Search results for: critical path segments
5161 3d Property Modelling of the Lower Acacus Reservoir, Ghadames Basin, Libya
Authors: Aimen Saleh
Abstract:
The Silurian Lower Acacus sandstone is one of the main reservoirs in North West Libya. Our aim in this study is to grasp a robust understanding of the hydrocarbon potential and distribution in the area. To date, the depositional environment of the Lower Acacus reservoir still open to discussion and contradiction. Henceforth, building three dimensional (3D) property modelling is one way to support the analysis and description of the reservoir, its properties and characterizations, so this will be of great value in this project. The 3D model integrates different data set, these incorporates well logs data, petrophysical reservoir properties and seismic data as well. The finalized depositional environment model of the Lower Acacus concludes that the area is located in a deltaic transitional depositional setting, which ranges from a wave dominated delta into tide dominated delta type. This interpretation carried out through a series of steps of model generation, core description and Formation Microresistivity Image tool (FMI) interpretation. After the analysis of the core data, the Lower Acacus layers shows a strong effect of tidal energy. Whereas these traces found imprinted in different types of sedimentary structures, for examples; presence of some crossbedding, such as herringbones structures, wavy and flaser cross beddings. In spite of recognition of some minor marine transgression events in the area, on the contrary, the coarsening upward cycles of sand and shale layers in the Lower Acacus demonstrate presence of a major regressive phase of the sea level. However, consequently, we produced a final package of this model in a complemented set of facies distribution, porosity and oil presence. And also it shows the record of the petroleum system, and the procedure of Hydrocarbon migration and accumulation. Finally, this model suggests that the area can be outlined into three main segments of hydrocarbon potential, which can be a textbook guide for future exploration and production strategies in the area.Keywords: Acacus, Ghadames , Libya, Silurian
Procedia PDF Downloads 1435160 Risk Aversion and Dynamic Games between Hydroelectric Operators under Uncertainty
Authors: Abdessalem Abbassi, Ahlem Dakhlaoui, Lota D. Tamini
Abstract:
This article analyses management of hydropower dams within two different industrial structures: monopolistic and oligopolistic; when hydroelectricity producers are risk averse and face demand uncertainty. In each type of market structure we determine the water release path in closed-loop equilibrium. We show how a monopoly can manage its hydropower dams by additional pumping or storage depending on the relative abundance of water between different regions to smooth the effect of uncertainty on electricity prices. In the oligopolistic case with symmetric rates of risk aversion, we determine the conditions under which the relative scarcity (abundance) of water in the dam of a hydroelectric operator can favor additional strategic pumping (storage) in its competitor’s dams. When there is asymmetry of the risk aversion coefficient, the firm’s hydroelectricity production increases as its competitor’s risk aversion increases, if and only if the average recharge speed of the competitor’s dam exceeds a certain threshold, which is an increasing function of its average water inflows.Keywords: asymmetric risk aversion, closed-loop Cournot competition, electricity wholesale market, hydropower dams
Procedia PDF Downloads 3545159 Separation of Powers and Judicial Review vis-a-vis Judicial Overreach in South Africa: A Critical Analysis
Authors: Linda Muswaka
Abstract:
The Constitution of the Republic of South Africa, 1996 ranks the Constitution as the Supreme law of the Republic. Law or conduct, inconsistent with the provisions of the Constitution is invalid to the extent of the inconsistency. The Constitution binds all persons and legislative, executive and judicial organs of the State at all levels of government. The Constitution embodies a Bill of Rights and expressly allows for judicial review. The introduction of a chapter of rights requires the judiciary to examine the decisions of the legislature and the executive. In a situation where these conflicts with the Bill of Rights, the judiciary have the constitutional power to overrule such decisions. In exercising its adjudicatory and interpretative powers, the judiciary sometimes arrives at unpopular decisions and accusations of judicial overreach are made. A problem, therefore, emerges on the issue of the separation of powers and judicial review. This paper proposes to, through the South African perspective, investigate the application of the doctrine of separation of powers and judicial review. In this regard, the qualitative method of research will be employed. The reason is that it is best suited to this type of study which entails a critical analysis of legal issues. The following findings are made: (i) a complete separation of powers is not possible. This is because some overlapping of the functions of the three branches of state are unavoidable; (ii) the powers vested in the judiciary does not make it more powerful than the executive and the legislature; (iii) interference by the judiciary in matters concerning other branches is not automatically, judicial overreach; and (iv) if both the executive and legislative organs of government adhere to their constitutional obligations there would be a decrease in the need for judicial interference through court adjudication. The researcher concludes by submitting that the judiciary should not derogate from their constitutionally mandated function of judicial review. The rationale being that that if the values contained in the Constitution are not scrupulously observed and their precepts not carried out conscientiously, the result will be a constitutional crisis of great magnitude.Keywords: constitution, judicial review, judicial overreach, separation of powers
Procedia PDF Downloads 2165158 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China
Authors: Xiaofei Zhu
Abstract:
As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change
Procedia PDF Downloads 1395157 The Influence of the Institutional Environment in Increasing Wealth: The Case of Women Business Operators in a Rural Setting
Authors: S. Archsana, Vajira Balasuriya
Abstract:
In Trincomalee of Sri Lanka, a post-conflict area, resettlement projects and policy initiatives are taking place to improve the wealth of the rural communities through promoting economic activities by way of encouraging the rural women to opt to commence and operate Micro and Small Scale (MSS) businesses. This study attempts to identify the manner in which the institutional environment could facilitate these MSS businesses owned and operated by women in the rural environment. The respondents of this study are the beneficiaries of the Divi Neguma Development Training Program (DNDTP); a project designed to aid women owned MSS businesses, in Trincomalee district. 96 women business operators, who had obtained financing facilities from the DNDTP, are taken as the sample based on fixed interval random sampling method. The study reveals that primary challenges encountered by 82% of the women business operators are lack of initial capital followed by 71% initial market finding and 35% access to technology. The low level of education and language barriers are the constraints in accessing support agencies/service providers. Institutional support; specifically management and marketing services, have a significant relationship with wealth augmentation. Institutional support at the setting-up stage of businesses are thin whereas terms and conditions of the finance facilities are perceived as ‘too challenging’. Although diversification enhances wealth of the rural women business operators, assistance from the institutional framework to prepare financial reports that are required for business expansion is skinny. The study further reveals that institutional support is very much weak in terms of providing access to new technology and identifying new market networks. A mechanism that could facilitate the institutional framework to support the rural women business operators to access new technology and untapped market segments, and assistance in preparation of legal and financial documentation is recommended.Keywords: business facilitation, institutional support, rural women business operators, wealth augmentation
Procedia PDF Downloads 4375156 Ensuring Safe Operation by Providing an End-To-End Field Monitoring and Incident Management Approach for Autonomous Vehicle Based on ML/Dl SW Stack
Authors: Lucas Bublitz, Michael Herdrich
Abstract:
By achieving the first commercialization approval in San Francisco the Autonomous Driving (AD) industry proves the technology maturity of the SAE L4 AD systems and the corresponding software and hardware stack. This milestone reflects the upcoming phase in the industry, where the focus is now about scaling and supervising larger autonomous vehicle (AV) fleets in different operation areas. This requires an operation framework, which organizes and assigns responsibilities to the relevant AV technology and operation stakeholders from the AV system provider, the Remote Intervention Operator, the MaaS provider and regulatory & approval authority. This holistic operation framework consists of technological, processual, and organizational activities to ensure safe operation for fully automated vehicles. Regarding the supervision of large autonomous vehicle fleets, a major focus is on the continuous field monitoring. The field monitoring approach must reflect the safety and security criticality of incidents in the field during driving operation. This includes an automatic containment approach, with the overall goal to avoid safety critical incidents and reduce downtime by a malfunction of the AD software stack. An End-to-end (E2E) field monitoring approach detects critical faults in the field, uses a knowledge-based approach for evaluating the safety criticality and supports the automatic containment of these E/E faults. Applying such an approach will ensure the scalability of AV fleets, which is determined by the handling of incidents in the field and the continuous regulatory compliance of the technology after enhancing the Operational Design Domain (ODD) or the function scope by Functions on Demand (FoD) over the entire digital product lifecycle.Keywords: field monitoring, incident management, multicompliance management for AI in AD, root cause analysis, database approach
Procedia PDF Downloads 755155 Development of the Integrated Quality Management System of Cooked Sausage Products
Authors: Liubov Lutsyshyn, Yaroslava Zhukova
Abstract:
Over the past twenty years, there has been a drastic change in the mode of nutrition in many countries which has been reflected in the development of new products, production techniques, and has also led to the expansion of sales markets for food products. Studies have shown that solution of the food safety problems is almost impossible without the active and systematic activity of organizations directly involved in the production, storage and sale of food products, as well as without management of end-to-end traceability and exchange of information. The aim of this research is development of the integrated system of the quality management and safety assurance based on the principles of HACCP, traceability and system approach with creation of an algorithm for the identification and monitoring of parameters of technological process of manufacture of cooked sausage products. Methodology of implementation of the integrated system based on the principles of HACCP, traceability and system approach during the manufacturing of cooked sausage products for effective provision for the defined properties of the finished product has been developed. As a result of the research evaluation technique and criteria of performance of the implementation and operation of the system of the quality management and safety assurance based on the principles of HACCP have been developed and substantiated. In the paper regularities of influence of the application of HACCP principles, traceability and system approach on parameters of quality and safety of the finished product have been revealed. In the study regularities in identification of critical control points have been determined. The algorithm of functioning of the integrated system of the quality management and safety assurance has also been described and key requirements for the development of software allowing the prediction of properties of finished product, as well as the timely correction of the technological process and traceability of manufacturing flows have been defined. Based on the obtained results typical scheme of the integrated system of the quality management and safety assurance based on HACCP principles with the elements of end-to-end traceability and system approach for manufacture of cooked sausage products has been developed. As a result of the studies quantitative criteria for evaluation of performance of the system of the quality management and safety assurance have been developed. A set of guidance documents for the implementation and evaluation of the integrated system based on the HACCP principles in meat processing plants have also been developed. On the basis of the research the effectiveness of application of continuous monitoring of the manufacturing process during the control on the identified critical control points have been revealed. The optimal number of critical control points in relation to the manufacture of cooked sausage products has been substantiated. The main results of the research have been appraised during 2013-2014 under the conditions of seven enterprises of the meat processing industry and have been implemented at JSC «Kyiv meat processing plant».Keywords: cooked sausage products, HACCP, quality management, safety assurance
Procedia PDF Downloads 2475154 Quantifying Uncertainties in an Archetype-Based Building Stock Energy Model by Use of Individual Building Models
Authors: Morten Brøgger, Kim Wittchen
Abstract:
Focus on reducing energy consumption in existing buildings at large scale, e.g. in cities or countries, has been increasing in recent years. In order to reduce energy consumption in existing buildings, political incentive schemes are put in place and large scale investments are made by utility companies. Prioritising these investments requires a comprehensive overview of the energy consumption in the existing building stock, as well as potential energy-savings. However, a building stock comprises thousands of buildings with different characteristics making it difficult to model energy consumption accurately. Moreover, the complexity of the building stock makes it difficult to convey model results to policymakers and other stakeholders. In order to manage the complexity of the building stock, building archetypes are often employed in building stock energy models (BSEMs). Building archetypes are formed by segmenting the building stock according to specific characteristics. Segmenting the building stock according to building type and building age is common, among other things because this information is often easily available. This segmentation makes it easy to convey results to non-experts. However, using a single archetypical building to represent all buildings in a segment of the building stock is associated with loss of detail. Thermal characteristics are aggregated while other characteristics, which could affect the energy efficiency of a building, are disregarded. Thus, using a simplified representation of the building stock could come at the expense of the accuracy of the model. The present study evaluates the accuracy of a conventional archetype-based BSEM that segments the building stock according to building type- and age. The accuracy is evaluated in terms of the archetypes’ ability to accurately emulate the average energy demands of the corresponding buildings they were meant to represent. This is done for the buildings’ energy demands as a whole as well as for relevant sub-demands. Both are evaluated in relation to the type- and the age of the building. This should provide researchers, who use archetypes in BSEMs, with an indication of the expected accuracy of the conventional archetype model, as well as the accuracy lost in specific parts of the calculation, due to use of the archetype method.Keywords: building stock energy modelling, energy-savings, archetype
Procedia PDF Downloads 1545153 A Tool to Provide Advanced Secure Exchange of Electronic Documents through Europe
Authors: Jesus Carretero, Mario Vasile, Javier Garcia-Blas, Felix Garcia-Carballeira
Abstract:
Supporting cross-border secure and reliable exchange of data and documents and to promote data interoperability is critical for Europe to enhance sector (like eFinance, eJustice and eHealth). This work presents the status and results of the European Project MADE, a Research Project funded by Connecting Europe facility Programme, to provide secure e-invoicing and e-document exchange systems among Europe countries in compliance with the eIDAS Regulation (Regulation EU 910/2014 on electronic identification and trust services). The main goal of MADE is to develop six new AS4 Access Points and SMP in Europe to provide secure document exchanges using the eDelivery DSI (Digital Service Infrastructure) amongst both private and public entities. Moreover, the project demonstrates the feasibility and interest of the solution provided by providing several months of interoperability among the providers of the six partners in different EU countries. To achieve those goals, we have followed a methodology setting first a common background for requirements in the partner countries and the European regulations. Then, the partners have implemented access points in each country, including their service metadata publisher (SMP), to allow the access to their clients to the pan-European network. Finally, we have setup interoperability tests with the other access points of the consortium. The tests will include the use of each entity production-ready Information Systems that process the data to confirm all steps of the data exchange. For the access points, we have chosen AS4 instead of other existing alternatives because it supports multiple payloads, native web services, pulling facilities, lightweight client implementations, modern crypto algorithms, and more authentication types, like username-password and X.509 authentication and SAML authentication. The main contribution of MADE project is to open the path for European companies to use eDelivery services with cross-border exchange of electronic documents following PEPPOL (Pan-European Public Procurement Online) based on the e-SENS AS4 Profile. It also includes the development/integration of new components, integration of new and existing logging and traceability solutions and maintenance tool support for PKI. Moreover, we have found that most companies are still not ready to support those profiles. Thus further efforts will be needed to promote this technology into the companies. The consortium includes the following 9 partners. From them, 2 are research institutions: University Carlos III of Madrid (Coordinator), and Universidad Politecnica de Valencia. The other 7 (EDICOM, BIZbrains, Officient, Aksesspunkt Norge, eConnect, LMT group, Unimaze) are private entities specialized in secure delivery of electronic documents and information integration brokerage in their respective countries. To achieve cross-border operativity, they will include AS4 and SMP services in their platforms according to the EU Core Service Platform. Made project is instrumental to test the feasibility of cross-border documents eDelivery in Europe. If successful, not only einvoices, but many other types of documents will be securely exchanged through Europe. It will be the base to extend the network to the whole Europe. This project has been funded under the Connecting Europe Facility Agreement number: INEA/CEF/ICT/A2016/1278042. Action No: 2016-EU-IA-0063.Keywords: security, e-delivery, e-invoicing, e-delivery, e-document exchange, trust
Procedia PDF Downloads 2655152 Navigating the Ripple Effect: Deconstructing the Multilayered Impact of Fuel Subsidy Removal on Nigeria’s Educational Landscape
Authors: Abimbola Mobolanle Adu, Marcus Tayo Akinlade
Abstract:
This comprehensive study systematically dissects the intricate interplay between the removal of fuel subsidy and its multifaceted repercussions on Nigeria's educational system. Originating in the 1970s, the fuel subsidy policy initially conceived to curtail fuel costs and faced financial unsustainability. In 2023, President Bola Tinubu's administration announced its cessation. The resultant escalation in petroleum product prices precipitated challenges within the education sector, manifesting as heightened administrative costs, increased student fees, amplified dropout rates, and others. Employing a qualitative research methodology, grounded in Critical Theory, the study draws from diverse secondary sources and employs content analysis to unravel the intricate layers of this issue. Critical Theory provides a lens through which the power dynamics, socio-economic structures, and ideological influences shaping policy decisions can be critically examined, offering a deeper understanding of the multifaceted impact. Findings underscore the imperative for strategic interventions, advocating for investments in technology and the exploration of alternative energy sources. The paper concludes by emphasizing the pivotal role of education, advocating for nuanced policies to alleviate the impact on both private and public educational institutions. In essence, this research contributes nuanced insights into the labyrinthine dynamics between fuel subsidy policies and the educational sector, underscoring the exigency for meticulous interventions to fortify the nation's educational foundation.Keywords: administration, education, fuel subsidy, policy, multilayered impact
Procedia PDF Downloads 595151 Genetic Variability and Principal Component Analysis in Eggplant (Solanum melongena)
Authors: M. R. Naroui Rad, A. Ghalandarzehi, J. A. Koohpayegani
Abstract:
Nine advanced cultivars and lines were planted in transplant trays on March, 2013. In mid-April 2014, nine cultivars and lines were taken from the seedling trays and were evaluated and compared in an experiment in form of a completely randomized block design with three replications at the Agricultural Research Station, Zahak. The results of the analysis of variance showed that there was a significant difference between the studied cultivars in terms of average fruit weight, fruit length, fruit diameter, ratio of fruit length to its diameter, the relative number of seeds per fruit, and each plant yield. The total yield of Sohrab and Y6 line with and an average of 41.9 and 36.7 t/ ha allocated the highest yield respectively to themselves. The results of simple correlation between the analyzed traits showed the final yield was affected by the average fruit weight due to direct and indirect effects of fruit weight and plant yield on the final yield. The genotypic and heritability values were high for fruit weight, fruit length and number of seed per fruit. The first two principal components accounted for 81.6% of the total variation among the characters describing genotypes.Keywords: eggplant, principal component, variation, path analysis
Procedia PDF Downloads 2325150 Effects, Causes, and Prevention of Teen Dating Violence
Authors: Isabel Jones
Abstract:
As adolescence is a formative time, experiences during adolescence often affect the rest of one’s life. Therefore, dating, specifically violence in dating, can have lasting effects on the rest of one’s life. In order to find sources, searches were conducted on PsycINFO, specifically EBSCO, and narrowed down under the criteria that the source contained information about adolescent dating violence rather than adult, and focused on causes, effects, or prevention methods. This literature review examines research regarding the effects and causes of TDV, and then what methods are effective in the prevention of TDV development. This will allow for a clear image of how these prevention methods are effective and why they are important. Effects of TDV extend beyond the physical, including psychological and sexual long-lasting effects. These are caused by a number of concepts, including learned behavior, inhibitory issues/substance abuse, and cultural factors. When both of these are taken into account, preventative measures such as school-based interventions, parental/adult monitoring, and the presence of positive family examples are more clear as to their effectiveness. This literature review may provide further awareness to this public health crisis and give the public a view of how adolescents are affected by TDV on their path from child to adult.Keywords: adolescence, dating violence, risk factors, predictors, relationship
Procedia PDF Downloads 685149 Understanding and Explaining Urban Resilience and Vulnerability: A Framework for Analyzing the Complex Adaptive Nature of Cities
Authors: Richard Wolfel, Amy Richmond
Abstract:
Urban resilience and vulnerability are critical concepts in the modern city due to the increased sociocultural, political, economic, demographic, and environmental stressors that influence current urban dynamics. Urban scholars need help explaining urban resilience and vulnerability. First, cities are dominated by people, which is challenging to model, both from an explanatory and a predictive perspective. Second, urban regions are highly recursive in nature, meaning they not only influence human action, but the structures of cities are constantly changing due to human actions. As a result, explanatory frameworks must continuously evolve as humans influence and are influenced by the urban environment in which they operate. Finally, modern cities have populations, sociocultural characteristics, economic flows, and environmental impacts on order of magnitude well beyond the cities of the past. As a result, the frameworks that seek to explain the various functions of a city that influence urban resilience and vulnerability must address the complex adaptive nature of cities and the interaction of many distinct factors that influence resilience and vulnerability in the city. This project develops a taxonomy and framework for organizing and explaining urban vulnerability. The framework is built on a well-established political development model that includes six critical classes of urban dynamics: political presence, political legitimacy, political participation, identity, production, and allocation. In addition, the framework explores how environmental security and technology influence and are influenced by the six elements of political development. The framework aims to identify key tipping points in society that act as influential agents of urban vulnerability in a region. This will help analysts and scholars predict and explain the influence of both physical and human geographical stressors in a dense urban area.Keywords: urban resilience, vulnerability, sociocultural stressors, political stressors
Procedia PDF Downloads 1165148 Role of Fracturing, Brecciation and Calcite Veining in Fluids Flow and Permeability Enhancement in Low-Porosity Rock Masses: Case Study of Boulaaba Aptian Dolostones, Kasserine, Central Tunisia
Authors: Mohamed Khali Zidi, Mohsen Henchiri, Walid Ben Ahmed
Abstract:
In the context of a hypogene hydrothermal travertine system, including low-porosity brittle bedrock and rock-mass permeability in Aptian dolostone of Boulaaba, Kasserine is enhanced through faulting and fracturing. This permeability enhancement related to the deformation modes along faults and fractures is likely to be in competition with permeability reduction when microcracks, fractures, and faults all become infilled with breccias and low-permeability hydrothermal precipitates. So that, fault continual or intermittent reactivation is probably necessary for them to keep their potential as structural high-permeability conduits. Dilational normal faults in strong mechanical stratigraphy associated with fault segments with dip changes are sites for porosity and permeability in groundwater infiltration and flow, hydrocarbon reservoirs, and also may be important sources of mineralization. The brecciation mechanism through dilational faulting and gravitational collapse originates according to hosting lithologies chaotic clast-supported breccia in strong lithologies such as sandstones, limestones, and dolostones, and matrix-supported cataclastic in weaker lithologies such as marls and shales. Breccias contribute to controlling fluid flow when the porosity is sealed either by low-permeability hydrothermal precipitates or by fine matrix materials. All these mechanisms of fault-related rock-mass permeability enhancement and reduction can be observed and analyzed in the region of Sidi Boulaaba, Kasserine, central Tunisia, where dilational normal faulting occurs in mechanical strong dolostone layering alternating with more weak marl and shale lithologies, has originated a variety of fault voids (fluid conduits) breccias (chaotic, crackle and mosaic breccias) and carbonate cement.Keywords: travertine, Aptian dolostone, Boulaaba, fracturing
Procedia PDF Downloads 655147 Assessing the Ecological Status of the Moroccan Mediterranean Sea: An Ecopath Modeling Study
Authors: Salma Aboussalam, Karima Khalil, Khalid Elkalay
Abstract:
In order to understand the structure, functioning, and current state of the Moroccan Mediterranean Sea ecosystem, an Ecopath mass balance model was applied. The model was based on 31 functional groups, which included 21 fish species, 7 invertebrates, 2 primary producers, and one detritus group. The trophic interactions between these groups were analyzed, and the system's average trophic transfer efficiency was found to be 23%. The total primary production and total respiration were calculated to be greater than 1, indicating that the system produces more energy than it respires. The ecosystem was found to have a high level of respiration and consumption flows, and indicators of stability and development showed low values for the Finn cycle index (13.97), system omnivory index (0.18), and average Finn path length (3.09), indicating that the ecosystem is disturbed and has a linear rather than web-like trophic structure. Keystone species were identified using the keystone index and mixed trophic impact analysis, with other demersal invertebrates, zooplankton, and cephalopods found to have a significant impact on other groups.Keywords: ecopath, food web, trophic flux, moroccan mediterranean sea
Procedia PDF Downloads 795146 Ultra-High Frequency Passive Radar Coverage for Cars Detection in Semi-Urban Scenarios
Authors: Pedro Gómez-del-Hoyo, Jose-Luis Bárcena-Humanes, Nerea del-Rey-Maestre, María-Pilar Jarabo-Amores, David Mata-Moya
Abstract:
A study of achievable coverages using passive radar systems in terrestrial traffic monitoring applications is presented. The study includes the estimation of the bistatic radar cross section of different commercial vehicle models that provide challenging low values which make detection really difficult. A semi-urban scenario is selected to evaluate the impact of excess propagation losses generated by an irregular relief. A bistatic passive radar exploiting UHF frequencies radiated by digital video broadcasting transmitters is assumed. A general method of coverage estimation using electromagnetic simulators in combination with estimated car average bistatic radar cross section is applied. In order to reduce the computational cost, hybrid solution is implemented, assuming free space for the target-receiver path but estimating the excess propagation losses for the transmitter-target one.Keywords: bistatic radar cross section, passive radar, propagation losses, radar coverage
Procedia PDF Downloads 3365145 The Effect of Recycling on Price Volatility of Critical Metals in the EU (2010-2019): An Application of Multivariate GARCH Family Models
Authors: Marc Evenst Jn Jacques, Sophie Bernard
Abstract:
Electrical and electronic applications, as well as rechargeable batteries, are common in any economy. They also contain a number of important and valuable metals. It is critical to investigate the impact of these new materials or volume sources on the metal market dynamics. This paper investigates the impact of responsible recycling within the European region on metal price volatility. As far as we know, no empirical studies have been conducted to assess the role of metal recycling in metal market price volatility. The goal of this paper is to test the claim that metal recycling helps to cushion price volatility. A set of circular economy indicators/variables, namely, 1) annual total trade values of recycled metals, 2) annual volume of scrap traded and 3) circular material use rate, and 4) information about recycling, are used to estimate the volatility of monthly spot prices of regular metals. A combination of the GARCH-MIDAS model for mixed frequency data sampling and a simple GARCH (1,1) model for the same frequency variables was adopted to examine the potential links between each variable and price volatility. We discovered that from 2010 to 2019, except for Nickel, scrap consumption (Millions of tons), Scrap Trade Values, and Recycled Material use rate had no significant impact on the price volatility of standard metals (Aluminum, Lead) and precious metals (Gold and Platinum). Worldwide interest in recycling has no impact on returns or volatility. Specific interest in metal recycling did have a link to the mean return equation for Aluminum, Gold and to the volatility equation for lead and Nickel.Keywords: recycling, circular economy, price volatility, GARCH, mixed data sampling
Procedia PDF Downloads 565144 Schedule Risk Management for Complex Projects: The Royal Research Ship: Sir David Attenborough Case Study
Authors: Chatelier Charlene, Oyegoke Adekunle, Ajayi Saheed, Jeffries Andrew
Abstract:
This study seeks to understand Schedule Risk Assessments as a priori for better performance whilst exploring the strategies employed to deliver complex projects like the New Polar research ship. This high-profile vessel was offered to Natural Environment Research Council and British Antarctic Survey (BAS) by Cammell Laird Shipbuilders. The Research Ship was designed to support science in extreme environments, with the expectancy to provide a wide range of specialist scientific facilities, instruments, and laboratories to conduct research over multiple disciplines. Aim: The focus is to understand the allocation and management of schedule risk on such a Major Project. Hypothesising that "effective management of schedule risk management" could be the most critical factor in determining whether the intended benefits mentioned are delivered within time and cost constraints. Objective 1: Firstly, the study seeks to understand the allocation and management of schedule risk in Major Projects. Objective 2: Secondly, it explores "effective management of schedule risk management" as the most critical factor determining the delivery of intended benefits. Methodology: This study takes a retrospective review of schedule risk management and how it influences project performance using a case study approach for the RRS (Royal Research Ship) Sir David Attenborough. Research Contribution: The outcomes of this study will contribute to a better understanding of project performance whilst building on its under-researched relationship to schedule risk management for complex projects. The outcomes of this paper will guide further research on project performance and enable the understanding of how risk-based estimates over time impact the overall risk management of the project.Keywords: complexity, major projects, performance management, schedule risk management, uncertainty
Procedia PDF Downloads 975143 Criteria for Good Governance in Georgian Defense Sector:Standards and Principles
Authors: Vephkhvia Grigalashvili
Abstract:
This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community.Keywords: anti-corruption policy within Georgian defense governance, conflict of interests within Georgian defense governance, good governance in Georgian defense sector, principles of integrity in Georgian defense management
Procedia PDF Downloads 1625142 Evaluation of Genetic Fidelity and Phytochemical Profiling of Micropropagated Plants of Cephalantheropsis obcordata: An Endangered Medicinal Orchid
Authors: Gargi Prasad, Ashiho A. Mao, Deepu Vijayan, S. Mandal
Abstract:
The main objective of the present study was to optimize and develop an efficient protocol for in vitro propagation of a medicinally important orchid Cephalantheropsis obcordata (Lindl.) Ormerod along with genetic stability analysis of regenerated plants. This plant has been traditionally used in Chinese folk medicine and the decoction of whole plant is known to possess anticancer activity. Nodal segments used as explants were inoculated on Murashige and Skoog (MS) medium supplemented with various concentrations of isopentenyl adenine (2iP). The rooted plants were successfully acclimatized in the greenhouse with 100% survival rate. Inter-simple sequence repeats (ISSR) markers were used to assess the genetic fidelity of in vitro raised plants and the mother plant. It was revealed that monomorphic bands showing the absence of polymorphism in all in vitro raised plantlets analyzed, confirming the genetic uniformity among the regenerants. Phytochemical analysis was done to compare the antioxidant activities and HPLC fingerprinting assay of 80% aqueous ethanol extract of the leaves and stem of in vitro and in vivo grown C. obcordata. The extracts of the plants were examined for their antioxidant activities by using free radical 1, 1-diphenyl-2-picryl hydrazyl (DPPH) scavenging method, 2,2’-azino-bis (3-ethylbenzothiazoline-6-sulfonic acid) (ABTS) radical scavenging ability, reducing power capacity, estimation of total phenolic content, flavonoid content and flavonol content. A simplified method for the detection of ascorbic acid, phenolic acids and flavonoids content was also developed by using reversed phase high-performance liquid chromatography (HPLC). This is the first report on the micropropagation, genetic integrity study and quantitative phytochemical analysis of in vitro regenerated plants of C. obcordata.Keywords: Cephalantheropsis obcordata, genetic fidelity, ISSR markers, HPLC
Procedia PDF Downloads 1565141 Computational Fluid Dynamics Model of Various Types of Rocket Engine Nozzles
Authors: Konrad Pietrykowski, Michal Bialy, Pawel Karpinski, Radoslaw Maczka
Abstract:
The nozzle is an element of the rocket engine in which the conversion of the potential energy of gases generated during combustion into the kinetic energy of the gas stream takes place. The design parameters of the nozzle have a decisive influence on the ballistic characteristics of the engine. Designing a nozzle assembly is, therefore, one of the most responsible stages in developing a rocket engine design. The paper presents the results of the simulation of three types of rocket propulsion nozzles. Calculations were made using CFD (Computational Fluid Dynamics) in ANSYS Fluent software. The next types of nozzles differ in shape. The analysis was made of a conical nozzle, a bell type nozzle with a conical supersonic part and a bell type nozzle. Calculation results are presented in the form of pressure, velocity and kinetic energy distributions of turbulence in the longitudinal section. The courses of these values along the nozzles are also presented. The results show that the cone nozzle generates strong turbulence in the critical section. Which negatively affect the flow of the working medium. In the case of a bell nozzle, the transformation of the wall caused the elimination of flow disturbances in the critical section. This reduces the probability of waves forming before or after the trailing edge. The most sophisticated construction is the bell type nozzle. It allows you to maximize performance without adding extra weight. The bell type nozzle can be used as a starter and auxiliary engine nozzle due to its advantages. The project/research was financed in the framework of the project Lublin University of Technology-Regional Excellence Initiative, funded by the Polish Ministry of Science and Higher Education (contract no. 030/RID/2018/19).Keywords: computational fluid dynamics, nozzle, rocket engine, supersonic flow
Procedia PDF Downloads 1585140 Optical Flow Based System for Cross Traffic Alert
Authors: Giuseppe Spampinato, Salvatore Curti, Ivana Guarneri, Arcangelo Bruna
Abstract:
This document describes an advanced system and methodology for Cross Traffic Alert (CTA), able to detect vehicles that move into the vehicle driving path from the left or right side. The camera is supposed to be not only on a vehicle still, e.g. at a traffic light or at an intersection, but also moving slowly, e.g. in a car park. In all of the aforementioned conditions, a driver’s short loss of concentration or distraction can easily lead to a serious accident. A valid support to avoid these kinds of car crashes is represented by the proposed system. It is an extension of our previous work, related to a clustering system, which only works on fixed cameras. Just a vanish point calculation and simple optical flow filtering, to eliminate motion vectors due to the car relative movement, is performed to let the system achieve high performances with different scenarios, cameras and resolutions. The proposed system just uses as input the optical flow, which is hardware implemented in the proposed platform and since the elaboration of the whole system is really speed and power consumption, it is inserted directly in the camera framework, allowing to execute all the processing in real-time.Keywords: clustering, cross traffic alert, optical flow, real time, vanishing point
Procedia PDF Downloads 2035139 Effect of Subsequent Drying and Wetting on the Small Strain Shear Modulus of Unsaturated Soils
Authors: A. Khosravi, S. Ghadirian, J. S. McCartney
Abstract:
Evaluation of the seismic-induced settlement of an unsaturated soil layer depends on several variables, among which the small strain shear modulus, Gmax, and soil’s state of stress have been demonstrated to be of particular significance. Recent interpretation of trends in Gmax revealed considerable effects of the degree of saturation and hydraulic hysteresis on the shear stiffness of soils in unsaturated states. Accordingly, the soil layer is expected to experience different settlement behaviors depending on the soil saturation and seasonal weathering conditions. In this study, a semi-empirical formulation was adapted to extend an existing Gmax model to infer hysteretic effects along different paths of the SWRC including scanning curves. The suitability of the proposed approach is validated against experimental results from a suction-controlled resonant column test and from data reported in literature. The model was observed to follow the experimental data along different paths of the SWRC, and showed a slight hysteresis in shear modulus along the scanning curves.Keywords: hydraulic hysteresis, scanning path, small strain shear modulus, unsaturated soil
Procedia PDF Downloads 3885138 Training a Neural Network to Segment, Detect and Recognize Numbers
Authors: Abhisek Dash
Abstract:
This study had three neural networks, one for number segmentation, one for number detection and one for number recognition all of which are coupled to one another. All networks were trained on the MNIST dataset and were convolutional. It was assumed that the images had lighter background and darker foreground. The segmentation network took 28x28 images as input and had sixteen outputs. Segmentation training starts when a dark pixel is encountered. Taking a window(7x7) over that pixel as focus, the eight neighborhood of the focus was checked for further dark pixels. The segmentation network was then trained to move in those directions which had dark pixels. To this end the segmentation network had 16 outputs. They were arranged as “go east”, ”don’t go east ”, “go south east”, “don’t go south east”, “go south”, “don’t go south” and so on w.r.t focus window. The focus window was resized into a 28x28 image and the network was trained to consider those neighborhoods which had dark pixels. The neighborhoods which had dark pixels were pushed into a queue in a particular order. The neighborhoods were then popped one at a time stitched to the existing partial image of the number one at a time and trained on which neighborhoods to consider when the new partial image was presented. The above process was repeated until the image was fully covered by the 7x7 neighborhoods and there were no more uncovered black pixels. During testing the network scans and looks for the first dark pixel. From here on the network predicts which neighborhoods to consider and segments the image. After this step the group of neighborhoods are passed into the detection network. The detection network took 28x28 images as input and had two outputs denoting whether a number was detected or not. Since the ground truth of the bounds of a number was known during training the detection network outputted in favor of number not found until the bounds were not met and vice versa. The recognition network was a standard CNN that also took 28x28 images and had 10 outputs for recognition of numbers from 0 to 9. This network was activated only when the detection network votes in favor of number detected. The above methodology could segment connected and overlapping numbers. Additionally the recognition unit was only invoked when a number was detected which minimized false positives. It also eliminated the need for rules of thumb as segmentation is learned. The strategy can also be extended to other characters as well.Keywords: convolutional neural networks, OCR, text detection, text segmentation
Procedia PDF Downloads 1615137 Mountain Photo Sphere: An Android Application of Mountain Hiking Street View
Authors: Yanto Budisusanto, Aulia Rachmawati
Abstract:
Land navigation technology that is being developed is Google Street View to provide 360° street views, enabling the user to know the road conditions physically with the photo display. For climbers, especially beginners, detail information of climbing terrain is needed so climbers can prepare supplies and strategies before climbing. Therefore, we built a mountaineer guide application named Mountain Photo Sphere. This application displays a 360̊ panoramic view of mountain hiking trail and important points along the hiking path and its surrounding conditions. By combining panoramic photos 360̊ and tracking paths from coordinate data, a virtual tour will be formed. It is built using Java language and Android Studio. The hiking trail map composed by Google Maps API (Gaining access to google maps), Google GEO API (Gaining access to google maps), and OpenStreetMap API (Getting map files to be accessed offline on the Application). This application can be accessed offline so that climbers can use the application during climbing activities.Keywords: google street view, panoramic photo 360°, mountain hiking, mountain photo sphere
Procedia PDF Downloads 1665136 Architecture for Multi-Unmanned Aerial Vehicles Based Autonomous Precision Agriculture Systems
Authors: Ebasa Girma, Nathnael Minyelshowa, Lebsework Negash
Abstract:
The use of unmanned aerial vehicles (UAVs) in precision agriculture has seen a huge increase recently. As such, systems that aim to apply various algorithms on the field need a structured framework of abstractions. This paper defines the various tasks of the UAVs in precision agriculture and models them into an architectural framework. The presented architecture is built on the context that there will be minimal physical intervention to do the tasks defined with multiple coordinated and cooperative UAVs. Various tasks such as image processing, path planning, communication, data acquisition, and field mapping are employed in the architecture to provide an efficient system. Besides, different limitation for applying Multi-UAVs in precision agriculture has been considered in designing the architecture. The architecture provides an autonomous end-to-end solution, starting from mission planning, data acquisition, and image processing framework that is highly efficient and can enable farmers to comprehensively deploy UAVs onto their lands. Simulation and field tests show that the architecture offers a number of advantages that include fault-tolerance, robustness, developer, and user-friendliness.Keywords: deep learning, multi-UAVs, precision agriculture, UAVs architecture
Procedia PDF Downloads 1145135 New Roles of Telomerase and Telomere-Associated Proteins in the Regulation of Telomere Length
Authors: Qin Yang, Fan Zhang, Juan Du, Chongkui Sun, Krishna Kota, Yun-Ling Zheng
Abstract:
Telomeres are specialized structures at chromosome ends consisting of tandem repetitive DNA sequences [(TTAGGG)n in humans] and associated proteins, which are necessary for telomere function. Telomere lengths are tightly regulated within a narrow range in normal human somatic cells, the basis of cellular senescence and aging. Previous studies have extensively focused on how short telomeres are extended and have demonstrated that telomerase plays a central role in telomere maintenance through elongating the short telomeres. However, the molecular mechanisms of regulating excessively long telomeres are unknown. Here, we found that telomerase enzymatic component hTERT plays a dual role in the regulation of telomeres length. We analyzed single telomere alterations at each chromosomal end led to the discoveries that hTERT shortens excessively long telomeres and elongates short telomeres simultaneously, thus maintaining the optimal telomere length at each chromosomal end for an efficient protection. The hTERT-mediated telomere shortening removes large segments of telomere DNA rapidly without inducing telomere dysfunction foci or affecting cell proliferation, thus it is mechanistically distinct from rapid telomere deletion. We found that expression of hTERT generates telomeric circular DNA, suggesting that telomere homologous recombination may be involved in this telomere shortening process. Moreover, the hTERT-mediated telomere shortening is required its enzymatic activity, but telomerase RNA component hTR is not involved in it. Furthermore, shelterin protein TPP1 interacts with hTERT and recruits it on telomeres to mediate telomere shortening. In addition, telomere-associated proteins, DKC1 and TCAB1 also play roles in this process. This novel hTERT-mediated telomere shortening mechanism not only exists in cancer cells, but also in primary human cells. Thus, the hTERT-mediated telomere shortening is expected to shift the paradigm on current molecular models of telomere length maintenance, with wide-reaching consequences in cancer and aging fields.Keywords: aging, hTERT, telomerase, telomeres, human cells
Procedia PDF Downloads 4275134 Analysing Tertiary Lecturers’ Teaching Practices and Their English Major Students’ Learning Practices with Information and Communication Technology (ICT) Utilization in Promoting Higher-Order Thinking Skills (HOTs)
Authors: Malini Ganapathy, Sarjit Kaur
Abstract:
Maximising learning with higher-order thinking skills with Information and Communications Technology (ICT) has been deep-rooted and emphasised in various developed countries such as the United Kingdom, the United States of America and Singapore. The transformation of the education curriculum in the Malaysia Education Development Plan (PPPM) 2013-2025 focuses on the concept of Higher Order Thinking (HOT) skills which aim to produce knowledgeable students who are critical and creative in their thinking and can compete at the international level. HOT skills encourage students to apply, analyse, evaluate and think creatively in and outside the classroom. In this regard, the National Education Blueprint (2013-2025) is grounded based on high-performing systems which promote a transformation of the Malaysian education system in line with the vision of Malaysia’s National Philosophy in achieving educational outcomes which are of world class status. This study was designed to investigate ESL students’ learning practices on the emphasis of promoting HOTs while using ICT in their curricula. Data were collected using a stratified random sampling where 100 participants were selected to take part in the study. These respondents were a group of undergraduate students who undertook ESL courses in a public university in Malaysia. A three-part questionnaire consisting of demographic information, students’ learning experience and ICT utilization practices was administered in the data collection process. Findings from this study provide several important insights on students’ learning experiences and ICT utilization in developing HOT skills.Keywords: English as a second language students, critical and creative thinking, learning, information and communication technology and higher order thinking skills
Procedia PDF Downloads 4905133 Stakeholders Perspectives on the Social Determinants of Health and Quality of Life in Aseer Healthy Cities
Authors: Metrek Almetrek, Naser Alqahtani, Eisa Ghazwani, Mona Asiri, Mohammed Alqahtani, Magboolah Balobaid
Abstract:
Background: Advocacy of potential for community coalitions to positively address social determinants of health and quality of life, little is known about the views of stakeholders involved in such efforts. This study sought to assess the provinces leaders’ perspectives about social determinants related to the Health Neighborhood Initiative (HNI), a new county effort to support community coalitions. Method and Subjects: We used a descriptive, qualitative study using personal interviews in 2022. We conducted it in the community coalition's “main cities committees” set across service planning areas that serve vulnerable groups located in the seven registered healthy cities to WHO (Abha, Tareeb, Muhayel, Balqarn, Alharajah, Alamwah, and Bisha). We conducted key informant interviews with 76 governmental, profit, non-profit, and community leaders to understand their perspectives about the HNI. As part of a larger project, this study focused on leaders’ views about social determinants of health related to the HNI. All interviews were audio-recorded and transcribed. An inductive approach to coding was used, with text segments grouped by social determinant categories. Results: Provinces leaders described multiple social determinants of health and quality of life that were relevant to the HNI community coalitions: housing and safety, community violence, economic stability, city services coordination and employment and education. Leaders discussed how social determinants were interconnected with each other and the need for efforts to address multiple social determinants simultaneously to effectively improve health and quality of life. Conclusions: Community coalitions have an opportunity to address multiple social determinants of health and quality of life to meet the social needs of vulnerable groups. Future research should examine how community coalitions, like those in the HNI, can actively engage with community members to identify needs and then deliver evidence-based care.Keywords: social determinants, health and quality of life, vulnerable groups, qualitative research
Procedia PDF Downloads 845132 Exploring Emerging Viruses From a Protected Reserve
Authors: Nemat Sokhandan Bashir
Abstract:
Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.Keywords: wild, plant, novel, metagenomics
Procedia PDF Downloads 80