Search results for: extended labelled dependency graph
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2097

Search results for: extended labelled dependency graph

897 Influence of Pile Radius on Inertial Response of Pile Group in Fundamental Frequency of Homogeneous Soil Medium

Authors: Faghihnia Torshizi Mostafa, Saitoh Masato

Abstract:

An efficient method is developed for the response of a group of vertical, cylindrical fixed-head, finite length piles embedded in a homogeneous elastic stratum, subjected to harmonic force atop the pile group cap. Pile to pile interaction is represented through simplified beam-on-dynamic-Winkler-foundation (BDWF) with realistic frequency-dependent springs and dashpots. Pile group effect is considered through interaction factors. New closed-form expressions for interaction factors and curvature ratios atop the pile are extended by considering different boundary conditions at the tip of the piles (fixed, hinged). In order to investigate the fundamental characteristics of inertial bending strains in pile groups, inertial bending strains at the head of each pile are expressed in terms of slenderness ratio. The results of parametric study give valuable insight in understanding the behavior of fixed head pile groups in fundamental natural frequency of soil stratum.

Keywords: Winkler-foundation, fundamental frequency of soil stratum, normalized inertial bending strain, harmonic excitation

Procedia PDF Downloads 409
896 Optimization of Turbocharged Diesel Engines

Authors: Ebrahim Safarian, Kadir Bilen, Akif Ceviz

Abstract:

The turbocharger and turbocharging have been the inherent component of diesel engines, so that critical parameters of such engines, as BSFC(Brake Specific Fuel Consumption) or thermal efficiency, fuel consumption, BMEP(Brake Mean Effective Pressure), the power density output and emission level have been improved extensively. In general, the turbocharger can be considered as the most complex component of diesel engines, because it has closely interrelated turbomachinery concepts of the turbines and the compressors to thermodynamic fundamentals of internal combustion engines and stress analysis of all components. In this paper, a waste gate for a conventional single stage radial turbine is investigated by consideration of turbochargers operation constrains and engine operation conditions, without any detail designs in the turbine and the compressor. Amount of opening waste gate which extended between the ranges of full opened and closed valve, is demonstrated by limiting compressor boost pressure ratio. Obtaining of an optimum point by regard above mentioned items is surveyed by three linked meanline modeling programs together which consist of Turbomatch®, Compal®, Rital®madules in concepts NREC® respectively.

Keywords: turbocharger, wastegate, diesel engine, concept NREC programs

Procedia PDF Downloads 240
895 Smart Transportation: Bringing Back Sunshine City Harare

Authors: R. Shayamapiki

Abstract:

This study explores the applicability of applying new urbanism principles in cities of developing countries as a panacea towards building sustainable cities through implementing smart transportation. Smart transportation approach to planning has been growing remarkably around the globe in the past decade. In conquest to curb traffic congestion and reducing automobile dependency in the inner-city Harare, Smart Transportation has been a strong drive towards building sustainable cities. Conceptually, Smart Transportation constitutes of principles which include walking, cycling and mass transit. The Smart Transportation approach has been a success story in the cities of developing world but its application in the cities of developing countries has been doubtful. Cities of developing countries being multifaceted with several urban sustainability challenges, the study consolidates that there are no robust policy, legislative and institutional frameworks to govern the application of Smart Transportation in urban planning hence no clear roadway towards its success story. Questions regarding this investigation proliferate to; how capable are cities of developing countries to transform Smart Transportation principles to a success story? What victory can Smart Transportation bring to sustainable urban development? What are constraints of embracing the principles and how can they be manipulated? Methodologically the case study of urban syntax in Harare Central Business District and arterial roads of the city, legislation and institutional settings underpins various research outcomes. The study finds out the hindrances of policy, legislative and institutional incapacities cooked with economic constraints, lack of political will and technically inflexible zoning regulations. The study also elucidates that there is need to adopt a localized approach to Smart Transportation. The paper then calls for strengthening of institutional and legal reform in conquest to embrace the concept, policy and legislative support, feasible financial mechanism, coordination of responsible stakeholders, planning standards and regulatory frameworks reform to celebrate the success story of Smart Transportation in the developing world.

Keywords: inner-city Harare, new urbanism, smart transportation, sustainable cities

Procedia PDF Downloads 466
894 Environmental and Socioeconomic Determinants of Climate Change Resilience in Rural Nigeria: Empirical Evidence towards Resilience Building

Authors: Ignatius Madu

Abstract:

The study aims at assessing the environmental and socioeconomic determinants of climate change resilience in rural Nigeria. This is necessary because researches and development efforts on building climate change resilience of rural areas in developing countries are usually made without the knowledge of the impacts of the inherent rural characteristics that determine resilient capacities of the households. This has, in many cases, led to costly mistakes, delayed responses, inaccurate outcomes, and other difficulties. Consequently, this assessment becomes crucial not only to policymakers and people living in risk-prone environments in rural areas but also to fill the research gap. To achieve the aim, secondary data were obtained from the Annual Abstract of Statistics 2017, LSMS-Integrated Surveys on Agriculture and General Household Survey Panel 2015/2016, and National Agriculture Sample Survey (NASS), 2010/2011.Resilience was calculated by weighting and adding the adaptive, absorptive and anticipatory measures of households variables aggregated at state levels and then regressed against rural environmental and socioeconomic characteristics influencing it. From the regression, the coefficients of the variables were used to compute the impacts of the variables using the Stochastic Regression of Impacts on Population, Affluence and Technology (STIRPAT) Model. The results showed that the northern States are generally low in resilient indices and are impacted less by the development indicators. The major determining factors are percentage of non-poor, environmental protection, road transport development, landholding, agricultural input, population density, dependency ratio (inverse), household asserts, education and maternal care. The paper concludes that any effort to a successful resilient building in rural areas of the country should first address these key factors that enhance rural development and wellbeing since it is better to take action before shocks take place.

Keywords: climate change resilience; spatial impacts; STIRPAT model; Nigeria

Procedia PDF Downloads 145
893 Cultural Adaptation of Foreign Students in Vienna, A Sociolinguistic Case Study of Iranian Students in Vienna

Authors: Roshanak Nouralian

Abstract:

The primary focus of my Ph.D. dissertation revolves around the interconnection between language and culture, as well as the crucial role that language plays in facilitating communication and fostering integration within the host society for immigrants. This research specifically focuses on Iranian students studying at various universities in Vienna. Throughout this study, I have attempted to examine and analyze their challenges in various life situations in Austria. The broad dimensions of the research question led the research process to apply a constructivist grounded theory strategy. I have also used critical discourse analysis that is in line with constructivist GT's point of view to look closely at the borders, contradictions, and inequalities that came up in the participants' real-life experiences. Data from individual interviews and group discussions have expanded the research trajectory beyond disciplinary boundaries toward a transdisciplinary approach. The research findings indicate how the language policy of the host society leads to the establishment of power relationships and the arousal of a sense of cultural dominance among the research participants. This study investigates the problems experienced by participants in their daily interactions within the host society. Additionally, the results illustrate the development of a dependency relationship between participants and their host society despite linguistic policies that cause a sense of cultural hegemony. Conversely, the obtained data allowed me to examine the participants' language ideologies. The findings of this study show that social linguistics has the potential to go beyond the boundaries of its field. This is possible by using a variety of research strategies and analyzing people's real-life experiences to find out how language affects different parts of their daily lives. Therefore, in this conference, discussing the logic of employing a constructivist GT strategy along with critical discourse analysis (CDA) in this research, I intend to discuss the achieved results.

Keywords: cultural adapttaion, language policy, language ideology, cultural hegemony, transdisciplinary research, constructivist grounded theory, critical discourse analysis

Procedia PDF Downloads 61
892 Introducing and Effectiveness Evaluation of Innovative Logistics System Simulation Teaching: Theoretical Integration and Verification

Authors: Tsai-Pei Liu, Zhi-Rou Zheng, Tzu-Tzu Wen

Abstract:

Innovative logistics system simulation teaching is to extract the characteristics of the system through simulation methodology. The system has randomness and interaction problems in the execution time. Therefore, the simulation model can usually deal with more complex logistics process problems, giving students different learning modes. Students have more autonomy in learning time and learning progress. System simulation has become a new educational tool, but it still needs to accept many tests to use it in the teaching field. Although many business management departments in Taiwan have started to promote, this kind of simulation system teaching is still not popular, and the prerequisite for popularization is to be supported by students. This research uses an extension of Integration Unified Theory of Acceptance and Use of Technology (UTAUT2) to explore the acceptance of students in universities of science and technology to use system simulation as a learning tool. At the same time, it is hoped that this innovation can explore the effectiveness of the logistics system simulation after the introduction of teaching. The results indicated the significant influence of performance expectancy, social influence and learning value on students’ intention towards confirmed the influence of facilitating conditions and behavioral intention. The extended UTAUT2 framework helps in understanding students’ perceived value in the innovative logistics system teaching context.

Keywords: UTAUT2, logistics system simulation, learning value, Taiwan

Procedia PDF Downloads 106
891 Current Methods for Drug Property Prediction in the Real World

Authors: Jacob Green, Cecilia Cabrera, Maximilian Jakobs, Andrea Dimitracopoulos, Mark van der Wilk, Ryan Greenhalgh

Abstract:

Predicting drug properties is key in drug discovery to enable de-risking of assets before expensive clinical trials and to find highly active compounds faster. Interest from the machine learning community has led to the release of a variety of benchmark datasets and proposed methods. However, it remains unclear for practitioners which method or approach is most suitable, as different papers benchmark on different datasets and methods, leading to varying conclusions that are not easily compared. Our large-scale empirical study links together numerous earlier works on different datasets and methods, thus offering a comprehensive overview of the existing property classes, datasets, and their interactions with different methods. We emphasise the importance of uncertainty quantification and the time and, therefore, cost of applying these methods in the drug development decision-making cycle. To the best of the author's knowledge, it has been observed that the optimal approach varies depending on the dataset and that engineered features with classical machine learning methods often outperform deep learning. Specifically, QSAR datasets are typically best analysed with classical methods such as Gaussian Processes, while ADMET datasets are sometimes better described by Trees or deep learning methods such as Graph Neural Networks or language models. Our work highlights that practitioners do not yet have a straightforward, black-box procedure to rely on and sets a precedent for creating practitioner-relevant benchmarks. Deep learning approaches must be proven on these benchmarks to become the practical method of choice in drug property prediction.

Keywords: activity (QSAR), ADMET, classical methods, drug property prediction, empirical study, machine learning

Procedia PDF Downloads 77
890 Accelerating Molecular Dynamics Simulations of Electrolytes with Neural Network: Bridging the Gap between Ab Initio Molecular Dynamics and Classical Molecular Dynamics

Authors: Po-Ting Chen, Santhanamoorthi Nachimuthu, Jyh-Chiang Jiang

Abstract:

Classical molecular dynamics (CMD) simulations are highly efficient for material simulations but have limited accuracy. In contrast, ab initio molecular dynamics (AIMD) provides high precision by solving the Kohn–Sham equations yet requires significant computational resources, restricting the size of systems and time scales that can be simulated. To address these challenges, we employed NequIP, a machine learning model based on an E(3)-equivariant graph neural network, to accelerate molecular dynamics simulations of a 1M LiPF6 in EC/EMC (v/v 3:7) for Li battery applications. AIMD calculations were initially conducted using the Vienna Ab initio Simulation Package (VASP) to generate highly accurate atomic positions, forces, and energies. This data was then used to train the NequIP model, which efficiently learns from the provided data. NequIP achieved AIMD-level accuracy with significantly less training data. After training, NequIP was integrated into the LAMMPS software to enable molecular dynamics simulations of larger systems over longer time scales. This method overcomes the computational limitations of AIMD while improving the accuracy limitations of CMD, providing an efficient and precise computational framework. This study showcases NequIP’s applicability to electrolyte systems, particularly for simulating the dynamics of LiPF6 ionic mixtures. The results demonstrate substantial improvements in both computational efficiency and simulation accuracy, highlighting the potential of machine learning models to enhance molecular dynamics simulations.

Keywords: lithium-ion batteries, electrolyte simulation, molecular dynamics, neural network

Procedia PDF Downloads 1
889 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 86
888 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 143
887 Implementation of A Treatment Escalation Plan During The Covid 19 Outbreak in Aneurin Bevan University Health Board

Authors: Peter Collett, Mike Pynn, Haseeb Ur Rahman

Abstract:

For the last few years across the UK there has been a push towards implementing treatment escalation plans (TEP) for every patient admitted to hospital. This is a paper form which is completed by a junior doctor then countersigned by the consultant responsible for the patient's care. It is designed to address what level of care is appropriate for the patient in question at point of entry to hospital. It helps decide whether the patient would benefit for ward based, high dependency or intensive care. They are completed to ensure the patient's best interests are maintained and aim to facilitate difficult decisions which may be required at a later date. For example, a frail patient with significant co-morbidities, unlikely to survive a pathology requiring an intensive care admission is admitted to hospital the decision can be made early to state the patient would not benefit from an ICU admission. This decision can be reversed depending on the clinical course of the patient's admission. It promotes discussions with the patient regarding their wishes to receive certain levels of healthcare. This poster describes the steps taken in the Aneurin Bevan University Health Board (ABUHB) when implementing the TEP form. The team implementing the TEP form campaigned for it's use to the board of directors. The directors were eager to hear of experiences of other health boards who had implemented the TEP form. The team presented the data produced in a number of health boards and demonstrated the proposed form. Concern was raised regarding the legalities of the form and that it could upset patients and relatives if the form was not explained properly. This delayed the effectuation of the TEP form and further research and discussion would be required. When COVID 19 reached the UK the National Institute for Health and Clinical Excellence issued guidance stating every patient admitted to hospital should be issued a TEP form. The TEP form was accelerated through the vetting process and was approved with immediate effect. The TEP form in ABUHB has now been in circulation for a month. An audit investigating it's uptake and a survey gathering opinions have been conducted.

Keywords: acute medicine, clinical governance, intensive care, patient centered decision making

Procedia PDF Downloads 173
886 First Occurrence of Histopathological Assessment in Gadoid Deep-Fish Phycis blennoides from the Southwestern Mediterranean Sea

Authors: Zakia Alioua, Amira Soumia, Zerouali-Khodja Fatiha

Abstract:

In spite of a wide variety of contaminants such as heavy metals and organic compounds in addition to the importance of extended pollution, the deep-sea and its species are not in haven and being affected through contaminants exposure. This investigation is performed in order to provide data on the presence of pathological changes in the liver and gonads of the greater forkbeard. A total of 998 specimens of the teleost fish Phycis blennoides Brünnich, 1768 ranged from 5,7 to 62,7 cm in total length, were obtained from the commercial fisheries of Algerian ports. The sampling has been carried out monthly from December 2013 to June 2015 and from January to June 2016 caught by trawlers and longlines between 75 and 600 fathoms in the coast of Algeria. Individuals were sexed their gonads, and their livers were removed and processed for light microscopy and one case of atresia was identified. In whole, overall 0,002% of the specimens presented some degree of liver steatosis. For the gastric section, 442 selected stomachs contents were observed looking for parasitic infestation and enumerate 212 nematodes. A prospecting survey for metal contaminant was performed on the liver by atomic absorption spectrophotometry analysis.

Keywords: atresia, coast of Algeria, histopathology, nematode, Phycis blennoides, steatosis

Procedia PDF Downloads 227
885 Understanding the Complex Relationship Between Economic Independency and Intimate Partner Violence by Applying a Socio-Ecological Analysis Framework

Authors: Suzanne Bouma

Abstract:

In the Netherlands, the assumed causal relationship between employment, economic independence and individual freedom of choice has been extended to the approach of intimate partner violence (IPV). In the interests of combating IPV, it is crucial to further investigate this relationship. Based on a literature review, this article shows that the relationship between economic independence and IPV is highly complex. To unravel this complex relationship, a socio-ecological analysis framework has been applied. First, it is a layered relation, in where employment does not necessarily lead to economic independence, which can be explained by social inequalities. Second, the relation is bidirectional, where women do not by definition have access to their own financial recourses due to tactics of financial control by the intimate partner. This reveals the coexistence of IPV and economic abuse and the extent to which an intimate relationship affects the scope for individual choice. Third, there is a paradoxical relationship in which employment is both a protective and risk factor for IPV. This, in turn, cannot be separated from traditional norms about masculinity and femininity, where men occupy a position of power and derive status from being the breadwinner. These findings imply that not only the approach to IPV but also the labor market policy requires a gender-sensitive approach.

Keywords: intimate partner violence, economic independence, literature review, socio-ecological analysis framework

Procedia PDF Downloads 227
884 Imposing Speed Constraints on Arrival Flights: Case Study for Changi Airport

Authors: S. Aneeka, S.M. Phyoe, R. Guo, Z.W. Zhong

Abstract:

Arrival flights tend to spend long waiting times at holding stacks if the arrival airport is congested. However, the waiting time spent in the air in the vicinity of the arrival airport may be reduced if the delays are distributed to the cruising phase of the arrival flights by means of speed control. Here, a case study was conducted for the flights arriving at Changi Airport. The flights that were assigned holdings were simulated to fly at a reduced speed during the cruising phase. As the study involves a single airport and is limited to imposing speed constraints to arrivals within 200 NM from its location, the simulation setup in this study could be considered as an application of the Extended Arrival Management (E-AMAN) technique, which is proven to result in considerable fuel savings and more efficient management of delays. The objective of this experiment was to quantify the benefits of imposing cruise speed constraints to arrivals at Changi Airport and to assess the effects on controllers’ workload. The simulation results indicated considerable fuel savings, reduced aircraft emissions and reduced controller workload.

Keywords: aircraft emissions, air traffic flow management, controller workload, fuel consumption

Procedia PDF Downloads 141
883 Cross Matching: An Improved Method to Obtain Comprehensive and Consolidated Evidence

Authors: Tuula Heinonen, Wilhelm Gaus

Abstract:

At present safety, assessment starts with animal tests although their predictivity is often poor. Even after extended human use experimental data are often judged as the core information for risk assessment. However, the best opportunity to generate true evidence is to match all available information. Cross matching methodology combines the different fields of knowledge and types of data (e.g. in-vitro and in-vivo experiments, clinical observations, clinical and epidemiological studies, and daily life observations) and gives adequate weight to individual findings. To achieve a consolidated outcome, the information from all available sources is analysed and compared with each other. If single pieces of information fit together a clear picture becomes visible. If pieces of information are inconsistent or contradictory careful consideration is necessary. 'Cross' can be understood as 'orthographic' in geometry or as 'independent' in mathematics. Results coming from different sources bring independent and; therefore, they result in new information. Independent information gives a larger contribution to evidence than results coming repeatedly from the same source. A successful example of cross matching is the assessment of Ginkgo biloba where we were able to come to the conclusive result: Ginkgo biloba leave extract is well tolerated and safe for humans.

Keywords: cross-matching, human use, safety assessment, Ginkgo biloba leave extract

Procedia PDF Downloads 278
882 Genesis and Achievements of Madhesh Movement in Nepal

Authors: Deepak Chaudhary

Abstract:

The main objective of the study is to explore the genesis and achievements of the Madhesh movement. Madhesh Movement is a social movement that brought massive political changes and contributed a lot to the nation-building process in the modern history of Nepal. This movement erupted in January 2007 in the Tarai/Madhesh region following the promulgation of the Interim Constitution that left the incorporation of federalism and proportional representation in the Constitution. The most excluded community in Nepal- Madheshi community, seemed to have angered against state-sponsored discrimination and exclusion that have been occurred for centuries. Since Madheshis were treated as non-Nepali, though the history of Nepal’s Tarai/Madhesh has been ancient. In the beginning, this movement was against Maoist, but later, it went against the state's prejudices and discriminations. It extended across the Tarai/Madhesh region of Nepal for a month. The movement was spontaneous to a large extent. A researcher himself is a witness to the movement. Key Informant Interviews with participants, including politicians, journalists, and activists, have mainly carried out for the study. This movement ensured Madheshi identity first. Secondly, the number of electoral constituencies was increased as it reached 120 in Tarai/Madhesh while it was 80 only. As a result, Madheshi representation in the Constitution Assembly reached 35 %, while it was 20% only. The main thing that this movement played a major role in ensuring the federalism as a political system in Nepal.

Keywords: dignity, exclusion, federalism, inclusion, Madhesh movement, nation-building

Procedia PDF Downloads 164
881 Attention Based Fully Convolutional Neural Network for Simultaneous Detection and Segmentation of Optic Disc in Retinal Fundus Images

Authors: Sandip Sadhukhan, Arpita Sarkar, Debprasad Sinha, Goutam Kumar Ghorai, Gautam Sarkar, Ashis K. Dhara

Abstract:

Accurate segmentation of the optic disc is very important for computer-aided diagnosis of several ocular diseases such as glaucoma, diabetic retinopathy, and hypertensive retinopathy. The paper presents an accurate and fast optic disc detection and segmentation method using an attention based fully convolutional network. The network is trained from scratch using the fundus images of extended MESSIDOR database and the trained model is used for segmentation of optic disc. The false positives are removed based on morphological operation and shape features. The result is evaluated using three-fold cross-validation on six public fundus image databases such as DIARETDB0, DIARETDB1, DRIVE, AV-INSPIRE, CHASE DB1 and MESSIDOR. The attention based fully convolutional network is robust and effective for detection and segmentation of optic disc in the images affected by diabetic retinopathy and it outperforms existing techniques.

Keywords: attention-based fully convolutional network, optic disc detection and segmentation, retinal fundus image, screening of ocular diseases

Procedia PDF Downloads 140
880 Damage Identification Using Experimental Modal Analysis

Authors: Niladri Sekhar Barma, Satish Dhandole

Abstract:

Damage identification in the context of safety, nowadays, has become a fundamental research interest area in the field of mechanical, civil, and aerospace engineering structures. The following research is aimed to identify damage in a mechanical beam structure and quantify the severity or extent of damage in terms of loss of stiffness, and obtain an updated analytical Finite Element (FE) model. An FE model is used for analysis, and the location of damage for single and multiple damage cases is identified numerically using the modal strain energy method and mode shape curvature method. Experimental data has been acquired with the help of an accelerometer. Fast Fourier Transform (FFT) algorithm is applied to the measured signal, and subsequently, post-processing is done in MEscopeVes software. The two sets of data, the numerical FE model and experimental results, are compared to locate the damage accurately. The extent of the damage is identified via modal frequencies using a mixed numerical-experimental technique. Mode shape comparison is performed by Modal Assurance Criteria (MAC). The analytical FE model is adjusted by the direct method of model updating. The same study has been extended to some real-life structures such as plate and GARTEUR structures.

Keywords: damage identification, damage quantification, damage detection using modal analysis, structural damage identification

Procedia PDF Downloads 112
879 Utilizing Extended Reality in Disaster Risk Reduction Education: A Scoping Review

Authors: Stefano Scippo, Damiana Luzzi, Stefano Cuomo, Maria Ranieri

Abstract:

Background: In response to the rise in natural disasters linked to climate change, numerous studies on Disaster Risk Reduction Education (DRRE) have emerged since the '90s, mainly using a didactic transmission-based approach. Effective DRRE should align with an interactive, experiential, and participatory educational model, which can be costly and risky. A potential solution is using simulations facilitated by eXtended Reality (XR). Research Question: This study aims to conduct a scoping review to explore educational methodologies that use XR to enhance knowledge among teachers, students, and citizens about environmental risks, natural disasters (including climate-related ones), and their management. Method: A search string of 66 keywords was formulated, spanning three domains: 1) education and target audience, 2) environment and natural hazards, and 3) technologies. On June 21st, 2023, the search string was used across five databases: EBSCOhost, IEEE Xplore, PubMed, Scopus, and Web of Science. After deduplication and removing papers without abstracts, 2,152 abstracts (published between 2013 and 2023) were analyzed and 2,062 papers were excluded, followed by the exclusion of 56 papers after full-text scrutiny. Excluded studies focused on unrelated technologies, non-environmental risks, and lacked educational outcomes or accessible texts. Main Results: The 34 reviewed papers were analyzed for context, risk type, research methodology, learning objectives, XR technology use, outcomes, and educational affordances of XR. Notably, since 2016, there has been a rise in scientific publications, focusing mainly on seismic events (12 studies) and floods (9), with a significant contribution from Asia (18 publications), particularly Japan (7 studies). Methodologically, the studies were categorized into empirical (26) and non-empirical (8). Empirical studies involved user or expert validation of XR tools, while non-empirical studies included systematic reviews and theoretical proposals without experimental validation. Empirical studies were further classified into quantitative, qualitative, or mixed-method approaches. Six qualitative studies involved small groups of users or experts, while 20 quantitative or mixed-method studies used seven different research designs, with most (17) employing a quasi-experimental, one-group post-test design, focusing on XR technology usability over educational effectiveness. Non-experimental studies had methodological limitations, making their results hypothetical and in need of further empirical validation. Educationally, the learning objectives centered on knowledge and skills for surviving natural disaster emergencies. All studies recommended XR technologies for simulations or serious games but did not develop comprehensive educational frameworks around these tools. XR-based tools showed potential superiority over traditional methods in teaching risk and emergency management skills. However, conclusions were more valid in studies with experimental designs; otherwise, they remained hypothetical without empirical evidence. The educational affordances of XR, mainly user engagement, were confirmed by the studies. Authors’ Conclusions: The analyzed literature lacks specific educational frameworks for XR in DRRE, focusing mainly on survival knowledge and skills. There is a need to expand educational approaches to include uncertainty education, developing competencies that encompass knowledge, skills, and attitudes like risk perception.

Keywords: disaster risk reduction education, educational technologies, scoping review, XR technologies

Procedia PDF Downloads 21
878 Improved Multi–Objective Firefly Algorithms to Find Optimal Golomb Ruler Sequences for Optimal Golomb Ruler Channel Allocation

Authors: Shonak Bansal, Prince Jain, Arun Kumar Singh, Neena Gupta

Abstract:

Recently nature–inspired algorithms have widespread use throughout the tough and time consuming multi–objective scientific and engineering design optimization problems. In this paper, we present extended forms of firefly algorithm to find optimal Golomb ruler (OGR) sequences. The OGRs have their one of the major application as unequally spaced channel–allocation algorithm in optical wavelength division multiplexing (WDM) systems in order to minimize the adverse four–wave mixing (FWM) crosstalk effect. The simulation results conclude that the proposed optimization algorithm has superior performance compared to the existing conventional computing and nature–inspired optimization algorithms to find OGRs in terms of ruler length, total optical channel bandwidth and computation time.

Keywords: channel allocation, conventional computing, four–wave mixing, nature–inspired algorithm, optimal Golomb ruler, lévy flight distribution, optimization, improved multi–objective firefly algorithms, Pareto optimal

Procedia PDF Downloads 315
877 Empirical Investigation of Bullwhip Effect with Sensitivity Analysis in Supply Chain

Authors: Shoaib Yousaf

Abstract:

The main purpose of this research is to the empirical investigation of the bullwhip effect under sensitivity analysis in the two-tier supply chain. The simulation modeling technique has been applied in this research as a research methodology to see the sensitivity analysis of the bullwhip effect in the rice industry of Pakistan. The research comprises two case studies that have been chosen as a sample. The results of this research have confirmed that reduction in production delay reduces the bullwhip effect, which conforms to the time compressing paradigm and the significance of the reduction in production delay to lessen demand amplification. The result of this research also indicates that by increasing the value of time to adjust inventory decreases the bullwhip effect. Furthermore, by decreasing the value of alpha increases the damping effect of the exponential smoother, it is not surprising that it also reduces the bullwhip effect. Moreover, by reducing the value of time to work in progress also reduces the bullwhip effect. This research will help practitioners and operation managers to reduces the major costs of their products in three ways. They can reduce their i) inventory levels, ii) better utilize their capacity and iii) improve their forecasting techniques. However, this study is based on two tier supply chain, while in reality the supply chain has got many tiers. Hence, future work will be extended across more than two-tier supply chains.

Keywords: bullwhip effect, rice industry, supply chain dynamics, simulation, sensitivity analysis

Procedia PDF Downloads 140
876 Some Reasons for the Pervasiveness of the Blood Feud among Albanians: An Albanian Phenomenon or Lack of Malfunction of the Judicial Structure

Authors: Arburim Iseni, Afrim Aliti, Nagri Rexhepi

Abstract:

The blood feud or blood-taking is a social obligation to commit murder in order to salvage honor questioned by an earlier murder or moral humiliation. This social obligation is still preserved as a stub among Albanians when honor is violated. By the term honor are understood many things, such as honor to the family, house, guest, property, etc. Many Albanian family members are forced to stay locked up at home because of the blood killing, whereas other families abandon their houses and migrate to other places. Nonetheless, Albanians maintain close ties with their extended families, clans, and tribes and thus chances are high that the violence can beget more violence and without reconciliation of the blood these families will always be endangered. One of the reasons for the pervasiveness of the blood feud is the poor social conditions, political imbroglio and the power vacuum which comes from the corrupted and judiciary system of the state. Contrary to this, Albanian blood feud is not a phenomenon present only to the Albanians, but it also takes place in some other cultures and nations, such as: Chechens, Montenegrins, Serbians, and lately more radical one is between Amman and Israel who are at constant feud.

Keywords: honor, blood feud, reconciliation, power vacuum, poor social conditions, political imbroglio

Procedia PDF Downloads 450
875 An Experimental Investigation on Explosive Phase Change of Liquefied Propane During a Bleve Event

Authors: Frederic Heymes, Michael Albrecht Birk, Roland Eyssette

Abstract:

Boiling Liquid Expanding Vapor Explosion (BLEVE) has been a well know industrial accident for over 6 decades now, and yet it is still poorly predicted and avoided. BLEVE is created when a vessel containing a pressure liquefied gas (PLG) is engulfed in a fire until the tank rupture. At this time, the pressure drops suddenly, leading the liquid to be in a superheated state. The vapor expansion and the violent boiling of the liquid produce several shock waves. This works aimed at understanding the contribution of vapor ad liquid phases in the overpressure generation in the near field. An experimental work was undertaken at a small scale to reproduce realistic BLEVE explosions. Key parameters were controlled through the experiments, such as failure pressure, fluid mass in the vessel, and weakened length of the vessel. Thirty-four propane BLEVEs were then performed to collect data on scenarios similar to common industrial cases. The aerial overpressure was recorded all around the vessel, and also the internal pressure changed during the explosion and ground loading under the vessel. Several high-speed cameras were used to see the vessel explosion and the blast creation by shadowgraph. Results highlight how the pressure field is anisotropic around the cylindrical vessel and highlights a strong dependency between vapor content and maximum overpressure from the lead shock. The time chronology of events reveals that the vapor phase is the main contributor to the aerial overpressure peak. A prediction model is built upon this assumption. Secondary flow patterns are observed after the lead. A theory on how the second shock observed in experiments forms is exposed thanks to an analogy with numerical simulation. The phase change dynamics are also discussed thanks to a window in the vessel. Ground loading measurements are finally presented and discussed to give insight into the order of magnitude of the force.

Keywords: phase change, superheated state, explosion, vapor expansion, blast, shock wave, pressure liquefied gas

Procedia PDF Downloads 75
874 Subsidiary Entrepreneurial Orientation, Trust in Headquarters and Performance: The Mediating Role of Autonomy

Authors: Zhang Qingzhong

Abstract:

Though there exists an increasing number of research studies on the headquarters-subsidiary relationship, and within this context, there is a focus on subsidiaries' contributory role to multinational corporations (MNC), subsidiary autonomy, and the conditions under which autonomy exerts an effect on subsidiary performance still constitute a subject of debate in the literature. The objective of this research is to study the MNC subsidiary autonomy and performance relationship and the effect of subsidiary entrepreneurial orientation and trust on subsidiary autonomy in the China environment, a phenomenon that has not yet been studied. The research addresses the following three questions: (i) Is subsidiary autonomy associated with MNC subsidiary performance in the China environment? (ii) How do subsidiary entrepreneurship and its trust in headquarters affect the level of subsidiary autonomy and its relationship with subsidiary performance? (iii) Does subsidiary autonomy have a mediating effect on subsidiary performance with subsidiary’s entrepreneurship and trust in headquarters? In the present study, we have reviewed literature and conducted semi-structured interviews with multinational corporation (MNC) subsidiary senior executives in China. Building on our insights from the interviews and taking perspectives from four theories, namely the resource-based view (RBV), resource dependency theory, integration-responsiveness framework, and social exchange theory, as well as the extant articles on subsidiary autonomy, entrepreneurial orientation, trust, and subsidiary performance, we have developed a model and have explored the direct and mediating effects of subsidiary autonomy on subsidiary performance within the framework of the MNC. To test the model, we collected and analyzed data based on cross-industry two waves of an online survey from 102 subsidiaries of MNCs in China. We used structural equation modeling to test measurement, direct effect model, and conceptual framework with hypotheses. Our findings confirm that (a) subsidiary autonomy is positively related to subsidiary performance; (b) subsidiary entrepreneurial orientation is positively related to subsidiary autonomy; (c) subsidiary’s trust in headquarters has a positive effect on subsidiary autonomy; (d) subsidiary autonomy mediates the relationship between entrepreneurial orientation and subsidiary performance; (e) subsidiary autonomy mediates the relationship between trust and subsidiary performance. Our study highlights the important role of subsidiary autonomy in leveraging the resource of subsidiary entrepreneurial orientation and its trust relationship with headquarters to achieve high performance. We discuss the theoretical and managerial implications of the findings and propose directions for future research.

Keywords: subsidiary entrepreneurial orientation, trust, subsidiary autonomy, subsidiary performance

Procedia PDF Downloads 184
873 A Methodology to Integrate Data in the Company Based on the Semantic Standard in the Context of Industry 4.0

Authors: Chang Qin, Daham Mustafa, Abderrahmane Khiat, Pierre Bienert, Paulo Zanini

Abstract:

Nowadays, companies are facing lots of challenges in the process of digital transformation, which can be a complex and costly undertaking. Digital transformation involves the collection and analysis of large amounts of data, which can create challenges around data management and governance. Furthermore, it is also challenged to integrate data from multiple systems and technologies. Although with these pains, companies are still pursuing digitalization because by embracing advanced technologies, companies can improve efficiency, quality, decision-making, and customer experience while also creating different business models and revenue streams. In this paper, the issue that data is stored in data silos with different schema and structures is focused. The conventional approaches to addressing this issue involve utilizing data warehousing, data integration tools, data standardization, and business intelligence tools. However, these approaches primarily focus on the grammar and structure of the data and neglect the importance of semantic modeling and semantic standardization, which are essential for achieving data interoperability. In this session, the challenge of data silos in Industry 4.0 is addressed by developing a semantic modeling approach compliant with Asset Administration Shell (AAS) models as an efficient standard for communication in Industry 4.0. The paper highlights how our approach can facilitate the data mapping process and semantic lifting according to existing industry standards such as ECLASS and other industrial dictionaries. It also incorporates the Asset Administration Shell technology to model and map the company’s data and utilize a knowledge graph for data storage and exploration.

Keywords: data interoperability in industry 4.0, digital integration, industrial dictionary, semantic modeling

Procedia PDF Downloads 90
872 Application of Rapidly Exploring Random Tree Star-Smart and G2 Quintic Pythagorean Hodograph Curves to the UAV Path Planning Problem

Authors: Luiz G. Véras, Felipe L. Medeiros, Lamartine F. Guimarães

Abstract:

This work approaches the automatic planning of paths for Unmanned Aerial Vehicles (UAVs) through the application of the Rapidly Exploring Random Tree Star-Smart (RRT*-Smart) algorithm. RRT*-Smart is a sampling process of positions of a navigation environment through a tree-type graph. The algorithm consists of randomly expanding a tree from an initial position (root node) until one of its branches reaches the final position of the path to be planned. The algorithm ensures the planning of the shortest path, considering the number of iterations tending to infinity. When a new node is inserted into the tree, each neighbor node of the new node is connected to it, if and only if the extension of the path between the root node and that neighbor node, with this new connection, is less than the current extension of the path between those two nodes. RRT*-smart uses an intelligent sampling strategy to plan less extensive routes by spending a smaller number of iterations. This strategy is based on the creation of samples/nodes near to the convex vertices of the navigation environment obstacles. The planned paths are smoothed through the application of the method called quintic pythagorean hodograph curves. The smoothing process converts a route into a dynamically-viable one based on the kinematic constraints of the vehicle. This smoothing method models the hodograph components of a curve with polynomials that obey the Pythagorean Theorem. Its advantage is that the obtained structure allows computation of the curve length in an exact way, without the need for quadratural techniques for the resolution of integrals.

Keywords: path planning, path smoothing, Pythagorean hodograph curve, RRT*-Smart

Procedia PDF Downloads 164
871 Women's Pathways to Prison in Thailand

Authors: Samantha Jeffries, Chontit Chuenurah

Abstract:

Thailand incarcerates the largest number of women and has the highest female incarceration rate in South East Asia. Since the 1990s, there has been a substantial increase in the number, rate and proportion of women imprisoned. Thailand places a high priority on the gender specific contexts out of which offending arises and the different needs of women in the criminal justice system. This is manifested in work undertaken to guide the development of the United Nations Rules for the Treatment of Women Prisoners and Non-Custodial Measures for Women Offenders (the Bangkok Rules); adopted by the United Nations General Assembly in 2010. The Bangkok Rules make a strong statement about Thailand’s recognition of and commitment to the fair and equitable treatment of women throughout their contact with the criminal justice system including at sentencing and in prison. This makes the comparatively high use of imprisonment for women in Thailand particularly concerning and raises questions about the relationship between gender, crime and criminal justice. While there is an extensive body of research in Western jurisdictions exploring women’s pathways to prison, there is a relative dearth of methodologically robust research examining the possible gendered circumstances leading to imprisonment in Thailand. In this presentation, we will report preliminary findings from a qualitative study of women’s pathways to prison in Thailand. Our research aims were to ascertain: 1) the type, frequency, and context of criminal behavior that led to women’s incarceration, 2) women’s experiences of the criminal justice system, 3) the broader life experiences and circumstances that led women to prison in Thailand. In-depth life history interviews (n=77) were utilized to gain a comprehensive understanding of women’s journeys into prison. The interview schedule was open-ended consisting of prisoner responses to broad discussion topics. This approach provided women with the opportunity to describe significant experiences in their lives, to bring together distinct chronologies of events, and to analyze links between their varied life experiences, offending, and incarceration. Analyses showed that women’s journey’s to prison take one of eight pathways which tentatively labelled as follows, the: 1) harmed and harming pathway, 2) domestic/family violence victimization pathway, 3) drug connected pathway, 4) street woman pathway, 5) economically motivated pathway, 6) jealousy anger and/or revenge pathway, 7) naivety pathway, 8) unjust and/or corrupted criminal justice pathway. Each will be fully discussed during the presentation. This research is significant because it is the first in-depth methodologically robust exploration of women’s journeys to prison in Thailand and one of a few studies to explore gendered pathways outside of western contexts. Understanding women’s pathways into Thailand’s prisons is crucial to the development of effective planning, policy and program responses not only while women are in prison but also post-release. To best meet women’s needs in prison and effectively support their reintegration, we must have a comprehensive understanding of who these women are, what offenses they commit, the reasons that trigger their confrontations with the criminal justice system and the impact of the criminal justice system on them.

Keywords: pathways, prison, women, Thailand

Procedia PDF Downloads 244
870 The Influence of C Element on the Phase Transformation in Weldment of Complex Stainless Steels 2507/316/316L

Authors: Lin Dong-Yih, Yang S. M., Huang B. W., Lian J. A.

Abstract:

Super duplex stainless steel has excellent mechanical properties and corrosion resistance. It becomes important structural material as its application has been extended to the fields such as renewable energy and the chemical industry because of its excellent properties. As examples are offshore wind power, solar cell machinery, and pipes in the chemical industry. The mechanical properties and corrosion resistance of super duplex stainless steel can be eliminated by welding due to the precipitation of the hard and brittle σ phase, which is rich of chromium, and molybdenum elements. This paper studies the influence of carbon element on the phase transformation of -ferrite and σ phase in 2507 super duplex stainless steel. The 2507 will be under argon gas protection welded with 316 and 316L extra low carbon stainless steel separately. The microstructural phases of stainless steels before and after welding, in fusion, heat affected zones, and base material will be studied via X-ray, OM, SEM, EPMA i.e. their quantity, size, distribution, and morphology. The influences of diffusion by carbon element will be compared according to the microstructures, hardness, and corrosion tests.

Keywords: complex stainless steel, welding, phase formation, carbon element, sigma phase, delta ferrite

Procedia PDF Downloads 97
869 Comparison Study between Deep Mixed Columns and Encased Sand Column for Soft Clay Soil in Egypt

Authors: Walid El Kamash

Abstract:

Sand columns (or granular piles) can be employed as soil strengthening for flexible constructions such as road embankments, oil storage tanks in addition to multistory structures. The challenge of embedding the sand columns in soft soil is that the surrounding soft soil cannot avail the enough confinement stress in order to keep the form of the sand column. Therefore, the sand columns which were installed in such soil will lose their ability to perform needed load-bearing capacity. The encasement, besides increasing the strength and stiffness of the sand column, prevents the lateral squeezing of sands when the column is installed even in extremely soft soils, thus enabling quicker and more economical installation. This paper investigates the improvement in load capacity of the sand column by encasement through a comprehensive parametric study using the 3-D finite difference analysis for the soft clay of soil in Egypt. Moreover, the study was extended to include a comparison study between encased sand column and Deep Mixed columns (DM). The study showed that confining the sand by geosynthetic resulted in an increment of shear strength. That result paid the attention to use encased sand stone rather than deep mixed columns due to relative high permeability of the first material.

Keywords: encased sand column, Deep mixed column, numerical analysis, improving soft soil

Procedia PDF Downloads 374
868 Intercultural Education through Literature Reception: An in-Depth Study of the Cultural and Literary Relations of Romania and China during 1948-2018

Authors: Iulia Elena Gîță

Abstract:

According to the sociological theory of literature, constraints on the creation and share of cultural works can be placed between two extremes: one with a high level of politicization and the other with a high level of commercialization. The overall objective of the present research is to follow the principles of Sociology of Translation to closely map and analyse the publishing activity of Romania concerning China and Chinese literature during four stages of Romanian history between 1948-2018. This paper proposes, thus, an extended approach to literature, to its cultural, political and economic reception. In achieving the proposed objectives, the research expands far beyond the literary text itself, to its macro context, analysing, through quantitative research methods, a statistical database created based on two phases - the first part containing literary and non-fictional works that address and discuss issues related to China; the second part includes literary translations of Chinese literature into Romanian, either by direct translation or by an intermediate language. Throughout this paper we will map not only the number of works, but also the topics approached by writers along the two periods of the political life of Romania.

Keywords: bilateral relations, Chinese literature, intercultural understanding, international relations, socio-cultural reception, socio-political constraints, publishing

Procedia PDF Downloads 129