscores the practical significance of our method in facilitating better decision-making regarding lithium-ion battery management.Keywords: Li-ion battery, aging, diagnostics, data analysis, prediction, machine learning, electrochemical model, regression
Procedia PDF Downloads 70330 Islamic Finance and Trade Promotion in the African Continental Free Trade Area: An Exploratory Study
Authors: Shehu Usman Rano Aliyu
Abstract:
Despite the significance of finance as a major trade lubricant, evidence in the literature alludes to its scarcity and increasing cost, especially in developing countries where small and medium-scale enterprises are worst affected. The creation of the African Continental Free Trade Area (AFCFTA) in 2018, an organ of the African Union (AU), was meant to serve as a beacon for deepening economic integration through the removal of trade barriers inhibiting intra-African trade and movement of persons, among others. Hence, this research explores the role Islamic trade finance (ITF) could play in spurring intra- and inter-African trade. The study involves six countries; Egypt, Kenya, Malaysia, Morocco, Nigeria, and Saudi Arabia, and employs survey research, a total of 430 sample data, and SmartPLS Structural Equation Modelling (SEM) techniques in its analyses. We find strong evidence that Shari’ah, legal and regulatory compliance issues of the ITF institutions rhythm with the internal, national, and international compliance requirements equally as the unique instruments applied in ITF. In addition, ITF was found to be largely driven by global economic and political stability, socially responsible finance, ethical and moral considerations, risk-sharing, and resilience of the global Islamic finance industry. Further, SMEs, Governments, and Importers are the major beneficiary sectors. By and large, AfCFTA’s protocols align with the principles of ITF and are therefore suited for the proliferation of Islamic finance in the continent. And, while AML/KYC and BASEL requirements, compliance to AAOIFI and IFSB standards, paucity of Shari'ah experts, threats to global security, and increasing global economic uncertainty pose as major impediments, the future of ITF would be shaped by a greater need for institutional and policy support, global economic cum political stability, robust regulatory framework, and digital technology/fintech. The study calls for the licensing of more ITF institutions in the continent, participation of multilateral institutions in ITF, and harmonization of Shariah standards.Keywords: AfCFTA, islamic trade finance, murabaha, letter of credit, forwarding
Procedia PDF Downloads 56329 China and the Criminalization of Aggression. The Juxtaposition of Justice and the Maintenance of International Peace and Security
Authors: Elisabetta Baldassini
Abstract:
Responses to atrocities are always unique and context-dependent. They cannot be foretold nor easily prompted. However, the events of the twentieth century had set the scene for the international community to explore new and more robust systems in response to war atrocities, with the ultimate goal being the restoration and maintenance of peace and security. The outlawry of war and the attribution of individual liability for international crimes were two major landmarks that set the roots for the development of international criminal law. From the London Conference (1945) for the establishment of the first international military tribunal in Nuremberg to Rome at the inauguration of the first permanent international criminal court, the development of international criminal law has shaped in itself a fluctuating degree of tensions between justice and maintenance of international peace and security, the cardinal dichotomy of this article. The adoption of judicial measures to achieve peace indeed set justice as an essential feature at the heart of the new international system. Blackhole of this dichotomy is the crime of aggression. Aggression was at first the key component of a wide body of peace projects prosecuted under the charges of crimes against peace. However, the wide array of controversies around aggression mostly related to its definition, determination and the involvement of the Security Council silenced, partly, a degree of efforts and agreements. Notwithstanding the establishment of the International Criminal Court (ICC), jurisdiction over the crime of aggression was suspended until an agreement over the definition and the conditions for the Court’s exercise of jurisdiction was reached. Compromised over the crime was achieved in Kampala in 2010 and the Court’s jurisdiction over the crime of aggression was eventually activated on 17 July 2018. China has steadily supported the advancement of international criminal justice together with the establishment of a permanent international judicial body to prosecute grave crimes and has proactively participated at the various stages of the codification and development of the crime of aggression. However, China has also expressed systematic reservations and setbacks. With the use of primary and secondary sources, including semi-structured interviews, this research aims at analyzing the role that China has played throughout the substantive historical development of the crime of aggression, demonstrating a sharp inclination in the maintenance of international peace and security. Such state behavior seems to reflect national and international political mechanisms that gravitate around a distinct rationale that involves a share of culture and tradition.Keywords: maintenance of peace and security, cultural expression of justice, crime of aggression, China
Procedia PDF Downloads 228328 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 145327 Neuro-Fuzzy Approach to Improve Reliability in Auxiliary Power Supply System for Nuclear Power Plant
Authors: John K. Avor, Choong-Koo Chang
Abstract:
The transfer of electrical loads at power generation stations from Standby Auxiliary Transformer (SAT) to Unit Auxiliary Transformer (UAT) and vice versa is through a fast bus transfer scheme. Fast bus transfer is a time-critical application where the transfer process depends on various parameters, thus transfer schemes apply advance algorithms to ensure power supply reliability and continuity. In a nuclear power generation station, supply continuity is essential, especially for critical class 1E electrical loads. Bus transfers must, therefore, be executed accurately within 4 to 10 cycles in order to achieve safety system requirements. However, the main problem is that there are instances where transfer schemes scrambled due to inaccurate interpretation of key parameters; and consequently, have failed to transfer several critical loads from UAT to the SAT during main generator trip event. Although several techniques have been adopted to develop robust transfer schemes, a combination of Artificial Neural Network and Fuzzy Systems (Neuro-Fuzzy) has not been extensively used. In this paper, we apply the concept of Neuro-Fuzzy to determine plant operating mode and dynamic prediction of the appropriate bus transfer algorithm to be selected based on the first cycle of voltage information. The performance of Sequential Fast Transfer and Residual Bus Transfer schemes was evaluated through simulation and integration of the Neuro-Fuzzy system. The objective for adopting Neuro-Fuzzy approach in the bus transfer scheme is to utilize the signal validation capabilities of artificial neural network, specifically the back-propagation algorithm which is very accurate in learning completely new systems. This research presents a combined effect of artificial neural network and fuzzy systems to accurately interpret key bus transfer parameters such as magnitude of the residual voltage, decay time, and the associated phase angle of the residual voltage in order to determine the possibility of high speed bus transfer for a particular bus and the corresponding transfer algorithm. This demonstrates potential for general applicability to improve reliability of the auxiliary power distribution system. The performance of the scheme is implemented on APR1400 nuclear power plant auxiliary system.Keywords: auxiliary power system, bus transfer scheme, fuzzy logic, neural networks, reliability
Procedia PDF Downloads 171326 Robust Numerical Method for Singularly Perturbed Semilinear Boundary Value Problem with Nonlocal Boundary Condition
Authors: Habtamu Garoma Debela, Gemechis File Duressa
Abstract:
In this work, our primary interest is to provide ε-uniformly convergent numerical techniques for solving singularly perturbed semilinear boundary value problems with non-local boundary condition. These singular perturbation problems are described by differential equations in which the highest-order derivative is multiplied by an arbitrarily small parameter ε (say) known as singular perturbation parameter. This leads to the existence of boundary layers, which are basically narrow regions in the neighborhood of the boundary of the domain, where the gradient of the solution becomes steep as the perturbation parameter tends to zero. Due to the appearance of the layer phenomena, it is a challenging task to provide ε-uniform numerical methods. The term 'ε-uniform' refers to identify those numerical methods in which the approximate solution converges to the corresponding exact solution (measured to the supremum norm) independently with respect to the perturbation parameter ε. Thus, the purpose of this work is to develop, analyze, and improve the ε-uniform numerical methods for solving singularly perturbed problems. These methods are based on nonstandard fitted finite difference method. The basic idea behind the fitted operator, finite difference method, is to replace the denominator functions of the classical derivatives with positive functions derived in such a way that they capture some notable properties of the governing differential equation. A uniformly convergent numerical method is constructed via nonstandard fitted operator numerical method and numerical integration methods to solve the problem. The non-local boundary condition is treated using numerical integration techniques. Additionally, Richardson extrapolation technique, which improves the first-order accuracy of the standard scheme to second-order convergence, is applied for singularly perturbed convection-diffusion problems using the proposed numerical method. Maximum absolute errors and rates of convergence for different values of perturbation parameter and mesh sizes are tabulated for the numerical example considered. The method is shown to be ε-uniformly convergent. Finally, extensive numerical experiments are conducted which support all of our theoretical findings. A concise conclusion is provided at the end of this work.Keywords: nonlocal boundary condition, nonstandard fitted operator, semilinear problem, singular perturbation, uniformly convergent
Procedia PDF Downloads 143325 Alternative Islamic Finance Channels and Instruments: An Evaluation of the Potential and Considerations in Light of Sharia Principles
Authors: Tanvir A. Uddin, Blake Goud
Abstract:
Emerging trends in FinTech-enabled alternative finance, which includes channels and instruments emerging outside the traditional financial system, heralds unprecedented opportunities to improve financial intermediation and increase access to finance. With widespread criticism of the mainstream Islamic banking and finance sector as either mimicking the conventional system, failing to achieve inclusive growth or both, industry stakeholders are turning to technology to show that finance can be done differently. This paper will outline the critical elements for successful deployment of technology to maximize benefit and minimize potential for harm from introduction of Islamic FinTech and propose recommendations for Islamic financial institutions, FinTech companies, regulators and other stakeholders who are integrating or who are considering introducing FinTech solutions. The paper will present an overview of literature, present relevant case studies and summarize the lessons from interviews conducted with Islamic FinTech founders from around the world. With growing central bank concerns about leveraged loans and ballooning private credit markets globally (estimated at $1.4 trillion), current and future Islamic FinTech operators are at risk of contributing to the problems they aim to solve by operating in a 'shadow banking' system. The paper will show that by systematising a robust theory of change linked to positive outcomes, utilising objective impact frameworks (e.g., the Impact Measurement Project) and instilling a risk management culture that is proactive about potential social harm (e.g., irresponsible lending), FinTech can enable the Islamic finance industry to support positive social impact and minimize harm in support of the maqasid. The adoption of FinTech within the Islamic finance context is still at a nascent stage and the recommendations we provide based on the limited experience to date will help address some of the major cross-cutting issues related to FinTech. Further research will be needed to elucidate in more detail issues relating to individual sectors and countries within the broader global Islamic finance industry.Keywords: alternative finance, FinTech, Islamic finance, maqasid, theory of change
Procedia PDF Downloads 154324 Circadian Rhythmic Expression of Choroid Plexus Membrane Transport Proteins
Authors: Rafael Mineiro, André Furtado, Isabel Gonçalves, Cecília Santos, Telma Quintela
Abstract:
The choroid plexus (CP) epithelial cells form the blood-cerebrospinal fluid barrier. This barrier is highly important for brain protection by physically separating the blood from the cerebrospinal fluid, controlling the trafficking of molecules, including therapeutic drugs, from blood to the brain. The control is achieved by tight junctions between epithelial cells, membrane receptors and transport proteins from the solute carrier and ATP-binding cassette superfamily on the choroid plexus epithelial cells membrane. Previous research of our group showed a functional molecular clock in the CP. The key findings included a rhythmic expression of Bmal1, Per2, and Cry2 in female rat CP. and a rhythmic expression of Cry2 and Per2 in male rat CP. Furthermore, in cultured rat CP epithelial cells we already showed that 17β-estradiol upregulates the expression of Bmal1 and Per1, where the Per1 and Per2 upregulation was abrogated in the presence of the estrogen receptors antagonist ICI. These findings, together with the fact that the CP produces robust rhythms, prompt us to understand the impact of sex hormones and circadian rhythms in CP drug transporters expression, which is a step towards the development and optimization of therapeutic strategies for efficiently delivering drugs to the brain. For that, we analyzed the circadian rhythmicity of the Abcb1, Abcc2, Abcc4 Abcg2, and Oat3 drug transporters at the CP of male and female rats. This analysis was performed by accessing the gene expression of the mentioned transporters at 4 time points by RT-qPCR and the presence of rhythms was evaluated by the CircWave software. Our findings showed a rhythmic expression of Abcc1 in the CP of male rats, of Abcg2 in female rats, and of Abcc4 and Oat3 in both male and female rats with an almost antiphasic pattern between male and female rats for Abcc4. In conclusion, these findings translated to a functional point of view may account for daily variations in brain permeability for several therapeutic drugs, making our findings important data for the future establishment and development of therapeutic strategies according to daytime.Keywords: choroid plexus, circadian rhythm, membrane transporters, sex hormones
Procedia PDF Downloads 12323 Relation Between Traffic Mix and Traffic Accidents in a Mixed Industrial Urban Area
Authors: Michelle Eliane Hernández-García, Angélica Lozano
Abstract:
The traffic accidents study usually contemplates the relation between factors such as the type of vehicle, its operation, and the road infrastructure. Traffic accidents can be explained by different factors, which have a greater or lower relevance. Two zones are studied, a mixed industrial zone and the extended zone of it. The first zone has mainly residential (57%), and industrial (23%) land uses. Trucks are mainly on the roads where industries are located. Four sensors give information about traffic and speed on the main roads. The extended zone (which includes the first zone) has mainly residential (47%) and mixed residential (43%) land use, and just 3% of industrial use. The traffic mix is composed mainly of non-trucks. 39 traffic and speed sensors are located on main roads. The traffic mix in a mixed land use zone, could be related to traffic accidents. To understand this relation, it is required to identify the elements of the traffic mix which are linked to traffic accidents. Models that attempt to explain what factors are related to traffic accidents have faced multiple methodological problems for obtaining robust databases. Poisson regression models are used to explain the accidents. The objective of the Poisson analysis is to estimate a vector to provide an estimate of the natural logarithm of the mean number of accidents per period; this estimate is achieved by standard maximum likelihood procedures. For the estimation of the relation between traffic accidents and the traffic mix, the database is integrated of eight variables, with 17,520 observations and six vectors. In the model, the dependent variable is the occurrence or non-occurrence of accidents, and the vectors that seek to explain it, correspond to the vehicle classes: C1, C2, C3, C4, C5, and C6, respectively, standing for car, microbus, and van, bus, unitary trucks (2 to 6 axles), articulated trucks (3 to 6 axles) and bi-articulated trucks (5 to 9 axles); in addition, there is a vector for the average speed of the traffic mix. A Poisson model is applied, using a logarithmic link function and a Poisson family. For the first zone, the Poisson model shows a positive relation among traffic accidents and C6, average speed, C3, C2, and C1 (in a decreasing order). The analysis of the coefficient shows a high relation with bi-articulated truck and bus (C6 and the C3), indicating an important participation of freight trucks. For the expanded zone, the Poisson model shows a positive relation among traffic accidents and speed average, biarticulated truck (C6), and microbus and vans (C2). The coefficients obtained in both Poisson models shows a higher relation among freight trucks and traffic accidents in the first industrial zone than in the expanded zone.Keywords: freight transport, industrial zone, traffic accidents, traffic mix, trucks
Procedia PDF Downloads 130322 The Safety Related Functions of The Engineered Barriers of the IAEA Borehole Disposal System: The Ghana Pilot Project
Authors: Paul Essel, Eric T. Glover, Gustav Gbeddy, Yaw Adjei-Kyereme, Abdallah M. A. Dawood, Evans M. Ameho, Emmanuel A. Aberikae
Abstract:
Radioactive materials mainly in the form of Sealed Radioactive Sources are being used in various sectors (medicine, agriculture, industry, research, and teaching) for the socio-economic development of Ghana. The use of these beneficial radioactive materials has resulted in an inventory of Disused Sealed Radioactive Sources (DSRS) in storage. Most of the DSRS are legacy/historic sources which cannot be returned to their manufacturer or country of origin. Though small in volume, DSRS can be intensively radioactive and create a significant safety and security liability. They need to be managed in a safe and secure manner in accordance with the fundamental safety objective. The Radioactive Waste Management Center (RWMC) of the Ghana Atomic Energy Commission (GAEC) is currently storing a significant volume of DSRS. The initial activities of the DSRS range from 7.4E+5 Bq to 6.85E+14 Bq. If not managed properly, such DSRS can represent a potential hazard to human health and the environment. Storage is an important interim step, especially for DSRS containing very short-lived radionuclides, which can decay to exemption levels within a few years. Long-term storage, however, is considered an unsustainable option for DSRS with long half-lives hence the need for a disposal facility. The GAEC intends to use the International Atomic Energy Agency’s (IAEA’s) Borehole Disposal System (BDS) to provide a safe, secure, and cost-effective disposal option to dispose of its DSRS in storage. The proposed site for implementation of the BDS is on the GAEC premises at Kwabenya. The site has been characterized to gain a general understanding in terms of its regional setting, its past evolution and likely future natural evolution over the assessment time frame. Due to the long half-lives of some of the radionuclides to be disposed of (Ra-226 with half-life of 1600 years), the engineered barriers of the system must be robust to contain these radionuclides for this long period before they decay to harmless levels. There is the need to assess the safety related functions of the engineered barriers of this disposal system.Keywords: radionuclides, disposal, radioactive waste, engineered barrier
Procedia PDF Downloads 82321 Advances in Machine Learning and Deep Learning Techniques for Image Classification and Clustering
Authors: R. Nandhini, Gaurab Mudbhari
Abstract:
Ranging from the field of health care to self-driving cars, machine learning and deep learning algorithms have revolutionized the field with the proper utilization of images and visual-oriented data. Segmentation, regression, classification, clustering, dimensionality reduction, etc., are some of the Machine Learning tasks that helped Machine Learning and Deep Learning models to become state-of-the-art models for the field where images are key datasets. Among these tasks, classification and clustering are essential but difficult because of the intricate and high-dimensional characteristics of image data. This finding examines and assesses advanced techniques in supervised classification and unsupervised clustering for image datasets, emphasizing the relative efficiency of Convolutional Neural Networks (CNNs), Vision Transformers (ViTs), Deep Embedded Clustering (DEC), and self-supervised learning approaches. Due to the distinctive structural attributes present in images, conventional methods often fail to effectively capture spatial patterns, resulting in the development of models that utilize more advanced architectures and attention mechanisms. In image classification, we investigated both CNNs and ViTs. One of the most promising models, which is very much known for its ability to detect spatial hierarchies, is CNN, and it serves as a core model in our study. On the other hand, ViT is another model that also serves as a core model, reflecting a modern classification method that uses a self-attention mechanism which makes them more robust as this self-attention mechanism allows them to lean global dependencies in images without relying on convolutional layers. This paper evaluates the performance of these two architectures based on accuracy, precision, recall, and F1-score across different image datasets, analyzing their appropriateness for various categories of images. In the domain of clustering, we assess DEC, Variational Autoencoders (VAEs), and conventional clustering techniques like k-means, which are used on embeddings derived from CNN models. DEC, a prominent model in the field of clustering, has gained the attention of many ML engineers because of its ability to combine feature learning and clustering into a single framework and its main goal is to improve clustering quality through better feature representation. VAEs, on the other hand, are pretty well known for using latent embeddings for grouping similar images without requiring for prior label by utilizing the probabilistic clustering method.Keywords: machine learning, deep learning, image classification, image clustering
Procedia PDF Downloads 11320 Challenging Shariah-Compliant Contract: A Latest Insight into the Malaysian Court Cases
Authors: Noor Suhaida Kasri
Abstract:
In the last three decades, Malaysia has developed fundamental legal and regulatory structures that aim to accommodate and facilitate the growth of Islamic banking and finance industry. Important building blocks have been put in place, to cite a few, the elevation of the position of the Malaysian Central Bank Shariah Advisory Council (SAC) as the apex advisory body and the empowerment of their Shariah resolutions through the Central Bank Act 1958; the promulgation of the Islamic Financial Services Act 2013 that regulate and govern Islamic finance market with a robust statutory requirement of Shariah governance and Shariah compliance. Notwithstanding these achievements, enforceability of Shariah-compliant contract remains a contentious subject. The validity of Al Bai Bithaman Ajil concept that was commonly used by the Islamic financial institutions in their financing facilities structures and documentation has been unabatedly challenged by the customers in courts. The challenge was due to the manner in which the Al Bai Bithaman Ajil transactions were carried out. Due to this legal challenge, Al Bai Bithaman Ajil financing structure seems to no longer be the practitioners’ favourite in Malaysia, though its substitute tawarruq and commodity murabahah financing structure may potentially face similar legal challenges. This paper examines the legal challenges affecting the enforceability of these underlying Shariah contracts. The examination of these cases highlights the manner in which these contracts were being implemented and applied by the Malaysian Islamic financial institutions that triggered Shariah and legal concern. The analysis also highlights the approach adopted by the Malaysian courts in determining the Shariah issues as well as the SAC in ascertaining the rulings on the Shariah issues referred to it by the courts. The paper adopts a qualitative research methodology by using textual and documentary analysis approach. The outcome of this study underlines factors that require consideration by industry stakeholder in order to ameliorate the efficacy of the existing building blocks that would eventually strengthens the validity and enforceability of Shariah-compliant contracts. This, in the long run, will further reinforce financial stability and trust into the Islamic banking and finance industry in Malaysia.Keywords: enforceability of Shariah compliant contract, legal challenge, legal and regulatory framework, Shariah Advisory Council
Procedia PDF Downloads 234319 Nano-Sized Iron Oxides/ZnMe Layered Double Hydroxides as Highly Efficient Fenton-Like Catalysts for Degrading Specific Pharmaceutical Agents
Authors: Marius Sebastian Secula, Mihaela Darie, Gabriela Carja
Abstract:
Persistent organic pollutant discharged by various industries or urban regions into the aquatic ecosystems represent a serious threat to fauna and human health. The endocrine disrupting compounds are known to have toxic effects even at very low values of concentration. The anti-inflammatory agent Ibuprofen is an endocrine disrupting compound and is considered as model pollutant in the present study. The use of light energy to accomplish the latest requirements concerning wastewater discharge demands highly-performant and robust photo-catalysts. Many efforts have been paid to obtain efficient photo-responsive materials. Among the promising photo-catalysts, layered double hydroxides (LDHs) attracted significant consideration especially due to their composition flexibility, high surface area and tailored redox features. This work presents Fe(II) self-supported on ZnMeLDHs (Me =Al3+, Fe3+) as novel efficient photo-catalysts for Fenton-like catalysis. The co-precipitation method was used to prepare ZnAlLDH, ZnFeAlLDH and ZnCrLDH (Zn2+/Me3+ = 2 molar ratio). Fe(II) was self-supported on the LDHs matrices by using the reconstruction method, at two different values of weight concentration. X-ray diffraction (XRD), thermogravimetric analysis (TG/DTG), Fourier transform infrared (FTIR) and transmission electron microscopy (TEM) were used to investigate the structural, textural, and micromorphology of the catalysts. The Fe(II)/ZnMeLDHs nano-hybrids were tested for the degradation of a model pharmaceutical agent, the anti-inflammatory agent ibuprofen, by photocatalysis and photo-Fenton catalysis, respectively. The results point out that the embedment Fe(II) into ZnFeAlLDH and ZnCrLDH lead to a slight enhancement of ibuprofen degradation by light irradiation, whereas in case of ZnAlLDH, the degradation process is relatively low. A remarkable enhancement of ibuprofen degradation was found in the case of Fe(II)/ZnMeLDHs by photo-Fenton process. Acknowledgements: This work was supported by a grant of the Romanian National Authority for Scientific Research and Innovation, CNCS - UEFISCDI, project number PN-II-RU-TE-2014-4-0405.Keywords: layered double hydroxide, heterogeneous Fenton, micropollutant, photocatalysis
Procedia PDF Downloads 295318 Minimizing Unscheduled Maintenance from an Aircraft and Rolling Stock Maintenance Perspective: Preventive Maintenance Model
Authors: Adel A. Ghobbar, Varun Raman
Abstract:
The Corrective maintenance of components and systems is a problem plaguing almost every industry in the world today. Train operators’ and the maintenance repair and overhaul subsidiary of the Dutch railway company is also facing this problem. A considerable portion of the maintenance activities carried out by the company are unscheduled. This, in turn, severely stresses and stretches the workforce and resources available. One possible solution is to have a robust preventive maintenance plan. The other possible solution is to plan maintenance based on real-time data obtained from sensor-based ‘Health and Usage Monitoring Systems.’ The former has been investigated in this paper. The preventive maintenance model developed for train operator will subsequently be extended, to tackle the unscheduled maintenance problem also affecting the aerospace industry. The extension of the model to the aerospace sector will be dealt with in the second part of the research, and it would, in turn, validate the soundness of the model developed. Thus, there are distinct areas that will be addressed in this paper, including the mathematical modelling of preventive maintenance and optimization based on cost and system availability. The results of this research will help an organization to choose the right maintenance strategy, allowing it to save considerable sums of money as opposed to overspending under the guise of maintaining high asset availability. The concept of delay time modelling was used to address the practical problem of unscheduled maintenance in this paper. The delay time modelling can be used to help with support planning for a given asset. The model was run using MATLAB, and the results are shown that the ideal inspection intervals computed using the extended from a minimal cost perspective were 29 days, and from a minimum downtime, perspective was 14 days. Risk matrix integration was constructed to represent the risk in terms of the probability of a fault leading to breakdown maintenance and its consequences in terms of maintenance cost. Thus, the choice of an optimal inspection interval of 29 days, resulted in a cost of approximately 50 Euros and the corresponding value of b(T) was 0.011. These values ensure that the risk associated with component X being maintained at an inspection interval of 29 days is more than acceptable. Thus, a switch in maintenance frequency from 90 days to 29 days would be optimal from the point of view of cost, downtime and risk.Keywords: delay time modelling, unscheduled maintenance, reliability, maintainability, availability
Procedia PDF Downloads 132317 Causes, Consequences, and Alternative Strategies of Illegal Migration in Ethiopia: The Case of Tigray Region
Authors: Muuz Abraha Meshesha
Abstract:
Illegal Migration, specifically Trafficking in person is one of the primary issues of the day affecting all states of the world with variation on the extent of the root causes and consequences that led people to migrate irregularly and the consequences it is costing on humanity. This paper intends to investigate the root causes and consequences of illegal migration in Ethiopia’s Tigray Regional state and come up with alternative intervening strategy. To come up with pertinent and robust research finding, this study employed mixed research approach involving qualitative and quantitative data in line with purposive and snow ball sampling selection technique. The study revealed that, though poverty is the most commonly sensed pushing factor for people to illegally migrate, the issue of psycho-social orientation and attitudinal immersion of the local community for illegal migration, both in thinking and action is the most pressing problem that urges serious intervention. Trafficking in persons and Illegal migration in general, is becoming the norm of the day in the study area that overtly reveal illegal migration is an issue beyond livelihood securing demand in practice. Basically, parties engaged in illegal migration and the accomplice with human traffickers these days in the study area are found to be more than urgency for food security and a need to escape from livelihood impoverishment. Therefore, this study come up with a new paradigm insight indicating that illegal migration is believed by the local community members as an optional path way of doing business in illegal way while the attitude of the community and officials authorized to regulate is being part of the channel or to the least tolerant of this grave global danger. The study also found that the effect of illegal migration is significantly manifested in long run than in short term periods. Therefore, a need for critical consideration on attitudinal based intervention and youth oriented and enforceable legal and policy framework accountability framework is required to face and control illegal migration by international, national, local stakeholders. Besides this, economy based development interventions that could engage and reorient the youth, as primary victims of trafficking, and expansion of large scale projects that can employ large number of youths at a time.Keywords: human traficking, illegal migration, migration, tigray region
Procedia PDF Downloads 66316 Detection of Abnormal Process Behavior in Copper Solvent Extraction by Principal Component Analysis
Authors: Kirill Filianin, Satu-Pia Reinikainen, Tuomo Sainio
Abstract:
Frequent measurements of product steam quality create a data overload that becomes more and more difficult to handle. In the current study, plant history data with multiple variables was successfully treated by principal component analysis to detect abnormal process behavior, particularly, in copper solvent extraction. The multivariate model is based on the concentration levels of main process metals recorded by the industrial on-stream x-ray fluorescence analyzer. After mean-centering and normalization of concentration data set, two-dimensional multivariate model under principal component analysis algorithm was constructed. Normal operating conditions were defined through control limits that were assigned to squared score values on x-axis and to residual values on y-axis. 80 percent of the data set were taken as the training set and the multivariate model was tested with the remaining 20 percent of data. Model testing showed successful application of control limits to detect abnormal behavior of copper solvent extraction process as early warnings. Compared to the conventional techniques of analyzing one variable at a time, the proposed model allows to detect on-line a process failure using information from all process variables simultaneously. Complex industrial equipment combined with advanced mathematical tools may be used for on-line monitoring both of process streams’ composition and final product quality. Defining normal operating conditions of the process supports reliable decision making in a process control room. Thus, industrial x-ray fluorescence analyzers equipped with integrated data processing toolbox allows more flexibility in copper plant operation. The additional multivariate process control and monitoring procedures are recommended to apply separately for the major components and for the impurities. Principal component analysis may be utilized not only in control of major elements’ content in process streams, but also for continuous monitoring of plant feed. The proposed approach has a potential in on-line instrumentation providing fast, robust and cheap application with automation abilities.Keywords: abnormal process behavior, failure detection, principal component analysis, solvent extraction
Procedia PDF Downloads 310