Search results for: active protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5730

Search results for: active protection

3750 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 327
3749 Children Learning Chinese as a Home Language in an English-Dominant Society

Authors: Sinming Law

Abstract:

Many Chinese families face many difficulties in maintaining their heritage language for their children in English-dominant societies. This article first looks at the losses from monolingualism and benefits of bilingualism. Then, it explores the common methods used today in teaching Chinese. We conclude that families and community play an indispensable role in their children’s acquisition. For children to acquire adequate proficiency in the language, educators should inform families about this topic and partner with them. Families can indeed be active in the process. Hence, the article further describes a guide designed and written by the author to accommodate the needs of parents. It can be used as a model for future guides. Further, the article recommends effective media routes by which families can have access to similar guides.

Keywords: children learning Chinese, biliteracy and bilingual acquisition, family and community support, heritage language maintenance

Procedia PDF Downloads 364
3748 Assessment of Compost Usage Quality and Quality for Agricultural Use: A Case Study of Hebron District, Palestine

Authors: Mohammed A. A. Sarhan, Issam A. Al-Khatib

Abstract:

Complying with the technical specifications of compost production is of high importance not only for environmental protection but also for increasing the productivity and promotion of compost use by farmers in agriculture. This study focuses on the compost quality of the Palestinian market and farmers’ attitudes toward agricultural use of compost. The quality is assessed through selection of 20 compost samples of different suppliers and producers and lab testing for quality parameters, while the farmers’ attitudes to compost use for agriculture are evaluated through survey questionnaire of 321 farmers in the Hebron area. The results showed that the compost in the Palestinian markets is of medium quality due to partial or non-compliance with the quality standards and guidelines. The Palestinian farmers showed a positive attitude since 91.2% of them have the desire to use compost in agriculture. The results also showed that knowledge of difference between compost and chemical fertilizers, perception of compost benefits and previously experiencing problems in compost use, are significant factors affecting the farmers’ attitude toward the use of compost as an organic fertilizer.

Keywords: attitude, compost, compost quality, organic fertilizer, manure

Procedia PDF Downloads 162
3747 Fractional Order Controller Design for Vibration Attenuation in an Airplane Wing

Authors: Birs Isabela, Muresan Cristina, Folea Silviu, Prodan Ovidiu

Abstract:

The wing is one of the most important parts of an airplane because it ensures stability, sustenance and maneuverability of the airplane. Because of its shape, the airplane wing can be simplified to a smart beam. Active vibration suppression is realized using piezoelectric actuators that are mounted on the surface of the beam. This work presents a tuning procedure of fractional order controllers based on a graphical approach of the frequency domain representation. The efficacy of the method is proven by practically testing the controller on a laboratory scale experimental stand.

Keywords: fractional order control, piezoelectric actuators, smart beam, vibration suppression

Procedia PDF Downloads 313
3746 Smart Speed Bump

Authors: Mohammad Rahmani Rezaiyeh, Mojtaba Rahmani Rezaiyeh, Mehrdad Rahmani Rezaiyeh

Abstract:

Smart speed bump is a new invention and I am invented it. Smart speed bump is a system that can change the position of speed bumps either active or passive in necessary situations. The basic system of smart speed bumps is based on a robotic system which includes mechanic, electronic and artificial intelligence. The smart speed bump is capable of smart decision making and can change its position by anticipating the peak of terrific hours. It can be noted to the advantages of this system such as preventing the waste of petrol while crossing speed bumps, traffic management, accelerating, flowing and securing traffic, reducing accidents and judicial records.

Keywords: invention, smart, robotic system, speed bump, traffic, management

Procedia PDF Downloads 411
3745 In the Primary Education, the Classroom Teacher's Procedure of Coping WITH Stress, the Health of Psyche and the Direction of Check Point

Authors: Caglayan Pinar Demirtas, Mustafa Koc

Abstract:

Objective: This study was carried out in order to find out; the methods which are used by primary school teachers to cope with stress, their psychological health, and the direction of controlling focus. The study was carried out by using the ‘school survey’ and ‘society survey’ methods. Method: The study included primary school teachers. The study group was made up of 1066 people; 511 women and 555 men who accepted volunteerly to complete; ‘the inventory for collecting data, ‘the Scale for Attitude of Overcoming Stress’ (SBTE / SAOS), ‘Rotter’s Scale for the Focus of Inner- Outer Control’ (RİDKOÖ / RSFIOC), and ‘the Symptom Checking List’ (SCL- 90). The data was collected by using ‘the Scale for Attitude of Overcoming Stress’, ‘the Scale for the Focus of Inner- Outer Control’, ‘the Symptom Checking List’, and a personal information form developed by the researcher. SPSS for Windows packet programme was used. Result: The age variable is a factor in interpersonal sensitivity, depression, anxciety, hostality symptoms but it is not a factor in the other symptoms. The variable, gender, is a factor in emotional practical escaping overcoming method but it is not a factor in the other overcoming methods. Namely, it has been found out that, women use emotional practical escaping overcoming method more than men. Marital status is a factor in methods of overcoming stress such as trusting in religion, emotional practical escaping and biochemical escaping while it is not a factor in the other methods. Namely, it has been found out that married teachers use trusting in religion method, and emotional practical escaping method more than single ones. Single teachers generally use biochemical escaping method. In primary school teachers’ direction of controlling focus, gender variable is a factor. It has been found out that women are more inner controlled while the men are more outer controlled. The variable, time of service, is a factor in the direction of controlling focus; that is, teachers with 1-5 years of service time are more inner controlled compared with teachers with 16-20 years of service time. The variable, age, is a factor in the direction of controlling focus; that is, teachers in 26-30 age groups are more outer controlled compared with the other age groups and again teachers in 26-30 age group are more inner controlled when compared with the other age groups. Direction of controlling focus is a factor in the primary school teachers’ psychological health. Namely, being outer controlled is a factor but being inner controlled is not. The methods; trusting in religion, active plannıng and biochemical escaping used by primary school teachers to cope with stress act as factors in the direction of controlling focus but not in the others. Namely, it has been found out that outer controlled teachers prefer the methods of trusting in religion and active planning while the inner controlled ones prefer biochemical escaping.

Keywords: coping with, controlling focus, psychological health, stress

Procedia PDF Downloads 347
3744 Mathematical Modeling of Cell Volume Alterations under Different Osmotic Conditions

Authors: Juliana A. Knocikova, Yann Bouret, Médéric Argentina, Laurent Counillon

Abstract:

Cell volume, together with membrane potential and intracellular hydrogen ion concentration, is an essential biophysical parameter for normal cellular activity. Cell volumes can be altered by osmotically active compounds and extracellular tonicity. In this study, a simple mathematical model of osmotically induced cell swelling and shrinking is presented. Emphasis is given to water diffusion across the membrane. The mathematical description of the cellular behavior consists in a system of coupled ordinary differential equations. We compare experimental data of cell volume alterations driven by differences in osmotic pressure with mathematical simulations under hypotonic and hypertonic conditions. Implications for a future model are also discussed.

Keywords: eukaryotic cell, mathematical modeling, osmosis, volume alterations

Procedia PDF Downloads 455
3743 Investigating Water-Oxidation Using a Ru(III) Carboxamide Water Coordinated Complex

Authors: Yosra M. Badiei, Evelyn Ortiz, Marisa Portenti, David Szalda

Abstract:

Water-oxidation half-reaction is a critical reaction that can be driven by a sustainable energy source (e.g., solar or wind) and be coupled with a chemical fuel making reaction which stores the released electrons and protons from water (e.g., H₂ or methanol). The use of molecular water-oxidation catalysts (WOC) allow the rationale design of redox active metal centers and provides a better understanding of their structure-activity-relationship. Herein, the structure of a Ru(III) complex bearing a doubly deprotonated N,N'-bis(aryl)pyridine-2,6-dicarboxamide ligand which contains a water molecule in its primary coordination sphere was elucidated by single-crystal X-ray diffraction. Further spectroscopic experimental data and pH-dependent electrochemical studies reveal its water-oxidation reactivity. Emphasis on mechanistic details for O₂ formation of this complex will be addressed.

Keywords: water-oxidation, catalysis, ruthenium, artificial photosynthesis

Procedia PDF Downloads 193
3742 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 84
3741 The Enzyme Inhibitory Potentials of Different Extracts from Linaria genistifolia subsp. genistifolia

Authors: Gokhan Zengin, Abdurrahman Aktumsek

Abstract:

The key enzyme inhibitory theory is one of the most accepted strategies in the treatment of global health problems including Alzheimer’s Disease and Diabetes mellitus. For this reason, the enzyme inhibitory potentials of different solvent extracts from Linaria genistifolia subsp. genistifolia were investigated against cholinesterase, and tyrosinase. The in vitro enzyme inhibitory potentials were measured with a microplate reader. The acetone and methanol extracts exhibited the strongest enzyme inhibitory effects on cholinesterase. However, the water extract was only active on tyrosinase. The results suggested that Linaria genistifolia subsp. genistifolia could be considered as a source of natural enzyme inhibitors for the treatment of major health problems.

Keywords: enzyme inhibitors, cholinesterase, tyrosinase, linaria, Turkey

Procedia PDF Downloads 304
3740 Photocatalytic Degradation of Phenol by Fe-Doped Tio2 under Solar Simulated Light

Authors: Mohamed Gar Alalm, Shinichi Ookawara, Ahmed Tawfik

Abstract:

In the present work, photocatalytic oxidation of phenol by iron (Fe+2) doped titanium dioxide (TiO2) was studied. The source of irradiation was solar simulated light under measured UV flux. The effect of light intensity, pH, catalyst loading, and initial concentration of phenol were investigated. The maximum removal of phenol at optimum conditions was 78%. The optimum pH was 5.3. The most effective degradation occurred when the catalyst dosage was 600 mg/L. increasing the initial concentration of phenol decreased the degradation efficiency due to the deactivation of active sites by additional intermediates. Phenol photocatalytic degradation moderately fitted to the pseudo-first order kinetic equation approximated from Langmuir–Hinshelwood model.

Keywords: phenol, photocatalytic, solar, titanium dioxide

Procedia PDF Downloads 396
3739 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 293
3738 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 409
3737 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 358
3736 The Antecedents That Effect to the Adventure Tourism in Krabi, Thailand

Authors: Autjira Songjan, Vimolsri Sansuk

Abstract:

The research aim to study the possible negative environmental impact by adventure tourism in Krabi, Thailand, which is a popular destination for adventure tourism. The research is carried out through quantitative and qualitative methods. Questionnaires are distributed to 400 adventure tourists: 160 Thai and 240 international tourists. Questions involved experiences and opinions towards the environment and certain practices which influence a protection or degradation of environment from tour guides, tour operators and tourists. Furthermore, in-depth interviews were carried out with 21 adventure tour operators operating 5 main adventure tours. The finding shows the various types of adventure activities in Krabi involve different kinds of nature, therefore the characteristics of the different adventure activities are likely to affect the physical environment in different level. Kayaking tours are managed inside the mangrove forests, and may lead to negative impact on the ecosystem of mangroves, through loud noise, pulling out the mangrove population.

Keywords: adventure activities, Krabi province in Thailand, physical environment, adventure tourism

Procedia PDF Downloads 263
3735 DNA Multiplier: A Design Architecture of a Multiplier Circuit Using DNA Molecules

Authors: Hafiz Md. Hasan Babu, Khandaker Mohammad Mohi Uddin, Nitish Biswas, Sarreha Tasmin Rikta, Nuzmul Hossain Nahid

Abstract:

Nanomedicine and bioengineering use biological systems that can perform computing operations. In a biocomputational circuit, different types of biomolecules and DNA (Deoxyribose Nucleic Acid) are used as active components. DNA computing has the capability of performing parallel processing and a large storage capacity that makes it diverse from other computing systems. In most processors, the multiplier is treated as a core hardware block, and multiplication is one of the time-consuming and lengthy tasks. In this paper, cost-effective DNA multipliers are designed using algorithms of molecular DNA operations with respect to conventional ones. The speed and storage capacity of a DNA multiplier are also much higher than a traditional silicon-based multiplier.

Keywords: biological systems, DNA multiplier, large storage, parallel processing

Procedia PDF Downloads 208
3734 Thiosemicarbazone Derived from 4-Aminoantipyrine as Corrosion Inhibitor

Authors: Ahmed A. Al-Amiery, Yasmin K. Al-Majedy, Abdul Amir H. Kadhum, Abu Bakar Mohamad

Abstract:

The efficiency of synthesized thiosemicarbazone namely 2-(1,5-dimethyl-4-(2-methylbenzylidene)amino)-2-phenyl-1H-pyrazol-3(2H)-ylidene) hydrazinecarbothioamide investigated as corrosion inhibitor of mild steel in 1N H2SO4 using electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization (PD) in addition of scanning electron microscopy (SEM). The results showed that this inhibitor behaved as a good corrosion inhibitor even at low concentration with a mean efficiency of 93%. Polarization technique and EIS were tested in different concentrations reveal that this compound is adsorbed on the mild steel, therefore blocking the active sites and the adsorption follows the Langmuir adsorption isotherm model. SEM shows that mild steel surface is nearly perfect for mild steel which was immersed in a solution of H2SO4 with corrosion inhibitor.

Keywords: corrosion inhibitor, thiosemicarbazide, electrochemical impedance, electrochemical impedance spectroscopy

Procedia PDF Downloads 512
3733 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique

Authors: Gagnesh Kumar, Nitin Gupta

Abstract:

Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.

Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)

Procedia PDF Downloads 290
3732 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 154
3731 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 74
3730 Strategies for Arctic Greenhouse Farming: An Energy and Technology Survey of Greenhouse Farming in the North of Sweden

Authors: William Sigvardsson, Christoffer Alenius, Jenny Lindblom, Andreas Johansson, Marcus Sandberg

Abstract:

This article covers a study focusing on a subarctic greenhouse located in Nikkala, Sweden. Through a visit and the creation of a CFD model, the study investigates the differences in energy demand with high pressure sodium (HPS) lights and light emitting diode (LED) lights in combination with an air-carried and water-carried heating system accordingly. Through an IDA ICE model, the impact of insulating the parts of the greenhouse without active cultivation was also investigated. This, with the purpose of comparing the current system in the greenhouse to state-of-the-art alternatives and evaluating if an investment in either a water-carried heating system in combination with LED lights and insulating the non-cultivating parts of the greenhouse could be considered profitable. Operating a greenhouse in the harsh subarctic climate found in the northern parts of Sweden is not an easy task and especially if the operation is year-round. With an average temperature of under -5 °C from November through January, efficient growing techniques are a must to ensure a profitable business. Today the most crucial parts of a greenhouse are the heating system, lighting system, dehumidifying measures, as well as thermal screen, and the impact of a poorly designed system in a sub-arctic could be devastating as the margins are slim. The greenhouse studied uses a pellet burner to power their air- carried heating system which is used. The simulations found the resulting savings amounted to just under 14 800 SEK monthly or 18 % of the total cost of energy by implementing the water-carrying heating system in combination with the LED lamps. Given this, a payback period of 3-9 years could be expected given different scenarios, including specific time periods, financial aids, and the resale price of the current system. The insulation of the non-cultivating parts of the greenhouse was found to have possible savings of 25 300 SEK annually or 46 % of the current heat demand resulting in a payback period of just over 1-2 years. Given the possible energy savings, a reduction in emitted CO2 equivalents of almost 1,9 tonnes could be achieved annually. It was concluded that relatively inexpensive investments in modern greenhouse equipment could make a significant contribution to reducing the energy consumption of the greenhouse resulting in a more competitive business environment for sub-arctic greenhouse owners. New parts of the greenhouse should be built with the water-carried heating system in combination with state-of-the-art LED lights, and all parts which are not housing active cultivation should be insulated. If the greenhouse in Nikkala is eligible for financial aid or finds a resale value in the current system, an investment should be made in a new water-carried heating system in combination with LED lights.

Keywords: energy efficiency, sub-arctic greenhouses, energy measures, greenhouse climate control, greenhouse technology, CFD

Procedia PDF Downloads 69
3729 Fuzzy Sliding Mode Control of a Flexible Structure for Vibration Suppression Using MFC Actuator

Authors: Jinsiang Shaw, Shih-Chieh Tseng

Abstract:

Active vibration control is good for low frequency excitation, with advantages of light weight and adaptability. This paper use a macro-fiber composite (MFC) actuator for vibration suppression in a cantilevered beam due to its higher output force to suppress the disturbance. A fuzzy sliding mode controller is developed and applied to this system. Experimental results illustrate that the controller and MFC actuator are very effective in attenuating the structural vibration near the first resonant freuqency. Furthermore, this controller is shown to outperform the traditional skyhook controller, with nearly 90% of the vibration suppressed at the first resonant frequency of the structure.

Keywords: Fuzzy sliding mode controller, macro-fiber-composite actuator, skyhook controller, vibration suppression

Procedia PDF Downloads 397
3728 Design of Rigid L-Shaped Retaining Walls

Authors: Ahmed Rouili

Abstract:

Cantilever L-shaped walls are known to be relatively economical as retaining solution. The design starts by proportioning the wall dimensions for which the stability is checked for. A ratio between the lengths of the base and the stem, falling between 0,5 to 0,7, ensure the stability requirements in most cases. However, the displacement pattern of the wall in terms of rotations and translations, and the lateral pressure profile, do not have the same figure for all wall’s proportioning, as it is usually assumed. In the present work, the results of a numerical analysis are presented, different wall geometries were considered. The results show that the proportioning governs the equilibrium between the instantaneous rotation and the translation of the wall-toe, also, the lateral pressure estimation based on the average value between the at-rest and the active pressure, recommended by most design standards, is found to be not applicable for all walls.

Keywords: cantilever wall, proportioning, numerical analysis, lateral pressure estimation

Procedia PDF Downloads 320
3727 Family Planning Use among Women Living with HIV in Malawi: Analysis from Malawi DHS-2010 Data

Authors: Dereje Habte, Jane Namasasu

Abstract:

Background: The aim of the analysis was to assess the practice of family planning (FP) among HIV-infected women and the influence of women’s awareness of HIV-positive status in the practice of FP. Methods: The analysis was made among 489 non-pregnant, sexually active, fecund women living with HIV. Result: Of the 489 confirmed HIV positive women, 184 (37.6%) reported that they knew they are HIV positive. The number of women with current use and unmet need of any family planning method were found to be 251 (51.2%) and 107 (21.9%) respectively. Women’s knowledge of HIV-positive status (AOR: 2.32(1.54,3.50)), secondary and above education (AOR: 2.36(1.16,4.78)), presence of 3-4 (AOR: 2.60(1.08,6.28)) and more than four alive children (AOR: 3.03(1.18,7.82)) were significantly associated with current use of family planning. Conclusion: Women’s awareness of HIV-positive status was found to significantly predict family planning practice among women living with HIV.

Keywords: family planning, HIV, Malawi, women

Procedia PDF Downloads 593
3726 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 138
3725 Ultrasound Assisted Extraction and Microwave Assisted Extraction of Carotenoids from Melon Shells

Authors: A. Brinda Lakshmi, J. Lakshmi Priya

Abstract:

Cantaloupes (muskmelon and watermelon) contain biologically active molecules such as carotenoids which are natural pigments used as food colorants and afford health benefits. ß-carotene is the major source of carotenoids present in muskmelon and watermelon shell. Carotenoids were extracted using Microwave assisted extraction (MAE) and Ultrasound assisted extraction (UAE) utilising organic lipophilic solvents such as acetone, methanol, and hexane. Extraction conditions feed-solvent ratio, microwave power, ultrasound frequency, temperature and particle size were varied and optimized. It was found that the yield of carotenoids was higher using UAE than MAE, and muskmelon had the highest yield of carotenoids when was ethanol used as a solvent for 0.5 mm particle size.

Keywords: carotenoids, extraction, muskmelon shell, watermelon shell

Procedia PDF Downloads 261
3724 Sliding Mode Control of the Power of Doubly Fed Induction Generator for Variable Speed Wind Energy Conversion System

Authors: Ahmed Abbou, Ali Mousmi, Rachid El Akhrif

Abstract:

This research paper aims to reduce the chattering phenomenon due to control by sliding mode control applied on a wind energy conversion system based on the doubly fed induction generator (DFIG). Our goal is to offset the effect of parametric uncertainties and come as close as possible to the dynamic response solicited by the control law in the ideal case and therefore force the active and reactive power generated by the DFIG to accurately follow the reference values which are provided to it. The simulation results using Matlab / Simulink demonstrate the efficiency and performance of the proposed technique while maintaining the simplicity of control by first order sliding mode.

Keywords: correction of the equivalent command, DFIG, induction machine, sliding mode controller

Procedia PDF Downloads 407
3723 Navigating the VUCA World with a Strong Heart and Mind: How to Build Passion and Character

Authors: Shynn Lim, Ching Tan

Abstract:

The paper presents the PASSION Programme designed by a government school in Singapore, guided by national goals as well as research-based pedagogies that aims to nurture students to become lifelong learners with the strength of character. The design and enactment of the integrated approach to develop in students good character, resilience and social-emotional well-being, future readiness, and active citizenship is guided by a set of principles that amalgamates Biesta’s domains of purposes of education and authentic learning. Data in terms of evidence of students’ learning and students’ feedback were collected, analysed, and suggests that the learning experience benefitted students by boosting their self-confidence, self-directed and collaborative learning skills, as well as empathy.

Keywords: lifelong learning, character and citizenship education, education and career guidance, 21CC, teaching and learning empathy

Procedia PDF Downloads 138
3722 Structural Analysis of Archaeoseismic Records Linked to the 5 July 408 - 410 AD Utica Strong Earthquake (NE Tunisia)

Authors: Noureddine Ben Ayed, Abdelkader Soumaya, Saïd Maouche, Ali Kadri, Mongi Gueddiche, Hayet Khayati-Ammar, Ahmed Braham

Abstract:

The archaeological monument of Utica, located in north-eastern Tunisia, was founded (8th century BC) By the Phoenicians as a port installed on the trade route connecting Phoenicia and the Straits of Gibraltar in the Mediterranean Sea. The flourishment of this city as an important settlement during the Roman period was followed by a sudden abandonment, disuse and progressive oblivion in the first half of the fifth century AD. This decadence can be attributed to the destructive earthquake of 5 July 408 - 410 AD, affecting this historic city as documented in 1906 by the seismologist Fernand De Montessus De Ballore. The magnitude of the Utica earthquake was estimated at 6.8 by the Tunisian National Institute of Meteorology (INM). In order to highlight the damage caused by this earthquake, a field survey was carried out at the Utica ruins to detect and analyse the earthquake archaeological effects (EAEs) using structural geology methods. This approach allowed us to highlight several structural damages, including: (1) folded mortar pavements, (2) cracks affecting the mosaic and walls of a water basin in the "House of the Grand Oecus", (3) displaced columns, (4) block extrusion in masonry walls, (5) undulations in mosaic pavements, (6) tilted walls. The structural analysis of these EAEs and data measurements reveal a seismic cause for all evidence of deformation in the Utica monument. The maximum horizontal strain of the ground (e.g. SHmax) inferred from the building oriented damage in Utica shows a NNW-SSE direction under a compressive tectonic regime. For the seismogenic source of this earthquake, we propose the active E-W to NE-SW trending Utique - Ghar El Melh reverse fault, passing through the Utica Monument and extending towards the Ghar El Melh Lake, as the causative tectonic structure. The active fault trace is well supported by instrumental seismicity, geophysical data (e.g., gravity, seismic profiles) and geomorphological analyses. In summary, we find that the archaeoseismic records detected at Utica are similar to those observed at many other archaeological sites affected by destructive ancient earthquakes around the world. Furthermore, the calculated orientation of the average maximum horizontal stress (SHmax) closely match the state of the actual stress field, as highlighted by some earthquake focal mechanisms in this region.

Keywords: Tunisia, utica, seimogenic fault, archaeological earthquake effects

Procedia PDF Downloads 37
3721 Structure Elucidation of Isolated Active Compounds from Nigella sativa and Calotropis procera and Their Efficacy for Treatment of Asthma

Authors: Intisar S. A. Elzein

Abstract:

In Saudi Arabia parts of Nigella sativa, and Calotropis procera are commonly used in folk medicine for the treatment of asthma, bronchitis, cough, eczema and other diseases. The purpose of the study is to identify chemical constituents of Nigella sativa seed and Calotropis procera leave isolated by the bioassay guided fractionation process and find out their relevance to the alleged efficacy of the plant in treating asthma. The medicinal properties of both plants for asthma treatment referred to the rich abundance of thymoquinone and phytol compounds isolated from the essential oil of their seed and leave extracts, which they can form a part of molecules of vitamin K.

Keywords: asthma, Calotropis procera, chemical constituents, Nigella sativa, vitamin K

Procedia PDF Downloads 245