Search results for: state machine
8302 Electron-Ion Recombination for Photoionized and Collisionally Ionized Plasmas
Authors: Shahin A. Abdel-Naby, Asad T. Hassan
Abstract:
Astrophysical plasma environments can be classified into collisionally ionized (CP) and photoionizedplasmas (PP). In the PP, ionization is caused by an external radiation field, while it is caused by electron collision in the CP. Accurate and reliable laboratory astrophysical data for electron-ion recombination is needed for plasma modeling for low and high-temperatures. Dielectronic recombination (DR) is the dominant recombination process for the CP for most of the ions. When a free electron is captured by an ion with simultaneous excitation of its core, a doubly-exited intermediate state may be formed. The doubly excited state relaxes either by electron emission (autoionization) or by radiative decay (photon emission). DR process takes place when the relaxation occurs to a bound state by a photon emission. DR calculations at low-temperatures are problematic and challenging since small uncertaintiesin the low-energy DR resonance positions can produce huge uncertainties in DR rate coefficients.DR rate coefficients for N²⁺ and O³⁺ ions are calculated using state-of-the-art multi-configurationBreit-Pauli atomic structure AUTOSTRUCTURE collisional package within the generalized collisional-radiative framework. Level-resolved calculations for RR and DR rate coefficients from the ground and metastable initial states are produced in an intermediate coupling scheme associated withn = 0 and n = 1 core-excitations. DR cross sections for these ions are convoluted with the experimental electron-cooler temperatures to produce DR rate coefficients. Good agreements are foundbetween these rate coefficients and theexperimental measurements performed at CRYRING heavy-ionstorage ring for both ions.Keywords: atomic data, atomic process, electron-ion collision, plasmas
Procedia PDF Downloads 968301 Business Intelligent to a Decision Support Tool for Green Entrepreneurship: Meso and Macro Regions
Authors: Anishur Rahman, Maria Areias, Diogo Simões, Ana Figeuiredo, Filipa Figueiredo, João Nunes
Abstract:
The circular economy (CE) has gained increased awareness among academics, businesses, and decision-makers as it stimulates resource circularity in the production and consumption systems. A large epistemological study has explored the principles of CE, but scant attention eagerly focused on analysing how CE is evaluated, consented to, and enforced using economic metabolism data and business intelligent framework. Economic metabolism involves the ongoing exchange of materials and energy within and across socio-economic systems and requires the assessment of vast amounts of data to provide quantitative analysis related to effective resource management. Limited concern, the present work has focused on the regional flows pilot region from Portugal. By addressing this gap, this study aims to promote eco-innovation and sustainability in the regions of Intermunicipal Communities Região de Coimbra, Viseu Dão Lafões and Beiras e Serra da Estrela, using this data to find precise synergies in terms of material flows and give companies a competitive advantage in form of valuable waste destinations, access to new resources and new markets, cost reduction and risk sharing benefits. In our work, emphasis on applying artificial intelligence (AI) and, more specifically, on implementing state-of-the-art deep learning algorithms is placed, contributing to construction a business intelligent approach. With the emergence of new approaches generally highlighted under the sub-heading of AI and machine learning (ML), the methods for statistical analysis of complex and uncertain production systems are facing significant changes. Therefore, various definitions of AI and its differences from traditional statistics are presented, and furthermore, ML is introduced to identify its place in data science and the differences in topics such as big data analytics and in production problems that using AI and ML are identified. A lifecycle-based approach is then taken to analyse the use of different methods in each phase to identify the most useful technologies and unifying attributes of AI in manufacturing. Most of macroeconomic metabolisms models are mainly direct to contexts of large metropolis, neglecting rural territories, so within this project, a dynamic decision support model coupled with artificial intelligence tools and information platforms will be developed, focused on the reality of these transition zones between the rural and urban. Thus, a real decision support tool is under development, which will surpass the scientific developments carried out to date and will allow to overcome imitations related to the availability and reliability of data.Keywords: circular economy, artificial intelligence, economic metabolisms, machine learning
Procedia PDF Downloads 738300 Factory Virtual Environment Development for Augmented and Virtual Reality
Authors: Michal Gregor, Jiri Polcar, Petr Horejsi, Michal Simon
Abstract:
Machine visualization is an area of interest with fast and progressive development. We present a method of machine visualization which will be applicable in real industrial conditions according to current needs and demands. Real factory data were obtained in a newly built research plant. Methods described in this paper were validated on a case study. Input data were processed and the virtual environment was created. The environment contains information about dimensions, structure, disposition, and function. Hardware was enhanced by modular machines, prototypes, and accessories. We added new functionalities and machines into the virtual environment. The user is able to interact with objects such as testing and cutting machines, he/she can operate and move them. Proposed design consists of an environment with two degrees of freedom of movement. Users are in touch with items in the virtual world which are embedded into the real surroundings. This paper describes the development of the virtual environment. We compared and tested various options of factory layout virtualization and visualization. We analyzed possibilities of using a 3D scanner in the layout obtaining process and we also analyzed various virtual reality hardware visualization methods such as Stereoscopic (CAVE) projection, Head Mounted Display (HMD), and augmented reality (AR) projection provided by see-through glasses.Keywords: augmented reality, spatial scanner, virtual environment, virtual reality
Procedia PDF Downloads 4088299 Ethno-Religious Conflicts In Nigeria; Implications for National Security
Authors: Samuel Onyekachi Chidi
Abstract:
Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.Keywords: ethnicity, religion, conflict, national security
Procedia PDF Downloads 768298 Setting Uncertainty Conditions Using Singular Values for Repetitive Control in State Feedback
Authors: Muhammad A. Alsubaie, Mubarak K. H. Alhajri, Tarek S. Altowaim
Abstract:
A repetitive controller designed to accommodate periodic disturbances via state feedback is discussed. Periodic disturbances can be represented by a time delay model in a positive feedback loop acting on system output. A direct use of the small gain theorem solves the periodic disturbances problem via 1) isolating the delay model, 2) finding the overall system representation around the delay model and 3) designing a feedback controller that assures overall system stability and tracking error convergence. This paper addresses uncertainty conditions for the repetitive controller designed in state feedback in either past error feedforward or current error feedback using singular values. The uncertainty investigation is based on the overall system found and the stability condition associated with it; depending on the scheme used, to set an upper/lower limit weighting parameter. This creates a region that should not be exceeded in selecting the weighting parameter which in turns assures performance improvement against system uncertainty. Repetitive control problem can be described in lifted form. This allows the usage of singular values principle in setting the range for the weighting parameter selection. The Simulation results obtained show a tracking error convergence against dynamic system perturbation if the weighting parameter chosen is within the range obtained. Simulation results also show the advantage of weighting parameter usage compared to the case where it is omitted.Keywords: model mismatch, repetitive control, singular values, state feedback
Procedia PDF Downloads 1558297 Water Efficiency: Greywater Recycling
Authors: Melissa Lubitz
Abstract:
Water scarcity is one of the crucial challenges of our time. There needs to be a focus on creating a society where people and nature flourish, regardless of climatic conditions. One of the solutions we can look to is decentralized greywater recycling. The vision is simple. Every building has its own water source being greywater from the bath, shower, sink and washing machine. By treating this in the home, you can save 25-45% of potable water use and wastewater production, a reduction in energy consumption and CO2 emissions. This reusable water is clean, and safe to be used for toilet flushing, washing machine, and outdoor irrigation. Companies like Hydraloop have been committed to the greywater recycle-ready building concept for years. This means that drinking water conservation and water reuse are included as standards in the design of all new buildings. Sustainability and renewal go hand in hand. This vision includes not only optimizing water savings and waste reduction but also forging strong partnerships that bring this ambition to life. Together with regulators, municipalities and builders, a sustainable and water-conscious future is pursued. This is an opportunity to be part of a movement that is making a difference. By pushing this initiative forward, we become part of a growing community that resists dehydration, believes in sustainability, and is committed to a living environment at the forefront of change: sustainable living, where saving water is the norm and where we shape the future together.Keywords: greywater, wastewater treatment, water conservation, circular water society
Procedia PDF Downloads 628296 Unsteady and Steady State in Natural Convection
Authors: Syukri Himran, Erwin Eka Putra, Nanang Roni
Abstract:
This study explains the natural convection of viscous fluid flowing on semi-infinite vertical plate. A set of the governing equations describing the continuity, momentum and energy, have been reduced to dimensionless forms by introducing the references variables. To solve the problems, the equations are formulated by explicit finite-difference in time dependent form and computations are performed by Fortran program. The results describe velocity, temperature profiles both in transient and steady state conditions. An approximate value of heat transfer coefficient and the effects of Pr on convection flow are also presented.Keywords: natural convection, vertical plate, velocity and temperature profiles, steady and unsteady
Procedia PDF Downloads 4898295 Children and Communities Benefit from Mother-Tongue Based Multi-Lingual Education
Authors: Binay Pattanayak
Abstract:
Multilingual state, Jharkhand is home to more than 19 tribal and regional languages. These are used by more than 33 communities in the state. The state has declared 12 of these languages as official languages of the state. However, schools in the state do not recognize any of these community languages even in early grades! Children, who speak in their mother tongues at home, local market and playground, find it very difficult to understand their teacher and textbooks in school. They fail to acquire basic literacy and numeracy skills in early grades. Out of frustration due to lack of comprehension, the majority of children leave school. Jharkhand sees the highest dropout in early grades in India. To address this, the state under the guidance of the author designed a mother tongue based pre-school education programme named Bhasha Puliya and bilingual picture dictionaries in 9 tribal and regional mother tongues of children. This contributed significantly to children’s school readiness in the school. Followed by this, the state designed a mother-tongue based multilingual education programme (MTB-MLE) for multilingual context. The author guided textbook development in 5 tribal (Santhali, Mundari, Ho, Kurukh and Kharia) and two regional (Odia and Bangla) languages. Teachers and community members were trained for MTB-MLE in around 1,000 schools of the concerned language pockets. Community resource groups were constituted along with their academic calendars in each school to promote story-telling, singing, painting, dancing, riddles, etc. with community support. This, on the one hand, created rich learning environments for children. On the other hand, the communities have discovered a great potential in the process of developing a wide variety of learning materials for children in own mother-tongue using their local stories, songs, riddles, paintings, idioms, skits, etc. as a process of their literary, cultural and technical enrichment. The majority of children are acquiring strong early grade reading skills (basic literacy and numeracy) in grades I-II thereby getting well prepared for higher studies. In a phased manner they are learning Hindi and English after 4-5 years of MTB-MLE using the foundational language learning skills. Community members have started designing new books, audio-visual learning materials in their mother-tongues seeing a great potential for their cultural and technological rejuvenation.Keywords: community resource groups, MTB-MLE, multilingual, socio-linguistic survey, learning
Procedia PDF Downloads 1988294 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South
Authors: Sunaina Sunaina
Abstract:
The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.Keywords: insurgency, southern Thailand, security, nation building
Procedia PDF Downloads 1268293 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms
Authors: Mohammad Besharatloo
Abstract:
Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree
Procedia PDF Downloads 918292 Economic Neoliberalism: Property Right and Redistribution Policy
Authors: Aleksandar Savanović
Abstract:
In this paper we will analyze the relationship between the neo-liberal concept of property rights and redistribution policy. This issue is back in the focus of interest due to the crisis 2008. The crisis has reaffirmed the influence of the state on the free-market processes. The interference of the state with property relations re-opened a classical question: is it legitimate to redistribute resources of a man in favor of another man with taxes? The dominant view is that the neoliberal philosophy of natural rights is incompatible with redistributive measures. In principle, this view can be accepted. However, when we look into the details of the theory of natural rights proposed by some coryphaei of neoliberal philosophy, such as Hayek, Nozick, Buchanan and Rothbard, we can see that it is not such an unequivocal view.Keywords: economic neoliberalism, natural law, property, redistribution
Procedia PDF Downloads 3768291 Improving Taint Analysis of Android Applications Using Finite State Machines
Authors: Assad Maalouf, Lunjin Lu, James Lynott
Abstract:
We present a taint analysis that can automatically detect when string operations result in a string that is free of taints, where all the tainted patterns have been removed. This is an improvement on the conservative behavior of previous taint analyzers, where a string operation on a tainted string always leads to a tainted string unless the operation is manually marked as a sanitizer. The taint analysis is built on top of a string analysis that uses finite state automata to approximate the sets of values that string variables can take during the execution of a program. The proposed approach has been implemented as an extension of FlowDroid and experimental results show that the resulting taint analyzer is much more precise than the original FlowDroid.Keywords: android, static analysis, string analysis, taint analysis
Procedia PDF Downloads 1818290 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks
Authors: Ruchi Makani, B. V. R. Reddy
Abstract:
Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system
Procedia PDF Downloads 1788289 Relative Depth Dose Profile and Peak Scatter Factors Measurement for Co-60 Teletherapy Machine Using Chemical Dosimetry
Authors: O. Moussous, T. Medjadj
Abstract:
The suitability of a Fricke dosimeter for the measurement of a relative depth dose profile and the peak scatter factors was studied. The measurements were carried out in the secondary standard dosimetry laboratory at CRNA Algiers using a collimated 60Co gamma source teletherapy machine. The measurements were performed for different field sizes at the phantom front face, at a fixed source-to-phantom distance of 80 cm. The dose measurements were performed by first placing the dosimeters free-in-air at the distance-source-detector (DSD) of 80.5 cm from the source. Additional measurements were made with the phantom in place. The water phantom type Med-Tec 40x40x40 cm for vertical beam was used in this work as scattering martial. The phantom was placed on the irradiation bench of the cobalt unit at the SSD of 80 cm from the beam focus and the centre of the field coincided with the geometric centre of the dosimeters placed at the depth in water of 5 mm Relative depth dose profile and Peak scatter factors measurements were carried out using our Fricke system. This was intercompared with similar measurements by ionization chamber under identical conditions. There is a good agreement between the relative percentage depth–dose profiles and the PSF values measured by both systems using a water phantom.Keywords: Fricke dosimeter, depth–dose profiles, peak scatter factors, DSD
Procedia PDF Downloads 2528288 Measuring Greenhouse Gas Exchange from Paddy Field Using Eddy Covariance Method in Mekong Delta, Vietnam
Authors: Vu H. N. Khue, Marian Pavelka, Georg Jocher, Jiří Dušek, Le T. Son, Bui T. An, Ho Q. Bang, Pham Q. Huong
Abstract:
Agriculture is an important economic sector of Vietnam, the most popular of which is wet rice cultivation. These activities are also known as the main contributor to the national greenhouse gas. In order to understand more about greenhouse gas exchange in these activities and to investigate the factors influencing carbon cycling and sequestration in these types of ecosystems, since 2019, the first eddy covariance station has been installed in a paddy field in Long An province, Mekong Delta. The station was equipped with state-of-the-art equipment for CO₂ and CH₄ gas exchange and micrometeorology measurements. In this study, data from the station was processed following the ICOS recommendations (Integrated Carbon Observation System) standards for CO₂, while CH₄ was manually processed and gap-filled using a random forest model from methane-gapfill-ml, a machine learning package, as there is no standard method for CH₄ flux gap-filling yet. Finally, the carbon equivalent (Ce) balance based on CO₂ and CH₄ fluxes was estimated. The results show that in 2020, even though a new water management practice - alternate wetting and drying - was applied to reduce methane emissions, the paddy field released 928 g Cₑ.m⁻².yr⁻¹, and in 2021, it was reduced to 707 g Cₑ.m⁻².yr⁻¹. On a provincial level, rice cultivation activities in Long An, with a total area of 498,293 ha, released 4.6 million tons of Cₑ in 2020 and 3.5 million tons of Cₑ in 2021.Keywords: eddy covariance, greenhouse gas, methane, rice cultivation, Mekong Delta
Procedia PDF Downloads 1428287 IoT Based Soil Moisture Monitoring System for Indoor Plants
Authors: Gul Rahim Rahimi
Abstract:
The IoT-based soil moisture monitoring system for indoor plants is designed to address the challenges of maintaining optimal moisture levels in soil for plant growth and health. The system utilizes sensor technology to collect real-time data on soil moisture levels, which is then processed and analyzed using machine learning algorithms. This allows for accurate and timely monitoring of soil moisture levels, ensuring plants receive the appropriate amount of water to thrive. The main objectives of the system are twofold: to keep plants fresh and healthy by preventing water deficiency and to provide users with comprehensive insights into the water content of the soil on a daily and hourly basis. By monitoring soil moisture levels, users can identify patterns and trends in water consumption, allowing for more informed decision-making regarding watering schedules and plant care. The scope of the system extends to the agriculture industry, where it can be utilized to minimize the efforts required by farmers to monitor soil moisture levels manually. By automating the process of soil moisture monitoring, farmers can optimize water usage, improve crop yields, and reduce the risk of plant diseases associated with over or under-watering. Key technologies employed in the system include the Capacitive Soil Moisture Sensor V1.2 for accurate soil moisture measurement, the Node MCU ESP8266-12E Board for data transmission and communication, and the Arduino framework for programming and development. Additionally, machine learning algorithms are utilized to analyze the collected data and provide actionable insights. Cloud storage is utilized to store and manage the data collected from multiple sensors, allowing for easy access and retrieval of information. Overall, the IoT-based soil moisture monitoring system offers a scalable and efficient solution for indoor plant care, with potential applications in agriculture and beyond. By harnessing the power of IoT and machine learning, the system empowers users to make informed decisions about plant watering, leading to healthier and more vibrant indoor environments.Keywords: IoT-based, soil moisture monitoring, indoor plants, water management
Procedia PDF Downloads 518286 Chilean Business Orientalism: The Role of Non-State Actors in the Frame of Asymmetric Bilateral Relations
Authors: Pablo Ampuero, Claudia Labarca
Abstract:
The current research paper assesses how the narrative of Chilean businesspeople about China shapes a new Orientalism Analyses on the role of non-state actors in foreign policy that have hitherto theorized about Orientalism as a narrative of hegemonic power. Hence, it has been instrumental to the efforts of imperialist powers to justify their mission civilisatrice. However, such conceptualization can seldom explain new complexities of international interactions at the height of globalization. Hence, we assessed the case of Chile, a small Latin American country, and its relationship with China, its largest trading partner. Through a discourse analysis of interviews with Chilean businesspeople engaged in the Chinese market, we could determine that Chile is building an Orientalist image of China. This new business Orientalism reinforces a relation of alterity based on commercial opportunities, traditional values, and natural dispositions. Hence, the perception of the Chinese Other amongst Chilean business people frames a new set of representations as part of the essentially commercial nature of current bilateral relations. It differs from previous frames, such as the racial bias frame of the early 20th century, or the anti-communist frame in reaction to Mao’s leadership. As in every narrative of alterity, there is not only a construction of the Other but also a definition of the Self. Consequently, this analysis constitutes a relevant case of the role of non-state actors in asymmetrical bilateral relations, where the non-state actors of the minor power build and act upon an Orientalist frame, which is not representative of its national status in the relation. This study emerges as a contribution on the relation amongst non-state actors in asymmetrical relations, where the smaller power’s business class acts on a negative prejudice of its interactions with its counterpart. The research builds upon the constructivist approach to international relations, linking the idea of Nation Branding with Orientalism in the case of Chile-China relations.Keywords: new business Orientalism, small power, framing, Chile-China relations
Procedia PDF Downloads 3288285 Temperature Evolution, Microstructure and Mechanical Properties of Heat-Treatable Aluminum Alloy Welded by Friction Stir Welding: Comparison with Tungsten Inert Gas
Authors: Saliha Gachi, Mouloud Aissani, Fouad Boubenider
Abstract:
Friction Stir Welding (FSW) is a solid-state welding technique that can join material without melting the plates to be welded. In this work, we are interested to demonstrate the potentiality of FSW for joining the heat-treatable aluminum alloy 2024-T3 which is reputed as difficult to be welded by fusion techniques. Thereafter, the FSW joint is compared with another one obtained from a conventional fusion process Tungsten Inert Gas (TIG). FSW welds are made up using an FSW tool mounted on a milling machine. Single pass welding was applied to fabricated TIG joint. The comparison between the two processes has been made on the temperature evolution, mechanical and microstructure behavior. The microstructural examination revealed that FSW weld is composed of four zones: Base metal (BM), Heat affected zone (HAZ), Thermo-mechanical affected zone (THAZ) and the nugget zone (NZ). The NZ exhibits a recrystallized equiaxed refined grains that induce better mechanical properties and good ductility compared to TIG joint where the grains have a larger size in the welded region compared with the BM due to the elevated heat input. The microhardness results show that, in FSW weld, the THAZ contains the lowest microhardness values and increase in the NZ; however, in TIG process, the lowest values are localized on the NZ.Keywords: friction stir welding, tungsten inert gaz, aluminum, microstructure
Procedia PDF Downloads 2768284 Attitude of Youth Farmers to Climate Change Adaptation and Mitigation in Benue State, Nigeria
Authors: Cynthia E. Nwobodo, A. E. Agwu
Abstract:
The study was carried out in Benue State, Nigeria. Multi-stage sampling technique was used to select 120 respondents from two agricultural zones in the State. Data was collected using interview schedule. Descriptive statistics was used in data analysis. Findings showed that youth farmers in the area had positive attitude to climate change adaptation and mitigation as shown by their response to a set of positive and negative statement including: the youth are very important stakeholders in climate change issues (M= 2.91), youths should be encouraged to be climate change conscious (2.90), everybody should be involved in planting trees not just the government (M= 2.89), I will be glad to participate in climate change seminars (M= 2.89) among others. Findings on information seeking behavior indicate that majority (80.8 %) of the respondents sought climate change information from radio at an average of 19.78 times per month, 53.3 % sought from friends and neighbours at an average of 12.55 times per month and 42.5 % sought from family members at an average of 12.55 times per month among others. It was recommended that Youth farmers should be made important stakeholders in climate change policies and programmes since they have a very positive attitude to climate change adaptation and mitigation.Keywords: adaptation, mitigation, attitude, climate change, youth farmers
Procedia PDF Downloads 6498283 Fashion and Soft War: Analysis of Iran's Regulatory Measures for Fashion Industry
Authors: Leili Nekounazar
Abstract:
Since 2009, when the Green movement, Iran’s most significant political uprising in post-Islamic revolution materialized, the term 'soft war' has become an integral part of the Iranian regime’s lexicon when addressing the media propaganda waged by the west and the regime’s so-called 'enemies'. Iran’s authorities describe soft war as a western campaign aiming at undermining the revolutionary values by covert activities, deploying cultural tools and purposeful dissemination of information. With this respect, Internet and in particular, the social media networks, and oppositional radio-television broadcasts have been considered as the west’s soft war conduits. With the rising of the underground fashion industry in the past couple of years that does not conform to the compulsory dress codes prescribed by the state, the Islamic regime expands the soft war narrative to include any undesired fashion-related activities and frames the rising fashion industry as a cultural war intoxicating the Iranian-Islamic identity. Accordingly, fashion products created by the Iranian fashion intermediators have been attributed to the westerners and outsiders and are regarded as the matter of national security. This study examines the reactive and proactive measures deployed by the Iranian regime to control the rise of fashion industry. It further puts under the scrutiny how the state as a part of its proactive measure shapes the narrative of 'soft war' in relation to fashion in Iran and explores how the notion of soft war has been articulated in relation to the modeling and fashion in the state’s political rhetoric. Through conducting a content analysis of the authorities’ statements, it describes how the narrative of soft war assists the state policing the fashion industry.Keywords: censorship, fashion, Iran, soft war
Procedia PDF Downloads 3448282 Teachers' and Learners' ICT-Readiness Assessment for Agricultural Science Instruction in Secondary Schools in Ogun State, Nigeria
Authors: A. Olusegun Egunjobi, Samson Sunday Adekunte
Abstract:
This study investigated the teachers’ and learners’ ICT-readiness assessment for agricultural science instruction in secondary schools in Ogun State, Nigeria. However, the sample population of 6 and 120 agricultural science teachers and learners were randomly selected respectively from 3 public and 3 private senior secondary schools in Ado-Odo/Ota Local Government Area of Ogun State, Nigeria. Descriptive survey design of ex post-facto type was adopted for the study. Two structured questionnaires tagged Teachers’ and Learners’ Questionnaires on ICT-Readiness for Agricultural Science Instruction TQICTRASI and LQICTRASI respectively were used for data collection. The two questionnaires were subjected to Cronbach alpha coefficient with the results 0.86 and 0.82 respectively. Five research hypotheses were tested at 0.05 level of significance. Findings revealed that teachers in private senior secondary school (SSS) were more ready and prepared than their counterparts in public SSS with the result t-value = 4.25 greater than t-critical = 2.77, df = 4 at p<0.05. Also, learners in private SSS were more prepared and ready for the utilisation of ICT-facilities for agricultural science instruction with the result t-value = 3.51 greater than t-critical = 1.98, df = 118 at p<0.05. However, male and female learners in both private and public SSS were equally prepared and ready for the ICT-facilities utilisation for agricultural science instruction, thus, there were no significant differences in their ICT-readiness. Therefore, the study proffered that, both male and female teachers and learners should be more ICT-compliant and always ready to upgrade their skills and knowledge in ICT-facilities, utilisation for agricultural science instruction and even for other school subjects particularly in Ogun State and in generally in Nigeria.Keywords: ICT-readiness, teachers’ and learners’ assessment, private and public senior secondary schools, agricultural science instruction
Procedia PDF Downloads 3718281 Customer Preference in the Textile Market: Fabric-Based Analysis
Authors: Francisca Margarita Ocran
Abstract:
Underwear, and more particularly bras and panties, are defined as intimate clothing. Strictly speaking, they enhance the place of women in the public or private satchel. Therefore, women's lingerie is a complex garment with a high involvement profile, motivating consumers to buy it not only by its functional utility but also by the multisensory experience it provides them. Customer behavior models are generally based on customer data mining, and each model is designed to answer questions at a specific time. Predicting the customer experience is uncertain and difficult. Thus, knowledge of consumers' tastes in lingerie deserves to be treated as an experiential product, where the dimensions of the experience motivating consumers to buy a lingerie product and to remain faithful to it must be analyzed in detail by the manufacturers and retailers to engage and retain consumers, which is why this research aims to identify the variables that push consumers to choose their lingerie product, based on an in-depth analysis of the types of fabrics used to make lingerie. The data used in this study comes from online purchases. Machine learning approach with the use of Python programming language and Pycaret gives us a precision of 86.34%, 85.98%, and 84.55% for the three algorithms to use concerning the preference of a buyer in front of a range of lingerie. Gradient Boosting, random forest, and K Neighbors were used in this study; they are very promising and rich in the classification of preference in the textile industry.Keywords: consumer behavior, data mining, lingerie, machine learning, preference
Procedia PDF Downloads 908280 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 2308279 Modeling Optimal Lipophilicity and Drug Performance in Ligand-Receptor Interactions: A Machine Learning Approach to Drug Discovery
Authors: Jay Ananth
Abstract:
The drug discovery process currently requires numerous years of clinical testing as well as money just for a single drug to earn FDA approval. For drugs that even make it this far in the process, there is a very slim chance of receiving FDA approval, resulting in detrimental hurdles to drug accessibility. To minimize these inefficiencies, numerous studies have implemented computational methods, although few computational investigations have focused on a crucial feature of drugs: lipophilicity. Lipophilicity is a physical attribute of a compound that measures its solubility in lipids and is a determinant of drug efficacy. This project leverages Artificial Intelligence to predict the impact of a drug’s lipophilicity on its performance by accounting for factors such as binding affinity and toxicity. The model predicted lipophilicity and binding affinity in the validation set with very high R² scores of 0.921 and 0.788, respectively, while also being applicable to a variety of target receptors. The results expressed a strong positive correlation between lipophilicity and both binding affinity and toxicity. The model helps in both drug development and discovery, providing every pharmaceutical company with recommended lipophilicity levels for drug candidates as well as a rapid assessment of early-stage drugs prior to any testing, eliminating significant amounts of time and resources currently restricting drug accessibility.Keywords: drug discovery, lipophilicity, ligand-receptor interactions, machine learning, drug development
Procedia PDF Downloads 1118278 Factors Associated with Unintended Pregnancy amongst Currently Married Pregnant Women in Ilesa Osun State, Nigeria
Authors: O. S. Asaolu, A. Bolorunduro
Abstract:
Background: Unwanted, mistimed and unintended pregnancy is an important public health issue and the most common cause of maternal mortality in developing countries. Unintended pregnancy is a potential hazard for every sexually active woman as it most times ends in unsafe abortion. The study aimed at assessing the pre-conception contraceptive use, prevalence of unintended pregnancies and the non-contraceptive factors associated with unintended pregnancy amongst currently married women in Osun state. Methodology: A descriptive cross-sectional study among randomly selected 341 currently married pregnant women attending antenatal clinics in Ilesa town of Osun state was conducted in 5 health facilities. A random selection of 5 of the 22 health facilities in the state was done. Data was collected through a self-administered questionnaire and all completed questionnaires were analyzed with SPSS. Result: About two-fifth of the currently pregnant women (40%) who has never used an FP method reported that their current pregnancy was unintended. The results indicate that age of women, age at first sex, substance use, total children ever born of children, religion, and extramarital affairs were key predictors of unintended pregnancy. Women who have higher parity are more likely to experience unintended pregnancy compared to women with lower parity (odds ratio, 0.25). Furthermore, those women who don’t engage in extra marital affairs were less likely to experience unintended pregnancy (odds ratio, 0.3) compared to those who do not. Contribution to knowledge: The predicted probability, using logistic regression, has shown that women who engage in extramarital affairs and women with high parity are more likely to have unintended pregnancy. Conclusion: Behaviour change programs should aim to reduce unintended pregnancy by focusing mostly on identified factors so that the need for abortion is decreased and the overall well-being of the family is maintained and enhanced.Keywords: unintended pregnancy, factors, pregnant women, Nigeria
Procedia PDF Downloads 3898277 Power System Stability Enhancement Using Self Tuning Fuzzy PI Controller for TCSC
Authors: Salman Hameed
Abstract:
In this paper, a self-tuning fuzzy PI controller (STFPIC) is proposed for thyristor controlled series capacitor (TCSC) to improve power system dynamic performance. In a STFPIC controller, the output scaling factor is adjusted on-line by an updating factor (α). The value of α is determined from a fuzzy rule-base defined on error (e) and change of error (Δe) of the controlled variable. The proposed self-tuning controller is designed using a very simple control rule-base and the most natural and unbiased membership functions (MFs) (symmetric triangles with equal base and 50% overlap with neighboring MFs). The comparative performances of the proposed STFPIC and the standard fuzzy PI controller (FPIC) have been investigated on a multi-machine power system (namely, 4 machine two area system) through detailed non-linear simulation studies using MATLAB/SIMULINK. From the simulation studies it has been found out that for damping oscillations, the performance of the proposed STFPIC is better than that obtained by the standard FPIC. Moreover, the proposed STFPIC as well as the FPIC have been found to be quite effective in damping oscillations over a wide range of operating conditions and are quite effective in enhancing the power carrying capability of the power system significantly.Keywords: genetic algorithm, power system stability, self-tuning fuzzy controller, thyristor controlled series capacitor
Procedia PDF Downloads 4238276 Evaluating Models Through Feature Selection Methods Using Data Driven Approach
Authors: Shital Patil, Surendra Bhosale
Abstract:
Cardiac diseases are the leading causes of mortality and morbidity in the world, from recent few decades accounting for a large number of deaths have emerged as the most life-threatening disorder globally. Machine learning and Artificial intelligence have been playing key role in predicting the heart diseases. A relevant set of feature can be very helpful in predicting the disease accurately. In this study, we proposed a comparative analysis of 4 different features selection methods and evaluated their performance with both raw (Unbalanced dataset) and sampled (Balanced) dataset. The publicly available Z-Alizadeh Sani dataset have been used for this study. Four feature selection methods: Data Analysis, minimum Redundancy maximum Relevance (mRMR), Recursive Feature Elimination (RFE), Chi-squared are used in this study. These methods are tested with 8 different classification models to get the best accuracy possible. Using balanced and unbalanced dataset, the study shows promising results in terms of various performance metrics in accurately predicting heart disease. Experimental results obtained by the proposed method with the raw data obtains maximum AUC of 100%, maximum F1 score of 94%, maximum Recall of 98%, maximum Precision of 93%. While with the balanced dataset obtained results are, maximum AUC of 100%, F1-score 95%, maximum Recall of 95%, maximum Precision of 97%.Keywords: cardio vascular diseases, machine learning, feature selection, SMOTE
Procedia PDF Downloads 1188275 Effect of Iron Oxide Addition on the Solid-State Synthesis of Ye’Elimite
Authors: F. Z. Abir, M. Mesnaoui, Y. Abouliatim, L. Nibou, Y. El Hafiane, A. Smith
Abstract:
The cement industry has been taking significant steps for years to reduce its carbon footprint by opting for an eco-friendly alternative such as Calcium Sulfoaluminate Cements (CSA). These binders, compared to Ordinary Portland Cements (OPC), have two advantages: reduction of the CO2 emissions and energy-saving because the sintering temperature of CSA cements is between 1250 and 1350 °C, which means 100 to 200 °C less than OPC. The aim of this work is to study the impurities effect, such as iron oxide, on the formation of the ye'elimite phase, which represents the main phase of Calcium Sulfoaluminate Cements and the consequence on its hydration. Several elaborations and characterization techniques were used to study the structure and microstructure of ye'elimite, such as X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), thermal analysis, specific surface area measurement, and electrical conductivity of diluted solutions. This study details the protocol for the solid-state synthesis of ye'elimite containing increasing amounts of iron (general formula: Ca4Al(6-2x)Fe2xSO16 with x = 0.00 to 1.13). Ye'elimite is formed by solid-state reactions between Al2O3, CaO and CaSO4 and the maximum ye'elimite content is reached at a sintering temperature of 1300 °C. The presence of iron promotes the formation of cubic ye'elimite at the expense of the orthorhombic phase. The total incorporation of iron in ye'elimite structure is possible when x < 0.12. Beyond this content, the ferritic phase (CaO)2(Al2O3,Fe2O3) appears as a minor phase and develops two different morphologies during cooling: dendritic crystals and melt morphology. The formation of the ferrous liquid phase affects the evolution of grain size of the ye’elimite and calcium aluminates.Keywords: calcium sulfoaluminate cement, ferritic phase, sintering, solid-state synthesis, ye’elimite
Procedia PDF Downloads 1898274 Migrant Labour in Kerala: A Study on Inter-State Migrant Workers
Authors: Arun Perumbilavil Anand
Abstract:
In the recent years, Kerala is witnessing a large inflow of migrants from different parts of the country. Though initially, the migrants were largely from the districts of Tamil Nadu and mostly of seasonal nature, but at a later period, the state started getting migrants from the far-off states like UP, Assam, Bengal, etc. Higher wages for unskilled labour, large opportunities for employment, the reluctance on the part of Kerala workers to do menial and hard physical work, and the shortage of local labour, paradoxically despite the high unemployment rate in the state, led to the massive influx of migrant labourers. This study takes a multi-dimensional overview of migrant labour in Kerala by encompassing factors such as channels of migration, nature of employment contracts entered into and the corresponding wages and benefits obtained by them. The study also analysed the circumstances that led to the large influx of migrants from different states of India. It further makes an attempt to examine the varying dimensions of living and working environment, and also the health conditions of migrants. The study is based on the empirical findings obtained as a result of the primary interviews conducted with migrants in the districts of Palakkad, Malappuram, and Ernakulam. The study concludes by noting that Kerala will inevitably have to depend on migrant labour and is likely to experience heavy in-migration of labour in future, provided that if the existing socioeconomic and demographic situations persist. Since, this is inevitable, the best way before the state is to prepare well in advance to receive and accommodate such migrant labour to lead a comfortable life in a hassle free environment, so that it would definitely play a vital role in further strengthening and sustaining the growth trajectory of not only Kerala’s economy but also the states of origin.Keywords: Kerala, labour, migration, migrant workers
Procedia PDF Downloads 2538273 Virtual Test Model for Qualification of Knee Prosthesis
Authors: K. Zehouani, I. Oldal
Abstract:
Purpose: In the human knee joint, degenerative joint disease may happen with time. The standard treatment of this disease is the total knee replacement through prosthesis implanting. The reason lies in the fact that this phenomenon causes different material abrasion as compare to pure sliding or rolling alone. This study focuses on developing a knee prosthesis geometry, which fulfills the mechanical and kinematical requirements. Method: The MSC ADAMS program is used to describe the rotation of the human knee joint as a function of flexion, and to investigate how the flexion and rotation movement changes between the condyles of a multi-body model of the knee prosthesis as a function of flexion angle (in the functional arc of the knee (20-120º)). Moreover, the multi-body model with identical boundary conditions is constituted, and the numerical simulations are carried out using the MSC ADAMS program system. Results: It is concluded that the use of the multi-body model reduces time and cost since it does not need to manufacture the tibia and the femur as it requires for the knee prosthesis of the test machine. Moreover, without measuring or by dispensing with a test machine for the knee prosthesis geometry, approximation of the results of our model to a human knee is carried out directly. Conclusion: The pattern obtained by the multi-body model provides an insight for future experimental tests related to the rotation and flexion of the knee joint concerning the actual average and friction load.Keywords: biomechanics, knee joint, rotation, flexion, kinematics, MSC ADAMS
Procedia PDF Downloads 144