Search results for: military operations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2195

Search results for: military operations

845 The Position of Space weather in Africa-Education and Outreach

Authors: Babagana Abubakar, Alhaji Kuya

Abstract:

Although the field of Space weather science is a young field among the space sciences, but yet history has it that activities related to this science began since the year 1859 when the great solar storm happened which resulted in the disruptions of telegraphs operations around the World at that particular time subsequently making it possible for the scientist Richard Carrington to be able to connect the Solar flare observed a day earlier before the great storm and the great deflection of the Earth’s Magnetic field (geometric storm) simultaneous with the telegraph disruption. However years later as at today with the advent of and the coming into existence of the Explorer 1, the Luna 1 and the establishments of the United States International Space Weather Program, International Geophysical Year (IGY) as well as the International Center for Space Weather Sciences and Education (ICSWSE) have made us understand the Space weather better and enable us well define the field of Space weather science. Despite the successes recorded in the development of Space sciences as a whole over the last century and the coming onboard of specialized bodies/programs on space weather like the International Space Weather Program and the ICSWSE, the majority of Africans including institutions, research organizations and even some governments are still ignorant about the existence of theSpace weather science,because apart from some very few countries like South Africa, Nigeria and Egypt among some few others the majority of the African nations and their academic institutions have no knowledge or idea about the existence of this field of Space science (Space weather).

Keywords: Africa, space, weather, education, science

Procedia PDF Downloads 444
844 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 674
843 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria

Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi

Abstract:

Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.

Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization

Procedia PDF Downloads 284
842 Leveraging Digital Transformation Initiatives and Artificial Intelligence to Optimize Readiness and Simulate Mission Performance across the Fleet

Authors: Justin Woulfe

Abstract:

Siloed logistics and supply chain management systems throughout the Department of Defense (DOD) has led to disparate approaches to modeling and simulation (M&S), a lack of understanding of how one system impacts the whole, and issues with “optimal” solutions that are good for one organization but have dramatic negative impacts on another. Many different systems have evolved to try to understand and account for uncertainty and try to reduce the consequences of the unknown. As the DoD undertakes expansive digital transformation initiatives, there is an opportunity to fuse and leverage traditionally disparate data into a centrally hosted source of truth. With a streamlined process incorporating machine learning (ML) and artificial intelligence (AI), advanced M&S will enable informed decisions guiding program success via optimized operational readiness and improved mission success. One of the current challenges is to leverage the terabytes of data generated by monitored systems to provide actionable information for all levels of users. The implementation of a cloud-based application analyzing data transactions, learning and predicting future states from current and past states in real-time, and communicating those anticipated states is an appropriate solution for the purposes of reduced latency and improved confidence in decisions. Decisions made from an ML and AI application combined with advanced optimization algorithms will improve the mission success and performance of systems, which will improve the overall cost and effectiveness of any program. The Systecon team constructs and employs model-based simulations, cutting across traditional silos of data, aggregating maintenance, and supply data, incorporating sensor information, and applying optimization and simulation methods to an as-maintained digital twin with the ability to aggregate results across a system’s lifecycle and across logical and operational groupings of systems. This coupling of data throughout the enterprise enables tactical, operational, and strategic decision support, detachable and deployable logistics services, and configuration-based automated distribution of digital technical and product data to enhance supply and logistics operations. As a complete solution, this approach significantly reduces program risk by allowing flexible configuration of data, data relationships, business process workflows, and early test and evaluation, especially budget trade-off analyses. A true capability to tie resources (dollars) to weapon system readiness in alignment with the real-world scenarios a warfighter may experience has been an objective yet to be realized to date. By developing and solidifying an organic capability to directly relate dollars to readiness and to inform the digital twin, the decision-maker is now empowered through valuable insight and traceability. This type of educated decision-making provides an advantage over the adversaries who struggle with maintaining system readiness at an affordable cost. The M&S capability developed allows program managers to independently evaluate system design and support decisions by quantifying their impact on operational availability and operations and support cost resulting in the ability to simultaneously optimize readiness and cost. This will allow the stakeholders to make data-driven decisions when trading cost and readiness throughout the life of the program. Finally, sponsors are available to validate product deliverables with efficiency and much higher accuracy than in previous years.

Keywords: artificial intelligence, digital transformation, machine learning, predictive analytics

Procedia PDF Downloads 157
841 Open and Distance Learning (ODL) Education in Nigeria: Challenge of Academic Quality

Authors: Edu Marcelina, Sule Sheidu A., Nsor Eunice

Abstract:

As open and distance education is gradually becoming an acceptable means of solving the problem of access in higher education, quality has now become one of the main concerns among institutions and stakeholders of open and distance learning (ODL) and the education sector in general. This study assessed the challenges of academic quality in the open and distance learning (ODL) education in Nigeria using Distance Learning Institute (DLI), University of Lagos and National Open University of Nigeria as a case. In carrying out the study, a descriptive survey research design was employed. A researcher-designed and validated questionnaire was used to elicit responses that translated to the quantitative data for this study. The sample comprised 665 students of the Distance Learning Institute (DLI), and National Open University of Nigeria (NOUN), carefully selected through the method of simple random sampling. Data collected from the study were analyzed using Chi-Square (X2) at 0.05 Level of significance. The results of the analysis revealed that; the use of ICT tools is a factor in ensuring quality in the Open and Distance Learning (ODL) operations; the quality of the materials made available to ODL students will determine the quality of education that will be received by the students; and the time scheduled for students for self-study, online lecturing/interaction and face to face study and the quality of education in Open and Distance Learning Institutions has a lot of impact on the quality of education the students receive. Based on the findings, a number of recommendations were made.

Keywords: open and distance learning, quality, ICT, face-to-face interaction

Procedia PDF Downloads 369
840 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: college entrance examination, higher education, education policy, education equality

Procedia PDF Downloads 372
839 The Characteristics of Quantity Operation for 2nd and 3rd Grade Mathematics Slow Learners

Authors: Pi-Hsia Hung

Abstract:

The development of mathematical competency has individual benefits as well as benefits to the wider society. Children who begin school behind their peers in their understanding of number, counting, and simple arithmetic are at high risk of staying behind throughout their schooling. The development of effective strategies for improving the educational trajectory of these individuals will be contingent on identifying areas of early quantitative knowledge that influence later mathematics achievement. A computer-based quantity assessment was developed in this study to investigate the characteristics of 2nd and 3rd grade slow learners in quantity. The concept of quantification involves understanding measurements, counts, magnitudes, units, indicators, relative size, and numerical trends and patterns. Fifty-five tasks of quantitative reasoning—such as number sense, mental calculation, estimation and assessment of reasonableness of results—are included as quantity problem solving. Thus, quantity is defined in this study as applying knowledge of number and number operations in a wide variety of authentic settings. Around 1000 students were tested and categorized into 4 different performance levels. Students’ quantity ability correlated higher with their school math grade than other subjects. Around 20% students are below basic level. The intervention design implications of the preliminary item map constructed are discussed.

Keywords: mathematics assessment, mathematical cognition, quantity, number sense, validity

Procedia PDF Downloads 242
838 Graph Cuts Segmentation Approach Using a Patch-Based Similarity Measure Applied for Interactive CT Lung Image Segmentation

Authors: Aicha Majda, Abdelhamid El Hassani

Abstract:

Lung CT image segmentation is a prerequisite in lung CT image analysis. Most of the conventional methods need a post-processing to deal with the abnormal lung CT scans such as lung nodules or other lesions. The simplest similarity measure in the standard Graph Cuts Algorithm consists of directly comparing the pixel values of the two neighboring regions, which is not accurate because this kind of metrics is extremely sensitive to minor transformations such as noise or other artifacts problems. In this work, we propose an improved version of the standard graph cuts algorithm based on the Patch-Based similarity metric. The boundary penalty term in the graph cut algorithm is defined Based on Patch-Based similarity measurement instead of the simple intensity measurement in the standard method. The weights between each pixel and its neighboring pixels are Based on the obtained new term. The graph is then created using theses weights between its nodes. Finally, the segmentation is completed with the minimum cut/Max-Flow algorithm. Experimental results show that the proposed method is very accurate and efficient, and can directly provide explicit lung regions without any post-processing operations compared to the standard method.

Keywords: graph cuts, lung CT scan, lung parenchyma segmentation, patch-based similarity metric

Procedia PDF Downloads 165
837 Investigating the Causes of Human Error-Induced Incidents in the Maintenance Operations of Petrochemical Industry by Using Human Factors Analysis and Classification System

Authors: Omid Kalatpour, Mohammadreza Ajdari

Abstract:

This article studied the possible causes of human error-induced incidents in the petrochemical industry maintenance activities by using Human Factors Analysis and Classification System (HFACS). The purpose of the study was anticipating and identifying these causes and proposing corrective and preventive actions. Maintenance department in a petrochemical company was selected for research. A checklist of human error-induced incidents was developed based on four HFACS main levels and nineteen sub-groups. Hierarchical task analysis (HTA) technique was used to identify maintenance activities and tasks. The main causes of possible incidents were identified by checklist and recorded. Corrective and preventive actions were defined depending on priority. Analyzing the worksheets of 444 activities in four levels of HFACS showed 37.6% of the causes were at the level of unsafe actions, 27.5% at the level of unsafe supervision, 20.9% at the level of preconditions for unsafe acts and 14% of the causes were at the level of organizational effects. The HFACS sub-groups showed errors (24.36%) inadequate supervision (14.89%) and violations (13.26%) with the most frequency. According to findings of this study, increasing the training effectiveness of operators and supervision improvement respectively are the most important measures in decreasing the human error-induced incidents in petrochemical industry maintenance.

Keywords: human error, petrochemical industry, maintenance, HFACS

Procedia PDF Downloads 235
836 Evaluation of Natural Gums: Gum Tragacanth, Xanthan Gum, Guar Gum and Gum Acacia as Potential Hemostatic Agents

Authors: Himanshu Kushwah, Nidhi Sandal, Meenakshi K. Chauhan, Gaurav Mittal

Abstract:

Excessive bleeding is the primary factor of avoidable death in both civilian trauma centers as well as the military battlefield. Hundreds of Indian troops die every year due to blood loss caused by combat-related injuries. These deaths are avoidable and can be prevented to a large extent by making available a suitable hemostatic dressing in an emergency medical kit. In this study, natural gums were evaluated as potential hemostatic agents in combination with calcium gluconate. The study compares the hemostatic activity of Gum Tragacanth (GT), Guar Gum (GG), Xanthan Gum (XG) and Gum Acacia (GA) by carrying out different in-vitro and in-vivo studies. In-vitro studies were performed using the Lee-White method and Eustrek method, which includes the visual and microscopic analysis of blood clotting. MTT assay was also performed using human lymphocytes to check the cytotoxicity of the gums. The in-vivo studies were performed in Sprague Dawley rats using tail bleeding assay to evaluate the hemostatic efficacy of the gums and compared with a commercially available hemostatic sponge, Surgispon. Erythrocyte agglutination test was also performed to check the interaction between blood cells and the natural gums. Other parameters like blood loss, adherence strength of the developed hemostatic dressing material incorporating these gums, re-bleeding, and survival of the animals were also studied. The data obtained from the MTT assay showed that Guar gum, Gum Tragacanth, and Gum Acacia were not significantly cytotoxic, but substantial cytotoxicity was observed in Xanthan gum samples at high concentrations. Also, Xanthan gum took the least time with its minimum concentration to achieve hemostasis, (approximately 50 seconds at 3mg concentration). Gum Tragacanth also showed efficient hemostasis at a concentration of 35mg at the same time, but the other two gums tested were not able to clot the blood in significantly less time. A sponge dressing made of Tragacanth gum was found to be more efficient in achieving hemostasis and showed better practical applicability among all the gums studied and also when compared to the commercially available product, Surgispon, thus making it a potentially better alternative.

Keywords: cytotoxicity, hemostasis, natural gums, sponge

Procedia PDF Downloads 144
835 Experimental Investigation of Air-Water Two-Phase Flow Pattern in T-Junction Microchannel

Authors: N. Rassoul-ibrahim, E. Siahmed, L. Tadrist

Abstract:

Water management plays a crucial role in the performance and durability of PEM fuel cells. Whereas the membrane must be hydrated enough, liquid droplets formed by water in excess can block the flow in the gas distribution channels and hinder the fuel cell performance. The main purpose of this work is to increase the understanding of liquid transport and mixing through mini- or micro-channels for various engineering or medical process applications including cool-ing of equipment according to the operations considered. For that purpose and as a first step, a technique was devel-oped to automatically detect and characterize two-phase flow patterns that may appear in such. The investigation, mainly experimental, was conducted on transparent channel with a 1mm x 1mm square cross section and a 0.3mm x 0.3 mm water injection normal to the gas channel. Three main flow patterns were identified liquid slug, bubble flow and annular flow. A flow map has been built accord-ing to the flow rate of both phases. As a sample the follow-ing figures show representative images of the flow struc-tures observed. An analysis and discussion of the flow pattern, in mini-channel, will be provided and compared to the case old micro-channel. . Keywords: Two phase flow, Clean Energy, Minichannels, Fuel Cells. Flow patterns, Maps.

Keywords: two phase flox, T-juncion, Micro and minichannels, clean energy, flow patterns, maps

Procedia PDF Downloads 71
834 Information Requirements for Vessel Traffic Service Operations

Authors: Fan Li, Chun-Hsien Chen, Li Pheng Khoo

Abstract:

Operators of vessel traffic service (VTS) center provides three different types of services; namely information service, navigational assistance and traffic organization to vessels. To provide these services, operators monitor vessel traffic through computer interface and provide navigational advice based on the information integrated from multiple sources, including automatic identification system (AIS), radar system, and closed circuit television (CCTV) system. Therefore, this information is crucial in VTS operation. However, what information the VTS operator actually need to efficiently and properly offer services is unclear. The aim of this study is to investigate into information requirements for VTS operation. To achieve this aim, field observation was carried out to elicit the information requirements for VTS operation. The study revealed that the most frequent and important tasks were handling arrival vessel report, potential conflict control and abeam vessel report. Current location and vessel name were used in all tasks. Hazard cargo information was particularly required when operators handle arrival vessel report. The speed, the course, and the distance of two or several vessels were only used in potential conflict control. The information requirements identified in this study can be utilized in designing a human-computer interface that takes into consideration what and when information should be displayed, and might be further used to build the foundation of a decision support system for VTS.

Keywords: vessel traffic service, information requirements, hierarchy task analysis, field observation

Procedia PDF Downloads 247
833 Comparative Analysis of the Treatment of the Success of the First Crusade in Modern Arab and Western Historiography

Authors: Oleg Sokolov

Abstract:

Despite the fact that the epoch of the Crusades ended more than 700 years ago, its legacy still remains relevant both in the Middle East and in the West. There was made a comparison of the positions of the most prominent Western and Arab medievalists of XX-XXI centuries, using the example of their interpretations of the success of the First Crusade. The analyzed corpus consists of 70 works. In the modern Arab Historiography, it is often pointed out that the Seljuks' struggle against the crusaders of the First Crusade was seriously hampered by the raids of the Arab Bedouin tribes of Jazira. At the same time, it is emphasized that the Arab rulers of Northern Syria were ‘pleased’ with the defeats of the Turks and made peace with the Crusaders, refusing to fight them. At the same time it is usually underlined that the Fatimid aggression against the Turks led both the first and the second to defeat from the Crusaders and became one of the main reasons for the success of the First Crusade and the Muslims' loss of Jerusalem in 1099. The position of Western historians about the reasons for the success of the First Crusade differs significantly. First of all, in the Western Historiography, it is noted that the deaths of the Fatimid and Abbasid Caliphs and the Seljuk Sultan between 1092 and 1094 years created political vacuum just before the crusaders appeared in the Middle East political arena. In 1097-1099, when the Crusaders advanced through Asia Minor, Syria and Palestine to Jerusalem, there was an active internecine struggle between the parts of the Seljuq state that had broken up by that time, and the crusaders were not perceived as a general threat of all Muslims of this region at that time. It is also pointed out that the main goals of the Crusaders - Antioch, Edessa, and Jerusalem - were at that time periphery since the main struggle for power in the Middle East was at this time in Iran. Thus, Arab historians see the lack of support from Arabs of Syria and Jazira and the aggression from Egypt as a crucial factors preventing the Seljuks from defeating the Crusaders, while their Western counterparts consider the internal power struggle between the Seljuks as a more important reason for the success of the First Crusade. The reason for this divergence in the treatment of the events of the First Crusade is probably the prevailing in much of Arab historiography, the idea of the Franks as an enemy of all peoples and religions of the Middle East. At the same time, in contemporary Western Historiography, the crusaders are described only as one of the many military and political forces that operated in this region at the end of the eleventh century.

Keywords: Arabs, Crusades, historiography, Turks

Procedia PDF Downloads 164
832 Characterization of Kevlar 29 for Multifunction Applications

Authors: Doaa H. Elgohary, Dina M. Hamoda, S. Yahia

Abstract:

Technical textiles refer to textile materials that are engineered and designed to have specific functionalities and performance characteristics beyond their traditional use as apparel or upholstery fabrics. These textiles are usually developed for their unique properties such as strength, durability, flame retardancy, chemical resistance, waterproofing, insulation and other special properties. The development and use of technical textiles are constantly evolving, driven by advances in materials science, manufacturing technologies and the demand for innovative solutions in various industries. Kevlar 29 is a type of aramid fiber developed by DuPont. It is a high-performance material known for its exceptional strength and resistance to impact, abrasion, and heat. Kevlar 29 belongs to the Kevlar family, which includes different types of aramid fibers. Kevlar 29 is primarily used in applications that require strength and durability, such as ballistic protection, body armor, and body armor for military and law enforcement personnel. It is also used in the aerospace and automotive industries to reinforce composite materials, as well as in various industrial applications. Two different Kevlar samples were used coated with cooper lithium silicate (CLS); ten different mechanical and physical properties (weight, thickness, tensile strength, elongation, stiffness, air permeability, puncture resistance, thermal conductivity, stiffness, and spray test) were conducted to approve its functional performance efficiency. The influence of different mechanical properties was statistically analyzed using an independent t-test with a significant difference at P-value = 0.05. The radar plot was calculated and evaluated to determine the best-performing samples. The results of the independent t-test observed that all variables were significantly affected by yarn counts except water permeability, which has no significant effect. All properties were evaluated for samples 1 and 2, a radar chart was used to determine the best attitude for samples. The radar chart area was calculated, which shows that sample 1 recorded the best performance, followed by sample 2. The surface morphology of all samples and the coating materials was determined using a scanning electron microscope (SEM), also Fourier Transform Infrared Spectroscopy Measurement for the two samples.

Keywords: cooper lithium silicate, independent t-test, kevlar, technical textiles.

Procedia PDF Downloads 75
831 Troubleshooting Petroleum Equipment Based on Wireless Sensors Based on Bayesian Algorithm

Authors: Vahid Bayrami Rad

Abstract:

In this research, common methods and techniques have been investigated with a focus on intelligent fault finding and monitoring systems in the oil industry. In fact, remote and intelligent control methods are considered a necessity for implementing various operations in the oil industry, but benefiting from the knowledge extracted from countless data generated with the help of data mining algorithms. It is a avoid way to speed up the operational process for monitoring and troubleshooting in today's big oil companies. Therefore, by comparing data mining algorithms and checking the efficiency and structure and how these algorithms respond in different conditions, The proposed (Bayesian) algorithm using data clustering and their analysis and data evaluation using a colored Petri net has provided an applicable and dynamic model from the point of view of reliability and response time. Therefore, by using this method, it is possible to achieve a dynamic and consistent model of the remote control system and prevent the occurrence of leakage in oil pipelines and refineries and reduce costs and human and financial errors. Statistical data The data obtained from the evaluation process shows an increase in reliability, availability and high speed compared to other previous methods in this proposed method.

Keywords: wireless sensors, petroleum equipment troubleshooting, Bayesian algorithm, colored Petri net, rapid miner, data mining-reliability

Procedia PDF Downloads 60
830 Assessment of Academic Knowledge Transfer Channels in Field of Environment

Authors: Jagul Huma Lashari, Arabella Bhutto

Abstract:

Last few years have shown increased an interest of researchers in knowledge and technology transfer. However, facts show fewer types of knowledge transfer practices in the developing countries. This article focuses on assessment transfer channels of academic research produced by highly qualified academicians working in universities in Sindh offering degrees in field of an Environment in Sindh Pakistan. The academic field has been chosen because in field of the environment there is alarming need of research into practice for sustainable development. Using case study approach; in this research qualitative interviews have been conducted from PhD faculty members working in the universities offering degrees in field of environment. Obtained data is analyzed using descriptive statistics and chi-square test with the help of statistical packages for social sciences (SPSS). Research explored 31 channels of academic knowledge transfer from detailed review of literature and exploratory interviews with participants. Identified knowledge transfer channels have been grouped together in 6 groups of knowledge transfer channels; As knowledge transfer through publications, networking, mobility of researchers, joint research, intellectual property and co-operations. Results revealed that academic knowledge have been transferred through publications, networking, and co-operation. However, less number of academic knowledge has been transferred through groups of knowledge transfer channels such as Intellectual Property and joint research.

Keywords: environment, research knowledge, transfer channels, universities

Procedia PDF Downloads 331
829 Path Planning for Orchard Robot Using Occupancy Grid Map in 2D Environment

Authors: Satyam Raikwar, Thomas Herlitzius, Jens Fehrmann

Abstract:

In recent years, the autonomous navigation of orchard and field robots is an emerging technology of the mobile robotics in agriculture. One of the core aspects of autonomous navigation builds upon path planning, which is still a crucial issue. Generally, for simple representation, the path planning for a mobile robot is performed in a two-dimensional space, which creates a path between the start and goal point. This paper presents the automatic path planning approach for robots used in orchards and vineyards using occupancy grid maps with field consideration. The orchards and vineyards are usually structured environment and their topology is assumed to be constant over time; therefore, in this approach, an RGB image of a field is used as a working environment. These images undergone different image processing operations and then discretized into two-dimensional grid matrices. The individual grid or cell of these grid matrices represents the occupancy of the space, whether it is free or occupied. The grid matrix represents the robot workspace for motion and path planning. After the grid matrix is described, a probabilistic roadmap (PRM) path algorithm is used to create the obstacle-free path over these occupancy grids. The path created by this method was successfully verified in the test area. Furthermore, this approach is used in the navigation of the orchard robot.

Keywords: orchard robots, automatic path planning, occupancy grid, probabilistic roadmap

Procedia PDF Downloads 154
828 Inventory Management System of Seasonal Raw Materials of Feeds at San Jose Batangas through Integer Linear Programming and VBA

Authors: Glenda Marie D. Balitaan

Abstract:

The branch of business management that deals with inventory planning and control is known as inventory management. It comprises keeping track of supply levels and forecasting demand, as well as scheduling when and how to plan. Keeping excess inventory results in a loss of money, takes up physical space, and raises the risk of damage, spoilage, and loss. On the other hand, too little inventory frequently causes operations to be disrupted and raises the possibility of low customer satisfaction, both of which can be detrimental to a company's reputation. The United Victorious Feed mill Corporation's present inventory management practices were assessed in terms of inventory level, warehouse allocation, ordering frequency, shelf life, and production requirement. To help the company achieve their optimal level of inventory, a mathematical model was created using Integer Linear Programming. Due to the season, the goal function was to reduce the cost of purchasing US Soya and Yellow Corn. Warehouse space, annual production requirements, and shelf life were all considered. To ensure that the user only uses one application to record all relevant information, like production output and delivery, the researcher built a Visual Basic system. Additionally, the technology allows management to change the model's parameters.

Keywords: inventory management, integer linear programming, inventory management system, feed mill

Procedia PDF Downloads 77
827 Defence Ethics : A Performance Measurement Framework for the Defence Ethics Program

Authors: Allyson Dale, Max Hlywa

Abstract:

The Canadian public expects the highest moral standards from Canadian Armed Forces (CAF) members and Department of National Defence (DND) employees. The Chief, Professional Conduct and Culture (CPCC) stood up in April 2021 with the mission of ensuring that the defence culture and members’ conduct are aligned with the ethical principles and values that the organization aspires towards. The Defence Ethics Program (DEP), which stood up in 1997, is a values-based ethics program for individuals and organizations within the DND/CAF and now falls under CPCC. The DEP is divided into five key functional areas, including policy, communications, collaboration, training and education, and advice and guidance. The main focus of the DEP is to foster an ethical culture within defence so that members and organizations perform to the highest ethical standards. The measurement of organizational ethics is often complex and challenging. In order to monitor whether the DEP is achieving its intended outcomes, a performance measurement framework (PMF) was developed using the Director General Military Personnel Research and Analysis (DGMPRA) PMF development process. This evidence-based process is based on subject-matter expertise from the defence team. The goal of this presentation is to describe each stage of the DGMPRA PMF development process and to present and discuss the products of the DEP PMF (e.g., logic model). Specifically, first, a strategic framework was developed to provide a high-level overview of the strategic objectives, mission, and vision of the DEP. Next, Key Performance Questions were created based on the objectives in the strategic framework. A logic model detailing the activities, outputs (what is produced by the program activities), and intended outcomes of the program were developed to demonstrate how the program works. Finally, Key Performance Indicators were developed based on both the intended outcomes in the logic model and the Key Performance Questions in order to monitor program effectiveness. The Key Performance Indicators measure aspects of organizational ethics such as ethical conduct and decision-making, DEP collaborations, and knowledge and awareness of the Defence Ethics Code while leveraging ethics-related items from multiple DGMPRA surveys where appropriate.

Keywords: defence ethics, ethical culture, organizational performance, performance measurement framework

Procedia PDF Downloads 99
826 A Geosynchronous Orbit Synthetic Aperture Radar Simulator for Moving Ship Targets

Authors: Linjie Zhang, Baifen Ren, Xi Zhang, Genwang Liu

Abstract:

Ship detection is of great significance for both military and civilian applications. Synthetic aperture radar (SAR) with all-day, all-weather, ultra-long-range characteristics, has been used widely. In view of the low time resolution of low orbit SAR and the needs for high time resolution SAR data, GEO (Geosynchronous orbit) SAR is getting more and more attention. Since GEO SAR has short revisiting period and large coverage area, it is expected to be well utilized in marine ship targets monitoring. However, the height of the orbit increases the time of integration by almost two orders of magnitude. For moving marine vessels, the utility and efficacy of GEO SAR are still not sure. This paper attempts to find the feasibility of GEO SAR by giving a GEO SAR simulator of moving ships. This presented GEO SAR simulator is a kind of geometrical-based radar imaging simulator, which focus on geometrical quality rather than high radiometric. Inputs of this simulator are 3D ship model (.obj format, produced by most 3D design software, such as 3D Max), ship's velocity, and the parameters of satellite orbit and SAR platform. Its outputs are simulated GEO SAR raw signal data and SAR image. This simulating process is accomplished by the following four steps. (1) Reading 3D model, including the ship rotations (pitch, yaw, and roll) and velocity (speed and direction) parameters, extract information of those little primitives (triangles) which is visible from the SAR platform. (2) Computing the radar scattering from the ship with physical optics (PO) method. In this step, the vessel is sliced into many little rectangles primitives along the azimuth. The radiometric calculation of each primitive is carried out separately. Since this simulator only focuses on the complex structure of ships, only single-bounce reflection and double-bounce reflection are considered. (3) Generating the raw data with GEO SAR signal modeling. Since the normal ‘stop and go’ model is not available for GEO SAR, the range model should be reconsidered. (4) At last, generating GEO SAR image with improved Range Doppler method. Numerical simulation of fishing boat and cargo ship will be given. GEO SAR images of different posture, velocity, satellite orbit, and SAR platform will be simulated. By analyzing these simulated results, the effectiveness of GEO SAR for the detection of marine moving vessels is evaluated.

Keywords: GEO SAR, radar, simulation, ship

Procedia PDF Downloads 171
825 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 371
824 An Automated Optimal Robotic Assembly Sequence Planning Using Artificial Bee Colony Algorithm

Authors: Balamurali Gunji, B. B. V. L. Deepak, B. B. Biswal, Amrutha Rout, Golak Bihari Mohanta

Abstract:

Robots play an important role in the operations like pick and place, assembly, spot welding and much more in manufacturing industries. Out of those, assembly is a very important process in manufacturing, where 20% of manufacturing cost is wholly occupied by the assembly process. To do the assembly task effectively, Assembly Sequences Planning (ASP) is required. ASP is one of the multi-objective non-deterministic optimization problems, achieving the optimal assembly sequence involves huge search space and highly complex in nature. Many researchers have followed different algorithms to solve ASP problem, which they have several limitations like the local optimal solution, huge search space, and execution time is more, complexity in applying the algorithm, etc. By keeping the above limitations in mind, in this paper, a new automated optimal robotic assembly sequence planning using Artificial Bee Colony (ABC) Algorithm is proposed. In this algorithm, automatic extraction of assembly predicates is done using Computer Aided Design (CAD) interface instead of extracting the assembly predicates manually. Due to this, the time of extraction of assembly predicates to obtain the feasible assembly sequence is reduced. The fitness evaluation of the obtained feasible sequence is carried out using ABC algorithm to generate the optimal assembly sequence. The proposed methodology is applied to different industrial products and compared the results with past literature.

Keywords: assembly sequence planning, CAD, artificial Bee colony algorithm, assembly predicates

Procedia PDF Downloads 233
823 Process of the Emergence and Evolution of Socio-Cultural Ideas about the "Asian States" In the Context of the Development of US Cinema in 1941-1945

Authors: Selifontova Darya Yurievna

Abstract:

The study of the process of the emergence and evolution of socio-cultural ideas about the "Asian states" in the context of the development of US cinema in 1941-1945 will contribute both to the approbation of a new approach to the classical subject and will allow using the methodological tools of history, political science, philology, sociology for understanding modern military-political, historical, ideological, socio-cultural processes on a concrete example. This is especially important for understanding the process of constructing the image of the Japanese Empire in the USA. Assessments and images of China and Japan in World War II, created in American cinema, had an immediate impact on the media, public sentiment, and opinions. During the war, the US cinema created new myths and actively exploited old ones, combining them with traditional Hollywood cliches - all this served as a basis for creating the image of China and the Japanese Empire on the screen, which were necessary to solve many foreign policy and domestic political tasks related to the construction of two completely different, but at the same time, similar images of Asia (China and the Japanese Empire). In modern studies devoted to the history of wars, the study of the specifics of the information confrontation of the parties is in demand. A special role in this confrontation is played by propaganda through cinema, which uses images, historical symbols, and stable metaphors, the appeal to which can form a certain public reaction. Soviet documentaries of the war years are proof of this. The relevance of the topic is due to the fact that cinema as a means of propaganda was very popular and in demand during the Second World War. This period was the time of creation of real masterpieces in the field of propaganda films, in the documentary space of the cinema of 1941 – 1945. The traditions of depicting the Second World War were laid down. The study of the peculiarities of visualization and mythologization of the Second World War in Soviet cinema is the most important stage for studying the development of the specifics of propaganda methods since the methods and techniques of depicting the war formed in 1941-1945 are also significant at the present stage of the study of society.

Keywords: asian countries, politics, sociology, domestic politics, USA, cinema

Procedia PDF Downloads 122
822 The Crisis of Turkey's Downing the Russian Warplane within the Concept of Country Branding: The Examples of BBC World, and Al Jazeera English

Authors: Derya Gül Ünlü, Oguz Kuş

Abstract:

The branding of a country means that the country has its own position different from other countries in its region and thus it is perceived more specifically. It is made possible by the branding efforts of a country and the uniqueness of all the national structures, by presenting it in a specific way, by creating the desired image and attracting tourists and foreign investors. Establishing a national brand involves, in a sense, the process of managing the perceptions of the citizens of the other country about the target country, by structuring the image of the country permanently and holistically. By this means, countries are not easily affected by their crisis of international relations. Therefore, within the scope of the research that will be carried out from this point, it is aimed to show how the warplane downing crisis between Turkey and Russia is perceived on social media. The Russian warplane was downed by Turkey on November 24, 2015, on the grounds that Turkey violated the airspace on the Syrian border. Whereupon the relations between the two countries have been tensed, and Russia has called on its citizens not to go to Turkey and citizens in Turkey to return to their countries. Moreover, relations between two countries have been weakened, for example, tourism tours organized in Russia to Turkey and visa-free travel were canceled and all military dialogue was cut off. After the event, various news sites on social media published plenty of news related to topic and the readers made various comments about the event and Turkey. In this context, an investigation into the perception of Turkey's national brand before and after the warplane downing crisis has been conducted. through comments fetched from the reports on the BBC World, and from Al Jazeera English news sites on Facebook accounts, which takes place widely in the social media. In order to realize study, user comments were fetched from jet downing-related news which are published on Facebook fan-page of BBC World Service, and Al Jazeera English. Regarding this, all the news published between 24.10.2015-24.12.2015 and containing Turk and Turkey keyword in its title composed data set of our study. Afterwards, comments written to these news were analyzed via text mining technique. Furthermore, by sentiment analysis, it was intended to reveal reader’s emotions before and after the crisis.

Keywords: Al Jazeera English, BBC World, country branding, social media, text mining

Procedia PDF Downloads 218
821 Application of Innovative Implementations in the SME Sector

Authors: Mateusz Janas

Abstract:

Innovative implementations in the micro, small, and medium-sized enterprises (MSME) sector are among the essential activities considering the current market realities, technological advancements, and digitization trends. MSMEs play a crucial role and significantly influence the economic conditions of countries, as their competitiveness directly impacts the global economy. Business development and investment in innovation and technology are integral parts of every modern enterprise's strategy, seeking to maintain and achieve a desired competitive position. The instability of the socio-economic environment, along with contemporary changes in artificial intelligence implementation and digitization, requires businesses to adopt increasingly newer solutions and actions. Enterprises must strive to survive in the global market and build competitive positions, especially in uncertain conditions. Being aware of the significance of innovative actions is crucial for MSMEs as it enables them to enhance their operations and expand their scope. It is essential for managers and executives of MSMEs to be focused on development and innovation, as their approach will also impact their employees, emphasizing results and maximizing the company's value. Managers of MSMEs must be aware of various threats, costs, opportunities, and gains that can arise from implementing new technical and organizational solutions. Businesses must view development as an integral part of their strategy and continuously strive for improvement.

Keywords: innovation, SME, develop, management

Procedia PDF Downloads 65
820 Effect of TERGITOL NP-9 and PEG-10 Oleyl Phosphate as Surfactant and Corrosion Inhibitor on Tribo-Corrosion Performance of Carbon Steel in Emulsion-Based Drilling Fluids

Authors: Mohammadjavad Palimi, D. Y. Li, E. Kuru

Abstract:

Emulsion-based drilling fluids containing mineral oil are commonly used for drilling operations, which generate a lubricating film to prevent direct contact between moving metal parts, thus reducing friction, wear, and corrosion. For long-lasting lubrication, the thin lubricating film formed on the metal surface should possess good anti-wear and anti-corrosion capabilities. This study aims to investigate the effects of two additives, TERGITOL NP-9 and PEG-10 oleyl phosphate, acting as surfactant and corrosion inhibitor, respectively, on the tribo-corrosion behavior of 1018 carbon steel immersed in 5% KCl solution at room temperature. A pin-on-disc tribometer attached to an electrochemical system was used to investigate the corrosive wear of the steel immersed in emulsion-based fluids containing the surfactant and corrosion inhibitor. The wear track, surface chemistry and composition of the protective film formed on the steel surface were analyzed with an optical profilometer, SEM, and SEM-EDX. Results of the study demonstrate that the performance of the emulsion-based drilling fluids was significantly improved by the corrosion inhibitor by a remarkable reduction in corrosion, coefficient of friction (COF) and wear.

Keywords: corrosion inhibitor, emulsion-based drilling fluid, tribo-corrosion, friction, wear

Procedia PDF Downloads 66
819 Decision Tree Based Scheduling for Flexible Job Shops with Multiple Process Plans

Authors: H.-H. Doh, J.-M. Yu, Y.-J. Kwon, J.-H. Shin, H.-W. Kim, S.-H. Nam, D.-H. Lee

Abstract:

This paper suggests a decision tree based approach for flexible job shop scheduling with multiple process plans, i. e. each job can be processed through alternative operations, each of which can be processed on alternative machines. The main decision variables are: (a) selecting operation/machine pair; and (b) sequencing the jobs assigned to each machine. As an extension of the priority scheduling approach that selects the best priority rule combination after many simulation runs, this study suggests a decision tree based approach in which a decision tree is used to select a priority rule combination adequate for a specific system state and hence the burdens required for developing simulation models and carrying out simulation runs can be eliminated. The decision tree based scheduling approach consists of construction and scheduling modules. In the construction module, a decision tree is constructed using a four-stage algorithm, and in the scheduling module, a priority rule combination is selected using the decision tree. To show the performance of the decision tree based approach suggested in this study, a case study was done on a flexible job shop with reconfigurable manufacturing cells and a conventional job shop, and the results are reported by comparing it with individual priority rule combinations for the objectives of minimizing total flow time and total tardiness.

Keywords: flexible job shop scheduling, decision tree, priority rules, case study

Procedia PDF Downloads 352
818 Contribution of Supply Chain Management Practices for Enhancing Healthcare Service Quality: A Quantitative Analysis in Delhi’s Healthcare Sector

Authors: Chitrangi Gupta, Arvind Bhardwaj

Abstract:

This study seeks to investigate and quantify the influence of various dimensions of supply chain management (namely, supplier relationships, compatibility, specifications and standards, delivery processes, and after-sales service) on distinct dimensions of healthcare service quality (specifically, responsiveness, trustworthiness, and security) within the operational framework of XYZ Superspeciality Hospital, situated in Delhi. The name of the Hospital is not being mentioned here because of the privacy policy of the hospital. The primary objective of this research is to elucidate the impact of supply chain management practices on the overall quality of healthcare services offered within hospital settings. Employing a quantitative research design, this study utilizes a hypothesis-testing approach to systematically discern the relationship between supply chain management dimensions and the quality of health services. The findings of this study underscore the significant influence exerted by supply chain management dimensions, specifically supplier relationships, specifications and standards, delivery processes, and after-sales service, on the enhancement of healthcare service quality. Moreover, the study's results reveal that demographic factors such as gender, qualifications, age, and experience do not yield discernible disparities in the relationship between supply chain management and healthcare service quality.

Keywords: supply chain management, healthcare, hospital operations, service delivery

Procedia PDF Downloads 64
817 The European Research and Development Project Improved Nuclear Site Characterization for Waste Minimization in Decommissioning under Constrained Environment: Focus on Performance Analysis and Overall Uncertainty

Authors: M. Crozet, D. Roudil, T. Branger, S. Boden, P. Peerani, B. Russell, M. Herranz, L. Aldave de la Heras

Abstract:

The EURATOM work program project INSIDER (Improved Nuclear Site Characterization for Waste minimization in Decommissioning under Constrained Environment) was launched in June 2017. This 4-year project has 18 partners and aims at improving the management of contaminated materials arising from decommissioning and dismantling (D&D) operations by proposing an integrated methodology of characterization. This methodology is based on advanced statistical processing and modelling, coupled with adapted and innovative analytical and measurement methods, with respect to sustainability and economic objectives. In order to achieve these objectives, the approaches will be then applied to common case studies in the form of Inter-laboratory comparisons on matrix representative reference samples and benchmarking. Work Package 6 (WP6) ‘Performance analysis and overall uncertainty’ is in charge of the analysis of the benchmarking on real samples, the organisation of inter-laboratory comparison on synthetic certified reference materials and the establishment of overall uncertainty budget. Assessment of the outcome will be used for providing recommendations and guidance resulting in pre-standardization tests.

Keywords: decommissioning, sampling strategy, research and development, characterization, European project

Procedia PDF Downloads 360
816 Aromatic Medicinal Plant Classification Using Deep Learning

Authors: Tsega Asresa Mengistu, Getahun Tigistu

Abstract:

Computer vision is an artificial intelligence subfield that allows computers and systems to retrieve meaning from digital images. It is applied in various fields of study self-driving cars, video surveillance, agriculture, Quality control, Health care, construction, military, and everyday life. Aromatic and medicinal plants are botanical raw materials used in cosmetics, medicines, health foods, and other natural health products for therapeutic and Aromatic culinary purposes. Herbal industries depend on these special plants. These plants and their products not only serve as a valuable source of income for farmers and entrepreneurs, and going to export not only industrial raw materials but also valuable foreign exchange. There is a lack of technologies for the classification and identification of Aromatic and medicinal plants in Ethiopia. The manual identification system of plants is a tedious, time-consuming, labor, and lengthy process. For farmers, industry personnel, academics, and pharmacists, it is still difficult to identify parts and usage of plants before ingredient extraction. In order to solve this problem, the researcher uses a deep learning approach for the efficient identification of aromatic and medicinal plants by using a convolutional neural network. The objective of the proposed study is to identify the aromatic and medicinal plant Parts and usages using computer vision technology. Therefore, this research initiated a model for the automatic classification of aromatic and medicinal plants by exploring computer vision technology. Morphological characteristics are still the most important tools for the identification of plants. Leaves are the most widely used parts of plants besides the root, flower and fruit, latex, and barks. The study was conducted on aromatic and medicinal plants available in the Ethiopian Institute of Agricultural Research center. An experimental research design is proposed for this study. This is conducted in Convolutional neural networks and Transfer learning. The Researcher employs sigmoid Activation as the last layer and Rectifier liner unit in the hidden layers. Finally, the researcher got a classification accuracy of 66.4 in convolutional neural networks and 67.3 in mobile networks, and 64 in the Visual Geometry Group.

Keywords: aromatic and medicinal plants, computer vision, deep convolutional neural network

Procedia PDF Downloads 431