Search results for: computational thinking
1652 An Approach for the Assessment of Semi-Elliptical Surface Crack
Authors: Muhammad Naweed, Usman Tariq Murtaza, Waseem Siddique
Abstract:
A pallet body approach is a finite element-based computational approach used for the modeling and assessment of a three-dimensional surface crack. The approach is capable of inserting the crack in an engineering structure and generating high-quality hexahedral mesh in the cracked region of the structure. The approach is capable of computing the stress intensity factors along a semi-elliptical surface crack numerically. The objective of this work is to present that the stress intensity factors produced by the approach can be used with confidence for capturing the parameters during the fatigue crack growth.Keywords: pallet body approach, semi-elliptical surface crack, stress intensity factors, fatigue crack growth
Procedia PDF Downloads 1001651 Islamic Banking: A New Trend towards the Development of Banking Law
Authors: Inese Tenberga
Abstract:
Undoubtedly, the focus of the present capitalist system of finance has shifted from the concept of productivity of money to the ‘cult of money’, which is characterized by such notions as speculative activity, squander, self-profit, vested interest, etc. The author is certain that a civilized society cannot follow this economic path any longer and therefore suggests that one solution would be to integrate the Islamic financial model in the banking sector of the EU to overcome its economic vulnerability and structurally transform its economies or build resilience against shocks and crisis. The researcher analyses the Islamic financial model, which is providing the basis for the concept of non-productivity of money, and proposes to consider it as a new paradigm of economic thinking. The author argues that it seeks to establish a broad-based economic well-being with an optimum rate of economic growth, socio-economic justice, equitable distribution of income and wealth. Furthermore, the author analyses and proposes to use the experience of member states of the Islamic Development Bank for the formation of a new EU interest free banking. It is offered to create within the EU banking system a credit sector and investment sector respectively. As a part of the latter, it is recommended to separate investment banks specializing in speculative investments and nonspeculative investment banks. Meanwhile, understanding of the idea of Islamic banking exclusively from the perspective of the manner of yielding profit that differs from credit banking, without considering the legal, social, ethical guidelines of Islam impedes to value objectively the advantages of this type of financial activities at the non-Islamic jurisdictions. However, the author comes to the conclusion the imperative of justice and virtue, which is inherent to all of us, exists regardless of religion. The author concludes that the global community should adopt the experience of the Muslim countries and focus on the Islamic banking model.Keywords: credit sector, EU banking system, investment sector, Islamic banking
Procedia PDF Downloads 1741650 Artificial Intelligence Based Meme Generation Technology for Engaging Audience in Social Media
Authors: Andrew Kurochkin, Kostiantyn Bokhan
Abstract:
In this study, a new meme dataset of ~650K meme instances was created, a technology of meme generation based on the state of the art deep learning technique - GPT-2 model was researched, a comparative analysis of machine-generated memes and human-created was conducted. We justified that Amazon Mechanical Turk workers can be used for the approximate estimating of users' behavior in a social network, more precisely to measure engagement. It was shown that generated memes cause the same engagement as human memes that produced low engagement in the social network (historically). Thus, generated memes are less engaging than random memes created by humans.Keywords: content generation, computational social science, memes generation, Reddit, social networks, social media interaction
Procedia PDF Downloads 1381649 The Current Ways of Thinking Mild Traumatic Brain Injury and Clinical Practice in a Trauma Hospital: A Pilot Study
Authors: P. Donnelly, G. Mitchell
Abstract:
Traumatic Brain Injury (TBI) is a major contributor to the global burden of disease; despite its ubiquity, there is significant variation in diagnosis, prognosis, and treatment between clinicians. This study aims to examine the spectrum of approaches that currently exist at a Level 1 Trauma Centre in Australasia by surveying Emergency Physicians and Neurosurgeons on those aspects of mTBI. A pilot survey of 17 clinicians (Neurosurgeons, Emergency Physicians, and others who manage patients with mTBI) at a Level 1 Trauma Centre in Brisbane, Australia, was conducted. The objective of this study was to examine the importance these clinicians place on various elements in their approach to the diagnosis, prognostication, and treatment of mTBI. The data were summarised, and the descriptive statistics reported. Loss of consciousness and post-traumatic amnesia were rated as the most important signs or symptoms in diagnosing mTBI (median importance of 8). MRI was the most important imaging modality in diagnosing mTBI (median importance of 7). ‘Number of the Previous TBIs’ and Intracranial Injury on Imaging’ were rated as the most important elements for prognostication (median importance of 9). Education and reassurance were rated as the most important modality for treating mTBI (median importance of 7). There was a statistically insignificant variation between the specialties as to the importance they place on each of these components. In this Australian tertiary trauma center, there appears to be variation in how clinicians approach mTBI. This study is underpowered to state whether this is between clinicians within a specialty or a trend between specialties. This variation is worthwhile in investigating as a step toward a unified approach to diagnosing, prognosticating, and treating this common pathology.Keywords: mild traumatic brain injury, adult, clinician, survey
Procedia PDF Downloads 1301648 Low-Complexity Multiplication Using Complement and Signed-Digit Recoding Methods
Authors: Te-Jen Chang, I-Hui Pan, Ping-Sheng Huang, Shan-Jen Cheng
Abstract:
In this paper, a fast multiplication computing method utilizing the complement representation method and canonical recoding technique is proposed. By performing complements and canonical recoding technique, the number of partial products can be reduced. Based on these techniques, we propose an algorithm that provides an efficient multiplication method. On average, our proposed algorithm is to reduce the number of k-bit additions from (0.25k+logk/k+2.5) to (k/6 +logk/k+2.5), where k is the bit-length of the multiplicand A and multiplier B. We can therefore efficiently speed up the overall performance of the multiplication. Moreover, if we use the new proposes to compute common-multiplicand multiplication, the computational complexity can be reduced from (0.5 k+2 logk/k+5) to (k/3+2 logk/k+5) k-bit additions.Keywords: algorithm design, complexity analysis, canonical recoding, public key cryptography, common-multiplicand multiplication
Procedia PDF Downloads 4351647 Geographic and Territorial Knowledge as Epistemic Contexts for Intercultural Curriculum Development
Authors: Verónica Muñoz-Rivero
Abstract:
The historically marginalized indigenous communities in the Atacama Desert continue to experience and struggle curricular hegemony in a prevalent monocultural educational context that denies heritage, culture and epistemologies in a documented attempted knowledge negation by the educational policies, the national curriculum and educational culture. The ancestral indigenous community of Toconce demands a territorial-based intercultural education and a school in their ancestral land to prevent the progressive cultural loss as they reclaim their memory and identity negated. This case study makes use of the intercultural theoretical framework and open qualitative methodology to analyze local socio-educational reality integrating aspects related to the educational experience, education demands for future generations and importance given to formal education. The interlocutors: elders, parents, caretakers and former teachers raised the educational experience for the indigenous childhood as an intergenerational voice that experienced discrimination, exclusion and racism on their K-12 trajectories. By center, the indigenous epistemologies, geography and memory, this research proposes a project-based learning approach anchored to the Limpia de Canales ceremony to develop a situated territorial intercultural curriculum unpacking from the local epistemology and structure thinking. The work on terraces gives students the opportunity to co-create a real-life application with practical purpose and present the importance of reinforcing notions related to the relevance of a situated intercultural curriculum for social justice in the formative development of prospective teachers.Keywords: cultural studies, decolonial education, epistemic symmetry, intercultural curriculum, multidimensional curriculum
Procedia PDF Downloads 1931646 The Relationship among Lifestyles, Accompany Forms, and Children’s Capability to Solve Problems of Modern Families
Authors: Tien-Ling Yeh, Jo-Han Chan
Abstract:
The percentage of dual-earner couples has become higher and higher each year. Family lifestyles in Taiwan have also been changing. This fact reflects the importance of family communication and parent-child relationship. This study aimed to explore the influences of family lifestyles and accompany forms on children’s capability to solve problems. The research process included two phases: (1) literature review, to explore the characteristics of children’s capability to solve problems and methods to measure this capability; and (2) questionnaire analyses, to explore the influences of lifestyles and accompany time and forms of modern families on their children’s capability to solve problems. The questionnaires were issued in October and November, 2016. A total of 300 questionnaires were retrieved, among which 250 were valid. The findings are summarized below: -The linguistic performances of the children from families of the busy and haggling lifestyle or the intermittent childcare lifestyle were rather good. Besides being interested in learning, these children could solve problems or difficulties independently. -The capability to ‘analyze problems’ of children from families with accompanying time during 19:00-19:30 (family dinner time) or 22:00-23:30 (before bedtime) was good. When facing a complex problem, these children could identify the most important factor in the problem. When seeing a problem, they would first look for the cause. If they encountered a bottleneck while solving a problem, they would review the context of the problem and related conditions to come up with another solution. -According to the literature, learning toys with numbers and symbols to learn to read can help develop children’s logic thinking, which is helpful to solve problems. Interestingly, some study suggested that children playing with fluid constructive toys are less likely to give up what they are doing and more likely to identify problems in their daily life. Some of them can even come up with creative and effective solutions.Keywords: accompany, lifestyle, parent-child, problem-solving
Procedia PDF Downloads 1171645 Effect of the Applied Bias on Mini-Band Structures in Dimer Fibonacci InAs/Ga1-XInXAs Superlattices
Authors: Z. Aziz, S. Terkhi, Y. Sefir, R. Djelti, S. Bentata
Abstract:
The effect of a uniform electric field across multi-barrier systems (InAs/InxGa1-xAs) is exhaustively explored by a computational model using exact Airy function formalism and the transfer-matrix technique. In the case of biased DFHBSL structure a strong reduction in transmission properties was observed and the width of the mini-band structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the mini-band structure, which becomes increasingly important (Wannier-Stark Effect).Keywords: dimer fibonacci height barrier superlattices, singular extended state, exact Airy function and transfer matrix formalism, bioinformatics
Procedia PDF Downloads 2881644 Formation of Miniband Structure in Dimer Fibonacci GaAs/Ga1-XAlXAs Superlattices
Authors: Aziz Zoubir, Sefir Yamina, Djelti Redouan, Bentata Samir
Abstract:
The effect of a uniform electric field across multibarrier systems (GaAs/AlxGa1-xAs) is exhaustively explored by a computational model using exact Airy function formalism and the transfer-matrix technique. In the case of biased Dimer Fibonacci Height Barrier superlattices (DFHBSL) structure a strong reduction in transmission properties was observed and the width of the miniband structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the miniband structure, which becomes increasingly important (Wannier-Stark effect).Keywords: Dimer Fibonacci Height Barrier superlattices, singular extended states, exact Airy function, transfer matrix formalism
Procedia PDF Downloads 5091643 Size-Reduction Strategies for Iris Codes
Authors: Jutta Hämmerle-Uhl, Georg Penn, Gerhard Pötzelsberger, Andreas Uhl
Abstract:
Iris codes contain bits with different entropy. This work investigates different strategies to reduce the size of iris code templates with the aim of reducing storage requirements and computational demand in the matching process. Besides simple sub-sampling schemes, also a binary multi-resolution representation as used in the JBIG hierarchical coding mode is assessed. We find that iris code template size can be reduced significantly while maintaining recognition accuracy. Besides, we propose a two stage identification approach, using small-sized iris code templates in a pre-selection satge, and full resolution templates for final identification, which shows promising recognition behaviour.Keywords: iris recognition, compact iris code, fast matching, best bits, pre-selection identification, two-stage identification
Procedia PDF Downloads 4401642 Innovation in Traditional Game: A Case Study of Trainee Teachers' Learning Experiences
Authors: Malathi Balakrishnan, Cheng Lee Ooi, Chander Vengadasalam
Abstract:
The purpose of this study is to explore a case study of trainee teachers’ learning experience on innovating traditional games during the traditional game carnival. It explores issues arising from multiple case studies of trainee teachers learning experiences in innovating traditional games. A qualitative methodology was adopted through observations, semi-structured interviews and reflective journals’ content analysis of trainee teachers’ learning experiences creating and implementing innovative traditional games. Twelve groups of 36 trainee teachers who registered for Sports and Physical Education Management Course were the participants for this research during the traditional game carnival. Semi structured interviews were administrated after the trainee teachers learning experiences in creating innovative traditional games. Reflective journals were collected after carnival day and the content analyzed. Inductive data analysis was used to evaluate various data sources. All the collected data were then evaluated through the Nvivo data analysis process. Inductive reasoning was interpreted based on the Self Determination Theory (SDT). The findings showed that the trainee teachers had positive game participation experiences, game knowledge about traditional games and positive motivation to innovate the game. The data also revealed the influence of themes like cultural significance and creativity. It can be concluded from the findings that the organized game carnival, as a requirement of course work by the Institute of Teacher Training Malaysia, was able to enhance teacher trainers’ innovative thinking skills. The SDT, as a multidimensional approach to motivation, was utilized. Therefore, teacher trainers may have more learning experiences using the SDT.Keywords: learning experiences, innovation, traditional games, trainee teachers
Procedia PDF Downloads 3301641 A Two Stage Stochastic Mathematical Model for the Tramp Ship Routing with Time Windows Problem
Authors: Amin Jamili
Abstract:
Nowadays, the majority of international trade in goods is carried by sea, and especially by ships deployed in the industrial and tramp segments. This paper addresses routing the tramp ships and determining the schedules including the arrival times to the ports, berthing times at the ports, and the departure times in an operational planning level. In the operational planning level, the weather can be almost exactly forecasted, however in some routes some uncertainties may remain. In this paper, the voyaging times between some of the ports are considered to be uncertain. To that end, a two-stage stochastic mathematical model is proposed. Moreover, a case study is tested with the presented model. The computational results show that this mathematical model is promising and can represent acceptable solutions.Keywords: routing, scheduling, tram ships, two stage stochastic model, uncertainty
Procedia PDF Downloads 4361640 A Study of the Understated Violence within Social Contexts against Adolescent Girls
Authors: Niranjana Soperna, Shivangi Nigam
Abstract:
Violence against women is linked to their disadvantageous position in the society. It is rooted in unequal power relationships between men and women in society and is a global problem which is not limited to a specific group of women in society. An adolescent girl’s life is often accustomed to the likelihood of violence, and acts of violence exert additional power over girls because the stigma of violence often attaches more to a girl than to her doer. The experience of violence is distressing at the individual emotional and physical level. The field of research and programs for adolescent girls has traditionally focused on sexuality, reproductive health, and behavior, neglecting the broader social issues that underpin adolescent girls’ human rights, overall development, health, and well-being. This paper is an endeavor to address the understated or disguised form of violence which the adolescent girls experience within the social contexts. The parameters exposed under this research had been ignored to a large extent when it came to studying the dimension of violence under the social domain. Hence, the researchers attempted to explore this camouflaged form of violence and discovered some specific parameters such as: Diminished Self Worth and Esteem, Verbal Abuse, Menstruation Taboo and Social Rigidity, Negligence of Medical and Health Facilities and Complexion- A Prime Parameter for Judging Beauty. The study was conducted in the districts of Haryana where personal interviews were taken from both urban and rural adolescent girls (aged 13 to 19 years) based on structured interview schedule. The results revealed that the adolescent girls, both in urban as well as rural areas were quite affected with the above mentioned issues. In urban areas, however, due to the higher literacy rate, which resulted in more rational thinking, the magnitude was comparatively smaller, but the difference was still negligible.Keywords: adolescent girls, education, social contexts, understated violence
Procedia PDF Downloads 3171639 Re-Defining Academic Literacy: An Information Literacy Approach to Helping Chinese International Students Succeed in American Colleges
Authors: Yi Ding
Abstract:
With the upsurge of Chinese international students in American higher education, serious academic problems Chinese international students are suffering from are also striking. While most practices and research in higher education focus on the role of professors, writing centers, and tutoring centers to help international students succeed in college, this research study focuses on a more fundamental skill that is neglected in most conversations: information literacy, which is usually addressed by academic librarians. Transitioning from an East-Asian, developing educational system that values authority, set knowledge more than independent thinking, scholarly conversation, Chinese international students need support from academic librarians to acquire information literacy, which is crucial to understand expectations of a Western academic setting and thus to succeed in college. This research study illustrates how academic librarians can play an integral role in helping Chinese international students acclimate to the expectations of American higher education by teaching information literacy as academic literacy unique to the Western academic setting. Six keys of information literacy put forward by Association of College and Research Libraries, which are 'Authority Is Constructed and Contextual', 'Information Creation as a Process', 'Information Has Value', 'Research as Inquiry', 'Scholarship as Conversation', and 'Searching as Strategic Exploration', are analyzed through the lens of Chinese educational system and students’ backgrounds. Based on the analysis as well as results from surveys and interviews among academic librarians, professors, and international students, this research further examines current practices from a wide range of academic libraries and finally, provides evidence-based recommendations for academic librarians to use information literacy instruction to help Chinese international students succeed in American higher education.Keywords: academic librarians, Chinese international students, information literacy, student success
Procedia PDF Downloads 2431638 An Exact Algorithm for Location–Transportation Problems in Humanitarian Relief
Authors: Chansiri Singhtaun
Abstract:
This paper proposes a mathematical model and examines the performance of an exact algorithm for a location–transportation problems in humanitarian relief. The model determines the number and location of distribution centers in a relief network, the amount of relief supplies to be stocked at each distribution center and the vehicles to take the supplies to meet the needs of disaster victims under capacity restriction, transportation and budgetary constraints. The computational experiments are conducted on the various sizes of problems that are generated. Branch and bound algorithm is applied for these problems. The results show that this algorithm can solve problem sizes of up to three candidate locations with five demand points and one candidate location with up to twenty demand points without premature termination.Keywords: disaster response, facility location, humanitarian relief, transportation
Procedia PDF Downloads 4511637 Influence of Intra-Yarn Permeability on Mesoscale Permeability of Plain Weave and 3D Fabrics
Authors: Debabrata Adhikari, Mikhail Matveev, Louise Brown, Andy Long, Jan Kočí
Abstract:
A good understanding of mesoscale permeability of complex architectures in fibrous porous preforms is of particular interest in order to achieve efficient and cost-effective resin impregnation of liquid composite molding (LCM). Fabrics used in structural reinforcements are typically woven or stitched. However, 3D fabric reinforcement is of particular interest because of the versatility in the weaving pattern with the binder yarn and in-plain yarn arrangements to manufacture thick composite parts, overcome the limitation in delamination, improve toughness etc. To predict the permeability based on the available pore spaces between the inter yarn spaces, unit cell-based computational fluid dynamics models have been using the Stokes Darcy model. Typically, the preform consists of an arrangement of yarns with spacing in the order of mm, wherein each yarn consists of thousands of filaments with spacing in the order of μm. The fluid flow during infusion exchanges the mass between the intra and inter yarn channels, meaning there is no dead-end of flow between the mesopore in the inter yarn space and the micropore in the yarn. Several studies have employed the Brinkman equation to take into account the flow through dual-scale porosity reinforcement to estimate their permeability. Furthermore, to reduce the computational effort of dual scale flow, scale separation criteria based on the ratio between yarn permeability to the yarn spacing was also proposed to quantify the dual scale and negligible micro-scale flow regime for the prediction of mesoscale permeability. In the present work, the key parameter to identify the influence of intra yarn permeability on the mesoscale permeability has been investigated with the systematic study of weft and warp yarn spacing on the plane weave as well as the position of binder yarn and number of in-plane yarn layers on 3D weave fabric. The permeability tensor has been estimated using an OpenFOAM-based model for the various weave pattern with idealized geometry of yarn implemented using open-source software TexGen. Additionally, scale separation criterion has been established based on the various configuration of yarn permeability for the 3D fabric with both the isotropic and anisotropic yarn from Gebart’s model. It was observed that the variation of mesoscale permeability Kxx within 30% when the isotropic porous yarn is considered for a 3D fabric with binder yarn. Furthermore, the permeability model developed in this study will be used for multi-objective optimizations of the preform mesoscale geometry in terms of yarn spacing, binder pattern, and a number of layers with an aim to obtain improved permeability and reduced void content during the LCM process.Keywords: permeability, 3D fabric, dual-scale flow, liquid composite molding
Procedia PDF Downloads 961636 The Use of Social Media by Companies Operating on the Polish Market in the Context of the Corporate Reputation Management
Authors: Danuta Szwajca
Abstract:
Reputation The exponential growth of the Internet and social media (SM) in the recent years has contributed to changing the communication environment, in which stakeholders: customers, investors, business partners, employees, like their users, may post and distribute their opinions about the company and its products. This generates a number of potential threats to the image and reputation of both people and organizations. Social media create new opportunities not only for rapid and interactive communication but also for organizing themselves into strong pressure groups which may effectively affect the decisions of various organized bodies. Companies cannot ignore this fact and should use SM not only as an additional communication marketing channel but in a broader context - as a tool to build and protect their reputation. This article aims to identify the extent, scope, and directions of the use of SM in the activities of companies operating in the Polish market, as well as to identify threats and opportunities generated by the media in the area of reputation management. The results of research presented in the article showed that Polish companies recognize the potential of SM and try to apply them in their marketing efforts. However, his activity is limited only to maintain communication with customers through two portals: Facebook and Twitter. In the approach to the SM as a communication channel, the traditional way of thinking dominates, in which they are treated as just another promotional tool used by two departments: marketing and PR. This approach is called "silo" and is not integrated. This way of using SM does not allow effective building and protecting reputation in the Internet environment. To achieve this goal, the following research methods were used: the critical analysis of literature, analysis of secondary sources in a form of the report from the research conducted by Harvard Business Review Poland together with Capgemini Poland and case study.Keywords: corporate reputation, reputation management, social media, risk reputation
Procedia PDF Downloads 1961635 Violence in the School Environment: When the Teenager Encounters the Threat of Depression
Authors: Ndje Ndje Mireille
Abstract:
For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.Keywords: violence, school, depression threats, adolescent, behavior
Procedia PDF Downloads 821634 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2931633 Governance Factors of Sustainable Stormwater Management: A Comparative Study of Case Cities in China and Sweden
Authors: Xiujuan Qiao
Abstract:
Cities worldwide are increasingly adopting sustainable stormwater solutions such as using green infrastructure to mitigate challenges related to stormwater, e.g., pluvial flooding, and stormwater pollution. Barriers caused by governance factors have been identified as the main reason for the slow pace of sustainable stormwater management implementation. In this study, we examined governance factors influencing local implementation in four case cities: Lund and Malmö, Sweden, and Xi’xian New Area and Zhenjiang, China. Based on systems thinking of interrelations between previously identified influencing governance factors in sustainable stormwater management (SSM), we developed a causal loop diagram (SSM-CLD) and used it to analyze 23 semi-structured interviews with local government officers in the four case cities. Based on the results, we created one SSM-CLD for each country and analyzed the main differences between these four SSM-CLDs. The results revealed that differences in governance structures can lead to differences in the influencing governance factors. In top-down political systems, e.g., China, the role of national policy in setting local leaders’ priorities is significant for SSM implementation. In political systems with more power devolved to local governments, e.g., Sweden, public awareness and local government politicians’ priorities are important for SSM implementation. Acquiring funding for long-term maintenance was identified as a challenge in all four cities studied. These results are relevant for policymakers, local government departments, consultancy companies, and researchers seeking a better understanding of how governance factors influence sustainable stormwater management.Keywords: sustainable stormwater management, causal loop diagram, governance structures, local government priorities, public awareness, maintenance
Procedia PDF Downloads 2551632 Numerical Investigation of Natural Convection of Pine, Olive and Orange Leaves
Authors: Ali Reza Tahavvor, Saeed Hosseini, Nazli Jowkar, Behnam Amiri
Abstract:
Heat transfer of leaves is a crucial factor in optimal operation of metabolic functions in plants. In order to quantify this phenomenon in different leaves and investigate the influence of leaf shape on heat transfer, natural convection for pine, orange and olive leaves was simulated as representatives of different groups of leaf shapes. CFD techniques were used in this simulation with the purpose to calculate heat transfer of leaves in similar environmental conditions. The problem was simulated for steady state and three-dimensional conditions. From obtained results, it was concluded that heat fluxes of all three different leaves are almost identical, however, total rate of heat transfer have highest and lowest values for orange leaves and pine leaves, respectively.Keywords: computational fluid dynamic, heat flux, heat transfer, natural convection
Procedia PDF Downloads 3621631 A Numerical Simulation of Arterial Mass Transport in Presence of Magnetic Field-Links to Atherosclerosis
Authors: H. Aminfar, M. Mohammadpourfard, K. Khajeh
Abstract:
This paper has focused on the most important parameters in the LSC uptake; inlet Re number and Sc number in the presence of non-uniform magnetic field. The magnetic field is arising from the thin wire with electric current placed vertically to the arterial blood vessel. According to the results of this study, applying magnetic field can be a treatment for atherosclerosis by reducing LSC along the vessel wall. Homogeneous porous layer as a arterial wall has been regarded. Blood flow has been considered laminar and incompressible containing Ferro fluid (blood and 4 % vol. Fe₃O₄) under steady state conditions. Numerical solution of governing equations was obtained by using the single-phase model and control volume technique for flow field.Keywords: LDL surface concentration (LSC), magnetic field, computational fluid dynamics, porous wall
Procedia PDF Downloads 4081630 An Analysis on the Hidden Transcripts and Power: A Cultural Study on Confliction between Mother and Daughter-in-Law in Contemporary Chinese Television Dramas
Authors: Xiaohui Pan
Abstract:
As the most influential media for the dissemination of Chinese culture, films and television dramas have played cognitive orientation in guiding young audience to understand its cultural value. Taking a retrospective overview of the Chinese domestic film and television dramas in the last decade, it is tangible to notice that Westernization has become irresistible force in the presentation of Chinese youth culture, such as the rise of sensibility, publicity of subjectivity, and the resistance to mainstream discourse. However, the process of deconstruction and transition of these film and television works on Western youth culture brought about more comprehensive conflicts and integration rather than providing a panoramic interpretation to young Chinese. Issues of tradition and modernization, oriental and Western, and serious thinking and the spirit of entertainment overwhelmed those Chinese works. This study attempts to examine the mechanism of young Chinese’s resistance, compromise and re-construction in their marriages during the dynamic cultural intergration between traditional Chinese culture and Western culture. To investigate such a mechanism, this study analyzed four Chinese television dramas themed on family ethics to reveal the conflictions between two generations, mother-in-law and daughter-in-law, aiming to identify their strategies of their struggles. Incorporating the theory of Scott's weapons of the weak, this study examines the dynamic model of the struggles content analysis on their hidden language and the power. The finding shows that young Chinese identified their self-awakening during the resistance. The study also finds out that the external factors might have the functions of switching the power from the strong end to the weak end. The finding of this study can provide useful insights for researchers in this area and for those in the process of exploring cultural integration issues.Keywords: intergration, integration, resistance, youth culture
Procedia PDF Downloads 4251629 Secure Bio Semantic Computing Scheme
Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii
Abstract:
In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing
Procedia PDF Downloads 3901628 Creating a Child Friendly Environment as a Curriculum Model for Early Years Teaching
Authors: Undiyaundeye Florence Atube, Ugar Innocent A.
Abstract:
Young children are active learners who use all their senses to build concepts and ideas from their experiences. The process of learning, the content and the outcomes, is vital for young children. They need time to explore whether they are satisfied with what is learnt. Of all levels of education, early childhood education is considered to be most critical for the social, emotional, cognitive and physical development. For this reason, the teachers for early years need to play a significant role in the teaching and learning process through the provision of a friendly environment in the school. A case study approach was used in this study. The information was gathered through various methods like class observation, field notes, documents analysis, group processes, and semi structured interviews. The group processes participants and interviewees were taken from some stakeholders such as parents, students, teachers, and head teachers from public schools, to have a broad and comprehensive analysis, informal interaction with different stakeholders and self-reflection was used to clarify aspects of varying issues and findings. The teachers’ roles in developing a child friendly environment in personal capacity to learning were found to improve a pupils learning ability. Prior to early child development education, learning experiences and pedagogical content knowledge played a vital role in engaging teachers in developing their thinking and teaching practice. Children can be helped to develop independent self-control and self-reliance with careful planning and development of the child’s experience with sensitive and appropriate interaction by the educator to propel eagerness to learn through the provision of a friendly environment.Keywords: child friendly environment, early childhood, education and development, teaching, learning and the curriculum
Procedia PDF Downloads 3741627 Single Machine Scheduling Problem to Minimize the Number of Tardy Jobs
Authors: Ali Allahverdi, Harun Aydilek, Asiye Aydilek
Abstract:
Minimizing the number of tardy jobs is an important factor to consider while making scheduling decisions. This is because on-time shipments are vital for lowering cost and increasing customers’ satisfaction. This paper addresses the single machine scheduling problem with the objective of minimizing the number of tardy jobs. The only known information is the lower and upper bounds for processing times, and deterministic job due dates. A dominance relation is established, and an algorithm is proposed. Several heuristics are generated from the proposed algorithm. Computational analysis indicates that the performance of one of the heuristics is very close to the optimal solution, i.e., on average, less than 1.5 % from the optimal solution.Keywords: single machine scheduling, number of tardy jobs, heuristi, lower and upper bounds
Procedia PDF Downloads 5551626 A Hybrid LES-RANS Approach to Analyse Coupled Heat Transfer and Vortex Structures in Separated and Reattached Turbulent Flows
Authors: C. D. Ellis, H. Xia, X. Chen
Abstract:
Experimental and computational studies investigating heat transfer in separated flows have been of increasing importance over the last 60 years, as efforts are being made to understand and improve the efficiency of components such as combustors, turbines, heat exchangers, nuclear reactors and cooling channels. Understanding of not only the time-mean heat transfer properties but also the unsteady properties is vital for design of these components. As computational power increases, more sophisticated methods of modelling these flows become available for use. The hybrid LES-RANS approach has been applied to a blunt leading edge flat plate, utilising a structured grid at a moderate Reynolds number of 20300 based on the plate thickness. In the region close to the wall, the RANS method is implemented for two turbulence models; the one equation Spalart-Allmaras model and Menter’s two equation SST k-ω model. The LES region occupies the flow away from the wall and is formulated without any explicit subgrid scale LES modelling. Hybridisation is achieved between the two methods by the blending of the nearest wall distance. Validation of the flow was obtained by assessing the mean velocity profiles in comparison to similar studies. Identifying the vortex structures of the flow was obtained by utilising the λ2 criterion to identify vortex cores. The qualitative structure of the flow compared with experiments of similar Reynolds number. This identified the 2D roll up of the shear layer, breaking down via the Kelvin-Helmholtz instability. Through this instability the flow progressed into hairpin like structures, elongating as they advanced downstream. Proper Orthogonal Decomposition (POD) analysis has been performed on the full flow field and upon the surface temperature of the plate. As expected, the breakdown of POD modes for the full field revealed a relatively slow decay compared to the surface temperature field. Both POD fields identified the most energetic fluctuations occurred in the separated and recirculation region of the flow. Latter modes of the surface temperature identified these levels of fluctuations to dominate the time-mean region of maximum heat transfer and flow reattachment. In addition to the current research, work will be conducted in tracking the movement of the vortex cores and the location and magnitude of temperature hot spots upon the plate. This information will support the POD and statistical analysis performed to further identify qualitative relationships between the vortex dynamics and the response of the surface heat transfer.Keywords: heat transfer, hybrid LES-RANS, separated and reattached flow, vortex dynamics
Procedia PDF Downloads 2311625 Solid Particles Transport and Deposition Prediction in a Turbulent Impinging Jet Using the Lattice Boltzmann Method and a Probabilistic Model on GPU
Authors: Ali Abdul Kadhim, Fue Lien
Abstract:
Solid particle distribution on an impingement surface has been simulated utilizing a graphical processing unit (GPU). In-house computational fluid dynamics (CFD) code has been developed to investigate a 3D turbulent impinging jet using the lattice Boltzmann method (LBM) in conjunction with large eddy simulation (LES) and the multiple relaxation time (MRT) models. This paper proposed an improvement in the LBM-cellular automata (LBM-CA) probabilistic method. In the current model, the fluid flow utilizes the D3Q19 lattice, while the particle model employs the D3Q27 lattice. The particle numbers are defined at the same regular LBM nodes, and transport of particles from one node to its neighboring nodes are determined in accordance with the particle bulk density and velocity by considering all the external forces. The previous models distribute particles at each time step without considering the local velocity and the number of particles at each node. The present model overcomes the deficiencies of the previous LBM-CA models and, therefore, can better capture the dynamic interaction between particles and the surrounding turbulent flow field. Despite the increasing popularity of LBM-MRT-CA model in simulating complex multiphase fluid flows, this approach is still expensive in term of memory size and computational time required to perform 3D simulations. To improve the throughput of each simulation, a single GeForce GTX TITAN X GPU is used in the present work. The CUDA parallel programming platform and the CuRAND library are utilized to form an efficient LBM-CA algorithm. The methodology was first validated against a benchmark test case involving particle deposition on a square cylinder confined in a duct. The flow was unsteady and laminar at Re=200 (Re is the Reynolds number), and simulations were conducted for different Stokes numbers. The present LBM solutions agree well with other results available in the open literature. The GPU code was then used to simulate the particle transport and deposition in a turbulent impinging jet at Re=10,000. The simulations were conducted for L/D=2,4 and 6, where L is the nozzle-to-surface distance and D is the jet diameter. The effect of changing the Stokes number on the particle deposition profile was studied at different L/D ratios. For comparative studies, another in-house serial CPU code was also developed, coupling LBM with the classical Lagrangian particle dispersion model. Agreement between results obtained with LBM-CA and LBM-Lagrangian models and the experimental data is generally good. The present GPU approach achieves a speedup ratio of about 350 against the serial code running on a single CPU.Keywords: CUDA, GPU parallel programming, LES, lattice Boltzmann method, MRT, multi-phase flow, probabilistic model
Procedia PDF Downloads 2071624 Numerical Study of the Dynamic Behavior of an Air Conditioning with a Muti Confined Swirling Jet
Authors: Mohamed Roudane
Abstract:
The objective of this study is to know the dynamic behavior of a multi swirling jet used for air conditioning inside a room. To conduct this study, we designed a facility to ensure proper conditions of confinement in which we placed five air blowing devices with adjustable vanes, providing multiple swirling turbulent jets. The jets were issued in the same direction and the same spacing defined between them. This study concerned the numerical simulation of the dynamic mixing of confined swirling multi-jets, and examined the influence of important parameters of a swirl diffuser system on the dynamic performance characteristics. The CFD investigations are carried out by a hybrid mesh to discretize the computational domain. In this work, the simulations have been performed using the finite volume method and FLUENT solver, in which the standard k-ε RNG turbulence model was used for turbulence computations.Keywords: simulation, dynamic behavior, swirl, turbulent jet
Procedia PDF Downloads 3991623 CFD Simulation of Surge Wave Generated by Flow-Like Landslides
Authors: Liu-Chao Qiu
Abstract:
The damage caused by surge waves generated in water bodies by flow-like landslides can be very high in terms of human lives and economic losses. The complicated phenomena occurred in this highly unsteady process are difficult to model because three interacting phases: air, water and sediment are involved. The problem therefore is challenging since the effects of non-Newtonian fluid describing the rheology of the flow-like landslides, multi-phase flow and free surface have to be included in the simulation. In this work, the commercial computational fluid dynamics (CFD) package FLUENT is used to model the surge waves due to flow-like landslides. The comparison between the numerical results and experimental data reported in the literature confirms the accuracy of the method.Keywords: flow-like landslide, surge wave, VOF, non-Newtonian fluids, multi-phase flows, free surface flow
Procedia PDF Downloads 416