Search results for: L. Major
5913 Assessment of Taiwan Railway Occurrences Investigations Using Causal Factor Analysis System and Bayesian Network Modeling Method
Authors: Lee Yan Nian
Abstract:
Safety investigation is different from an administrative investigation in that the former is conducted by an independent agency and the purpose of such investigation is to prevent accidents in the future and not to apportion blame or determine liability. Before October 2018, Taiwan railway occurrences were investigated by local supervisory authority. Characteristics of this kind of investigation are that enforcement actions, such as administrative penalty, are usually imposed on those persons or units involved in occurrence. On October 21, 2018, due to a Taiwan Railway accident, which caused 18 fatalities and injured another 267, establishing an agency to independently investigate this catastrophic railway accident was quickly decided. The Taiwan Transportation Safety Board (TTSB) was then established on August 1, 2019 to take charge of investigating major aviation, marine, railway and highway occurrences. The objective of this study is to assess the effectiveness of safety investigations conducted by the TTSB. In this study, the major railway occurrence investigation reports published by the TTSB are used for modeling and analysis. According to the classification of railway occurrences investigated by the TTSB, accident types of Taiwan railway occurrences can be categorized into: derailment, fire, Signal Passed at Danger and others. A Causal Factor Analysis System (CFAS) developed by the TTSB is used to identify the influencing causal factors and their causal relationships in the investigation reports. All terminologies used in the CFAS are equivalent to the Human Factors Analysis and Classification System (HFACS) terminologies, except for “Technical Events” which was added to classify causal factors resulting from mechanical failure. Accordingly, the Bayesian network structure of each occurrence category is established based on the identified causal factors in the CFAS. In the Bayesian networks, the prior probabilities of identified causal factors are obtained from the number of times in the investigation reports. Conditional Probability Table of each parent node is determined from domain experts’ experience and judgement. The resulting networks are quantitatively assessed under different scenarios to evaluate their forward predictions and backward diagnostic capabilities. Finally, the established Bayesian network of derailment is assessed using investigation reports of the same accident which was investigated by the TTSB and the local supervisory authority respectively. Based on the assessment results, findings of the administrative investigation is more closely tied to errors of front line personnel than to organizational related factors. Safety investigation can identify not only unsafe acts of individual but also in-depth causal factors of organizational influences. The results show that the proposed methodology can identify differences between safety investigation and administrative investigation. Therefore, effective intervention strategies in associated areas can be better addressed for safety improvement and future accident prevention through safety investigation.Keywords: administrative investigation, bayesian network, causal factor analysis system, safety investigation
Procedia PDF Downloads 1235912 Prevention of Road Accidents by Computerized Drowsiness Detection System
Authors: Ujjal Chattaraj, P. C. Dasbebartta, S. Bhuyan
Abstract:
This paper aims to propose a method to detect the action of the driver’s eyes, using the concept of face detection. There are three major key contributing methods which can rapidly process the framework of the facial image and hence produce results which further can program the reactions of the vehicles as pre-programmed for the traffic safety. This paper compares and analyses the methods on the basis of their reaction time and their ability to deal with fluctuating images of the driver. The program used in this study is simple and efficient, built using the AdaBoost learning algorithm. Through this program, the system would be able to discard background regions and focus on the face-like regions. The results are analyzed on a common computer which makes it feasible for the end users. The application domain of this experiment is quite wide, such as detection of drowsiness or influence of alcohols in drivers or detection for the case of identification.Keywords: AdaBoost learning algorithm, face detection, framework, traffic safety
Procedia PDF Downloads 1575911 Factors Associated with Suicidal Ideation among Undergraduate College Students
Authors: Samantha Vennice G. Sarcia
Abstract:
A person dies every 40 seconds throughout the world due to suicide-related behaviors. Suicidal ideation is a strong precursor to suicide completion. It is one of the major health challenges faced by the world today thus, it is highly substantial. The present study investigated the influence of personality traits and socio-demographic characteristics in predicting suicidal ideation. Using the Suicide Behaviors Questionnaire-Revised and the Big Five Inventory, the degree of suicidal ideation and the associated personality traits were identified. Out of 194 students from the allied health courses, the findings suggest that the college students are at-risk and have passive thoughts about suicide. Using multiple regression analysis, there was an identified significant relationship among the factors associated with suicidal ideation, particularly the number of persons in the household, living arrangement, attendance in church activities, agreeableness, conscientiousness, and neuroticism. Findings can help in the development of campus-based suicide prevention programs.Keywords: depression, personality traits, suicidal ideation, suicide
Procedia PDF Downloads 2255910 Response of Solar Updraft Power Plants Incorporating Material Nonlinearity
Authors: Areeg Shermaddo
Abstract:
Solar updraft power plants (SUPP) provide a great potential for green and environmentally friendly renewable power generation. An up to 1000 m high chimney represents one of the major parts of each SUPP, which consist of the main shell structure and the stiffening rings. Including the nonlinear material behavior in a simulation of the chimney is computationally a demanding task. However, allowing the formation of cracking in concrete leads to a more economical design of the structure. In this work, an FE model of a SUPP is presented incorporating the nonlinear material behavior. The effect of wind loading intensity on the structural response is explored. Furthermore, the influence of the stiffness of the ring beams on the global behavior is as well investigated. The obtained results indicate that the minimum reinforcement is capable of carrying the tensile stresses provided that the ring beams are rather stiff.Keywords: ABAQUS, nonlinear analysis, ring beams, SUPP
Procedia PDF Downloads 2165909 Non-Chronological Approach in Crane Girder and Composite Steel Beam Installation: Case Study
Authors: Govindaraj Ramanathan
Abstract:
The time delay and the structural stability are major issues in big size projects due to several factors. Improper planning and poor coordination lead to delay in construction, which sometimes result in reworking or rebuilding. This definitely increases the cost and time of project. This situation stresses the structural engineers to plan out of the limits of contemporary technology utilizing non-chronological approach with creative ideas. One of the strategies to solve this issue is through structural integrity solutions in a cost-effective way. We have faced several problems in a project worth 470 million USD, and one such issue is crane girder installation with composite steel beams. We have applied structural integrity approach with the proper and revised planning schedule to solve the problem efficiently with minimal expenses.Keywords: construction management, delay, non-chronological approach, composite beam, structural integrity
Procedia PDF Downloads 2375908 Hydrodynamics of Wound Ballistics
Authors: Harpreet Kaur, Er. Arjun, Kirandeep Kaur, P. K. Mittal
Abstract:
Simulation of a human body from a 20% gelatin & 80% water mixture is examined from a wound ballistics point of view. Parameters such as incapacitation energy & temporary to permanent cavity size & tools of hydrodynamics have been employed to arrive at a model of the human body similar to the one adopted by NATO. Calculations using equations of motion yield a value of 339 µs in which a temporary cavity with maximum size settles down to a permanent cavity. This occurs for 10mm size bullets & settles down to a permanent cavity in the case of 4 different bullets, i.e., 5.45, 5.56, 7.62,10 mm sizes. The obtained results are in excellent agreement with the body as a right circular cylinder of 15 cm height & 10 cm diameter. An effort is made here in this work to present a sound theoretical base to parameters commonly used in wound ballistics from field experience discussed by Col Coats & Major Beyer.Keywords: gelatine, gunshot, hydrodynamic model, oscillation time, temporary and permanent cavity, wound ballistics
Procedia PDF Downloads 755907 A Comparative Assessment of Industrial Composites Using Thermography and Ultrasound
Authors: Mosab Alrashed, Wei Xu, Stephen Abineri, Yifan Zhao, Jörn Mehnen
Abstract:
Thermographic inspection is a relatively new technique for Non-Destructive Testing (NDT) which has been gathering increasing interest due to its relatively low cost hardware and extremely fast data acquisition properties. This technique is especially promising in the area of rapid automated damage detection and quantification. In collaboration with a major industry partner from the aerospace sector advanced thermography-based NDT software for impact damaged composites is introduced. The software is based on correlation analysis of time-temperature profiles in combination with an image enhancement process. The prototype software is aiming to a) better visualise the damages in a relatively easy-to-use way and b) automatically and quantitatively measure the properties of the degradation. Knowing that degradation properties play an important role in the identification of degradation types, tests and results on specimens which were artificially damaged have been performed and analyzed.Keywords: NDT, correlation analysis, image processing, damage, inspection
Procedia PDF Downloads 5475906 Investigating Causes of Pavement Deterioration in Khartoum State, Sudan
Authors: Magdi Mohamed Eltayeb Zumrawi
Abstract:
It is quite essential to investigate the causes of pavement deterioration in order to select the proper maintenance technique. The objective of this study was to identify factors cause deterioration of recently constructed roads in Khartoum state. A comprehensive literature concerning the factors of road deterioration, common road defects and their causes were reviewed. Three major road projects with different deterioration reasons were selected for this study. The investigation involved field survey and laboratory testing on those projects to examine the existing pavement conditions. The results revealed that the roads investigated experienced severe failures in the forms of cracks, potholes and rutting in the wheel path. The causes of those failures were found mainly linked to poor drainage, traffic overloading, expansive subgrade soils and the use of low quality materials in construction. Based on the results, recommendations were provided to help highway engineers in selecting the most effective repair techniques for specific kinds of distresses.Keywords: pavement, deterioration, causes, failures
Procedia PDF Downloads 3545905 Gender Identity in the Fashion Industry in 21st Century in India
Authors: Priya Sharma
Abstract:
As one think of fashion, the only things that come to mind are feminine activities such as acquiring high-end bags, clothing, and shoes. A person's personal style is defined by their clothing. Fashion been more feminine over the centuries, but the masculine identity has also dwindled. Fashion has an impact on social status, trends, and the socio-economic and political environment. The major focus of this study is on how the most prominent fast fashion businesses establish their gender identities in order to achieve industry legitimacy. A questionnaire survey was conducted to understand the people prospection. It also helps in understanding the different driving factors which contribute collectively from the Doman from social and economic norms across the different reign in India. A conceptual module was made which help to understand the future scope of fashion with respect to gender identity in India. The ways there feel to create their own personal style and their feelings and how fashion can make more confident and authentic in their minds.Keywords: fashion, gender, identity, feminism, environment
Procedia PDF Downloads 3795904 Pioneering Conservation of Aquatic Ecosystems under Australian Law
Authors: Gina M. Newton
Abstract:
Australia’s Environment Protection and Biodiversity Conservation Act (EPBC Act) is the premiere, national law under which species and 'ecological communities' (i.e., like ecosystems) can be formally recognised and 'listed' as threatened across all jurisdictions. The listing process involves assessment against a range of criteria (similar to the IUCN process) to demonstrate conservation status (i.e., vulnerable, endangered, critically endangered, etc.) based on the best available science. Over the past decade in Australia, there’s been a transition from almost solely terrestrial to the first aquatic threatened ecological community (TEC or ecosystem) listings (e.g., River Murray, Macquarie Marshes, Coastal Saltmarsh, Salt-wedge Estuaries). All constitute large areas, with some including multiple state jurisdictions. Development of these conservation and listing advices has enabled, for the first time, a more forensic analysis of three key factors across a range of aquatic and coastal ecosystems: -the contribution of invasive species to conservation status, -how to demonstrate and attribute decline in 'ecological integrity' to conservation status, and, -identification of related priority conservation actions for management. There is increasing global recognition of the disproportionate degree of biodiversity loss within aquatic ecosystems. In Australia, legislative protection at Commonwealth or State levels remains one of the strongest conservation measures. Such laws have associated compliance mechanisms for breaches to the protected status. They also trigger the need for environment impact statements during applications for major developments (which may be denied). However, not all jurisdictions have such laws in place. There remains much opposition to the listing of freshwater systems – for example, the River Murray (Australia's largest river) and Macquarie Marshes (an internationally significant wetland) were both disallowed by parliament four months after formal listing. This was mainly due to a change of government, dissent from a major industry sector, and a 'loophole' in the law. In Australia, at least in the immediate to medium-term time frames, invasive species (aliens, native pests, pathogens, etc.) appear to be the number one biotic threat to the biodiversity and ecological function and integrity of our aquatic ecosystems. Consequently, this should be considered a current priority for research, conservation, and management actions. Another key outcome from this analysis was the recognition that drawing together multiple lines of evidence to form a 'conservation narrative' is a more useful approach to assigning conservation status. This also helps to addresses a glaring gap in long-term ecological data sets in Australia, which often precludes a more empirical data-driven approach. An important lesson also emerged – the recognition that while conservation must be underpinned by the best available scientific evidence, it remains a 'social and policy' goal rather than a 'scientific' goal. Communication, engagement, and 'politics' necessarily play a significant role in achieving conservation goals and need to be managed and resourced accordingly.Keywords: aquatic ecosystem conservation, conservation law, ecological integrity, invasive species
Procedia PDF Downloads 1325903 Design Patterns for Emergency Management Processes
Authors: Tomáš Ludík, Jiří Barta, Josef Navrátil
Abstract:
Natural or human made disasters have a significant negative impact on the environment. At the same time there is an extensive effort to support management and decision making in emergency situations by information technologies. Therefore the purpose of the paper is to propose a design patterns applicable in emergency management, enabling better analysis and design of emergency management processes and therefore easier development and deployment of information systems in the field of emergency management. It will be achieved by detailed analysis of existing emergency management legislation, contingency plans, and information systems. The result is a set of design patterns focused at emergency management processes that enable easier design of emergency plans or development of new information system. These results will have a major impact on the development of new information systems as well as to more effective and faster solving of emergencies.Keywords: analysis and design, Business Process Modelling Notation, contingency plans, design patterns, emergency management
Procedia PDF Downloads 4845902 A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Authors: Seyed Mahdi Jameii
Abstract:
Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay.Keywords: attacks, routing, security, underwater wireless sensor networks
Procedia PDF Downloads 4185901 Protection of Floating Roof Petroleum Storage Tanks against Lightning Strokes
Authors: F. M. Mohamed, A. Y. Abdelaziz
Abstract:
The subject of petroleum storage tank fires has gained a great deal of attention due to the high cost of petroleum, and the consequent disruption of petroleum production; therefore, much of the current research has focused on petroleum storage tank fires. Also, the number of petroleum tank fires is oscillating between 15 and 20 fires per year. About 33% of all tank fires are attributed to lightning. Floating roof tanks (FRT’s) are especially vulnerable to lightning. To minimize the likelihood of a fire, the API RP 545 recommends three major modifications to floating roof tanks. This paper was inspired by a stroke of lightning that ignited a fire in a crude oil storage tank belonging to an Egyptian oil company, and is aimed at providing an efficient lightning protection system to the tank under study, in order to avoid the occurrence of such phenomena in the future and also, to give valuable recommendations to be applied to floating roof tank projects.Keywords: crude oil, fire, floating roof tank, lightning protection system
Procedia PDF Downloads 2845900 Multifunctional Bending and Straightening Machines for Shipbuilding
Authors: V. Yu. Shungin, A. V. Popov
Abstract:
At present, one of the main tasks of Russian shipbuilding yards is implementation of new technologies and replacement of main process equipment. In particular, conventional bending technologies with dies are being replaced with resource-saving methods of rotation (roller) banding. Such rolling bending is performed by multiple rolling of a plat in special bending rollers. Studies, conducted in JSC SSTC, allowed developing a theory of rotation bending, methods for calculation of process parameters, requirements to roller presses and bending accessories. This technology allows replacing old and expensive presses with new cheaper roller ones, having less power consumption and bending force. At first, roller presses were implemented in ship repair, however now they are widely employed at major shipbuilding yards. JSC SSTC develops bending technology and carries out design, manufacturing and delivery of roller presses.Keywords: bending/straightening machines, rotational bending, ship hull structures, multifunctional bending
Procedia PDF Downloads 5765899 A Statistical Model for the Dynamics of Single Cathode Spot in Vacuum Cylindrical Cathode
Authors: Po-Wen Chen, Jin-Yu Wu, Md. Manirul Ali, Yang Peng, Chen-Te Chang, Der-Jun Jan
Abstract:
Dynamics of cathode spot has become a major part of vacuum arc discharge with its high academic interest and wide application potential. In this article, using a three-dimensional statistical model, we simulate the distribution of the ignition probability of a new cathode spot occurring in different magnetic pressure on old cathode spot surface and at different arcing time. This model for the ignition probability of a new cathode spot was proposed in two typical situations, one by the pure isotropic random walk in the absence of an external magnetic field, other by the retrograde motion in external magnetic field, in parallel with the cathode surface. We mainly focus on developed relationship between the ignition probability density distribution of a new cathode spot and the external magnetic field.Keywords: cathode spot, vacuum arc discharge, transverse magnetic field, random walk
Procedia PDF Downloads 4345898 Flowsheet Development, Simulation and Optimization of Carbon-Di-Oxide Removal System at Natural Gas Reserves by Aspen–Hysys Process Simulator
Authors: Mohammad Ruhul Amin, Nusrat Jahan
Abstract:
Natural gas is a cleaner fuel compared to the others. But it needs some treatment before it is in a state to be used. So natural gas purification is an integral part of any process where natural gas is used as raw material or fuel. There are several impurities in natural gas that have to be removed before use. CO2 is one of the major contaminants. In this project we have removed CO2 by amine process by using MEA solution. We have built up the whole amine process for removing CO2 in Aspen Hysys and simulated the process. At the end of simulation we have got very satisfactory results by using MEA solution for the removal of CO2. Simulation result shows that amine absorption process enables to reduce CO2 content from NG by 58%. HYSYS optimizer allowed us to get a perfect optimized plant. After optimization the profit of existing plant is increased by 2.34 %.Simulation and optimization by Aspen-HYSYS simulator makes available us to enormous information which will help us to further research in future.Keywords: Aspen–Hysys, CO2 removal, flowsheet development, MEA solution, natural gas optimization
Procedia PDF Downloads 4985897 Co-Factors of Hypertension and Decomposition of Inequalities in Its Prevalence in India: Evidence from NFHS-4
Authors: Ayantika Biswas
Abstract:
Hypertension still remains one of the most important preventable contributors to adult mortality and morbidity and a major public health challenge worldwide. Studying regional and rural-urban differences in prevalence and assessment of the contributions of different indicators is essential in determining the drivers of this condition. The 2015-16 National Family Health Survey data has been used for the study. Bivariate analysis, multinomial regression analysis, concentration indices and decomposition of concentration indices assessing contribution of factors has been undertaken in the present study. An overall concentration index of 0.003 has been found for hypertensive population, which shows its concentration among the richer wealth quintiles. The contribution of factors like age 45 to 49 years, years of schooling between 5 to 9 years are factors that are important contributors to inequality in hypertension occurrence. Studies should be conducted to find approaches to prevent or delay the onset of the condition.Keywords: hypertension, decomposition, inequalities, India
Procedia PDF Downloads 1395896 Concept and Implementation of Religious Tourism as a City Icon; Case Study: Golden Dome Mosque in Depok, Indonesia
Authors: Azhari Fauzan
Abstract:
Dian Al Mahri Mosque or more known as Golden Dome Mosque is one of the biggest mosques in Southeast Asia which located in Depok, West Java Province, Indonesia. Instead of a place for praying, this beautiful Mosque is also becoming an icon of Depok for religious tourism destination. The purpose of this study is to understand the concept and objective of religious tourism, also how to be implemented as an icon of the city. As a qualitative method, the data was collected by direct interview with three of the most influential persons: K. H. Amirudin Said S. Q. MA as a Manager of the Mosque, K. H. Dr. Mohammad Idris, MA as a Major of Depok, and Mulyamto as a Head of Tourism Department of Depok. As a result, Golden Dome Mosque involves three integrated aspects (social, economic, and cultural) which can be implemented to evaluate their daily activities and services in order to define themselves as a religious tourism destination.Keywords: city icon, golden mosque, Muslim Indonesia, religious tourism
Procedia PDF Downloads 3115895 Investigating Activity Recognition Using 9-Axis Sensors and Filters in Wearable Devices
Authors: Jun Gil Ahn, Jong Kang Park, Jong Tae Kim
Abstract:
In this paper, we analyze major components of activity recognition (AR) in wearable device with 9-axis sensors and sensor fusion filters. 9-axis sensors commonly include 3-axis accelerometer, 3-axis gyroscope and 3-axis magnetometer. We chose sensor fusion filters as Kalman filter and Direction Cosine Matrix (DCM) filter. We also construct sensor fusion data from each activity sensor data and perform classification by accuracy of AR using Naïve Bayes and SVM. According to the classification results, we observed that the DCM filter and the specific combination of the sensing axes are more effective for AR in wearable devices while classifying walking, running, ascending and descending.Keywords: accelerometer, activity recognition, directiona cosine matrix filter, gyroscope, Kalman filter, magnetometer
Procedia PDF Downloads 3335894 Structural Rehabilitation, Retrofitting and Strengthening of Reinforced Concrete Structures
Authors: Manish Kumar
Abstract:
Reinforced cement concrete is getting extensively used for construction of different type of structures for the last one century. During this period, we have constructed many structures like buildings, bridges, industrial structures, pavement, water tanks etc. using this construction material. These structures have been created with huge investment of resources. It is essential to maintain those structures in functional condition. Since deterioration in RCC Structures is a common and natural phenomenon it is required to have a detailed plan, methodology for structural repair and rehabilitation shall be in place for dealing such issues. It is important to know exact reason of distress, type of distress and correct method of repair concrete structures. The different methods of repair are described in paper according to distress category which can be refereed for repair. Major finding of the study is that to protect our structure we need to have maintenance frequency and correct material to be chosen for repair. Also workmanship during repair needs to be taken utmost care for quality repair.Keywords: deterioration, functional condition, reinforced cement concrete, resources
Procedia PDF Downloads 2535893 Engineering Graduates' Employability in the Eyes of Stakeholders: Based on the Survey to 6 Universities and 20 Enterprises in China
Authors: Cui Jun
Abstract:
By surveying 536 engineering graduates and 232 employers of 6 research-based universities and 20 enterprises in China, this research aims to reveal the perceptions and expectations of engineering curriculum and graduates’ employability by stakeholders. Variation was seen by university and sometimes by engineering major. Overall, however, the satisfaction with courses that promote employability is not high by graduates, and there is a gap between employers’ satisfaction and their expectation. Importantly, students’ satisfaction degree of the curricula enhancing employability and employers’ satisfaction degree of graduates’ employability are significantly lower than employers’ expectation value. Therefore, engineering curriculum reform must take the stakeholders’ demand into account and integrate employability into curricula. These findings provide the empirical basis for the curriculum reform of the National Excellent Engineers Education Program (NE3P) in China.Keywords: engineering education, employability of graduates, stakeholders, survey
Procedia PDF Downloads 3765892 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 2905891 Climate Impact-Minimizing Road Infrastructure Layout for Growing Cities
Authors: Stanislovas Buteliauskas, Aušrius Juozapavičius
Abstract:
City road transport contributes significantly to climate change, and the ongoing world urbanization is only increasing the problem. The paper describes a city planning concept minimizing the number of vehicles on the roads while increasing overall mobility. This becomes possible by utilizing a recently invented two-level road junction with a unique property of serving both as an intersection of uninterrupted traffic and an easily accessible transport hub capable of accumulating private vehicles, and therefore becoming an especially effective park-and-ride solution, and a logistics or business center. Optimized layouts of city road infrastructure, living and work areas, and major roads are presented. The layouts are suitable both for the development of new cities as well as for the expansion of existing ones. Costs of the infrastructure and a positive impact on climate are evaluated in comparison to current city growth patterns.Keywords: congestion, city infrastructure, park-and-ride, road junctions
Procedia PDF Downloads 3055890 An Exposition of Principles of Islamic Fiscal Policy
Authors: Muhammad A. Ishaq, S. U. R. Aliyu
Abstract:
This paper on an exposition of Islamic fiscal policy attempts to discuss the basic principles of Islamic fiscal policy in an Islamic economy. The paper presents a number of definitions of the subject matter, its nature and its tools of application. Government spending, taxation and public borrowings were identified as the tools of the policy. The paper identifies zakat both as a veritable source of revenue and a major instrument of economic stabilization. Furthermore, the paper presents an algebraic 2-sector and 3-sector models from the basic Keynesian model. The paper posits that in view of uniqueness of its instruments, absence of interest rate in the economy and the policy’s derive towards socioeconomic justice and redistribution, Islamic fiscal policy is capable of stabilizing Islamic economy and ushering it into the path of long term economic growth and prosperity.Keywords: automatic built-in-stabilizers, government spending, Islamic fiscal policy, taxation, zakat
Procedia PDF Downloads 3395889 Recycled Aggregates from Construction and Demolition Waste Suitable for Concrete Production
Authors: Vladimira Vytlacilova
Abstract:
This study presents the latest research trend in the discipline of construction and demolition (C&D) waste management in Czech Republic. The results of research interest exhibit an increasing research interest in C&D waste management practices in recent years. Construction and demolition waste creates a major portion of total solid waste production in the world and most of it is used in landfills, for reclamation or landscaping all the time. The quality of recycled aggregates for use in concrete construction depends on recycling practices. Classifications, composition and contaminants influence the mechanical-physical properties as well as environmental risks related to its utilization. The second part of contribution describes properties of fibre reinforced concrete with the full replacement of natural aggregate by recycled one (concrete or masonry rubble).Keywords: construction and demolition waste, fibre reinforced concrete, recycled aggregate, recycling, waste management
Procedia PDF Downloads 3095888 Underwater Remotely Operated Vehicle (ROV) Exploration
Authors: M. S. Sukumar
Abstract:
Our objective is to develop a full-fledged system for exploring and studying nature of fossils and to extend this to underwater archaeology and mineral mapping. This includes aerial surveying, imaging techniques, artefact extraction and spectrum analysing techniques. These techniques help in regular monitoring of fossils and also the sensing system. The ROV was designed to complete several tasks which simulate collecting data and samples. Given the time constraints, the ROV was engineered for efficiency and speed in performing tasks. Its other major design consideration was modularity, allowing the team to distribute the building process, to easily test systems as they were completed and troubleshoot and replace systems as necessary. Our design itself had several challenges of on-board waterproofed sensor mounting, waterproofing of motors, ROV stability criteria, camera mounting and hydrophone sound acquisition.Keywords: remotely operated vehicle (ROV) dragonair, underwater archaeology, full-fledged system, aerial imaging and detection
Procedia PDF Downloads 2375887 Study to Understand the Social Implications of Sexually Transmitted Infections in Patients Belonging to Low Socio-Economic Status
Authors: Rudraksh Kesharwani, Ritika Agarkar
Abstract:
Sexually transmitted diseases are a major public health concern affecting both the mortality and the morbidity of a population. It is among the most serious causes of the diseases affecting the quality of life of a individual leading to a significant decrease in their health. In India, STIs have been a significant public health concern due to various reasons, including a large population, limited access to healthcare in certain areas, stigma around discussing sexual health, and insufficient sex education. Some common STIs in India include HIV/AIDS, syphilis, gonorrhea, chlamydia, and herpes. This research report aims to determine the percentage of people infected with sexually transmitted infections (STI) worrying about it’s impact on their day to day activity, specifically focusing on it’s impact on the mentaland sexual health of the patient infected along with his/her partner.Keywords: sexual health, mental health, sexually transmitted disease, sexual taboos
Procedia PDF Downloads 145886 Dialect as a Means of Identification among Hausa Speakers
Authors: Hassan Sabo
Abstract:
Language is a system of conventionally spoken, manual and written symbols by human beings that members of a certain social group and participants in its culture express themselves. Communication, expression of identity and imaginative expression are among the functions of language. Dialect is a form of language, or a regional variety of language that is spoken in a particular geographical setting by a particular group of people. Hausa is one of the major languages in Africa, in terms of large number of people for whom it is the first language. Hausa is one of the western Chadic groups of languages. It constitutes one of the five or six branches of Afro-Asiatic family. The predominant Hausa speakers are in Nigeria and they live in different geographical locations which resulted to variety of dialects within the Hausa language apart of the standard Hausa language, the Hausa language has a variety of dialect that distinguish from one another by such features as phonology, grammar and vocabulary. This study intends to examine such features that serve as means of identification among Hausa speakers who are set off from others, geographically or socially.Keywords: dialect, features, geographical location, Hausa language
Procedia PDF Downloads 1945885 Electrochemical Study of Ni and/or Fe Based Mono- And Bi- Hydroxides
Authors: H. Benaldjia, N. Habib, F. Djefaflia, A. Nait-Merzoug, A. Harat, J. El-Haskouri, O. Guellati
Abstract:
Currently, the technology has attracted knowledge of energy storage sources similar to batteries, capacitors and super-capacitors because of its very different applications in many fields with major social and economic challenges. Moreover, hydroxides have attracted much attention as a promising and active material choice in large-scale applications such as molecular adsorption/storage and separation for the environment, ion exchange, nanotechnology, supercapacitor for energy storage and conversion, electro-biosensing, and catalysts, due to their unique properties which are strongly influenced by their composition, microstructure, and synthesis method. In this context, we report in this study the synthesis of hydroxide-based nanomaterials precisely based on Ni and Fe using a simple hydrothermal method with mono and bi precursors at optimized growth conditions (6h-120°C). The obtained products were characterized using different techniques, such as XRD, FTIR, FESEM and BET, as well as electrochemical measurements.Keywords: energy storage, Supercapacitors, nanocomposites, nanohybride, electro-active materials.
Procedia PDF Downloads 845884 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine
Authors: Soran Tarkhani
Abstract:
A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war
Procedia PDF Downloads 75