Search results for: common property
5187 Comparison of the Distillation Curve Obtained Experimentally with the Curve Extrapolated by a Commercial Simulator
Authors: Lívia B. Meirelles, Erika C. A. N. Chrisman, Flávia B. de Andrade, Lilian C. M. de Oliveira
Abstract:
True Boiling Point distillation (TBP) is one of the most common experimental techniques for the determination of petroleum properties. This curve provides information about the performance of petroleum in terms of its cuts. The experiment is performed in a few days. Techniques are used to determine the properties faster with a software that calculates the distillation curve when a little information about crude oil is known. In order to evaluate the accuracy of distillation curve prediction, eight points of the TBP curve and specific gravity curve (348 K and 523 K) were inserted into the HYSYS Oil Manager, and the extended curve was evaluated up to 748 K. The methods were able to predict the curve with the accuracy of 0.6%-9.2% error (Software X ASTM), 0.2%-5.1% error (Software X Spaltrohr).Keywords: distillation curve, petroleum distillation, simulation, true boiling point curve
Procedia PDF Downloads 4425186 Mathematical Model for Defection between Two Political Parties
Authors: Abdullahi Mohammed Auwal
Abstract:
Formation and change or decamping from one political party to another have now become a common trend in Nigeria. Many of the parties’ members who could not secure positions and or win elections in their parties or are not very much satisfied with the trends occurring in the party’s internal democratic principles and mechanisms, change their respective parties. This paper developed/presented and analyzed the used of non linear mathematical model for defections between two political parties using epidemiological approach. The whole population was assumed to be a constant and homogeneously mixed. Equilibria have been analytically obtained and their local and global stability discussed. Conditions for the co-existence of both the political parties have been determined, in the study of defections between People Democratic Party (PDP) and All Progressive Congress (APC) in Nigeria using numerical simulations to support the analytical results.Keywords: model, political parties, deffection, stability, equilibrium, epidemiology
Procedia PDF Downloads 6385185 An Explanatory Practice Example: The Reasons of Students Not Doing Any Extra Work
Authors: Özge Özsoy
Abstract:
Teachers usually complain that their students do not study enough to further practice the subjects they have covered in class. Teachers tend to focus on how often and hard they should study rather than finding out the main reasons why most students avoid doing any extra work to improve their skills. In this study, with the use of exploratory practice method, 40 English preparatory class students at Anadolu University will discuss this puzzle through an in-class discussion and create posters describing the reasons for and solutions to it. The overlapping data from the posters will be categorized in two sections as reasons and solutions in a final poster. The study aims at revealing the student perspective of a common puzzle that troubles many teachers.Keywords: exploratory practice, extra work, puzzle, students, teachers
Procedia PDF Downloads 3405184 Antiglycemic Activity of Raw Plant Materials as Potential Components of Functional Food
Authors: Ewa Flaczyk, Monika Przeor, Joanna Kobus-Cisowska, Józef Korczak
Abstract:
The aim of this paper was to collect the information concerning the most popular raw plant materials of antidiabetic activity, in a context of functional food developing production. The elaboration discusses morphological elements possible for an application in functional food production of the plants such as: common bean, ginger, Ceylon cinnamon, white mulberry, fenugreek, French lilac, ginseng, jambolão, and bitter melon. An activity of bioactive substances contained in these raw plant materials was presented, pointing their antiglycemic and also hypocholesterolemic, antiarthritic, antirheumatic, antibacterial, and antiviral activity in the studies on humans and animals. Also the genesis of functional food definition was presented.Keywords: antiglycemic activity, raw plant materials, functional food, food, nutritional sciences
Procedia PDF Downloads 4705183 Accurate and Repeatable Pressure Control for Critical Testing of Advanced Ceramics Using Proportional and Derivative Controller
Authors: Benchalak Muangmeesri
Abstract:
The purpose of this paper is to discuss how to test the best control performance of a ceramics. Hydraulic press machine (HPM) is the most common shaping of advanced ceramic with products, dimensions, and ceramic products mainly from synthetic powders. A microcontroller can be achieved to control process and has set high standards in the shaping of raw materials in powder form. HPM was proposed to develop a position control system that linked to the embedded controller PIC16F877 via Proportional and Derivative (PD) controller. The model is performed using MATLAB/SIMULINK and the best control performance of an HPM. Finally, PD controller results, showing the best performance as it had the smallest overshoot and highest quality using a microcontroller control.Keywords: ceramics, hydraulic press, microcontroller, PD controller
Procedia PDF Downloads 3565182 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1395181 Open Access in the Economic Sphere: A Framework Interpreting the Rise of the UK, US and China at Different Historical Times
Authors: Guanghua Yu
Abstract:
This article has examined the rise of the UK, US, and China at different historical times to explain the argument that it is open access in the economic sphere, as well as institutional building related to the protection of property rights, contract enforcement, financial market, the rule of law, and human resource accumulation that determine economic and human development. Both the UK, after the Glorious Revolution in the seventeenth century, and China, after its adoption of the open door policy at the end of the 1970s, follow such a path of development. The difference between the UK and China in moving toward that path is the different coordination of elites. While the coordination of elites in the UK through parliament played important roles in forcing the government to consider the wider encompassing interest in society after the Glorious Revolution, the coordination of elites in China has mainly been achieved by the Communist Party of China such that the Chinese Government has started to pay greater deal of attention to the wider encompassing interest in the country from 1978. The article has also examined the rise of the US following colonial settlement to independence and institutional building thereafter. The US case is similarly consistent with the argument that open access in the economic sphere and institutional building matter the most to economic development. More decentralized methods of the coordination of elites in the US among colonies (states), the federal governments, and other political groups similarly shaped the path towards open access in the economic sphere and institutional building. As such, open access in the political sphere plays an indirect role in development at best. If that is correct, there are possibilities that different political systems are able to achieve coordination of elites so that governments will turn their attention to development.Keywords: open access, interconnected institutions, democracy, development
Procedia PDF Downloads 805180 Low Power Consuming Electromagnetic Actuators for Pulsed Pilot Stages
Authors: M. Honarpardaz, Z. Zhang, J. Derkx, A. Trangärd, J. Larsson
Abstract:
Pilot stages are one of the most common positioners and regulators in industry. In this paper, we present two novel concepts for pilot stages with low power consumption to regulate a pneumatic device. Pilot 1, first concept, is designed based on a conventional frame core electro-magnetic actuator and a leaf spring to control the air flow and pilot 2 has an axisymmetric actuator and spring made of non-oriented electrical steel. Concepts are simulated in a system modeling tool to study their dynamic behavior. Both concepts are prototyped and tested. Experimental results are comprehensively analyzed and compared. The most promising concept that consumes less than 8 mW is highlighted and presented.Keywords: electro-magnetic actuator, multidisciplinary system, low power consumption, pilot stage
Procedia PDF Downloads 2585179 Assessment of Germination Loss Due to Dusky Cotton Bug (Oxycarenus laetus) in Relation to Cotton Boll Stage and Bug Intensity
Authors: Ali Hassan, Mian Muhammad Awais, Muhammad Rafique Shahid, Farazia Hassan, Shumaila Rasool
Abstract:
Dusky cotton bug (Oxycarenus laetus) has attained the status of major insect pest of cotton. It is also known as seed bug due to its property of feeding on seeds. It causes floral abscission at flowering stage and reduction in seed germination. Present study was carried out to assess germination loss caused by dusky bug with respect to crop stage and insect intensity. Treatments consisted of three stages immature boll, mature boll and opened boll as well three levels of dusky bug i.e., 50 bugs per boll, 40 bugs per boll along with zero level kept as control. Results showed that the germination percentage was highest in control treatment where no insect was released followed by treatment where 40 insects released and minimum germination showed by treatment in which 50 insects were released. The germination percentage of seeds surpassed after control treatment in the treatment where dusky bugs exposure was given at boll opening stage than on mature boll stage. Minimum germination was observed in immature boll stage. Interaction between crop stages and dusky bug levels showed that germination percentage of seeds was maximum in control treatment then boll opening stage followed by mature boll stage. Minimum seed germination was recorded in dusky bug treatment at immature boll stage which was 34% where 50 insects were released. From the results it is clear that dusky bug should be managed properly at all reproductive stages but immature stage is most critical.Keywords: Gossypium hirsutum, Oxycarenus laetus, seed bug, seed germination
Procedia PDF Downloads 3245178 Comparing Community Detection Algorithms in Bipartite Networks
Authors: Ehsan Khademi, Mahdi Jalili
Abstract:
Despite the special features of bipartite networks, they are common in many systems. Real-world bipartite networks may show community structure, similar to what one can find in one-mode networks. However, the interpretation of the community structure in bipartite networks is different as compared to one-mode networks. In this manuscript, we compare a number of available methods that are frequently used to discover community structure of bipartite networks. These networks are categorized into two broad classes. One class is the methods that, first, transfer the network into a one-mode network, and then apply community detection algorithms. The other class is the algorithms that have been developed specifically for bipartite networks. These algorithms are applied on a model network with prescribed community structure.Keywords: community detection, bipartite networks, co-clustering, modularity, network projection, complex networks
Procedia PDF Downloads 6255177 Determination of Lead , Cadmium, Nickel and Zinc in Some Green Tea Samples Collected from Libyan Markets
Authors: Jamal A. Mayouf, Hashim Salih Al Bayati, Eltayeb M. Emmima
Abstract:
Green tea is one of the most common drinks in all cities of Libyan. Heavy metal contents such as cadmium (Cd), lead (Pb), nickel (Ni) and zinc (Zn) were determined in four green tea samples collected from Libyan market and their tea infusions by using atomic emission spectrophotometry after acid digestion. The results obtained indicate that the concentrations of Cd, Pb, Ni and Zn in tea infusions samples ranged from 0.07-0.12, 0.19-0.28, 0.09-0.15, 0.18-0.43 mg/l after boiling for 5 min., 0.06-0.08, 0.18-0.23, 0.08-0.14, 0.17-0.27 mg/l after boiling for 10 min., 0.07-0.11, 0.18-0.24, 0.08-0.14, 0.21-0.34 mg/l after boiling for 15 min. respectively. On the other hand, the concentrations of the same element mentioned above obtained in tea leaves ranged from 6.0-18.0, 36.0-42.0, 16.0-20.0, 44.0-132.0 mg/kg respectively. The concentrations of Cd, Pb, Ni and Zn in tea leaves samples were higher than Prevention of Food Adulteration (PFA) limit and World Health Organization(WHO) permissible limit.Keywords: boiling, infusion, metals, tea
Procedia PDF Downloads 3985176 The Effect of Artificial Intelligence on Banking Development and Progress
Authors: Mina Malak Hanna Saad
Abstract:
New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development
Procedia PDF Downloads 355175 Electability of Stable Insiders’ Coalition Governments
Authors: Tryphon Kollintzas, Lambros Pechlivanos
Abstract:
In this paper, we formulate a general equilibrium theory that explains the existence and stability of democratically elected governments that support certain groups of individuals in society (insiders) to the detriment of everybody else (outsiders), even if the latter constitute a majority. The vehicle is a dynamic general equilibrium model, where insiders get monopoly rents and outsiders get less than what they would have gotten under a common good regime. We construct such political economy equilibria, and we identify the conditions under which such political regimes (coalitions of insiders): (a) can safeguard against opportunistic behavior (i.e., do not fall from within) and (b) may come to power in the first place (i.e., manage to get elected). To that end, we highlight the role of perception manipulation and self-serving bias as a gluing device to garner an electable coalition.Keywords: insiders, coalition governments, stability, electability, politico-economic equilibrium, perceptions manipulation
Procedia PDF Downloads 655174 Causes and Consequences of Unauthorized Use of Books: Readers, Authors, and Publishers' Perspective
Authors: Arūnas Gudinavičius, Vincas Grigas
Abstract:
Purpose: The current study aims to identify and explore causes and consequences of unauthorized use of books from readers’, publishers’, and authors’ points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country. Design/methodology/approach: Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis. Findings: Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits, and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause. Originality: This research contributed to the body of knowledge by investigating unauthorized use of books from readers’, publishers’, and authors’ points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. We suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.Keywords: digital piracy, unauthorized access, publishing industry, book reader, intellectual property rights
Procedia PDF Downloads 1715173 The Interplay of Factors Affecting Learning of Introductory Programming: A Comparative Study of an Australian and an Indian University
Authors: Ritu Sharma, Haifeng Shen
Abstract:
Teaching introductory programming is a challenging task in tertiary education and various factors are believed to have influence on students’ learning of programming. However, these factors were largely studied independently in a chosen context. This paper aims to investigate whether interrelationships exist among the factors and whether the interrelationships are context-dependent. In this empirical study, two universities were chosen from two continents, which represent different cultures, teaching methodologies, assessment criteria and languages used to teach programming in west and east worlds respectively. The results reveal that some interrelationships are common across the two different contexts, while others appear context-dependent.Keywords: introductory programming, tertiary education, factors, interrelationships, context, empirical study
Procedia PDF Downloads 3635172 Designing of Food Products with Seasoned Plant Components Assigned for Obese and Diabetic Individuals
Authors: A. Gramza-Michałowska, J. Skręty, M. Antczak, J. Kobus-Cisowska, D. Kmiecik, J. Korczak, Kulczyński Bartosz
Abstract:
Background: Modern consumer highly appreciates the correlation between eating habits and health. Intensified research showed many proofs confirming that food besides its basic nutritional function, possess also significant prophylactic and therapeutic potential. Preventive potential of selected food is commonly used as improvement factor of patients life standard. World Health Organization indicates that diabetes (Diabetes mellitus) and obesity are two of the most common and dangerous diseases. Diet therapy is an element of diabetes education program and a part of healing process, allowing maintaining and remaining the optimal metabolic state of the system. It must be remembered that diabetes treatment should be individualized to each patient. One of highly recommended vegetable for diabetes is asparagus (Asparagus officinalis L.), low calories common plant, growing in European countries. Objective: To propose the technology of unsweetened muesli production with addition of new components, we investigated the effects of selected vegetable addition on antioxidative capacity and consumer’s acceptance of muesli as representative of breakfast product. Methods: Muesli was formulated from a composition of oat flakes, flaxseed, bran, carrots, broccoli and asparagus. Basic composition of muesli was evaluated as content of protein, lipids, fatty acid composition, ash, selected minerals and caloricity. Antioxidant capacity of muesli was evaluated with use radical scavenging methods (DPPH, ABTS), ORAC value and PCL - photochemiluminescence antiradical potential. Proposed muesli as new product was also characterized with sensory analysis, which included color, scent, taste, consistency and overall acceptance of a product. Results: Results showed that addition of freeze-dried asparagus into muesli allowed to lower the fat content and caloricity of a product according to the base product. No significant loss in antioxidant potential was evaluated, also the sensory value of a product was not negative. Conclusion: Designed muesli would be an answer for obese people looking for healthy snack during the daytime. Results showed that product with asparagus addition would be accepted by the consumers and because of its antidiabetic potential could be a n important factor in prevention of diabetes or obesity. Financial support by the UE Project no PO IG 01.01.00.00-061/09Keywords: muesli, vegetables, asparagus, antioxidant potential, lipids
Procedia PDF Downloads 3175171 The Role of Internal and External Control in the Migrant Related Representations of Right-Wing Extremists
Authors: Gabriella Kengyel
Abstract:
This study aims to describe the differences between the attitudes of the right-wing extremists with internal or external control towards migrants. They both have a significantly higher score on Rotter's Locus of Control Scale, and they are quite xenophobic (54%) according to Bogardus Social Distance Scale. Present research suggests their motives are different. Principle components analysis shows that extremists with internal control reject migrants because of welfare chauvinism and they think that there is some kind of political conspirationism behind the European Refugee Crisis. Contrarily extremist with external control believe in a common enemy and they are significantly more ethnocentric and less skeptical in politics. Results suggest that extremist with internal control shows hostility toward minorities and migrants mainly because of their own reference group.Keywords: control, extremist, migrant, right-wing
Procedia PDF Downloads 2785170 Rényi Entropy Correction to Expanding Universe
Authors: Hamidreza Fazlollahi
Abstract:
The Re ́nyi entropy comprises a group of data estimates that sums up the well-known Shannon entropy, acquiring a considerable lot of its properties. It appears as unqualified and restrictive entropy, relative entropy, or common data, and has found numerous applications in information theory. In the Re ́nyi’s argument, the area law of the black hole entropy plays a significant role. However, the total entropy can be modified by some quantum effects, motivated by the randomness of a system. In this note, by employing this modified entropy relation, we have derived corrections to Friedmann equations. Taking this entropy associated with the apparent horizon of the Friedmann-Robertson-Walker Universe and assuming the first law of thermodynamics, dE=T_A (dS)_A+WdV, satisfies the apparent horizon, we have reconsidered expanding Universe. Also, the second thermodynamics law has been examined.Keywords: Friedmann equations, dark energy, first law of thermodynamics, Reyni entropy
Procedia PDF Downloads 945169 Implications of Fulani Herders/Farmers Conflict on the Socio-Economic Development of Nigeria (2000-2018)
Authors: Larry E. Udu, Joseph N. Edeh
Abstract:
Unarguably, the land is an indispensable factor of production and has been instrumental to numerous conflicts between crop farmers and herders in Nigeria. The conflicts pose a grave challenge to life and property, food security and ultimately to sustainable socio-economic development of the nation. The paper examines the causes of the Fulani herders/farmers conflicts, particularly in the Middle Belt; numerity of occurrences and extent of damage and their socio-economic implications. Content Analytical Approach was adopted as methodology wherein data was extensively drawn from the secondary source. Findings reveal that major causes of the conflict are attributable to violation of tradition and laws, trespass and cultural factors. Consequently, the numerity of attacks and level of fatality coupled with displacement of farmers, destruction of private and public facilities impacted negatively on farmers output with their attendant socio-economic implications on sustainable livelihood of the people and the nation at large. For instance, Mercy Corps (a Global Humanitarian Organization) in its research, 2013-2016 asserts that a loss of $14billion within 3 years was incurred and if the conflict were resolved, the average affected household could see increase income by at least 64 percent and potentially 210 percent or higher and that states affected by the conflicts lost an average of 47 percent taxes/IGR. The paper therefore recommends strict adherence to grazing laws; platform for dialogue bothering on compromises where necessary and encouragement of cattle farmers to build ranches for their cattle according to international standards.Keywords: conflict, farmers, herders, Nigeria, socio-economic implications
Procedia PDF Downloads 2075168 Frequent Pattern Mining for Digenic Human Traits
Authors: Atsuko Okazaki, Jurg Ott
Abstract:
Some genetic diseases (‘digenic traits’) are due to the interaction between two DNA variants. For example, certain forms of Retinitis Pigmentosa (a genetic form of blindness) occur in the presence of two mutant variants, one in the ROM1 gene and one in the RDS gene, while the occurrence of only one of these mutant variants leads to a completely normal phenotype. Detecting such digenic traits by genetic methods is difficult. A common approach to finding disease-causing variants is to compare 100,000s of variants between individuals with a trait (cases) and those without the trait (controls). Such genome-wide association studies (GWASs) have been very successful but hinge on genetic effects of single variants, that is, there should be a difference in allele or genotype frequencies between cases and controls at a disease-causing variant. Frequent pattern mining (FPM) methods offer an avenue at detecting digenic traits even in the absence of single-variant effects. The idea is to enumerate pairs of genotypes (genotype patterns) with each of the two genotypes originating from different variants that may be located at very different genomic positions. What is needed is for genotype patterns to be significantly more common in cases than in controls. Let Y = 2 refer to cases and Y = 1 to controls, with X denoting a specific genotype pattern. We are seeking association rules, ‘X → Y’, with high confidence, P(Y = 2|X), significantly higher than the proportion of cases, P(Y = 2) in the study. Clearly, generally available FPM methods are very suitable for detecting disease-associated genotype patterns. We use fpgrowth as the basic FPM algorithm and built a framework around it to enumerate high-frequency digenic genotype patterns and to evaluate their statistical significance by permutation analysis. Application to a published dataset on opioid dependence furnished results that could not be found with classical GWAS methodology. There were 143 cases and 153 healthy controls, each genotyped for 82 variants in eight genes of the opioid system. The aim was to find out whether any of these variants were disease-associated. The single-variant analysis did not lead to significant results. Application of our FPM implementation resulted in one significant (p < 0.01) genotype pattern with both genotypes in the pattern being heterozygous and originating from two variants on different chromosomes. This pattern occurred in 14 cases and none of the controls. Thus, the pattern seems quite specific to this form of substance abuse and is also rather predictive of disease. An algorithm called Multifactor Dimension Reduction (MDR) was developed some 20 years ago and has been in use in human genetics ever since. This and our algorithms share some similar properties, but they are also very different in other respects. The main difference seems to be that our algorithm focuses on patterns of genotypes while the main object of inference in MDR is the 3 × 3 table of genotypes at two variants.Keywords: digenic traits, DNA variants, epistasis, statistical genetics
Procedia PDF Downloads 1225167 The Effect of Austenitization Conditioning on the Mechanical Properties of Cr-Mo-V Hot Work Tool Steel with Different Nitrogen Addition
Authors: Iting Chiang, Cheng-Yu Wei, Chin-Teng Kuo, Po-Sheng Hsu, Yo-Lun Yang, Yung-Chang Kang, Chien-Chon Chen, Chih-Yuan Chen
Abstract:
In recent years, it is reported that microalloying of nitrogen atoms within traditional Cr-Mo-V hot work tool steels can achieve better high temperature mechanical properties, which thus leads to such metallurgical approach widely utilized in the several commercial advanced hot work tool steels. Although the performance of hot work tool steel can be improved better by alloy composition design strategy, the influence of processing parameters on the mechanical property, especially on the service life of hot work tool steel, is still not fully understood yet. A longer service life of hot work tool steel can decrease the manufacturing cost effectively and thus become a research hot spot. According to several previous studies, it is generally acknowledged the service life of hot work tool steels can be increased effectively as the steels possessing higher hardness and toughness due to the formation and propagation of microcracks within the steel can be inhibited effectively. Therefore, in the present research, the designed experiments are primarily to explore the synergistic effect of nitrogen content and austenitization conditioning on the mechanical properties of hot work tool steels has been conducted and analyzed. No matter the nitrogen content, the results indicated the hardness of hot work tool steels increased as the austenitization treatment executed at higher temperature. On the other hand, an optimum toughness of hot work tool steel can be achieved as the austenitization treatment performed at a suitable temperature range. The possible explanation of such metallurgical phenomenon has been also proposed and analyzed in the present research.Keywords: hot work tool steel, Cr-Mo-V, toughness, hardness, TEM
Procedia PDF Downloads 595166 Sukuk Issuance and Its Regulatory Framework in Saudi Arabia
Authors: Ali Alshamrani
Abstract:
This article aims to give a comprehensive and critical review of sukuk issuance in Saudi Arabia, and the extent to which the issuance of sukuk in Saudi Arabia is consistent with Shariah requirements. The article is divided into two sections. Accordingly, the first section of this article begins with an examination of sukuk in general, and includes the concept of sukuk, the basic principles of sukuk, common types of sukuk, and a critical analysis of the most important differences between sukuk and conventional bonds. The second section gives a critical analysis of how sukuk work in Saudi Arabia, offering the regulatory framework of the issuance of sukuk in the KSA, and the legal challenges from Shariah point of view, and provide recommendations to overcome these challenges.Keywords: sukuk issuance, Shariah, Saudi Arabia, capital market authority
Procedia PDF Downloads 4725165 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3465164 Tourism Development Analysis According to Offer Improvements: Case of Crikvenica
Authors: Josip Arneric, Antonio Sostaric
Abstract:
Crikvenica is one of the favourite tourist destinations at the Adriatic Sea in Croatia which attracts guests with its natural beauties and is one of the top destinations with the highest number of overnights stays. The main purpose of this research is to determine which elements of tourist offer should be improved to achieve sustainable development of the town of Crikvenica. Namely, the survey results from a random sample have shown that the most common reason of the visits is relaxation and vacation, and that more attention should be given to the following categories: restaurants and the working hours of stores and banks. We have also examined whether or not there is a correlation between an average daily expenditure and the overnight stay. The paper ends with the conclusion and the recommendations on how to improve the tourist offer of Crikvenica in order to increase guest satisfaction and to keep its reputation at a high level.Keywords: tourism development, survey, Crikvenica, management sciences
Procedia PDF Downloads 3725163 Integration of GIS with Remote Sensing and GPS for Disaster Mitigation
Authors: Sikander Nawaz Khan
Abstract:
Natural disasters like flood, earthquake, cyclone, volcanic eruption and others are causing immense losses to the property and lives every year. Current status and actual loss information of natural hazards can be determined and also prediction for next probable disasters can be made using different remote sensing and mapping technologies. Global Positioning System (GPS) calculates the exact position of damage. It can also communicate with wireless sensor nodes embedded in potentially dangerous places. GPS provide precise and accurate locations and other related information like speed, track, direction and distance of target object to emergency responders. Remote Sensing facilitates to map damages without having physical contact with target area. Now with the addition of more remote sensing satellites and other advancements, early warning system is used very efficiently. Remote sensing is being used both at local and global scale. High Resolution Satellite Imagery (HRSI), airborne remote sensing and space-borne remote sensing is playing vital role in disaster management. Early on Geographic Information System (GIS) was used to collect, arrange, and map the spatial information but now it has capability to analyze spatial data. This analytical ability of GIS is the main cause of its adaption by different emergency services providers like police and ambulance service. Full potential of these so called 3S technologies cannot be used in alone. Integration of GPS and other remote sensing techniques with GIS has pointed new horizons in modeling of earth science activities. Many remote sensing cases including Asian Ocean Tsunami in 2004, Mount Mangart landslides and Pakistan-India earthquake in 2005 are described in this paper.Keywords: disaster mitigation, GIS, GPS, remote sensing
Procedia PDF Downloads 4815162 Spatial Comparative Analysis on Travels of Mackay in Taiwan
Authors: Shao-Chi Chien, Ying-Ju Chen, Chiao-Yu Tseng, Wan-Ting Lee, Yi-Wen Cheng
Abstract:
Dr. George Leslie Mackay arrived at Takoukang (now Port of Kaohsiung) in Taiwan on December 30, 1871. When Dr. Mackay dedicated at Taiwan for 30 years, he has been an important factor in such areas as preaching, medical and engaged in education. Many researchers have thoroughly studied Dr. Mackay's travels to understand his impact on the state of education, medicine and religion in Taiwan. In the 30-year period of hard work, Dr. Mackay's made outstanding influence on the church in Taiwan. Therefore, the present study will be the mission of the establishment of hospitals, schools, churches which preaching, education, and medicine whether there are related the number of comparisons to explore. According to The Diaries of George Leslie Mackay, our research uses the Geographic Information System (GIS) to map the location of Dr. Mackay's travel in Taiwan and compares it with today's local churches, hospitals, and schools whether there are related the number of comparisons to explore. Therefore, our research focuses on the whole of Taiwan, divided into missionary, medical and education as the main content of the three major parts. Additionally, use of point layer, the surface layer of the property table to establish, in-depth mission of Dr. Mackay's development in Taiwan and Today's comparison. The results will be based on the classification of three different colors pictures that the distance of Mackay's contribution of preaching, medicine, and education. Our research will be compared with the current churches, hospitals, schools and the past churches, hospitals, schools. The results of the present study will provide a reference for future research.Keywords: George Leslie Mackay, geographic information system, spatial distribution, color categories analysis
Procedia PDF Downloads 3975161 Thyroid Cancer Treatment in Yemen Under Blockade Conditions and Absence of Radioactive Iodine
Authors: Anis Al-Yakhiri
Abstract:
Introduction: The World Health Organization (WHO) classifies malignant epithelial thyroid tumors into four major groups (papillary, follicular, medullar and undifferentiated) . Papillary thyroid carcinoma (PTC) is the most common type, for about eight out of ten thyroid cancers belong to this histological type. Radioactive iodine (RAI) is considered effective for patients with total or nearly total thyroidectomy, but the beneficial effects of RAI are still controversial. War conditions forced us to study alternative methods of using radioactive iodine in the treatment of patients with PTC. Material and methods: Between January 2014 and June 2021, in Al-Yakhiri hospital, 57 Total Thyroidectomy with Radical BilateralNeckDissection (RBND) were performed, 50 for malignant disease,7 for false positive cytology.RBND involves surgical clearance of Levels II-VI. Mean age was 40.7 years old and 92% of the patients were female. 7(14%) patients had hypothyroidism which required preoperative thyroid hormone treatment. The Thyroid Stimulating Hormone- Suppression Therapy (TSH-ST) immediately started after RBND for mostpatients on the first day. It consisted in reducing the level of TSH< 0.1 mIU/L. Results: The Apron flap was used on most operations (40)80% and with lateral extensions had 10(20%). RBND involves surgical clearance of Levels II-VI performed in all operated patients, besides that, 4(8%) of them had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV) withclearance of Levels IB. The PTC was the most common 80.9% (38 patients from 47)by histopathological report. and 4(8%) patients of 50 had resection of sternocleidomastoid muscle (SCM) and accessory nerve (XIn) and internal jugular vein (IJV). The postoperative mortality rate not observed (0%). The postoperative morbidity rate was 22.8% (n =13).Seroma(8.7%),Hypocalcimia(7%), Wound infection(5.3%), Bleeding(1.8%). To suppress TSH and growth of any residual thyroid theTSH-ST (levothyroxine150 – 600mcg)was performed in all patients 57(100%) on the first day afterRBND. We tracked the results of treatment for two years in 30 patients with PTC, only 3 of them received radioactive iodine abroad. Biennial Recurrence rate for PTC appeared in one woman (2%), who had RAI postoperatively in the form of neck lymph nodes metastasis. Conclusion: For patients with PTC, thyroidectomy plus prophylacticRBND is a safe and efficient procedure and it results in lower recurrence rate. Postoperative treatment with exogenous thyroid hormone in doses sufficient to suppress TSH (not less than 150mcg), decreases incidence of recurrence. Total Thyroidectomy with RBND followed by TSH-ST, in our opinion, applicable optimal treatment scheme care for this patient population.Keywords: thyroid cancer, Yemen war, absence of radioactive iodine, neck dissection, surgery results
Procedia PDF Downloads 825160 A Comparative Study of the Effects of Vibratory Stress Relief and Thermal Aging on the Residual Stress of Explosives Materials
Authors: Xuemei Yang, Xin Sun, Cheng Fu, Qiong Lan, Chao Han
Abstract:
Residual stresses, which can be produced during the manufacturing process of plastic bonded explosive (PBX), play an important role in weapon system security and reliability. Residual stresses can and do change in service. This paper mainly studies the influence of vibratory stress relief (VSR) and thermal aging on residual stress of explosives. Firstly, the residual stress relaxation of PBX via different physical condition of VSR, such as vibration time, amplitude and dynamic strain, were studied by drill-hole technique. The result indicated that the vibratory amplitude, time and dynamic strain had a significant influence on the residual stress relief of PBX. The rate of residual stress relief of PBX increases first and then decreases with the increase of dynamic strain, amplitude and time, because the activation energy is too small to make the PBX yield plastic deformation at first. Then the dynamic strain, time and amplitude exceed a certain threshold, the residual stress changes show the same rule and decrease sharply, this sharply drop of residual stress relief rate may have been caused by over vibration. Meanwhile, the comparison between VSR and thermal aging was also studied. The conclusion is that the reduction ratio of residual stress after VSR process with applicable vibratory parameters could be equivalent to 73% of thermal aging with 7 days. In addition, the density attenuation rate, mechanical property, and dimensional stability with 3 months after VSR process was almost the same compared with thermal aging. However, compared with traditional thermal aging, VSR only takes a very short time, which greatly improves the efficiency of aging treatment for explosive materials. Therefore, the VSR could be a potential alternative technique in the industry of residual stress relaxation of PBX explosives.Keywords: explosives, residual stresses, thermal aging, vibratory stress relief, VSR
Procedia PDF Downloads 1605159 Self-Help Adaptation to Flooding in Low-Income Settlements in Chiang Mai, Thailand
Authors: Nachawit Tikul
Abstract:
This study aimed to determine low-income housing adaptations for flooding, which causes living problems and housing damage, and the results from improvement. Three low-income settlements in Chiang Mai which experienced different flood types, i.e. flash floods in Samukeepattana, drainage floods in Bansanku, and river floods in Kampangam, were chosen for the study. Almost all of the residents improved their houses to protect the property from flood damage by changing building materials to flood damage resistant materials for walls, floors, and other parts of the structure that were below the base of annual flood elevation. They could only build some parts of their own homes, so hiring skilled workers or contractors was still important. Building materials which have no need for any special tools and are easy to access and use for construction, as well as low cost, are selected for construction. The residents in the three slums faced living problems for only a short time and were able to cope with them. This may be due to the location of the three slums near the city where assistance is readily available. But the housing and the existence in the slums can endure only the regular floods and residence still have problems in unusual floods, which have been experienced 1-2 times during the past 10 years. The residents accept the need for evacuations and prepare for them. When faced with extreme floods, residence have evacuated to the nearest safe place such as schools and public building, and come back to repair the houses after the flood. These are the distinguishing characteristics of low-income living which can withstand serious situations due to the simple lifestyle. Therefore, preparation of living areas for use during severe floods and encouraging production of affordable flood resistant materials should be areas of concern when formulating disaster assistance policies for low income people.Keywords: flooding, low-income settlement, housing, adaptation
Procedia PDF Downloads 2385158 Mathematical Modelling of Different Types of Body Support Surface for Pressure Ulcer Prevention
Authors: Mahbub C. Mishu, Venktesh N. Dubey, Tamas Hickish, Jonathan Cole
Abstract:
Pressure ulcer is a common problem for today's healthcare industry. It occurs due to external load applied to the skin. Also when the subject is immobile for a longer period of time and there is continuous load applied to a particular area of human body,blood flow gets reduced and as a result pressure ulcer develops. Body support surface has a significant role in preventing ulceration so it is important to know the characteristics of support surface under loading conditions. In this paper we have presented mathematical models of different types of viscoelastic materials and also we have shown the validation of our simulation results with experiments.Keywords: pressure ulcer, viscoelastic material, mathematical model, experimental validation
Procedia PDF Downloads 311